Secure and Portable

ID Control USB Token is a secure USB flash Token with secure flash storage up to  64GB, protecting with strong encryption and a mandatory strong password protecting your digital assets and privacy inside. The ID Control USB Token provides very interesting security and portability features.

Latest

A password vault is as mandatory as anti-virus

We all need to get out of the mindset that our primary e-mail address combined with a single universal password are our credentials for the world.
Admit it. You have one password. You may even have half a dozen variations on your childhood cat’s name, but it is still the same basic password, and you use it to log into American Express, Netflix, Bank of America, GMail, Comcast, MySpace, Fark, Twitter, Virgin America, EBay, New York Times, and even the message forum where you talk about your obsessive collecting of late 19th century yak bridles.

You think to yourself, hey, what’s the big deal, right? Having the same password in one location won’t affect the security of the other location. If someone compromises your Netflix account, for example, the worst that can happen is they realize you favor tripe like The Notebook and National Treasure rather than quality cinema like Blade Runner and Rocky. It isn’t like they can pull your credit card information from the site and use it elsewhere, and besides, it isn’t like anyone who grabbed your password would be able to figure out all the other websites you visit.

You are forgetting that when you use the same username, an e-mail address, and the same password on numerous websites, you are relying upon the strength of the security of the weakest website you authenticate against to guarantee the secrecy of our login credentials. In other words, if you use the same username and password at 50 odd websites, you are relying upon the laziest system administrator of all 50 systems to keep their web app from being hacked to prevent your credentials from leaking out. Again, big deal, right?

Let’s say someone compromises yakbridletrader.com as part of compromising everyone that is still running PHPNuke. They dump the usernames and passwords online for all to see and share. Someone notices that your e-mail address, This email address is being protected from spambots. You need JavaScript enabled to view it. , is in the tuple, and gets the bright idea to go to GMail and try your yakbridletrader.com password. From there they go and figure out what bank backs your credit card, and well… you get the idea.

Having a strong and diverse password everywhere is mandatory now. It is as mandatory as running anti-virus on a PC and having a working set of backups. Like backups and anti-virus, if you don’t have a strong and diverse password that is different on every website you visit, you have no right to complain if you get compromised because someone took down the one-stop yak shop.

 

FBI Releases 2009 Internet Crime Report

Crime Complaint Center Growth Internet Crime The Internet Crime Complaint Center (IC3) released its 2009 Annual Internet Crime Report late last week. Complaints regarding online crime increased dramatically in the past year, experiencing a 22.3 percent increase over the previous year.

The IC3 received 336,655 complaints with an estimated total loss of $559.7 million, up by approximately $265 million from the previous year. Fraud that utilized the FBI’s name for advanced fee scams was the most prolific with non-payment or non-delivery coming in second.

The doubled damage caused by internet fraud was remarkable. A victim of online fraud lost on the average 575 US dollars. Of the top five categories of offenses reported to law enforcement during 2009, non-delivered merchandise and/or payment ranked 19.9%; identity thieft, 14.1%; credit card fraud, 10.4%; auction fraud, 10.3%; and computer fraud (destruction/damage/vandalism of property), 7.9%.

The 2009 Annual Report along with previous reports, can be downloaded here

 

Companies face fines of £500,000 for losing data

The Information Commissioner's Office (ICO) has been granted new powers by the Government that could see organisations facing fines of up to £500,000 for breaching the Data Protection Act.

The ICO's new powers come into force today, and give the organisation significantly greater muscle in taking on data security breaches. Firms now risk a fine of £500,000 for losing consumer data – equivalent to more than 10 per cent of most small companies' annual turnover, and a figure 100 times higher than the previous maximum penalty the ICO could impose.

The severity of the fine will be determined on the basis of the precautions taken by the company or department in question, and the nature of the data security breach.

According to the ICO's guidelines on the Data Protection Act, the most serious fines will occur in cases where the data controller responsible has “seriously contravened the data protection principles and the contravention was of a kind likely to cause substantial damage or substantial distress”.

 

Check Point survey reveals that only 10 percent of laptop users protect their personal data

Check Point conducted two surveys in January and February, 2010 to explore consumer experience and attitudes about data privacy and actions taken to protect private data. The first survey was conducted on behalf of Check Point by Harris Interactive, followed by a similar survey of ZoneAlarm customers, conducted by Check Point.

Almost half of the laptop users installs no security software
or password in order to protect the machine.  44% of the surveyed consumers says not to have a virusscanner or firewall in place on the computer. A password at start-up is not enforced for 45% of the users. Although laptops seem often to be be stolen only ten percent use full disk encryption. Eleven percent think this is unnecessary since they do not store any personal data on the computer.


Unauthorized access to private data, including credit card information, financial and medical records, private photos and work files was the number one concern for laptop users, ahead of the 35 percent that were mostly worried about the hardware replacement cost. Only 56% are concerned about the privacy consequences.

Laptops store different information than desktops. Laptops are used to store more tax records and business documents, desktops store more personal photos and videos.



 

Company

ID ControlID Control B.V., www.idcontrol.com offers strong, affordable and easy authentication with the mobile authentication solutions HandyID and MessageID based on One Time Password technology, keystroke behavior recognition with KeystrokeID, risk based assessment of the DNA of mobile phones with RiskID as a strong authentication method for mobile phones before syncing of email or contact data takes place, hardware based authentication tokens based on One Time Password technology with ID Control OTP Key or PKI based authentication and signing with the ID Control USB Token. Strong authentication is possible for VPN, web mail, network authentication, server based computing and web applications. Organizations that use different authentication methods and tokens for different users, accounts, services, systems and/or applications can centrally and integrally manage all kinds, even compatible third party tokens, with the ID Control Server.


ID Control BV is specialized in advanced strong authentication and encryption solutions. ID Control offers a variety of security hardware and software strong authentication tokens and services in order to make your access to extranet, VPN, web mail, Server Based Computing, transactions and the digital signature with strong authentication more secure.

ID Control: “Strong, Affordable and Easy Authentication”

Read more: Company
 

Latest News

What customers say...

Hi,

We protected the internet banking solution we developed for a large financial insititute with PKI and stored the digital certificates inside of the ID Control USB Token. Thanks for all the great support and easy integration.

- SFL Pro Armenia

webdesign by sushitek.com