Blog

Blog2018-08-08T16:49:27+00:00

Student Authentication Guidelines: Coming Soon To An Accreditor Near You

Lately there’s been quite a lot of buzz surrounding “student authentication” and what universities and colleges need to do to become compliant. From the landmark case between WGU and the OIG, to the countless billions lost in 2017 alone to academic cheating and financial aid fraud, it’s clear that the time for change is now. Recently the largest education accrediting agency in the U.S. passed new requirements for student ID authentication. The new regulation(s) stands to change ... Read more

Accurate Attendance Records: Why It’s Necessary For Compliance and Saves You Money

Each semester, education loan fraud by criminals who pose as students grows tremendously. Fraudsters are easily able to pose as students because they are not required to make a physical presence. As long as a student can make it to census date, they are eligible to receive the thousands of dollars from Pell Grant monies. Keeping accurate attendance records is crucial because it's required for Title IV fund eligibility. However, ordinary attendance records don't ... Read more

EdTech Conference Highlights Biometric Signature ID’s Biometric Password

The Biometric Signature ID team headed to a recent EdTech conference which draws education I.T. professionals who want to see the latest tools that enable online education. BSI was there to demonstrate BioSig-ID, its patented software that authenticates student identities. Currently many schools and their learning management systems are accessible with simple username and password or PIN. That's not authentication, it's just credential approval. It could be anyone behind that keyboard. Did you know ... Read more

Finding The Needle In The Haystack: How BioSig-ID Forensic Tools Catch The 2 Types Of Fraud

Online Fraud Protection - How to Get it Fraud using the “virtual highway” is big business with data breaches costing $6.2B in 2016 and financial student aid fraud (FSAF) costing upwards of $3.8B annually. Online fraud protection is not optional. But how do you go about it? There are at least two types of common internet or device based fraud: Data theft for financial gain, typically user data, that leaves organizations with the liability ... Read more

Pell Grant And Direct Student Loan Fraud: Best Practices For Saving $ Millions.

Pell Grant and Direct Student Loan Fraud are two of the biggest obstacles plaguing institutions of higher education and the worst part is, there’s no immediate end in sight. In 2016, almost $4 billion was disbursed improperly. With the feds cracking down and looking at new funding models, it’s uncertain what the future holds for financial aid or how it will affect students and schools. The feds have responded with new regulations that now ... Read more

2 FA SMS Is No Longer Secure… Here’s What You Need To Know

Recently, several of the world’s top professional poker players revealed that they have been victims of a hacker or group of hackers who took over some of their non-poker online accounts. The security weakness that allowed this to happen was one most people wouldn’t expect: two-factor authentication (2FA). 2FA insecurity remains an unguarded area of opportunity access that hackers can exploit. One of the most common forms of 2FA is SMS text messaging using a person’s mobile phone. ... Read more

The Telehealthcare Movement Gains Monumental Ground In Texas… But The Industry Still Has Side Effects

The ability of telehealth companies to do business in Texas--the last major U.S. market stymieing the growth of video doctor consultations--cleared a key hurdle when a bill widening patient access cleared the House of Representatives. The new legislation is the latest victory for the Telehealthcare industry. Passage has opened a market of 28 million people to telehealth companies like American Well, MDLive and Teladoc that all offer access to physicians and patients via smartphone, tablet ... Read more

Virtual Proctoring – Is It True The System Can Be Broken?

VIRTUAL PROCTORING – Is It True The System Can Be Broken? Virtual proctoring, it’s a service nearly everyone is familiar with. Created to help higher-ed institutions protect against cheating, the process is designed to be cheaper than brick and mortar proctoring methods which are typically very expensive. The problem is, it’s not effective. With technology growing at an unprecedented rate, virtual proctoring companies are not equipped to deal with the emerging technologies and actors that seek ... Read more

Real Time Event Notifications Proven To Catch Cheaters – Case Study

Some college students are apparently willing to pay hundreds to off load a test or thousands for the whole course. Google “pay to do my homework” is the top monthly search phrase for the top sites most visited to rid one’s self of the onerous task of doing one’s own course work and to guarantee a good grade or your money back.  The phrase, “Do my chemistry homework,” is another top favorite for those ... Read more

Lightning Fast Brute Force Password Hack – Mission Possible

Something more reminiscent of Mission: Impossible, circa 1996, has come to light last week. We have all held a belief (well, desperately clung to it actually) that it would take a hacker a certain amount of time to guess the password to our personal and office computers. Long enough that they would be caught red-handed, in fact. It gives one those “warm fuzzy” feelings inside, well things got cold and hard with a quickness ... Read more

Load More Posts