Latest Post

Loading...
Three things you should never do to identity theft vic...

Medical identity theft is no longer some obscure phrase spoken primarily in data security circles. It’s quickly becoming a household term for millions of Americans who’ve become a victim or know someone victimized by identity theft. In fact, 90% of the respondents in a recent study knew the definition...

Read More Three things you should never do to identity theft victims
Report gives readers the latest inside(r) scoop...

Today, those who steal data from the outside also usually steal the headlines. Witness recent mega-hacks at some very well-known firms: Electronics corporation: criminals accessed, stole and reused usernames and passwords from nearly 100,000 accounts stored on third-party servers Social media site: encoded passwords for 6.5 million (one out...

Read More Report gives readers the latest inside(r) scoop
World-class scammers vie for Olympic gold...

Swimmers may be stealing the spotlight, but it’s scammers who are taking home the gold–in the form of stolen credit card numbers, PINs, consumers’ personal identities. One familiar con trotted out this year (and every Olympics) is ticket fraud, including what Britons call ‘ticket touting’ (scalping) and its more...

Read More World-class scammers vie for Olympic gold
Three data protection strategies to catch a “phish”...

Phishing attacks, despite their long history, continue to be one of the greatest threats to data security. More than 200,000 new viruses are discovered every day, according to malware experts, and they’re usually out of circulation by the time they’re detected. So how does an organization protect data from...

Read More Three data protection strategies to catch a “phish”
The top 5 cyber security threats to future of mobile b...

As mobile banking grows in popularity, so do the dangers of data breach and identity theft. In fact, these data security dangers are so significant they could threaten the future of the mobile financial services industry. To get a better understanding of the industry’s cyber security woes, a powerful...

Read More The top 5 cyber security threats to future of mobile banking
Webinar: Data breaches can happen anytime, anywhere...

Can you imagine losing backup disks containing information for 300,000 patients? Or having computer back-up tapes stolen? What if someone hacked into your network servers or lost important laptops? These aren’t hypothetical scenarios. They’re real data breach cases that have occurred in recent years. Can this happen to you?...

Read More Webinar: Data breaches can happen anytime, anywhere
A mobile test of human threats...

Like Blanche Dubois in A Streetcar Named Desire, we’d all like to think that we can depend upon the kindness of strangers.  Unfortunately, Symantec recently reminded us (in case there was any doubt) that strangers are bound to let you down. In its Smartphone Honey Stick Project, Symantec intentionally...

Read More A mobile test of human threats
Cyber insurance: the risk-reduction remedy some compan...

Unfettered mayhem, raining down from cyberspace, has birthed the need for new protection few would have envisioned just a few years ago: cyber insurance coverage. As coverage goes, cyber insurance is still a relatively new and emerging option that, despite its newness, is rapidly gaining traction among threat-weary businesses...

Read More Cyber insurance: the risk-reduction remedy some companies want and need
Protecting high-risk information in EHRs...

Our guest blogger this week is Karen Barney of the Identity Theft Resource Center (ITRC). According to one recent study, more than 19 million health records have been compromised since August 2009.  As the health care industry moves into the adoption of electronic health records (EHRs), medical breaches have...

Read More Protecting high-risk information in EHRs
Vigilance is still the best medicine for avoiding medi...

The latest Ponemon Institute Medical Identity Theft survey reflects the classic good news, bad news scenario. The good news is that more consumers understand how medical identity theft happens, and the importance of checking healthcare invoices and records for accuracy. The bad news is that the victim count has...

Read More Vigilance is still the best medicine for avoiding medical identity theft
Password management...

Our guest blogger this week is Karen Barney of the Identity Theft Resource Center (ITRC). The rise of online functionality and connectivity has in turn given rise to online security issues, which create the need for passwords and other defenses against information theft.  Most people today have multiple online...

Read More Password management
Share National Internet Safety Month with every employ...

Internet safety isn’t just for the employees who handle your most sensitive data. It’s for each and every one. With June being National Internet Safety Month, it’s the perfect time to brush up on exactly what that means for your employees and business. In a recent study, 78% of...

Read More Share National Internet Safety Month with every employee