The top 5 cyber security threats to future of mobile banking

Posted on Jul 24 2012 by

As mobile banking grows in popularity, so do the dangers of data breach and identity theft. In fact, these data security dangers are so significant they could threaten the future of the mobile financial services industry. To get a better understanding of the industry’s cyber security woes, a powerful trade group conducted a comprehensive survey […]


Webinar: Data breaches can happen anytime, anywhere

Posted on Jul 19 2012 by

Can you imagine losing backup disks containing information for 300,000 patients? Or having computer back-up tapes stolen? What if someone hacked into your network servers or lost important laptops? These aren’t hypothetical scenarios. They’re real data breach cases that have occurred in recent years. Can this happen to you? You bet. The key is being […]


A mobile test of human threats

Posted on Jul 17 2012 by

Like Blanche Dubois in A Streetcar Named Desire, we’d all like to think that we can depend upon the kindness of strangers.  Unfortunately, Symantec recently reminded us (in case there was any doubt) that strangers are bound to let you down. In its Smartphone Honey Stick Project, Symantec intentionally “lost” 50 smartphones, all programmed with […]


Cyber insurance: the risk-reduction remedy some companies want and need

Posted on Jul 10 2012 by

  Unfettered mayhem, raining down from cyberspace, has birthed the need for new protection few would have envisioned just a few years ago: cyber insurance coverage. As coverage goes, cyber insurance is still a relatively new and emerging option that, despite its newness, is rapidly gaining traction among threat-weary businesses in every sector—healthcare, in particular, […]


Protecting high-risk information in EHRs

Posted on Jul 03 2012 by

Our guest blogger this week is Karen Barney of the Identity Theft Resource Center (ITRC). According to one recent study[i], more than 19 million health records have been compromised since August 2009.  As the health care industry moves into the adoption of electronic health records (EHRs), medical breaches have become a more significant concern. These […]


Vigilance is still the best medicine for avoiding medical identity theft

Posted on Jun 26 2012 by

  The latest Ponemon Institute Medical Identity Theft survey reflects the classic good news, bad news scenario. The good news is that more consumers understand how medical identity theft happens, and the importance of checking healthcare invoices and records for accuracy. The bad news is that the victim count has hit an all-time high (nearly […]


Password management

Posted on Jun 19 2012 by

Our guest blogger this week is Karen Barney of the Identity Theft Resource Center (ITRC). The rise of online functionality and connectivity has in turn given rise to online security issues, which create the need for passwords and other defenses against information theft.  Most people today have multiple online accounts and accompanying passwords to protect […]


Share National Internet Safety Month with every employee

Posted on Jun 12 2012 by

Internet safety isn’t just for the employees who handle your most sensitive data. It’s for each and every one. With June being National Internet Safety Month, it’s the perfect time to brush up on exactly what that means for your employees and business. In a recent study, 78% of organizations had experienced at least one […]


Infographic: The state of identity theft

Posted on Jun 11 2012 by

A nationwide look at consumers’ identity theft complaints based on FTC reports.


Three reasons your breach notices are flawed

Posted on Jun 05 2012 by

Still using the less-is-more approach to notification letters? As it turns out, consumers want more – much more than they’re getting. In a new study, 72% of consumers who recall receiving a notification letter express disappointment. The Ponemon Institute explores why in the 2012 Consumer Study on Data Breach Notification. Among all survey respondents, those […]