Identity Protection is the New Security Concern

Identity Protection is the New Security Concern

What if hackers didn’t need to know a lot about technology and leverage system vulnerabilities to get where they wanted to go? It’s a reality we’re starting to see. Criminals don’t need to break in if they can get your credentials and just log in. Identity is becoming a weapon in cybercrime. And that means identity protection is more crucial than ever.

See Identity is the New Security Perimeter with Jeff Reich for a complete transcript of the Easy Prey podcast episode.

Jeff Reich is the Executive Director of the Identity Defined Security Alliance (IDSA), a nonprofit focused on two different components of identity protection – identity security and raising awareness about the importance of it. Before that, he did a variety of things. He got his degree in physics and astrophysics and taught at a planetarium for a while before moving to law enforcement. He was good at it, but his fellow officers kept asking why he was there if he had a degree. Eventually, he became convinced that doing something that didn’t involve getting shot at was a good idea. He went back to school, and eventually ended up in Texas, where he’s been for the past five decades.

His career included starting security programs at ARCO (a petroleum company now owned by Marathon), Dell, a financial services company, and several hosting companies. For a few years, he was the director of a cloud security-focused research center at the University of Texas San Antonio. He’s been with the IDSA for about three years, and appreciates no longer having to be on call. There was a point with one job that his non-techie wife could diagnose firewall problems as well as he could because she’d overheard so many 2 a.m. conversations.

Incidents and Identity Protection

Jeff has a lot of stories about scams, frauds, and security incidents. And a lot of them come down to situational awareness. Situational awareness is just what it sounds like – being aware of the truth of a situation and acting accordingly. If you’ve ever seen a Jason Bourne movie, whenever he goes into a new place the first thing he looks for is exit points. That’s situational awareness. Jeff isn’t Jason Bourne, so the things he needs to be aware of are a little different, but the concept is similar.

In the past month, you’ve probably gotten a text that seems interesting, sincere, or just vague, and it turned out to be a scam. It happens with phone calls, too. Being aware that this is a scam tactic can help you avoid a potentially terrible situation.

If you’re receiving something from someone you don’t know, assume it’s hostile. – Jeff Reich

Incidents and Identity Protection

Strange Signals from the Servers

Not long after starting one role at a hosting company, Jeff noticed clusters of servers in the network center would go to red status, be red for about ten minutes, then turn back to green, then another cluster would do the same thing. He asked the network technicians if they were doing maintenance. They said it happened to the servers all the time, but the customers didn’t really complain.

Jeff went to the CFO and asked about the size discrepancy between the bandwidth the company was paying for and the bandwidth they were selling. The CFO said he was just thinking about that and couldn’t figure out where all their bandwidth was going. It ended up being a five-month incident where the hackers were not only stealing bandwidth, but taking over customer websites. Even a complete wipe and gold disc image reboot didn’t help, which meant their gold disc backup was compromised too. At the time, perimeter security was relatively new, and Jeff decided to beef up the perimeter first to see if they could get through. It became a cat-and-mouse game of protecting sites and trying to keep them out.

Jeff later found out that the hackers were reaching out to customers and pretending to be from the hosting company. That’s how they got in. Sometimes they were mean and berated the customers if they wouldn’t comply, and customers got upset about the terrible customer service. But Jeff and the team at the company had no idea about any of this until one customer contacted them. That’s one key to avoiding these threats. Always use a channel you know works. Wherever you think a contact is from, don’t reply – validate it using known contact information. Validate every message you get.

A Fraudulent Invoice Incident

In another situation, Jeff was doing some consulting. The company wanted him to recommend a cybersecurity framework. When he arrived, there had been a miscommunication, and the CIO didn’t know he was coming. So when he walked in, the CIO asked if he was there about the incident. Jeff hadn’t heard about the incident, but asked his contact at the company. Since the CIO had already said something, he explained. One of the company’s customers paid a $2 million invoice, but the money didn’t go to the company. They found out when they sent the invoice to the customer, and the customer called and said they already paid.

The CEO wanted to fire the entire IT team about it. But what had happened was business email compromise. The criminal had created a domain with one character that looked similar, figured out what the company’s invoices looked like, and was able to send a legit-looking email with fraudulent payment instructions. The CEO wanted tech to prevent this, but there isn’t any. Jeff recommended sending all customers the company’s payment info, with a notice that any time they see something different, it’s a scam, they shouldn’t pay and should call the company. If someone pays anyway, that’s on them.

Spoofing is easy – even spoofing someone’s voice on the phone, with AI. If you get a call from your brother that he’s in jail and needs bail money, the first thing you should do is call your brother. If you get an email from a company advising of new information for paying invoices, call the company. Verify and validate in a way you know, every time.

How Identity and Identity Protection Has Changed

The concept of identity is pretty much the same now as it has always been, with a few new components. The biggest change is that everything happens much faster and identity protection has to account for that. If you go back to the 1950s, most people had a social security number. So you have your carbon-based physical identity and this number, which is not supposed to be used for identification but often is. For a long time, the military printed your social security number on your equipment.

A portion of your identity may or may not related to your carbon-based self. Most people have a bank account, which is a number. You may have an account at a store. If you went to school, you got some sort of identifier. Going back a hundred years, it looks a little different, but it’s not as simple as everyone likes to think. Now we have more components, and also additional tools to manage those components.

IDSA recently had their Identity Management Day, and the theme for 2025 was “existential identity.” Your identity may be based on the carbon-based identity you see in the mirror, but you also have an identity at work, through your personal email, your Meta account, your Google account, any shopping accounts, any streaming accounts – anything you do online ends up as part of your identity. Jeff has twelve email addresses to separate parts of his identity. One, for example, he uses only for financial transactions. You can keep some parts of your identity separate for better protection.

So what’s changed over the years? Identity theft occurred in the 1950s and even earlier, but started ramping up in the 1980s. Driver’s licenses and other forms of ID were easier to duplicate back then. And these licenses and numbers are part of your identity. These days, there are more components to your identity, but fundamentally not much has changed. It’s just much faster now and criminals can do identity crimes in bulk.

Identity theft and protecting identity is not a new concept, but … the playing field has completely changed and everything is faster. – Jeff Reich

Identity Protection and Compromise

If you’re in a situation where someone is using your identity and claiming to be you, how you want to respond and protect your identity depends on the situation. If they’re claiming to be you to your bank or to the IRS, it might be worth considering an attorney. But if it’s a browsing website, you can probably manage it yourself. It’s a spectrum.

Identity Protection and Compromise

When someone tries to impersonate you, there’s two victims – you and the organization they’re impersonating you to. If the organization was concerned about security, they should have given you a process with a failsafe. There are a lot of different failsafe methods, from a PIN to a pre-determined phone number to call. And many aren’t expensive. If there’s not that failsafe, consider telling the organization that it’s time to play King Solomon – determine criteria, decide which of you is real, and apply that to every customer. That’s why you sometimes need an attorney. The words have more force when said by someone with “Esquire” at the end of their name.

In the end, you have to put the onus on the organization that was willing to accept the bogus credentials. The first thing you should do is freeze all activity. You don’t want the account to be able to do anything until the matter is settled. A good organization will do that. One that doesn’t deserves to lose you as a customer. Additionally, most scammers aren’t going to ask the bank to freeze accounts until it’s resolved. Once a scammer realizes it’s going to take time and effort, they’re probably going to give up and move on. Unless, of course, you’re a high-net-worth person – in which case you should hire someone specifically to protect your assets.

The Future of Identity

Identity protection is making huge advances. Future identity protection is going to use AI. It’s relatively easy to impersonate someone using AI, so we should be able to use it as a relatively easy way of confirming identity. Some tools already exist. The challenge is getting enough big organizations to make the investment. Jeff has known people who have more token generators on their keychains than actual keys. Going to apps changes the security profile. There are advantages and risks to both. Going down to just one way to get tokens concentrates the risk.

If there’s going to be an identity protection app that blows up in the next five years, it’s going to be an aggregator. It will be something that takes every key you have, registers it, and confirms your identity. Rather than consolidating everything, it just aggregates it. The app that can duplicate every YubiKey or other options is going to be big in the identity space in the next five years.

