Quantcast
Channel: Articles
Browsing all 52 articles
Browse latest View live

BYOD Puts Employees, Employers At Risk of ID Theft

Employees using personal smartphones or iPads for office work might seem like a win-win all around. Workers don't have to keep track of multiple devices or transfer data between devices, and they have...

View Article


Cyber Security Giant: Attacks on Small Business 'Threaten All of Us'

Small businesses are the new darlings of cyber criminals. Business identity theft and cyber attacks are a rapidly growing problem with far-reaching ramifications for not only the companies targeted,...

View Article


Tax ID Theft Against Seniors Sparks Worry, Action Among Feds

Just when you think identity thieves can't sink any lower than robbing children by using their clean credit profiles for criminal purposes, news emerges of an escalating form of identity theft: tax...

View Article

Security Advice for Mobile Device Users

With 87 percent of American adults owning cellphones (according to Pew Research Center), 45 percent possessing smartphones, 26 percent toting e-book readers and 31 percent owning tablet computers, it's...

View Article

GAO: Flaws In IRS Controls Led To Invalid Refunds to Dead Taxpayers

It's a sad statistical fact that when data breaches or business identity theft occur, a failure of internal safeguards is often to blame-partially or entirely. Often, organizations or companies leave...

View Article


Image may be NSFW.
Clik here to view.

When a Soldier Comes Home to Identity Theft

Norman Rockwell painted soldiers coming home to open-armed relatives, hot meals and hard-earned rest. Rick Martinez’s homecoming wasn’t so heartwarming. The National Guardsman returned from an 11-month...

View Article

Steps Toward Tracking And Managing Your Digital Footprint

Even if you're not ecologically inclined, you've probably heard the term "carbon footprint"-a phrase that refers to the amount of excess carbon an individual, family or organization contributes to the...

View Article

What Medicare Fraud Means To You

Americans spend decades protecting their Social Security numbers - not carrying their cards in their wallets, carefully parsing who they share the number with, monitoring their Social Security...

View Article


Image may be NSFW.
Clik here to view.

Old School Scams Make a Comeback

Scammers don’t need to be master hackers to bust into your bank account. A pen and paper can be enough—especially if the paper comes from a lost or stolen checkbook.Cyber crimes may rule the headlines,...

View Article


Image may be NSFW.
Clik here to view.

Q&A: Everything You Need to Know About Social Bots

Social bots are programmed to appear as real people on social networks—tweeting and retweeting, amassing followers, even having matching Facebook accounts. Filippo Menczer, an Indiana University...

View Article

Image may be NSFW.
Clik here to view.

This Casanova Was An Imposter

Raul Siqueiros knows his way around Facebook. He frequently updates his own personal page, and as a Realtor, he also runs his company page to attract new clients.He's a social guy. But he had no idea...

View Article

Image may be NSFW.
Clik here to view.

Shut Out Hackers with Vulnerability, Penetration Testing

By Mark McCurleyMany companies inadvertently give hackers an easy way into their networks by failing to stay on top of vulnerabilities, or weaknesses in their software, hardware or network...

View Article

Image may be NSFW.
Clik here to view.

Four Steps to Stronger Vendor Security

Four Steps to Stronger Vendor Security By Deena Coffman When it comes to entrusting your company’s sensitive information to suppliers and contractors, out of sight shouldn’t be out of mind. Consider...

View Article


Image may be NSFW.
Clik here to view.

Four Do's and Don'ts After a Breach

Companies aim for greater revenues, profits and brand loyalty. They never wish for data to be lost or stolen because a data breach takes away from these three important goals. But the reality is that...

View Article

Image may be NSFW.
Clik here to view.

10 Questions Executives Should Be Asking About Data Security

 The phone rings, and it’s your information security officer—or worse, law enforcement—with bad news. Your company appears to have experienced a data breach. Information that is protected by law or...

View Article


Image may be NSFW.
Clik here to view.

Avoid These Six Common Breach Scenarios

  By Deena CoffmanA short list of trigger events are responsible for a large percentage of data breaches. The majority of exposures can be greatly minimized by focusing first on these areas. Also,...

View Article

Image may be NSFW.
Clik here to view.

5 Ways to Keep Your Office Copier Data Safe

When it comes to your business security, the office photocopier may be the last thing that comes to mind. But today’s generation of machines are networked, multi-functioning devices that can print,...

View Article


Image may be NSFW.
Clik here to view.

Case Study: Thieves Use Stolen Identity for Retail Therapy

Katie Smith* was living an upright life—working for a large manufacturer, saving for retirement and being a good neighbor—when she received a voicemail from Kohl’s department store about activity on...

View Article

Image may be NSFW.
Clik here to view.

How HR Can Safeguard PHI

By Deena Coffman Human resource departments are collecting a growing amount of protected health information (PHI) on employees and their dependents for health benefits on a daily basis. Yet many of...

View Article

Image may be NSFW.
Clik here to view.

Case Study: Identity Theft Hits Too Close to Home for Seniors

Eileen and Laurence Cashman carefully planned their retirement, securing an affordable apartment in a building for seniors where they’d have the support they needed in their twilight years.They didn’t...

View Article
Browsing all 52 articles
Browse latest View live