Tax ID Theft Against Seniors Sparks Worry, Action Among Feds
Just when you think identity thieves can't sink any lower than robbing children by using their clean credit profiles for criminal purposes, news emerges of an escalating form of identity theft: tax...
View ArticleSecurity Advice for Mobile Device Users
With 87 percent of American adults owning cellphones (according to Pew Research Center), 45 percent possessing smartphones, 26 percent toting e-book readers and 31 percent owning tablet computers, it's...
View ArticleGAO: Flaws In IRS Controls Led To Invalid Refunds to Dead Taxpayers
It's a sad statistical fact that when data breaches or business identity theft occur, a failure of internal safeguards is often to blame-partially or entirely. Often, organizations or companies leave...
View ArticleWhen a Soldier Comes Home to Identity Theft
Norman Rockwell painted soldiers coming home to open-armed relatives, hot meals and hard-earned rest. Rick Martinez’s homecoming wasn’t so heartwarming. The National Guardsman returned from an 11-month...
View ArticleSteps Toward Tracking And Managing Your Digital Footprint
Even if you're not ecologically inclined, you've probably heard the term "carbon footprint"-a phrase that refers to the amount of excess carbon an individual, family or organization contributes to the...
View ArticleWhat Medicare Fraud Means To You
Americans spend decades protecting their Social Security numbers - not carrying their cards in their wallets, carefully parsing who they share the number with, monitoring their Social Security...
View ArticleOld School Scams Make a Comeback
Scammers don’t need to be master hackers to bust into your bank account. A pen and paper can be enough—especially if the paper comes from a lost or stolen checkbook.Cyber crimes may rule the headlines,...
View ArticleQ&A: Everything You Need to Know About Social Bots
Social bots are programmed to appear as real people on social networks—tweeting and retweeting, amassing followers, even having matching Facebook accounts. Filippo Menczer, an Indiana University...
View ArticleThis Casanova Was An Imposter
Raul Siqueiros knows his way around Facebook. He frequently updates his own personal page, and as a Realtor, he also runs his company page to attract new clients.He's a social guy. But he had no idea...
View ArticleShut Out Hackers with Vulnerability, Penetration Testing
By Mark McCurleyMany companies inadvertently give hackers an easy way into their networks by failing to stay on top of vulnerabilities, or weaknesses in their software, hardware or network...
View ArticleFour Steps to Stronger Vendor Security
Four Steps to Stronger Vendor Security By Deena Coffman When it comes to entrusting your company’s sensitive information to suppliers and contractors, out of sight shouldn’t be out of mind. Consider...
View ArticleFour Do's and Don'ts After a Breach
Companies aim for greater revenues, profits and brand loyalty. They never wish for data to be lost or stolen because a data breach takes away from these three important goals. But the reality is that...
View Article10 Questions Executives Should Be Asking About Data Security
The phone rings, and it’s your information security officer—or worse, law enforcement—with bad news. Your company appears to have experienced a data breach. Information that is protected by law or...
View ArticleAvoid These Six Common Breach Scenarios
By Deena CoffmanA short list of trigger events are responsible for a large percentage of data breaches. The majority of exposures can be greatly minimized by focusing first on these areas. Also,...
View Article5 Ways to Keep Your Office Copier Data Safe
When it comes to your business security, the office photocopier may be the last thing that comes to mind. But today’s generation of machines are networked, multi-functioning devices that can print,...
View ArticleCase Study: Thieves Use Stolen Identity for Retail Therapy
Katie Smith* was living an upright life—working for a large manufacturer, saving for retirement and being a good neighbor—when she received a voicemail from Kohl’s department store about activity on...
View ArticleHow HR Can Safeguard PHI
By Deena Coffman Human resource departments are collecting a growing amount of protected health information (PHI) on employees and their dependents for health benefits on a daily basis. Yet many of...
