Government agencies may find themselves wondering if fraudsters will ever really get into their systems. The answer is yes they will, if proper securities against risks aren’t in place. We should be thinking about the kinds of cyber threats that are going to come to us – and what methods they use.
Synthetic identities are another threat, whereby identities are pieced together from real identities – they can pass certain verification tests but ultimately they’re creating a fictitious person that can be used.
And, there are sites being used to test stolen credentials to see if those credentials are valid. This is typically done through automated bot attacks, as well as complex multi-channel attacks – they may just be doing a single attack on your site or it might be a sign of a larger network attack.