Print

Print


In message <002e01c42a41$9af58900$9a3468d5@ntlworld>, ianwelton
<[log in to unmask]> writes
>There are a few relatively common security questions which most businesses
>record, and then ask.  So if some of the PI/information/hacking groups are
>to be believed you merely have find out the answer to those few questions
>prior to making any approach.

Yes, which is why it's probably important to lie to people about the
really easily researched ones like Mother's Maiden Name. However, I'm
not sure why this is more difficult if you Christian name is your real
mother's maiden name.
--
Roland Perry

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
       All archives of messages are stored permanently and are
      available to the world wide web community at large at
      http://www.jiscmail.ac.uk/lists/data-protection.html
      If you wish to leave this list please send the command
       leave data-protection to [log in to unmask]
            All user commands can be found at : -
        http://www.jiscmail.ac.uk/help/commandref.htm
  (all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^