Quantcast
Channel: Articles
Browsing latest articles
Browse All 75 View Live

Tax ID Theft Against Seniors Sparks Worry, Action Among Feds

Just when you think identity thieves can't sink any lower than robbing children by using their clean credit profiles for criminal purposes, news emerges of an escalating form of identity theft: tax...

View Article



Security Advice for Mobile Device Users

With 87 percent of American adults owning cellphones (according to Pew Research Center), 45 percent possessing smartphones, 26 percent toting e-book readers and 31 percent owning tablet computers, it's...

View Article

GAO: Flaws In IRS Controls Led To Invalid Refunds to Dead Taxpayers

It's a sad statistical fact that when data breaches or business identity theft occur, a failure of internal safeguards is often to blame-partially or entirely. Often, organizations or companies leave...

View Article

Image may be NSFW.
Clik here to view.

When a Soldier Comes Home to Identity Theft

Norman Rockwell painted soldiers coming home to open-armed relatives, hot meals and hard-earned rest. Rick Martinez’s homecoming wasn’t so heartwarming. The National Guardsman returned from an 11-month...

View Article

Steps Toward Tracking And Managing Your Digital Footprint

Even if you're not ecologically inclined, you've probably heard the term "carbon footprint"-a phrase that refers to the amount of excess carbon an individual, family or organization contributes to the...

View Article


What Medicare Fraud Means To You

Americans spend decades protecting their Social Security numbers - not carrying their cards in their wallets, carefully parsing who they share the number with, monitoring their Social Security...

View Article

Image may be NSFW.
Clik here to view.

Old School Scams Make a Comeback

Scammers don’t need to be master hackers to bust into your bank account. A pen and paper can be enough—especially if the paper comes from a lost or stolen checkbook.Cyber crimes may rule the headlines,...

View Article

Image may be NSFW.
Clik here to view.

Q&A: Everything You Need to Know About Social Bots

Social bots are programmed to appear as real people on social networks—tweeting and retweeting, amassing followers, even having matching Facebook accounts. Filippo Menczer, an Indiana University...

View Article


Image may be NSFW.
Clik here to view.

This Casanova Was An Imposter

Raul Siqueiros knows his way around Facebook. He frequently updates his own personal page, and as a Realtor, he also runs his company page to attract new clients.He's a social guy. But he had no idea...

View Article


Image may be NSFW.
Clik here to view.

Shut Out Hackers with Vulnerability, Penetration Testing

By Mark McCurleyMany companies inadvertently give hackers an easy way into their networks by failing to stay on top of vulnerabilities, or weaknesses in their software, hardware or network...

View Article

Image may be NSFW.
Clik here to view.

Four Steps to Stronger Vendor Security

Four Steps to Stronger Vendor Security By Deena Coffman When it comes to entrusting your company’s sensitive information to suppliers and contractors, out of sight shouldn’t be out of mind. Consider...

View Article

Image may be NSFW.
Clik here to view.

Four Do's and Don'ts After a Breach

Companies aim for greater revenues, profits and brand loyalty. They never wish for data to be lost or stolen because a data breach takes away from these three important goals. But the reality is that...

View Article

Image may be NSFW.
Clik here to view.

10 Questions Executives Should Be Asking About Data Security

 The phone rings, and it’s your information security officer—or worse, law enforcement—with bad news. Your company appears to have experienced a data breach. Information that is protected by law or...

View Article


Image may be NSFW.
Clik here to view.

Avoid These Six Common Breach Scenarios

  By Deena CoffmanA short list of trigger events are responsible for a large percentage of data breaches. The majority of exposures can be greatly minimized by focusing first on these areas. Also,...

View Article

Image may be NSFW.
Clik here to view.

5 Ways to Keep Your Office Copier Data Safe

When it comes to your business security, the office photocopier may be the last thing that comes to mind. But today’s generation of machines are networked, multi-functioning devices that can print,...

View Article


Image may be NSFW.
Clik here to view.

Case Study: Thieves Use Stolen Identity for Retail Therapy

Katie Smith* was living an upright life—working for a large manufacturer, saving for retirement and being a good neighbor—when she received a voicemail from Kohl’s department store about activity on...

View Article

Image may be NSFW.
Clik here to view.

How HR Can Safeguard PHI

By Deena Coffman Human resource departments are collecting a growing amount of protected health information (PHI) on employees and their dependents for health benefits on a daily basis. Yet many of...

View Article


Image may be NSFW.
Clik here to view.