View ArticleCase Study: Identity Theft Hits Too Close to Home for Seniors
Eileen and Laurence Cashman carefully planned their retirement, securing an affordable apartment in a building for seniors where they’d have the support they needed in their twilight years.They didn’t...
View Article6 Reasons Why Changes to Rhode Island's Breach Laws Won't Work
By Eduard GoodmanThe main reason why? Legislators are asking for a 14-day notification timeframe, but that can lead to a number of problems. Responding to a breach is complicated. Organizations first...
View ArticleInsurance Professional Navigates Tax Fraud Nightmare
Tax fraud happens all the time. And without the right resources at your back, it can be a nightmare. Just ask Melissa Richardson. When Richardson efiled her 2013 tax return through a popular online...
View ArticleSavvy Financial Advisor Falls Victim to Identity Theft
Having worked in the financial industry for 31 years, Jay Smith* thought he knew how to protect himself against identity theft. But when identity thieves began rapidly opening new accounts the day...
View Article5 Habits of Highly Successful CISOs
By Deena CoffmanBusinesses of all sizes—from international corporations to local coffee shops—must concern themselves with data privacy. Curious about your company’s security posture? See if you’re...
View ArticleWhat the Schnucks Judgment Means for Insurers
By Eduard Goodman Schnucks, the grocery chain based in the Midwest, is mostly off the hook for a data breach that hit 2.4 million customers a few years back. But the case still provides an object...
View ArticleWhat You Need to Know About Canada’s New Data Breach Law
By Eduard Goodman After years and several failed attempts, the Canadian government has successfully passed a federal data breach notification requirement. The Digital Privacy Act, which received Royal...
View ArticleEducational Software and Privacy in the Classroom: What You Need to Know
By Eduard Goodman Educational software platforms are becoming more common in the classroom, raising privacy issues about the data they collect on children.The market for educational software and...
View ArticleWhen Mother Doesn't Know Best: Family Fraud Hits Daughter Hard
Dealing with identity theft is bad enough when you don’t know the perpetrator, but imagine if the criminal turned out to be a trusted family member.Imagine if the criminal were your mom.That’s what...
View ArticleDon’t Make These Mistakes When Choosing a Cyber Claims Provider
By Joe SalpietroBusinesses are becoming more interested in cyber coverage as they face mounting risks to their data security. But finding the right carrier and product can be challenging. Here are four...
View ArticleAsk the Expert: 'We Are Losing the Game' Against Cyber Threats
The cyber security industry faced steep challenges in 2015, and the battle against hackers and other threats to corporate data looks bleak, according to Natalya Kaspersky, co-founder of Kaspersky Lab....
View ArticleAsk the Expert: Data Is a Valuable Asset Companies Must Protect
There's a steep price to pay for all those empowering free online services, such as web searches and email: It's your privacy. Every move you make online is routinely logged, stored and data-mined by...
View ArticleIdentity Theft and Data Security Trends to Watch in 2016
By Byron Acohido Will cyber exposures subside in the new year? Highly unlikely, according to data security and privacy experts.Trends to expect: an increase in tax and child identity theft, wire...
View Article4 Reasons Why Cyber Claims Are Denied
By Joe Salpietro Helping clients get the most out of their cyber coverage means making sure they get their claims covered when a breach or security event occurs. By understanding the most common...
View ArticleCompanies in All Industries Are Losing Patient Health Data
By Rodika TollefsonEach time a Community Health Systems or an Anthem or a Premera Blue Cross gets hacked, sensitive patient records flood into the cyber underground. But cyber thieves are by no means...
View ArticleKeep Employee Trust After a Breach
By Matt Cullina Employee trust is slow to build but quick to lose, especially after a data breach. Morale may dip as employees watch their workplace become the subject of scrutiny and scorn in the...
View ArticleSMBs Better Get Ready for More Ransomware Attacks
By Byron AcohidoIn a ransomware attack, victims are prevented or limited from accessing their systems. Cyber criminals attempt to extort money by first using malware to encrypt the contents of a...
