Quantcast
Channel: Articles
Browsing all 88 articles
Browse latest View live

Steps Toward Tracking And Managing Your Digital Footprint

Even if you're not ecologically inclined, you've probably heard the term "carbon footprint"-a phrase that refers to the amount of excess carbon an individual, family or organization contributes to the...

View Article


What Medicare Fraud Means To You

Americans spend decades protecting their Social Security numbers - not carrying their cards in their wallets, carefully parsing who they share the number with, monitoring their Social Security...

View Article


Image may be NSFW.
Clik here to view.

Old School Scams Make a Comeback

Scammers don’t need to be master hackers to bust into your bank account. A pen and paper can be enough—especially if the paper comes from a lost or stolen checkbook.Cyber crimes may rule the headlines,...

View Article

Image may be NSFW.
Clik here to view.

Q&A: Everything You Need to Know About Social Bots

Social bots are programmed to appear as real people on social networks—tweeting and retweeting, amassing followers, even having matching Facebook accounts. Filippo Menczer, an Indiana University...

View Article

Image may be NSFW.
Clik here to view.

This Casanova Was An Imposter

Raul Siqueiros knows his way around Facebook. He frequently updates his own personal page, and as a Realtor, he also runs his company page to attract new clients.He's a social guy. But he had no idea...

View Article


Image may be NSFW.
Clik here to view.

Q&A: Why SMBs Are Targets For Cyber Crime

Ondrej Krehel is a computer forensics consultant. With more than a decade of experience in computer forensics, he has launched investigations internationally and domestically into a broad range of IT...

View Article

Image may be NSFW.
Clik here to view.

Shut Out Hackers with Vulnerability, Penetration Testing

By Mark McCurleyMany companies inadvertently give hackers an easy way into their networks by failing to stay on top of vulnerabilities, or weaknesses in their software, hardware or network...

View Article

Image may be NSFW.
Clik here to view.

Four Steps to Stronger Vendor Security

Four Steps to Stronger Vendor Security By Deena Coffman When it comes to entrusting your company’s sensitive information to suppliers and contractors, out of sight shouldn’t be out of mind. Consider...

View Article


Image may be NSFW.
Clik here to view.

Four Do's and Don'ts After a Breach

Companies aim for greater revenues, profits and brand loyalty. They never wish for data to be lost or stolen because a data breach takes away from these three important goals. But the reality is that...

View Article


Image may be NSFW.
Clik here to view.

10 Questions Executives Should Be Asking About Data Security

 The phone rings, and it’s your information security officer—or worse, law enforcement—with bad news. Your company appears to have experienced a data breach. Information that is protected by law or...

View Article

Image may be NSFW.
Clik here to view.

Avoid These Six Common Breach Scenarios

  By Deena CoffmanA short list of trigger events are responsible for a large percentage of data breaches. The majority of exposures can be greatly minimized by focusing first on these areas. Also,...

View Article

Image may be NSFW.
Clik here to view.

5 Ways to Keep Your Office Copier Data Safe

When it comes to your business security, the office photocopier may be the last thing that comes to mind. But today’s generation of machines are networked, multi-functioning devices that can print,...

View Article

Image may be NSFW.
Clik here to view.

Case Study: Thieves Use Stolen Identity for Retail Therapy

Katie Smith* was living an upright life—working for a large manufacturer, saving for retirement and being a good neighbor—when she received a voicemail from Kohl’s department store about activity on...

View Article


Image may be NSFW.
Clik here to view.

How HR Can Safeguard PHI

By Deena Coffman Human resource departments are collecting a growing amount of protected health information (PHI) on employees and their dependents for health benefits on a daily basis. Yet many of...

View Article

School Year Poses Identity Theft Concern?

For parents across the country, registering their children for preschool, kindergarten or a new school system is a necessary part of making sure those kids get the education they need. But at the same...

View Article


Image may be NSFW.
Clik here to view.

Case Study: Identity Theft Hits Too Close to Home for Seniors

Eileen and Laurence Cashman carefully planned their retirement, securing an affordable apartment in a building for seniors where they’d have the support they needed in their twilight years.They didn’t...

View Article

Image may be NSFW.
Clik here to view.

6 Reasons Why Changes to Rhode Island's Breach Laws Won't Work

By Eduard GoodmanThe main reason why? Legislators are asking for a 14-day notification timeframe, but that can lead to a number of problems. Responding to a breach is complicated. Organizations first...

View Article


Image may be NSFW.
Clik here to view.

Insurance Professional Navigates Tax Fraud Nightmare

Tax fraud happens all the time. And without the right resources at your back, it can be a nightmare. Just ask Melissa Richardson. When Richardson efiled her 2013 tax return through a popular online...

View Article

Image may be NSFW.
Clik here to view.

Savvy Financial Advisor Falls Victim to Identity Theft

Having worked in the financial industry for 31 years, Jay Smith* thought he knew how to protect himself against identity theft. But when identity thieves began rapidly opening new accounts the day...

View Article

Image may be NSFW.
Clik here to view.

5 Habits of Highly Successful CISOs

By Deena CoffmanBusinesses of all sizes—from international corporations to local coffee shops—must concern themselves with data privacy. Curious about your company’s security posture? See if you’re...

View Article
Browsing all 88 articles
Browse latest View live