Identity Theft

Loading...
Controversial Cyber Security Bill Passes The House...

Despite President Obama’s January signing of an Executive Order (EO) which outlines national cyber security policies in protecting U.S. companies and government agencies against cyber threats, the controversial Cyber Intelligence Sharing and Protection Act (CISPA) was passed in a 288-127 House vote sending it now to the Senate.¹ CISPA...

Read More Controversial Cyber Security Bill Passes The House
Tips to save your reputation following a big data brea...

The advent of big data and consequently, the task of collecting and analyzing it, can reap many benefits for organizations looking for deeper insight. We create 2.5 quintillion bytes of data daily1 in all aspects of everyday life.  Organizations can use this data to increase productivity, provide more value...

Read More Tips to save your reputation following a big data breach
Cybercriminals Aim For A New Target...

Bank employees have recently usurped their customers as the preferred target of cybercriminals in the financial industry according to the FBI and other finance member organizations who last month issued fraud alert warnings to banking institutions.  The latest data breach trend by cyberthieves is to use hacking methods such...

Read More Cybercriminals Aim For A New Target
Three things you should never do to identity theft vic...

Medical identity theft is no longer some obscure phrase spoken primarily in data security circles. It’s quickly becoming a household term for millions of Americans who’ve become a victim or know someone victimized by identity theft. In fact, 90% of the respondents in a recent study knew the definition...

Read More Three things you should never do to identity theft victims
Infographic: The state of identity theft...

A nationwide look at consumers’ identity theft complaints based on FTC...

Read More Infographic: The state of identity theft
ITRC report identifies top three data breach triggers...

For a company, a data breach can seem like it comes out of the blue. Yet, according to analysis by the Identity Theft Resource Center (ITRC), the three primary causes of data breaches have remained the same since 2009: Hacking Data on the move Insider theft ITRC has been releasing...

Read More ITRC report identifies top three data breach triggers
Students and cyber defense...

This vulnerability, combined with the fact that stealing personal information from minors can go undetected for years, is just part of the reason why minors are 51 times more likely to suffer from identity theft than...

Read More Students and cyber defense
Are you in hiding after a data breach? Watch our new v...

...

Read More Are you in hiding after a data breach? Watch our new video.
Five top trends in security threats...

Just as technology is continuously evolving, so are the wily ways in which fraudsters circumvent the safeguards for changing technologies. Symantec’s study Internet Security Threat Report offers a review of where cyber thieves are finding new opportunities and, accordingly, where experts believe the thorniest security trouble spots lie....

Read More Five top trends in security threats
‘Tis the season for data privacy...

As our world becomes ever smaller and more networked, Data Privacy Day provides information to consumers about the ways in which personal information is collected, stored, used and shared. The international privacy promotion also helps businesses understand the laws and regulations to which they’re subjected and offers guidance about...

Read More ‘Tis the season for data privacy
How data breaches harm reputations...

The Ponemon study clearly shows that when data breaches occur, the collateral damage of a company’s brand and reputation become significant hard costs that must be factored into the total financial loss....

Read More How data breaches harm reputations
Data breaches don’t take a holiday at the arcade...

A recent data breach discovery serves as a reminder that even when you’re on vacation, cyber criminals never s...

Read More Data breaches don’t take a holiday at the arcade