A VPN Can Secure Your Business Network
Labor Day is right around the corner, which is a great time to talk about the important topic of security...
Labor Day is right around the corner, which is a great time to talk about the important topic of security...
It’s easy to fall into one of two different traps when you receive a data breach notification letter. On the...
There’s a lot to celebrate about June: the end of the school year, Father’s Day, the start of summer vacations. And with so many great things to celebrate, it’s easy to see why most people overlook the festivities surrounding Internet Safety Month. While you’re free to celebrate this important event by throwing a party, there are some more useful ways to observe this important holiday.
Within the last decade, our senses of self and identity have made a major shift. Whether we’ve noticed it or not, the items that used to define our identities have gone from hard copy items, such as birth certificates and Social Security cards, to online banking passwords, Facebook logins, and mobile wallets stored in our smartphones. While we still need to safeguard and protect those hard copy documents, we also have to focus on our digital identities.
The need for better online safety training to prevent data breaches is a hot topic right now. Coupled with stronger computer and network policies, companies want to prevent the hacking events that leave businesses susceptible to a data breach. While it’s no secret that employees in both the private sector and government service can unintentionally expose organizations to hackers, what is surprising is a report by Wombat Security that shows that 33% of CEOs fell for phishing attacks that led to network access. Why are they falling for this kind of internet activity?
E-filing your annual return to the IRS offers speed and convenience and when coupled with industry-approved software that can plug in the values for you, a lot of the headaches traditionally associated with doing your taxes are eliminated. However, there are some potential dangers that you should be aware of, such as insecure public WiFi networks and online tax fraud.
Living a mobile lifestyle does not come without risk, especially where your identity is concerned. But staying mobile secure doesn’t have to be complicated. Consider this: 94.2% of identity victims say they are still highly engaged online and via their mobile devices despite having had their personally identifiable information stolen, according to a recent study from The Identity Theft Resource Center.
So how do we stay safe? Just follow these five tips!
Now is the time to make your online activity a blur. Why? Here are some startling reasons: In the last 18 month, over 157 million US credit card holders have been notified of a breach. Furthermore, the typical web surfer is tracked by 11 companies at each site they visit – resulting in over 2,500 unique tracking and data collection attempts weekly. This is the new reality of the Internet in 2014 – and as 2015 approaches, the treat level will only increase.
On Wednesday, October 29, learn about the ITRC’s most recent survey report, “Identity Theft: The Aftermath.” A panel of experts will discuss the survey’s key findings, with a special emphasis on the emotional impact of identity theft on victims, and ways in which the industry as a whole can leverage this information to better serve victims and consumers.
Can’t make it to the event in Washington, DC, but want to be involved? Join in live on Twitter and follow along with the hashtag #IDTheftImpact. Keep reading for more details about this very important event.
October is National Cyber Security Awareness Month, and in part to raise public awareness of the dangers of identity theft, Experian, a global information services company, has published a new survey regarding U.S. attitudes toward this serious problem. Check out the results — including why so many people still fail to take actions to protect themselves online.
We applaud Tech Republic for explaining what we’ve been educating about for years: “Public hotspots all have one thing in common; they are open networks that are vulnerable to attacks and security breaches. Most, if not all, public hotspots do not encrypt data, allowing passwords, email messages, and other information to be intercepted by nefarious types.”
Keep reading to see what else their article suggests — as well as our suggestions for avoiding evil-twin hotspots, dodging hackers, and protecting your identity.
Have you heard about the major Home Depot attack? Some say it could be one of the largest data breaches in history, even larger than the Target data breach last year. It speaks to a lack of awareness of security protocols — and has identity theft experts very worried.