BYOD Puts Employees, Employers At Risk of ID Theft
Employees using personal smartphones or iPads for office work might seem like a win-win all around. Workers don't have to keep track of multiple devices or transfer data between devices, and they have...
View ArticleCyber Security Giant: Attacks on Small Business 'Threaten All of Us'
Small businesses are the new darlings of cyber criminals. Business identity theft and cyber attacks are a rapidly growing problem with far-reaching ramifications for not only the companies targeted,...
View ArticleTax ID Theft Against Seniors Sparks Worry, Action Among Feds
Just when you think identity thieves can't sink any lower than robbing children by using their clean credit profiles for criminal purposes, news emerges of an escalating form of identity theft: tax...
View ArticleSecurity Advice for Mobile Device Users
With 87 percent of American adults owning cellphones (according to Pew Research Center), 45 percent possessing smartphones, 26 percent toting e-book readers and 31 percent owning tablet computers, it's...
View ArticleGAO: Flaws In IRS Controls Led To Invalid Refunds to Dead Taxpayers
It's a sad statistical fact that when data breaches or business identity theft occur, a failure of internal safeguards is often to blame-partially or entirely. Often, organizations or companies leave...
View ArticleWhen a Soldier Comes Home to Identity Theft
Norman Rockwell painted soldiers coming home to open-armed relatives, hot meals and hard-earned rest. Rick Martinez’s homecoming wasn’t so heartwarming. The National Guardsman returned from an 11-month...
View ArticleSteps Toward Tracking And Managing Your Digital Footprint
Even if you're not ecologically inclined, you've probably heard the term "carbon footprint"-a phrase that refers to the amount of excess carbon an individual, family or organization contributes to the...
View ArticleWhat Medicare Fraud Means To You
Americans spend decades protecting their Social Security numbers - not carrying their cards in their wallets, carefully parsing who they share the number with, monitoring their Social Security...
View ArticleOld School Scams Make a Comeback
Scammers don’t need to be master hackers to bust into your bank account. A pen and paper can be enough—especially if the paper comes from a lost or stolen checkbook.Cyber crimes may rule the headlines,...
View ArticleQ&A: Everything You Need to Know About Social Bots
Social bots are programmed to appear as real people on social networks—tweeting and retweeting, amassing followers, even having matching Facebook accounts. Filippo Menczer, an Indiana University...
View ArticleThis Casanova Was An Imposter
Raul Siqueiros knows his way around Facebook. He frequently updates his own personal page, and as a Realtor, he also runs his company page to attract new clients.He's a social guy. But he had no idea...
View ArticleShut Out Hackers with Vulnerability, Penetration Testing
By Mark McCurleyMany companies inadvertently give hackers an easy way into their networks by failing to stay on top of vulnerabilities, or weaknesses in their software, hardware or network...
View ArticleFour Steps to Stronger Vendor Security
Four Steps to Stronger Vendor Security By Deena Coffman When it comes to entrusting your company’s sensitive information to suppliers and contractors, out of sight shouldn’t be out of mind. Consider...
View ArticleFour Do's and Don'ts After a Breach
Companies aim for greater revenues, profits and brand loyalty. They never wish for data to be lost or stolen because a data breach takes away from these three important goals. But the reality is that...
View Article10 Questions Executives Should Be Asking About Data Security
The phone rings, and it’s your information security officer—or worse, law enforcement—with bad news. Your company appears to have experienced a data breach. Information that is protected by law or...
View ArticleAvoid These Six Common Breach Scenarios
By Deena CoffmanA short list of trigger events are responsible for a large percentage of data breaches. The majority of exposures can be greatly minimized by focusing first on these areas. Also,...
View Article5 Ways to Keep Your Office Copier Data Safe
When it comes to your business security, the office photocopier may be the last thing that comes to mind. But today’s generation of machines are networked, multi-functioning devices that can print,...
View ArticleCase Study: Thieves Use Stolen Identity for Retail Therapy
Katie Smith* was living an upright life—working for a large manufacturer, saving for retirement and being a good neighbor—when she received a voicemail from Kohl’s department store about activity on...
View ArticleHow HR Can Safeguard PHI
By Deena Coffman Human resource departments are collecting a growing amount of protected health information (PHI) on employees and their dependents for health benefits on a daily basis. Yet many of...
View ArticleCase Study: Identity Theft Hits Too Close to Home for Seniors
Eileen and Laurence Cashman carefully planned their retirement, securing an affordable apartment in a building for seniors where they’d have the support they needed in their twilight years.They didn’t...
View Article