A neutral authenticator app would also be a big hit in the next five years. Microsoft and Google both have good ones, but if you don’t trust Google, why would you trust their app? An independent organization with no big tech alliances or association with a big company would probably see some popularity.

DNA-Based Identity

This advancement is probably at least a decade out, but Jeff thinks it’s possible we’ll see DNA-based identity in the future. The DNA info from 23andMe is about to be sold. Whether or not that’s wrong, consider the ramifications of who’s going to buy it and what they’re going to do with it. Without a scenario involving CRISPR and a time machine, you can’t change your DNA. With that information being sold, do you want to take that risk or do you want to delete your data off the app before it’s sold? Nobody was thinking about this risk when they wanted to find out their ancestry, but we need to consider it.

This data could go into a DNA registry that could be used for identification and identity protection. We already put our fingers on readers for fingerprint ID. It could easily be modified for a DNA reader and it wouldn’t need to do a full analysis, just a quick match. We have the technical capability. A better question is can we duplicate it in a way that we can read in three dimensions. That’s how face ID works now, too. The reason you have to look different directions when you do the initialization is because it doesn’t just want to take a photo, it wants a three-dimensional image.

The Future of Identity Threats

A big change to identity protection and threats is time. You may not know an attack happened until long after because they’re no longer attacking you directly. They don’t have to. Hackers aren’t breaking in anymore. They’re stealing credentials and logging in. That’s what’s going to happen to most companies that have compromises. You won’t know what happened until you see the effects, and that may be a while.

Hackers are no longer breaking into companies. They’re logging in. – Jeff Reich

We’re going to see a lot more of these attempts. For identity protection, people need situational awareness. Know what you should be confirming and what not to trust. You don’t need to be tough enough to defeat the hacker, you need to be just tough enough that they decide you’re too much work and they should look for an easier target.

Validate everything. Assume any contact you get is fraudulent until proven otherwise. Clean up wherever you can by deleting accounts and data you don’t use. Consider dividing the things you do into different classifications of security and acting appropriately. Do what you can to not work with organizations that don’t protect your data. Jeff once left a doctor’s office because of this. Jeff would argue that things like health data need to be protected more than your accounts. You can get a new account with a different number if you need to. You can’t change your medical history or your DNA.

Reach Jeff Reich through the Identity Defined Security Alliance at www.idsalliance.org. You can also email him at [email protected] or find him on LinkedIn. There are also a lot of resources free on the IDSA website, and you can also consider membership at different levels in IDSA.

About Your Host

Chris Parker

Chris Parker is the founder of WhatIsMyIPAddress.com, a tech-friendly website attracting a remarkable 6,000,000 visitors a month. In 2000, Chris created WhatIsMyIPAddress.com as a solution to finding his employer’s office IP address. Today, WhatIsMyIPAddress.com is among the top 3,000 websites in the U.S.

Share Post:

COULD YOU BE EASY PREY?

Take the Easy Prey
 Self-Assessment.

YOU MAY ALSO LIKE

If you’ve ever felt like your smart devices are “spying” on you and silently collecting your personal data to feed the almighty algorithm or…

Less than 30 years ago, biometric security seemed like something out of science fiction—reserved for futuristic thriller films like The Bourne Identity or Mission:…

Professionally and personally, most of us spend a lot of our time online. We use our smartphones and our personal computers for everything from…

PODCAST reviews

Excellent Podcast

Chris Parker has such a calm and soothing voice, which is a wonderful accompaniment for the kinds of serious topics that he covers. You want a soothing voice as you’re learning about all the ways the bad guys out there are desperately trying to take advantage of us, and how they do cleverly find new and more devious ways each day! It’s a weird world out there! Don’t let your guard down, this podcast will give you some explicit directions!

MTracey141

Required Listening

Somethings are required reading – this podcast should be required listening for anyone using anything connected in the current world.

Apple Podcasts User

Fascinating stuff!

I've listened to quite of few of these podcasts now. Some of the topics I wouldn't have given a second look, but the interviewees have always been very interesting and knowledgeable. Fascinating stuff!

Apple Podcasts User

Excellent Show

Excellent interview. Don't give personal information over the phone … it can be abused in countless ways

George Jenson

Interesting

I've listened to quite of few of these podcasts now. Some of the topics I wouldn't have given a second look, but the interviewees have always been very interesting and knowledgeable. Fascinating stuff!

