Page 13 - GS131101
P. 13

News



technology, which makes the are currently in the middle of it.
CSC chip functionality accessible
via a key chain or a wearable The "software-based password is
device that is interoperable with dead," Narendra said. "It's just a
smartphones, tablet devices and PCs. matter of us recognizing it." He
"Communication protocols may be noted that regulatory and standards
NFC [near field communication] or bodies, such as the National Institute
Bluetooth, and commercial offerings of Standards and Technology, are
will have a menu of form factors for aware of it, but not others, including
institutions to choose from," Tyfone payments businesses. "A lot of IT
said. folks are in denial," he said.
Inside the cross over Hardware to combat hard-
ware
Dr. Siva Narendra, co-founder
and Chief Executive Officer at According to Narendra, the solution
Tyfone, likened the current security to this security dilemma is to migrate
infrastructure designed to protect account security to physical devices
sensitive cardholder data stored in that only individual accountholders
the cloud to a medieval castle: the can access. "The only way you can
data is protected by strong, high compete with hardware speed is by
walls – firewalls and virtual private using hardware with you as opposed
networks – that are fatally weak to [data stored] in a central location,"
nonetheless. he said.

"This wall is very porous because Tyfone's CSC technology is designed
a legitimate user still needs to get to do just that. The password is stored
into the fortress, so there are doors in the secure chip, which is the safest Get Value for
everywhere," Narendra said. "And place to store information, according your Portfolio,
these doors are actually getting to Narendra. "[I]f you want to visit a
weaker rapidly, by the day." website and make a transaction, you No Strings Attached
go to a website and your password
Narendra referred to Moore's law would be validated by your key
that states computational power chain and then the key chain will Sell or leverage your existing portfolio
is doubling every 18 months. That expose the certificate for this request, to get access to the cash you need.
means ever faster processing speeds challenge, response paradigm," he
for smartphones and computers, said.
but equally faster data crunching The process is quick and simple.
capabilities for fraudsters. To Tyfone chose to roll out CSC in
counter this exponential growth a variety of form factors because
in password hacking speed, ever the device needs to be portable We buy portfolios from all processors.
longer passwords are required. Four- and independent of smartphones
digit passcodes that were sufficient and corresponding mobile wallets.
protection 30 years ago have given "Today, when you buy a pair of Easy to understand documents
way to the stringing together of pants, the wallet is not stitched to it," and terms, resulting in fast closings.
eight to 12 numbers and letters, with Narendra said. "You carry your wallet
special characters thrown in. But that from one pair of pants to another. So
path is unsustainable. we wanted the technology to be just Call us today to receive a quick
that – neutral." estimate for your portfolio and
Based on Moore's law, in 18 months, get the cash you need today.
passwords will need to be 24 National implications
characters long and, in three years, Beyond the threat of the cross over for
they will need to expand to an
impractical 48 characters, Narendra individual security looms the national
security issue, as it is generally
said. In fact, he stated that the
password security infrastructure is assumed foreign governments and Call 800-801-6242 x.1340
terrorist organizations are stockpiling
nearing a "point of no return," where or email us at
hacking speeds will outstrip current hacked passwords for future use agentinfo@AmericanCapitalAdvance.com
in cyber warfare. "Control systems
security forever. Narendra called it www.americancapitaladvance.com/greensheet
the "cross over," and added that we for utilities, petro chemical, some
of these systems have already been
13
   8   9   10   11   12   13   14   15   16   17   18