SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Weapon detection
  • Home
  • About
  • News
  • Security beat
  • Expert commentary
  • Case studies
  • Round table
  • White papers
  • Videos

Check out our special report on casino security

Get it now!

Regula urges awareness as identity theft soars to a record 3,205 data compromises

31 Jan 2024

Regula urges awareness as identity theft soars to a record 3,205 data compromises
Contact company
Contact Regula Forensics (Regula)
icon Add as a preferred source Download PDF version

In a landscape saturated with staggering statistics, the need for innovative solutions to safeguard against the usage of stolen identities becomes more pronounced.

The gravity of identity-related crimes is illustrated by the Identity Theft Resource Centre's annual report, disclosing a record 3,205 data compromises in 2023, marking a seismic 78% increase from the prior year. These breaches facilitated hackers in gaining unauthorised access to the personal information of millions of consumers.

Businesses under attack

The tangible consequences of data breaches can be grasped by spotlighting prominent cases of the year 2023. Shields Healthcare Group, a Massachusetts-based medical services provider, saw the theft of sensitive patient information and confidential data in a breach that affected approximately 2.3 million people.

Tangible effects of data breaches can be held by spotlighting famous cases of the year 2023

MOVEit Transfer software, a file transfer tool developed by Progress Software, experienced a significant cybersecurity incident impacting over 1,000 victim organisations and more than 60 million individuals. The breach exposed large volumes of often-sensitive data, including pension information, social security numbers, medical records, and billing data.

Protection of genetic information

23andMe, a genetics testing company, faced a significant breach in October 2023, revealing vulnerabilities in the protection of sensitive genetic and personal information. The breach involved unauthorised access to the "DNA Relatives" feature, exposing the personal information of millions. 

Initially affecting one million users of Ashkenazi Jewish descent and 100,000 users of Chinese descent, the breach later expanded to include records of four million more general accounts.

Government systems at risk, too

Governments globally face the spectre of identity theft threats. Australia's myGov platform, a digital identity hub, has fallen victim to scams totalling US$2 billion this year alone.

India's national biometric authentication system weathered 55 hours of downtime

India's national biometric authentication system weathered 55 hours of downtime, while Bangladesh grappled with vulnerabilities in its online birth registration system due to a leak of national ID card numbers. Anonymous Sudan's cyberattack on Kenya's eCitizen portal resulted in disruptions and alleged passport data theft, emphasising the global nature of the threat.

Next level of identity verification

Biometric checks are proliferating in the fight against identity theft, driven by the increasing new threats. As Regula’s survey highlights, a third of businesses were hit by deepfake fraud in 2022.

Regula urges awareness as identity theft soars to a record 3,205 data compromises
Regula's research “The State of Identity Verification in 2023” reveals a global concern

Biometrics are reshaping the way of approaching security. Here are some noteworthy examples of 2023. Apple's Vision Pro introduces iris biometrics for device unlocking. Stadiums across America embrace facial recognition and AI for enhanced fan experiences, ranging from weapons detection to automated concessions. Nightclubs in the UK trial biometric-loaded body cameras, enhancing security with Reveal's digital evidence management system. Airports globally, including Singapore's Changi Airport, adopt biometrics for improved processes. American Express pioneers secure online transactions by adding face and fingerprint biometrics to its SafeKey standard.

Intriguing examples

Most vital and overall is that governments worldwide are advancing digital identity systems

In a unique twist, Australia plans to launch a digital identity system for goats and sheep, with mandatory registration from 2025, potentially preceding a human counterpart. Canadian scientists utilise facial recognition for tracking seals, a fascinating application echoing efforts with sea dragons in Australia. Biofire's biometric handgun introduces facial recognition, which works well in the dark, authenticating users with either face or fingerprints.

But of course, the most important and widespread is that governments worldwide are advancing digital identity systems, with an estimated 4.9 billion digital identities in use by 2029.

A piece of advice for 2024

"In the wake of these breaches, malicious actors seised the opportunity to illicitly access the personal information of millions of consumers, underscoring the critical need for robust cybersecurity measures. What can help? First of all, document liveness verification ensures the presence of a real document and the authenticity of an ID by scrutinising dynamic security features, especially in remote scenarios. Cross-referencing all the data in the document, together with authenticity and biometric checks, makes it possible to identify inconsistencies that may signal fraud."

"Also, e-documents such as e-passports or eIDs are more secure and difficult to fake than traditional identity documents. That’s because the RFID chip holds digitally signed data that can be read and verified with NFC-enabled smartphones and specialised IDV software. Moreover, utilising the "zero trust to mobile" approach, which involves re-verifying the RFID chip on a server in a secured perimeter, ensures the e-document is trustworthy, and the chip is not cloned or its data manipulated," advises Ihar Kliashchou, Chief Technology Officer at Regula.

Learn why leading casinos are upgrading to smarter, faster, and more compliant systems

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Healthcare security
  • Nightclub security
  • Public sector security
  • Security access systems
  • Radio frequency Identification
  • Voice recognition systems
  • Facial recognition systems
  • Iris recognition systems
  • Identity management
  • License plate recognition
  • Data Security
  • Artificial intelligence (AI)
  • Weapon detection
  • Related categories
  • Bollards
  • Power supplies & batteries
  • Barricades
  • Video servers (IP transmission)
  • Gates
  • Barriers
  • Storage
Related white papers
School security moves to the cloud

School security moves to the cloud

Download
Cloud video and smart cities

Cloud video and smart cities

Download
Access control & intelligent vehicle screening

Access control & intelligent vehicle screening

Download
Related articles
The how and why of gunshot detection

The how and why of gunshot detection

Do we have the technology to reduce our epidemic of mass shootings?

Do we have the technology to reduce our epidemic of mass shootings?

Gunfire detection solutions and AI technology to address the growth in mass shootings

Gunfire detection solutions and AI technology to address the growth in mass shootings

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Weapon detection
  4. News
  5. Corporate news
About this page

"Discover critical insights on identity theft prevention at our information portal, your trusted guide to the physical security industry. Learn about latest trends, technological advancements, and notable industry incidents affecting businesses and individuals alike."

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec