Identity Theft

Loading...
The Battle Against Breach Fatigue: Driving Employee En...

The Identify Theft Resource Center reported 159 data breaches occurred in just the first two months of 2018 – that’s more than two incidents each day from Jan. 1 to Feb. 28. The prevalence of cyberattacks leaves little wonder why consumers and organizations alike are experiencing “breach fatigue,” or...

Read More The Battle Against Breach Fatigue: Driving Employee Engagement in Data Breach Preparedness
Four Ways to Prevent Tax-Related Identity Theft...

While identity theft and fraud affect millions of Americans each year, the threat especially pervasive during tax season. In fact, tax fraud was the second most common type of identity theft reported by consumers in 2017. When you consider how much highly sensitive information you share with your employer,...

Read More Four Ways to Prevent Tax-Related Identity Theft
Going for the gold in identity protection: Ensuring da...

All eyes are currently on the 2018 Winter Olympics in Pyeongchang, South Korea. Whether you’re lucky enough to experience the events in person or cheering from the comfort of your home, this is an opportune time to think about how to protect your personal information while in large crowds...

Read More Going for the gold in identity protection: Ensuring data security when attending major events
Predictions for the data breach industry in 2018...

High-profile data breaches dominated the headlines in 2017, and unfortunately, these attacks are anticipated to only increase in frequency and magnitude in 2018. Breaches like those that affected LinkedIn, Dropbox and Yahoo, serve as a wake-up call for organizations to implement processes for safeguarding sensitive data and defending against...

Read More Predictions for the data breach industry in 2018
Myth Buster: Most Consumers Aren’t at Risk for Identit...

Businesses may be increasingly aware of identity theft threats to their customers, but an Experian survey shows that many consumers still seriously underestimate their risk of falling victim to identity thieves. In fact, the persistent and harmful myth that the majority of consumers are not vulnerable to identity theft...

Read More Myth Buster: Most Consumers Aren’t at Risk for Identity Theft
Why companies should offer post-breach monitoring serv...

When a cybersecurity incident occurs, will your organization’s data breach response contribute to customer retention or undermine it? Multiple studies and surveys illustrate that how well a company supports consumers in the wake of a security event directly affects customers’ perceptions of and loyalty to the breached company. Consumers...

Read More Why companies should offer post-breach monitoring services
Prediction check-in: Emerging threats present new chal...

New cyber risks emerge daily, and companies can find it challenging to maintain protections against known threats while also adjusting their response plans to account for new ones. While it’s virtually impossible to know exactly what cyber-criminals will think of next, it pays to be aware of new tools...

Read More Prediction check-in: Emerging threats present new challenges for companies
Phishing For a Refund – What You Should Know to ...

In 2017, the deadline for filing both paper and electronic W-2s with the SSA is the same date they're due in employees' hands: Jan....

Read More Phishing For a Refund – What You Should Know to Block W-2 Wage Theft, Tax and Wage Fraud
Identity theft knows no season: Why credit monitoring ...

When do your customers think about credit monitoring? When do you, as a business, think about offering it to them? Many consumers don’t independently monitor their credit on a regular basis – multiple surveys tell us that, including those by Javelin Strategy & Research. Most of those who don’t monitor...

Read More Identity theft knows no season: Why credit monitoring should be a year-round effort
Following Personal Identifying Information (PII) Down ...

As a business manager savvy to security risks, you may be well aware of the costs consumers and businesses incur when personal identifying information (PII) is stolen in a data breach. But once the information is taken from your system, do you know what happens next? Do you understand...

Read More Following Personal Identifying Information (PII) Down the Black Net Road
Recognize Internet Safety Month As a Reminder To Keep ...

Airtight firewalls and current-to-the-minute defensive software aren’t enough to keep your organization safe from cyber attacks. Your IT team could be doing everything right, and your company may still be at risk from internal threats – because just one employee thinks that cybersecurity isn’t his or her job. Our...

Read More Recognize Internet Safety Month As a Reminder To Keep Data Secure
Cybercriminals Cashing in as Companies Struggle to Sec...

Experian Data Breach Resolution and Ponemon Institute release the first industry study that closely examines payment technologies and how companies are managing the growing threat of data breaches. The study, Data Security in the Evolving Payments Ecosystem, asked professionals to weigh in on several topics including who should be...

Read More Cybercriminals Cashing in as Companies Struggle to Secure Payment Systems