Identity Theft

Scam report: shipping pirates

Posted on Mar 15 2011 by

With some precautions, your business can safely navigate through hazardous shipping channels without fear of data piracy.

Share

10 ways that breaches burn business

Posted on Feb 15 2011 by

Don’t let your bottom line go up in flames: understand how security breaches impact your business and take aggressive action to avert disaster.

Share

Understanding the risks of chip and PIN credit card verification

Posted on Feb 07 2011 by

The point of sale chip and PIN payment technology is believed to be a safer form of payment than the common magnetic striped credit card. The new technology uses a card with an embedded microchip that requires the consumer to enter a unique PIN through a reader to make payment. So why aren’t more businesses adopting this technology?

Share

Stopping healthcare fraud with tools used in other industries

Posted on Feb 01 2011 by

A few weeks ago I discussed a few preventative measures a healthcare business can implement to protect itself from the damages of medical fraud.  However, the fight against medical fraud requires support from many groups, including the U.S. Government.  Bringing new tools to the fight, the Obama Administration recently announced aggressive new measures it is […]

Share

Protecting your retail business from consumer fraud

Posted on Jan 25 2011 by

The Holiday Season is one of the busiest times of year for consumer-facing businesses.  While Holiday sales can help improve a bottom line, the increased consumer activity also brings many headaches. One of the biggest headaches is falling victim to fraud schemes from wily consumers hoping to take advantage of business who do not have […]

Share

Identity theft protection insights

Posted on Jan 04 2011 by

Consumers who are part of a data breach may be more likely to experience identity theft. Learn about sources and consequences of identity theft and the benefits of ProtectMyID.

Share

Mobile smishing attacks are on the rise

Posted on Dec 21 2010 by

Mobile devices are important tools to efficiently manage a business and to quickly meet the needs of a customer.  Think about the hit in productivity you’d take if you lost your smart phone or PDA.  Several weeks ago I wrote about the importance of implementing a wireless data policy to protect employee account data from […]

Share

Protecting your business from identity theft

Posted on Dec 07 2010 by

A majority of the media attention has focused on the sharp increase of personal identity theft or on the loss of customer data by businesses.  Very little focus has been given to the damage done by fraudsters who craftily steal the identity of a business.  The difference between personal and business identity theft is quite […]

Share

Phishing attacks threaten your business

Posted on Nov 16 2010 by

Phishing attacks are on the rise. According to a Panda Security investigation, scammers are creating 57,000 fake websites a week to falsely represent 375 popular brand names.

Share

Create a social media policy to protect your company and employees

Posted on Nov 02 2010 by

Facebook and other social networks have generated a lot of buzz recently due to their data privacy settings and policies. Unfortunately, many consumers are not aware of these settings and openly share their personally identifiable information.

Share