Steps Toward Tracking And Managing Your Digital Footprint
Even if you're not ecologically inclined, you've probably heard the term "carbon footprint"-a phrase that refers to the amount of excess carbon an individual, family or organization contributes to the...
View ArticleWhat Medicare Fraud Means To You
Americans spend decades protecting their Social Security numbers - not carrying their cards in their wallets, carefully parsing who they share the number with, monitoring their Social Security...
View ArticleOld School Scams Make a Comeback
Scammers don’t need to be master hackers to bust into your bank account. A pen and paper can be enough—especially if the paper comes from a lost or stolen checkbook.Cyber crimes may rule the headlines,...
View ArticleQ&A: Everything You Need to Know About Social Bots
Social bots are programmed to appear as real people on social networks—tweeting and retweeting, amassing followers, even having matching Facebook accounts. Filippo Menczer, an Indiana University...
View ArticleThis Casanova Was An Imposter
Raul Siqueiros knows his way around Facebook. He frequently updates his own personal page, and as a Realtor, he also runs his company page to attract new clients.He's a social guy. But he had no idea...
View ArticleQ&A: Why SMBs Are Targets For Cyber Crime
Ondrej Krehel is a computer forensics consultant. With more than a decade of experience in computer forensics, he has launched investigations internationally and domestically into a broad range of IT...
View ArticleShut Out Hackers with Vulnerability, Penetration Testing
By Mark McCurleyMany companies inadvertently give hackers an easy way into their networks by failing to stay on top of vulnerabilities, or weaknesses in their software, hardware or network...
View ArticleFour Steps to Stronger Vendor Security
Four Steps to Stronger Vendor Security By Deena Coffman When it comes to entrusting your company’s sensitive information to suppliers and contractors, out of sight shouldn’t be out of mind. Consider...
View ArticleFour Do's and Don'ts After a Breach
Companies aim for greater revenues, profits and brand loyalty. They never wish for data to be lost or stolen because a data breach takes away from these three important goals. But the reality is that...
View Article10 Questions Executives Should Be Asking About Data Security
The phone rings, and it’s your information security officer—or worse, law enforcement—with bad news. Your company appears to have experienced a data breach. Information that is protected by law or...
View ArticleAvoid These Six Common Breach Scenarios
By Deena CoffmanA short list of trigger events are responsible for a large percentage of data breaches. The majority of exposures can be greatly minimized by focusing first on these areas. Also,...
View Article5 Ways to Keep Your Office Copier Data Safe
When it comes to your business security, the office photocopier may be the last thing that comes to mind. But today’s generation of machines are networked, multi-functioning devices that can print,...
View ArticleCase Study: Thieves Use Stolen Identity for Retail Therapy
Katie Smith* was living an upright life—working for a large manufacturer, saving for retirement and being a good neighbor—when she received a voicemail from Kohl’s department store about activity on...
View ArticleHow HR Can Safeguard PHI
By Deena Coffman Human resource departments are collecting a growing amount of protected health information (PHI) on employees and their dependents for health benefits on a daily basis. Yet many of...
View ArticleSchool Year Poses Identity Theft Concern?
For parents across the country, registering their children for preschool, kindergarten or a new school system is a necessary part of making sure those kids get the education they need. But at the same...
View ArticleCase Study: Identity Theft Hits Too Close to Home for Seniors
Eileen and Laurence Cashman carefully planned their retirement, securing an affordable apartment in a building for seniors where they’d have the support they needed in their twilight years.They didn’t...
View Article6 Reasons Why Changes to Rhode Island's Breach Laws Won't Work
By Eduard GoodmanThe main reason why? Legislators are asking for a 14-day notification timeframe, but that can lead to a number of problems. Responding to a breach is complicated. Organizations first...
View ArticleInsurance Professional Navigates Tax Fraud Nightmare
Tax fraud happens all the time. And without the right resources at your back, it can be a nightmare. Just ask Melissa Richardson. When Richardson efiled her 2013 tax return through a popular online...
View ArticleSavvy Financial Advisor Falls Victim to Identity Theft
Having worked in the financial industry for 31 years, Jay Smith* thought he knew how to protect himself against identity theft. But when identity thieves began rapidly opening new accounts the day...
View Article5 Habits of Highly Successful CISOs
By Deena CoffmanBusinesses of all sizes—from international corporations to local coffee shops—must concern themselves with data privacy. Curious about your company’s security posture? See if you’re...
View Article