View Article4 Ways to Protect Your Business Data in the Cloud
By Eduard Goodman More companies are using the cloud for storage, software and even infrastructure services. This growing trend has changed the way businesses handle data—and, unfortunately, it also...
View ArticleSpear Phishing Gets Sophisticated, Targets CEOs
By Gary Stoller Spear phishers continue to pierce even well-defended networks, causing grave financial wounds. Spear phishers lure a specific individual to click on a viral email attachment or to...
View ArticleCyber Criminals Target Social Media, Apps for Phishing Attacks
By Jaikumar VijayanPhishers have begun leveraging the trust people have in popular social media and cloud collaboration websites to trick people into downloading malware or parting with sensitive...
View Article4 Things You Should Know About the EU-U.S. Privacy Shield
By Byron AcohidoAmerican whistle-blower Edward Snowden and Austrian citizen Maximilian Schrems are happenstance collaborators who together forced the United States and Europe to formally address an...
View ArticleSMBs Take a Step Back with Breach Defense
By Evan SchumanDespite rising cyber exposures and intensifying attacks, small and midsize businesses actually may be regressing when it comes to defending their networks.That startling finding comes...
View ArticleSMBs Take a Step Back with Breach Defense
By Byron AcohidoLast week I had the privilege of mingling with a record 40,000 attendees at the 25th RSA Conference at San Francisco’s vast Moscone Convention Center. It was my 11th RSA, each one...
View ArticleIRS Fights Fraud, Slows Tax Refunds
By Rodika TollefsonThe Internal Revenue Service is taking up to 21 days to review tax returns, according to research from fraud prevention vendor iovation, a clear sign that Uncle Sam has stepped up...
View ArticleWhy Business Email Compromise is Skyrocketing
By Byron AcohidoIt is a devastatingly effective form of spear phishing that the FBI refers to as “business email compromise,” or a BEC attack.Also known as “whaling” and “CEO fraud,” BEC attacks carry...
View ArticleCyber Liability Insurance is the 'Wild, Wild West'
By Byron Acohido A convergence between the cyber insurance and tech security sectors is fast gaining momentum. If this trend accelerates, it could help commercial cyber liability policies arise as a...
View ArticleKeep Employee Data Safe
By Matt CullinaWhen a cyber breach occurs, lawsuits are usually not far behind. It’s a chain of events that has become de rigueur in the consumer realm when retailers experience a breach and it is...
View ArticleBusinesses Struggle to Control BYOD
By Justin HarveyThe standoff between mobile hardware giant Apple and the U.S. Department of Justice raises myriad privacy concerns regarding the government’s power to compel a company to unlock a...
View ArticleBrexit Will Complicate Data Protection Laws
By Thomas SpierLONDON—Of the many shock waves reverberating from the United Kingdom’s vote to leave the European Union, one ramification of acute concern to U.S. companies doing business in Europe is...
View ArticleBrexit Will Complicate Data Protection Laws
By Bob SullivanThere’s been a scary increase in successful ransomware attacks against large organizations this year. Specifically, hospitals have found themselves at the mercy of hackers who demand...
View Article5 Cyber Security Best Practices for 2016
By Oscar MarquezIn the past five years, businesses of all sizes have realized just how vulnerable they are to cyber attacks.The astonishing increase in the number of attacks each year troubles...
View ArticleThe Case of the Disappearing $300,000 Loan
For homebuyers, nothing beats the excitement and relief that comes with a home loan approval. So you can imagine the horror when those funds suddenly disappear. John and Nancy Ritter* experienced the...
View ArticleWhat Is Your Data Breach Response Plan?
By Rich BlumbergBusinesses would prefer to avoid the attention of cyber hackers, of course, but it seems just about every organization is in the crosshairs these days. As the number of breaches...
View Article