Tagged: identity theft

Cyber Security Training Just As Important at C-Level

The need for better online safety training to prevent data breaches is a hot topic right now. Coupled with stronger computer and network policies, companies want to prevent the hacking events that leave businesses susceptible to a data breach. While it’s no secret that employees in both the private sector and government service can unintentionally expose organizations to hackers, what is surprising is a report by Wombat Security that shows that 33% of CEOs fell for phishing attacks that led to network access. Why are they falling for this kind of internet activity?

E-filing: The Fastest and Safest Way to File Taxes?

E-filing your annual return to the IRS offers speed and convenience and when coupled with industry-approved software that can plug in the values for you, a lot of the headaches traditionally associated with doing your taxes are eliminated. However, there are some potential dangers that you should be aware of, such as insecure public WiFi networks and online tax fraud.

Identity Protection: 5 Tips to Stay Mobile Secure in 2015

Living a mobile lifestyle does not come without risk, especially where your identity is concerned. But staying mobile secure doesn’t have to be complicated. Consider this: 94.2% of identity victims say they are still highly engaged online and via their mobile devices despite having had their personally identifiable information stolen, according to a recent study from The Identity Theft Resource Center.

So how do we stay safe? Just follow these five tips!

Don’t Give Your Data Away: Blur Your Passwords, Payments, and Privacy

Now is the time to make your online activity a blur. Why? Here are some startling reasons: In the last 18 month, over 157 million US credit card holders have been notified of a breach. Furthermore, the typical web surfer is tracked by 11 companies at each site they visit – resulting in over 2,500 unique tracking and data collection attempts weekly. This is the new reality of the Internet in 2014 – and as 2015 approaches, the treat level will only increase.

ITRC Victim Impact Survey Findings LIVE Event

On Wednesday, October 29, learn about the ITRC’s most recent survey report, “Identity Theft: The Aftermath.” A panel of experts will discuss the survey’s key findings, with a special emphasis on the emotional impact of identity theft on victims, and ways in which the industry as a whole can leverage this information to better serve victims and consumers.

Can’t make it to the event in Washington, DC, but want to be involved? Join in live on Twitter and follow along with the hashtag #IDTheftImpact. Keep reading for more details about this very important event.

Q&A: Founder of ‘Savvy Cyber Kids’ on Cybersecurity Best Practices

Because October is National Cyber Security Awareness Month, and in part to raise public awareness of the dangers of identity theft, we recently chatted with author and technology guru Ben Halpert. Several years ago he launched Savvy Cyber Kids, a nonprofit that has joined the U.S. Department of Homeland Security’s STOP.THINK.CONNECT. campaign’s national network, forming a partnership that will promote cybersecurity awareness to children nationwide. Keep reading to learn why he launched Savvy Cyber Kids and various topics related to keeping kids as safe as possible online.

Experian Survey: We Understand WiFi Dangers but Don’t Protect Ourselves from Identity Theft

October is National Cyber Security Awareness Month, and in part to raise public awareness of the dangers of identity theft, Experian, a global information services company, has published a new survey regarding U.S. attitudes toward this serious problem. Check out the results — including why so many people still fail to take actions to protect themselves online.

The Rise of the Evil Twin: How a Personal VPN Can Strike Back

We applaud Tech Republic for explaining what we’ve been educating about for years: “Public hotspots all have one thing in common; they are open networks that are vulnerable to attacks and security breaches. Most, if not all, public hotspots do not encrypt data, allowing passwords, email messages, and other information to be intercepted by nefarious types.”

Keep reading to see what else their article suggests — as well as our suggestions for avoiding evil-twin hotspots, dodging hackers, and protecting your identity.

Home Depot Hit by Data Thieves, Similar to Target Breach

Have you heard about the major Home Depot attack? Some say it could be one of the largest data breaches in history, even larger than the Target data breach last year. It speaks to a lack of awareness of security protocols — and has identity theft experts very worried.

Twitter Chat on Back-to-School Identity Protection

PRIVATE WiFi and the Identity Theft Resource Center will be hosting a Twitter chat on Thursday, September 4, at 2pm ET, to discuss the hidden dangers and the ways to prevent a personal data breach of your kids’ information. Keep reading to learn some of the most commonly asked questions about children’s identity security, and of course, please join us Thursday to answer any questions you may have.

Why the Delay? 3 Simple Steps to Protect Your Password Today

Last week brought us the story of a Russian cybergang that hacked into the ownership of 1.2 billion usernames and passwords. Last week also presented me with the most obvious demonstration of aloofness to how people view their personal information.

So just how technologically savvy do you need to be to take one of the strongest measures available to protect your personal information? Well, let’s just say I would bet money that you can do it.

4.5 Million Risk ID Theft After Hospital Network Hacked

Is malware to blame? Community Health Systems, a company that operates 206 hospitals across the United States, has admitted that hackers recently broke into its computers and stole data on 4.5 million patients.

The company says it secures itself with cyber-liability policies to protect their bottom line. But do the hospitals affiliated with this profitable corporation truly explain to new patients how and where their most sensitive personal information is being shared, saved, and protected?