Case Study: Identity Theft Hits Too Close to Home for Seniors

Eileen and Laurence Cashman carefully planned their retirement, securing an affordable apartment in a building for seniors where they’d have the support they needed in their twilight years.They didn’t...

View Article

Image may be NSFW.
Clik here to view.

6 Reasons Why Changes to Rhode Island's Breach Laws Won't Work

By Eduard GoodmanThe main reason why? Legislators are asking for a 14-day notification timeframe, but that can lead to a number of problems. Responding to a breach is complicated. Organizations first...

View Article

Image may be NSFW.
Clik here to view.

Insurance Professional Navigates Tax Fraud Nightmare

Tax fraud happens all the time. And without the right resources at your back, it can be a nightmare. Just ask Melissa Richardson. When Richardson efiled her 2013 tax return through a popular online...

View Article

Image may be NSFW.
Clik here to view.

Savvy Financial Advisor Falls Victim to Identity Theft

Having worked in the financial industry for 31 years, Jay Smith* thought he knew how to protect himself against identity theft. But when identity thieves began rapidly opening new accounts the day...

View Article


Image may be NSFW.
Clik here to view.

5 Habits of Highly Successful CISOs

By Deena CoffmanBusinesses of all sizes—from international corporations to local coffee shops—must concern themselves with data privacy. Curious about your company’s security posture? See if you’re...

View Article


Image may be NSFW.
Clik here to view.

What the Schnucks Judgment Means for Insurers

By Eduard Goodman Schnucks, the grocery chain based in the Midwest, is mostly off the hook for a data breach that hit 2.4 million customers a few years back. But the case still provides an object...

View Article

Image may be NSFW.
Clik here to view.

What You Need to Know About Canada’s New Data Breach Law

By Eduard Goodman After years and several failed attempts, the Canadian government has successfully passed a federal data breach notification requirement. The Digital Privacy Act, which received Royal...

View Article

Image may be NSFW.
Clik here to view.

Educational Software and Privacy in the Classroom: What You Need to Know

By Eduard Goodman Educational software platforms are becoming more common in the classroom, raising privacy issues about the data they collect on children.The market for educational software and...

View Article


Image may be NSFW.
Clik here to view.

When Mother Doesn't Know Best: Family Fraud Hits Daughter Hard

Dealing with identity theft is bad enough when you don’t know the perpetrator, but imagine if the criminal turned out to be a trusted family member.Imagine if the criminal were your mom.That’s what...

View Article

Image may be NSFW.
Clik here to view.

Don’t Make These Mistakes When Choosing a Cyber Claims Provider

By Joe SalpietroBusinesses are becoming more interested in cyber coverage as they face mounting risks to their data security. But finding the right carrier and product can be challenging. Here are four...

View Article

Image may be NSFW.
Clik here to view.

Ask the Expert: 'We Are Losing the Game' Against Cyber Threats

The cyber security industry faced steep challenges in 2015, and the battle against hackers and other threats to corporate data looks bleak, according to Natalya Kaspersky, co-founder of Kaspersky Lab....

View Article

Image may be NSFW.
Clik here to view.

Ask the Expert: Data Is a Valuable Asset Companies Must Protect

There's a steep price to pay for all those empowering free online services, such as web searches and email: It's your privacy. Every move you make online is routinely logged, stored and data-mined by...

View Article



Image may be NSFW.
Clik here to view.

Identity Theft and Data Security Trends to Watch in 2016

By Byron Acohido Will cyber exposures subside in the new year? Highly unlikely, according to data security and privacy experts.Trends to expect: an increase in tax and child identity theft, wire...

View Article

Image may be NSFW.
Clik here to view.

4 Reasons Why Cyber Claims Are Denied

By Joe Salpietro  Helping clients get the most out of their cyber coverage means making sure they get their claims covered when a breach or security event occurs. By understanding the most common...

View Article

Image may be NSFW.
Clik here to view.

Companies in All Industries Are Losing Patient Health Data

By Rodika TollefsonEach time a Community Health Systems or an Anthem or a Premera Blue Cross gets hacked, sensitive patient records flood into the cyber underground. But cyber thieves are by no means...

View Article

Image may be NSFW.
Clik here to view.

Keep Employee Trust After a Breach

By Matt Cullina Employee trust is slow to build but quick to lose, especially after a data breach. Morale may dip as employees watch their workplace become the subject of scrutiny and scorn in the...

View Article


Image may be NSFW.
Clik here to view.

SMBs Better Get Ready for More Ransomware Attacks

By Byron AcohidoIn a ransomware attack, victims are prevented or limited from accessing their systems. Cyber criminals attempt to extort money by first using malware to encrypt the contents of a...

