<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=4052188&amp;fmt=gif">

With the number of identity authentication measures and security features offered today, it’s unnerving to realize how easy it could have been for someone to hijack six of SIGNiX’s corporate bank accounts just a few days ago.

Our bank was recently acquired, so I went through the process to transfer accounts to the new bank. Like most financial processes today, accounts can be viewed and managed online. So to make the accounts impossible to access except for those with authorization, the bank sent me a hardware security token for each account we were transferring. 

This is a premier example of two-factor authentication—one of the most certain ways to ensure the right people have access to digital information. Each time I would sign into the accounts, the token would provide a unique code for me to use in addition to ausername and password.  But for two-factor authentication to work, it must be used correctly. In the words of the late Paul Harvey, here’s “the rest of the story.”

When the bank mailed these tokens to me, they left two major vulnerabilities unchecked.

Vulnerability #1: Each security token was packaged with a document that provided step-by-step information on how to set up the accounts. The documents all contained my customer number, user name and password for the setup. That meant that all the tools and information anyone would have needed to access these six accounts was there for the taking—both steps in the two-factor authentication—in one convenient package.Security tokens delivered

Vulnerability #2: The package containing the security tokens and documents was intended to be shipped to our SIGNiX headquarters, but the package reached our previous location first. When the package reached our actual location our receptionist was allowed to sign for it. Should that have been opened at the wrong address or given to someone who had another motive, this could have resulted in fraud of major proportions. (Thankfully, the package was forwarded and our receptionist—like all of SIGNiX’s employees—is a rock star of the highest integrity.) 

These giant security risks could have been avoided entirely with a secure digital process—and it would be far cheaper and easier.

Consider another high-stakes process: signing a $250,000 loan. With e-signatures, you can do this anywhere and anytime with an Internet connection. But instead of mailing a security token with other ID information, as in the case above, the process remains fully digital with highly secure authentication processes—like knowledge-based authentication (KBA) or two-factor authentication. 

Digital two-factor authentication is one of the strongest ways to make certain only the right people have access to information. Instead of mailing tokens and login information, which could be intercepted by anyone, a one-time PIN code can be sent to your mobile phone via a text message. This is used in addition to a username and password.

In a worst case scenario, let’s say someone stole your phone and now has access to that PIN code—he still does not know your username and password. There are two distinct levels of verification one must meet.

Security Tokens with Account InformationWith KBA, another secure authentication method, not only is a signer required to supply a Social Security number and a date of birth, she’s required to answer a series of questions pulled from information found in public databases. Questions may revolve around information from up to 30 years ago, and it would be extremely difficult for anyone other than you to know the answers or find them in your wallet or phone.

Not only is this safer, it’s cost-effective—there’s no paper or ink involved and no shipping. (Imagine buying and mailing six security tokens to every client the bank has. That’s not cheap.)

For now, I’m counting my blessings knowing this is a cautionary tale only. And in the future, my guard will go up fast to anything but secure digital processes like our own here at SIGNiX.

Need to brush up on e-signature security? Click here to download our FREE e-book.

Free e-signature security eBook

You may also like

SIGNiX Developer Talks About Company’s 15-Year History [Interview]
SIGNiX Developer Talks About Company’s 15-Year History [Interview]
16 June, 2014

This year marks the 15th year since SIGNiX’s technology was invented, and to celebrate we’re taking a look back at our c...

SIGNiX Welcomes Healthcare Company to E-Signature Client Roster
SIGNiX Welcomes Healthcare Company to E-Signature Client Roster
18 November, 2013

We're excited to announce that a Fortune 100 healthcare technology company has chosen SIGNiX to help streamline the huma...