Because October is National Cyber Security Awareness Month, and in part to raise public awareness of the dangers of identity theft, we recently chatted with author and technology guru Ben Halpert. Several years ago he launched Savvy Cyber Kids, a nonprofit that has joined the U.S. Department of Homeland Security’s STOP.THINK.CONNECT. campaign’s national network, forming a partnership that will promote cybersecurity awareness to children nationwide. Keep reading to learn why he launched Savvy Cyber Kids and various topics related to keeping kids as safe as possible online.
Tagged: identity theft
October is National Cyber Security Awareness Month, and in part to raise public awareness of the dangers of identity theft, Experian, a global information services company, has published a new survey regarding U.S. attitudes toward this serious problem. Check out the results — including why so many people still fail to take actions to protect themselves online.
We applaud Tech Republic for explaining what we’ve been educating about for years: “Public hotspots all have one thing in common; they are open networks that are vulnerable to attacks and security breaches. Most, if not all, public hotspots do not encrypt data, allowing passwords, email messages, and other information to be intercepted by nefarious types.”
Keep reading to see what else their article suggests — as well as our suggestions for avoiding evil-twin hotspots, dodging hackers, and protecting your identity.
Have you heard about the major Home Depot attack? Some say it could be one of the largest data breaches in history, even larger than the Target data breach last year. It speaks to a lack of awareness of security protocols — and has identity theft experts very worried.
PRIVATE WiFi and the Identity Theft Resource Center will be hosting a Twitter chat on Thursday, September 4, at 2pm ET, to discuss the hidden dangers and the ways to prevent a personal data breach of your kids’ information. Keep reading to learn some of the most commonly asked questions about children’s identity security, and of course, please join us Thursday to answer any questions you may have.
Last week brought us the story of a Russian cybergang that hacked into the ownership of 1.2 billion usernames and passwords. Last week also presented me with the most obvious demonstration of aloofness to how people view their personal information.
So just how technologically savvy do you need to be to take one of the strongest measures available to protect your personal information? Well, let’s just say I would bet money that you can do it.
Is malware to blame? Community Health Systems, a company that operates 206 hospitals across the United States, has admitted that hackers recently broke into its computers and stole data on 4.5 million patients.
The company says it secures itself with cyber-liability policies to protect their bottom line. But do the hospitals affiliated with this profitable corporation truly explain to new patients how and where their most sensitive personal information is being shared, saved, and protected?
It’s believed that Goodwill stores in as many as 21 states may have been hacked for the credit card data of consumers who’ve shopped at the thrift stores. Some signs have led investigators to believe these cybercrimes may have begun as early as May of 2012. But what would make someone stoop so low as to attack a charity whose purpose is to restore a sense of pride in people who are in need, mostly by providing them with training and skills to find better jobs?
While the Internet initially provided a platform for the powerless, governments and big business are now using the power of the Internet to collect unprecedented amounts of data about us. How has this happened?
It might be hard to envision life before the convenience of portable devices emerged on the market. Providing everything from instant connectivity and access to information, tablets and smartphones can feel like we’re carrying a portable personal assistant everywhere we go.
But one trend emerging in the mobile device market does have its critics raising the alarm for personal security, and that’s the high numbers of consumers who use health and fitness apps. These apps, which track our healthy habits and exercise information, seem like a great way to foster a healthy lifestyle, but the reality has industry experts a little concerned.
No one doubts that biometric identification is a powerful tool with many possible applications. But there’s a downside to this technology: in essence, our faces can now be used for government tracking and surveillance that was not possible until now. And there are few safeguards currently in place to curb excessive use of this tool.
We are always excited to read new reports on issues relating to identity theft, but the 2014 Trustwave Global Security Report is of special interest to us here at the ITRC. These reports help us to understand what the people who call our victim assistance center may be experiencing and improve our ability to help them.