User22

Content, content, content!

Chris provides amazing content that everyone needs to hear to better protect themselves and learn from other’s mistakes to stay safe!

CaigJ3189

New Favorite Podcast!

Entertaining, educational and I cannot 
get enough! I am excited for more phenomenal content to come and this is sthe only podcast I check frequently to see if a new episode has rolled out.

brandooj

Big BIG ups!

What Chris is doing with this podcast is something that isn’t just desirable, but needed – everyone using the internet should be listening to this! Our naivete is constantly being used against us when we’re online; the best way to combat this is by arming the masses with the information we need to stay wary and keep ourselves safe. Big, BIG ups to Chris for putting the work in for us.

Riley

As seen on

COULD YOU BE EASY PREY?

Take the Easy Prey Self-Assessment.
close

Copy and paste this code to display the image on your site

COULD YOU BE EASY PREY?

Take the Easy Prey Self-Assessment.

We will only send you awesome stuff!

Privacy Policy

Your privacy is important to us. To better protect your privacy we provide this notice explaining our online information practices and the choices you can make about the way your information is collected and used. To make this notice easy to find, we make it available on every page of our site.

The Way We Use Information

We use email addresses to confirm registration upon the creation of a new account.

We use return email addresses to answer the email we receive. Such addresses are not used for any other purpose and are not shared with outside parties.

On occasion, we may send email to addresses of registered users to inform them about changes or new features added to our site.

We use non-identifying and aggregate information to better design our website and to share with advertisers. For example, we may tell an advertiser that X number of individuals visited a certain area on our website, or that Y number of men and Z number of women filled out our registration form, but we would not disclose anything that could be used to identify those individuals.

Finally, we never use or share the personally identifiable information provided to us online in ways unrelated to the ones described above.

Our Commitment To Data Security

To prevent unauthorized access, maintain data accuracy, and ensure the correct use of information, we have put in place appropriate physical, electronic, and managerial procedures to safeguard and secure the information we collect online.

Affiliated sites, linked sites, and advertisements

CGP Holdings, Inc. expects its partners, advertisers, and third-party affiliates to respect the privacy of our users. However, third parties, including our partners, advertisers, affiliates and other content providers accessible through our site, may have their own privacy and data collection policies and practices. For example, during your visit to our site you may link to, or view as part of a frame on a CGP Holdings, Inc. page, certain content that is actually created or hosted by a third party. Also, through CGP Holdings, Inc. you may be introduced to, or be able to access, information, Web sites, advertisements, features, contests or sweepstakes offered by other parties. CGP Holdings, Inc. is not responsible for the actions or policies of such third parties. You should check the applicable privacy policies of those third parties when providing information on a feature or page operated by a third party.

While on our site, our advertisers, promotional partners or other third parties may use cookies or other technology to attempt to identify some of your preferences or retrieve information about you. For example, some of our advertising is served by third parties and may include cookies that enable the advertiser to determine whether you have seen a particular advertisement before. Through features available on our site, third parties may use cookies or other technology to gather information. CGP Holdings, Inc. does not control the use of this technology or the resulting information and is not responsible for any actions or policies of such third parties.

We use third-party advertising companies to serve ads when you visit our website. These companies may use information (not including your name, address, email address, or telephone number) about your visits to this and other websites in order to provide advertisements about goods and services of interest to you. For information about their specific privacy policies please contact the advertisers directly.

Please be careful and responsible whenever you are online. Should you choose to voluntarily disclose Personally Identifiable Information on our site, such as in message boards, chat areas or in advertising or notices you post, that information can be viewed publicly and can be collected and used by third parties without our knowledge and may result in unsolicited messages from other individuals or third parties. Such activities are beyond the control of CGP Holdings, Inc. and this policy.

Changes to this policy

CGP Holdings, Inc. reserves the right to change this policy at any time. Please check this page periodically for changes. Your continued use of our site following the posting of changes to these terms will mean you accept those changes. Information collected prior to the time any change is posted will be used according to the rules and laws that applied at the time the information was collected.