View Article

Image may be NSFW.
Clik here to view.

4 Ways to Protect Your Business Data in the Cloud

By Eduard Goodman More companies are using the cloud for storage, software and even infrastructure services. This growing trend has changed the way businesses handle data—and, unfortunately, it also...

View Article

Image may be NSFW.
Clik here to view.

Spear Phishing Gets Sophisticated, Targets CEOs

By Gary Stoller Spear phishers continue to pierce even well-defended networks, causing grave financial wounds. Spear phishers lure a specific individual to click on a viral email attachment or to...

View Article


Image may be NSFW.
Clik here to view.

Cyber Criminals Target Social Media, Apps for Phishing Attacks

By Jaikumar VijayanPhishers have begun leveraging the trust people have in popular social media and cloud collaboration websites to trick people into downloading malware or parting with sensitive...

View Article


Image may be NSFW.
Clik here to view.

4 Things You Should Know About the EU-U.S. Privacy Shield

By Byron AcohidoAmerican whistle-blower Edward Snowden and Austrian citizen Maximilian Schrems are happenstance collaborators who together forced the United States and Europe to formally address an...

View Article

Image may be NSFW.
Clik here to view.

SMBs Take a Step Back with Breach Defense

By Evan SchumanDespite rising cyber exposures and intensifying attacks, small and midsize businesses actually may be regressing when it comes to defending their networks.That startling finding comes...

View Article

Image may be NSFW.
Clik here to view.

IRS Fights Fraud, Slows Tax Refunds

By Rodika TollefsonThe Internal Revenue Service is taking up to 21 days to review tax returns, according to research from fraud prevention vendor iovation, a clear sign that Uncle Sam has stepped up...

View Article

Image may be NSFW.
Clik here to view.

Why Business Email Compromise is Skyrocketing

By Byron AcohidoIt is a devastatingly effective form of spear phishing that the FBI refers to as “business email compromise,” or a BEC attack.Also known as “whaling” and “CEO fraud,” BEC attacks carry...

View Article


Image may be NSFW.
Clik here to view.

Cyber Liability Insurance is the 'Wild, Wild West'

By Byron Acohido A convergence between the cyber insurance and tech security sectors is fast gaining momentum. If this trend accelerates, it could help commercial cyber liability policies arise as a...

View Article

Image may be NSFW.
Clik here to view.

Keep Employee Data Safe

By Matt CullinaWhen a cyber breach occurs, lawsuits are usually not far behind. It’s a chain of events that has become de rigueur in the consumer realm when retailers experience a breach and it is...

View Article


Image may be NSFW.
Clik here to view.

SMBs Take a Step Back with Breach Defense

By Byron AcohidoLast week I had the privilege of mingling with a record 40,000 attendees at the 25th RSA Conference at San Francisco’s vast Moscone Convention Center. It was my 11th RSA, each one...

View Article

Image may be NSFW.
Clik here to view.

Businesses Struggle to Control BYOD

By Justin HarveyThe standoff between mobile hardware giant Apple and the U.S. Department of Justice raises myriad privacy concerns regarding the government’s power to compel a company to unlock a...

View Article


Image may be NSFW.
Clik here to view.

Brexit Will Complicate Data Protection Laws

By Thomas SpierLONDON—Of the many shock waves reverberating from the United Kingdom’s vote to leave the European Union, one ramification of acute concern to U.S. companies doing business in Europe is...

View Article

Image may be NSFW.
Clik here to view.

Brexit Will Complicate Data Protection Laws

By Bob SullivanThere’s been a scary increase in successful ransomware attacks against large organizations this year. Specifically, hospitals have found themselves at the mercy of hackers who demand...

View Article

Image may be NSFW.
Clik here to view.

5 Cyber Security Best Practices for 2016

By Oscar MarquezIn the past five years, businesses of all sizes have realized just how vulnerable they are to cyber attacks.The astonishing increase in the number of attacks each year troubles...

View Article

Image may be NSFW.
Clik here to view.

The Case of the Disappearing $300,000 Loan

For homebuyers, nothing beats the excitement and relief that comes with a home loan approval. So you can imagine the horror when those funds suddenly disappear. John and Nancy Ritter* experienced the...

View Article


Image may be NSFW.
Clik here to view.

What Is Your Data Breach Response Plan?

By Rich BlumbergBusinesses would prefer to avoid the attention of cyber hackers, of course, but it seems just about every organization is in the crosshairs these days. As the number of breaches...

View Article

Browsing latest articles
Browse All 75 View Live




Latest Images