Tag: Identity Theft

Loading...
Stress, Apathy and Winning by Default: How Consumers R...

Data breach notification letters serve multiple purposes. They ensure a breached company is compliant with data breach notification laws, they alert consumers to the breach and their involvement in it, they can warn customers of potential identity theft risks and educate them on how to cope with those risks....

Read More Stress, Apathy and Winning by Default: How Consumers Respond to Data Breach Notification Letters
The Worst Things You can Say or Do in a Breach Notific...

When a data breach occurs, laws and industry regulations, dictate when and if you need to notify consumers whose data might have been compromised. However, many consumers would also probably argue that you’re morally obligated, to notify them of data loss; they want you to tell them of the...

Read More The Worst Things You can Say or Do in a Breach Notification Letter
Data Breach News for the First Quarter of 2014...

With the first quarter of 2014 drawing to a close, now is a good time to review data breach news from the past four months and consider what that information may indicate about the state of cyber security in American businesses. As of March 21, 2014, 191 data breaches...

Read More Data Breach News for the First Quarter of 2014
Must-do Resolutions to Improve Your Small Business’ Cy...

As we approach the end of the 1st quarter of 2014 , small-business owners juggle a host of operational and financial objectives. Resolving to improve cyber security should be paramount among them. Cyber security risks continue to grow across all industries, regardless of an organization’s size. Data shows that...

Read More Must-do Resolutions to Improve Your Small Business’ Cyber Security
Advances in Cyber Insurance Risk Management Services H...

Written by: Rick Betterley, President, Betterley Risk Consultants Insurance against data loss has developed rapidly to protect organizations from the economic consequences of a data breach. Insurance companies have broadened their coverage to include not only the cost of notifying and monitoring affected persons, but also costs such as...

Read More Advances in Cyber Insurance Risk Management Services Help Protect Against Data Loss – But More Can Be Done
IAPP Panel Discusses BYOD and the “Technology Divorce”...

As mobile technology continues to dominate the workplace, look for more organizations to adopt “bring your own device” programs to stay competitive.  If your organization falls into this category, how will you protect your data? And just as importantly, how will you control your employees’ activities on their devices?...

Read More IAPP Panel Discusses BYOD and the “Technology Divorce”
Data Privacy Day: A day to recognize data protection a...

Today’s digital world has enabled us to enjoy and take advantage of all that the internet and digital communications have to offer, however, in our progressively connected society, the benefits also come with risks. In the United States, identity theft is the largest type of consumer fraud affecting more...

Read More Data Privacy Day: A day to recognize data protection and security awareness
Online holiday shopping is also big business for fraud...

According to EMC’s November 2012 fraud report, online holiday shopping is projected to account for 24% of the year’s total  e-commerce sales which is good news for retailers and unfortunately, it can also be good news for online con artists.  If 2012 is anything like 2011, retailers will need to...

Read More Online holiday shopping is also big business for fraudsters
Three things you should never do to identity theft vic...

Medical identity theft is no longer some obscure phrase spoken primarily in data security circles. It’s quickly becoming a household term for millions of Americans who’ve become a victim or know someone victimized by identity theft. In fact, 90% of the respondents in a recent study knew the definition...

Read More Three things you should never do to identity theft victims
World-class scammers vie for Olympic gold...

Swimmers may be stealing the spotlight, but it’s scammers who are taking home the gold–in the form of stolen credit card numbers, PINs, consumers’ personal identities. One familiar con trotted out this year (and every Olympics) is ticket fraud, including what Britons call ‘ticket touting’ (scalping) and its more...

Read More World-class scammers vie for Olympic gold
Webinar: Data breaches can happen anytime, anywhere...

Can you imagine losing backup disks containing information for 300,000 patients? Or having computer back-up tapes stolen? What if someone hacked into your network servers or lost important laptops? These aren’t hypothetical scenarios. They’re real data breach cases that have occurred in recent years. Can this happen to you?...

Read More Webinar: Data breaches can happen anytime, anywhere
Vigilance is still the best medicine for avoiding medi...

  The latest Ponemon Institute Medical Identity Theft survey reflects the classic good news, bad news scenario. The good news is that more consumers understand how medical identity theft happens, and the importance of checking healthcare invoices and records for accuracy. The bad news is that the victim count...

Read More Vigilance is still the best medicine for avoiding medical identity theft