Category: Thought Leadership

Social Networking Security: Privacy Steps to Take Today

This week we are fortunate to have guest writer Susie Jones, author of 8 Core Values: Security, Privacy, and Asset Protection. A business owner for the past 20 years — with the last six years spent working in online business ventures — today she shares the issue of online privacy invasions, learning to “opt out” of websites that track your information, and other steps to protect yourself online. Click above to read her suggestions for online security measures.

social networking

How Identity Theft Happens on Social Networking Sites

Because you must divulge some level of personal information in order to use and fully benefit from social networking sites, the risk of identity theft exists for people who use them. Learn  the ways that you might put yourself at risk of identity theft and how to prevent this.

digital information

Distressingly Fragile: Digital Information and Things That We Trust That We Shouldn’t

It might sound crazy, but it’s actually rather simple for some cyberpunk to drive to where you live or work, park out front, and put up cellphone antenna aimed at your home or office to hack your cell phone conversations, text messages, even emails. Think it’s not so simple? Think again, says CEO Kent Lawson, in this special post from May that we’re publishing again as part of our “Best of…” series. Click above to read all of Kent’s thoughts on a few “distressingly fragile” mobile trends you need to know about.

marriage identity theft

Honey, I Stole Your Identity


It can be very hard on somebody to find out that their Social Security Number (SSN) has been used for fraudulent purposes by their spouse.  Unfortunately the normal procedure for clearing your credit reports of these fraudulent charges does not apply if you are currently married to the person using your information fraudulently.

So Buggy: Wiretaps At All-Time High

We all know — and applaud — when wiretaps break major corruption scandals, such as Blagojevich in Illinois, or the recent Wall Street insider trading investigation. Or the delicious ones, like Spitzer’s dalliance with a New York call girl. But there is also something just a little scary about government wiretaps as well. Read more for some interesting facts from a report covering wiretaps in 2010 — and what would make you the subject of such an investigation!

online dating

Finding Love on the Internet: Tips for Safe Online Dating

The days of skirting the fact that you met your significant other on the Internet are gone.  According to Match.com, 17% of couples married in the last 3 years, or 1 in 6, met each other on an online dating site.#  The numbers are only expected to grow as the Internet plays a larger role in our day-to-day lives. People using such services need to know how to keep themselves from becoming victims of scams or identity theft.

Ask the Expert: Is Reusing the Same Password Risky?

In his latest “Ask the Excerpt” installment, CEO Kent Lawson points out why it’s more important than ever to use strong passwords — and also why it’s imperative to change passwords for your various login accounts. Otherwise, you might as well leave your house key under your doormat.

children identity theft

How Identity Thieves Steal Our Lives from the Cradle to the Grave Part I: Robbing the Cradle

From children taking out mortgages to dead people filing income tax returns, identity thieves are stealing the lives of our most vulnerable citizens – damaging their credit, their reputation and their families’ peace of mind. Find out what you can do to protect your loved ones from the Number One crime reported by Americans – consumer identity theft.

scams

If Scams Were Real

Guest Blogger Nikki Junker, Social Media Coordinator and Victim Advisor for the Identity Theft Resource Center (ITRC), shares some of the scams that have been sent to her in just the last 24 hours.

Someone Stole My Identity: Now What?

You get denied for a card at your local department store because of delinquent accounts. You don’t have any accounts which are delinquent, so you check your credit report and it shows five credit card accounts that are past due. You now realize you have become a victim of identity theft. What do you do now?

How Hard Is It to Hack Wifi?

CEO Kent Lawson points out how incredibly easy it is for ordinary people to hack WiFi. It doesn’t take any tech expertise — it doesn’t even take a geek — for someone to access your email passwords, logins, and other highly sensitive data. Read on to learn how this is happening — perhaps even to you!

video chat

Hey…Watch This: The Dangers of Video Chat and How to Protect Yourself

It is astounding when we sit back and think about just how far communication has come in recent history. While many can remember only having the option of a letter or a phone call, these days there is a plethora of ways to engage each other. Distance and cost are not as much of a concern with the integration of communication services through the internet. However, with the ease of sharing our private lives with friends and acquaintances, comes risk.