Close
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    Need for Anti-Phishing Vigilance Continues

    By
    eWEEK Editorial Board
    -
    October 17, 2005
    Share
    Facebook
    Twitter
    Linkedin

      Despite the recent emergence of anti-phishing legislation, IT managers and consumers would be foolish not to continue implementing their own stringent technology measures against this persistent strain of online fraud.

      On the heels of similar legislation in New Mexico, Arizona and Texas, and with federal legislation pending, Californias Anti-Phishing Act of 2005 criminalizes phishing, with a threat of steep fines.

      /zimages/2/28571.gifCritics doubt the effectiveness of Californias anti-phishing law. Click here to read more.

      More important, the law allows a business or consumer to file a complaint against a phisher without specifically showing damages, unless the claimed damage is more than $500,000 to a business or $5,000 to an individual. This provision takes such actions off the slow and laborious track of fraud complaints.

      Whats missing from this law, as the Computer Crime Research Center notes on its Web site, is any real response to the phishers three means of evasion.

      First, phishers crimes readily cross geographic borders, which makes finding phishers difficult.

      Second, that same mobility impedes the establishment of jurisdiction to prosecute.

      Third, phishers can readily make themselves judgment-proof by such means as declaring bankruptcy or simply failing to make appearances or payments. Phishers are ephemeral entities, not brick-and-mortar business establishments whose doors can be locked and assets seized.

      To deter phishing, federal, and even international, laws are needed. Although not common, international cooperation is not unprecedented; air transportation and radio spectrum usage have both given rise to international agreements.

      /zimages/2/28571.gifClick here to read how the private sector and the feds are teaming up against phishing.

      Nonetheless, IT managers should note how long its taken just to get a few, limited anti-phishing state laws passed, and they should continue to rely on technology measures to stay ahead of phishers.

      Banks, stores and other companies that support online services must step up to the challenge of adopting and implementing tougher authentication technologies to make it harder for phishers to imitate their sites and their customers.

      Multifactor authentication techniques, biometrics or ID cards, and password policies that force users to create stronger passwords and change them regularly should be used by all e-commerce sites. These measures will reduce the ease with which a phisher can adopt a legitimate customers identity based on theft of merely a user ID and password, and they will reduce the life span and therefore the value of stolen identity information.

      Single sign-on is another effective step. It makes it easier for users to keep track of accounts because there is no need to manage all accounts separately, with different user names and passwords at every site. Also, if users sense that something phishy is going on, they can go back to a trusted site to immediately reset their global passwords and minimize exposure risks.

      Inconvenience and cost are often deterrents for implementing enhanced site security, but considering the feeble state of anti- phishing laws and the millions or even billions of dollars that could be lost to phishing scams in future years, a proactive approach to eliminating phishing is worth the pain.

      /zimages/2/28571.gifCheck out eWEEK.coms for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at eWEEK.com Security Center Editor Larry Seltzers Weblog.

      eWEEK Editorial Board
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.

      MOST POPULAR ARTICLES

      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Applications

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      IT Management

      Intuit’s Nhung Ho on AI for the...

      James Maguire - May 13, 2022 0
      I spoke with Nhung Ho, Vice President of AI at Intuit, about adoption of AI in the small and medium-sized business market, and how...
      Read more
      Applications

      Kyndryl’s Nicolas Sekkaki on Handling AI and...

      James Maguire - November 9, 2022 0
      I spoke with Nicolas Sekkaki, Group Practice Leader for Applications, Data and AI at Kyndryl, about how companies can boost both their AI and...
      Read more
      Cloud

      IGEL CEO Jed Ayres on Edge and...

      James Maguire - June 14, 2022 0
      I spoke with Jed Ayres, CEO of IGEL, about the endpoint sector, and an open source OS for the cloud; we also spoke about...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2022 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×