Standard Post with Image

When ID Theft Gets Personal PODCAST

A national survey of online households indicates that 45% of us are worried about credit card and banking fraud. Here’s the kicker: One-third of those households no longer purchase goods and services on the Internet.

Read More
Standard Post with Image

8 Best Practices To Avoid A Phishing Scam [c/o Mother G]

One of our trusted partners, Mother G, has been helping clients with Phishing Scams for many years. And while we address this issue in our Risk Awareness Training [link to training-workshops-webinars/risk-awareness-training], our expert advise comes from the technical engineers over at Mother G, and here's what they have to say...

Read More
Standard Post with Image

CBS News 60 Minutes "Can a phone be hacked?"

Well, the short and now obvious answer (Apple vs USA) is of course, yes. And possibly the more important follow up is, "What is the impact of my smart phone getting hacked?" 60 Minutes has provided an in-depth, insider view of the hacker world, with a very real taste of the impact cell phone hacking can have on our lives.

Read More
Standard Post with Image

ID Theft in 2015 - 5 Things We Learned

Each year, hundreds of thousands of Americans file identity theft complaints with the Federal Trade Commission and other agencies.

Related data is compiled into the Consumer Sentinel Network Data Book. This Investigator Insight from Kroll shares five key facts pulled from the data.

This is why Undo Identity Theft has been saying for years, credit monitoring alone is not enough.

Read More
Standard Post with Image

Cyber Security: Huge Risk To Small Businesses?

Twice a month MotherG teams up with Jim Kendall, business columnist for the Daily Herald and host of our podcast. On this episode, Undo Identity Theft Expert George Vroustouris, an Identity Protection Advisor...joins the conversation.

Read More
Standard Post with Image

Everyone is Accountable

"It's a cultural thing. If it's true that "your culture is defined by what you tolerate,” then what sort of accountability do you tolerate? Real commitments or just good intentions? "

Read More
Standard Post with Image

Social Engineering - People Are The Key

Social engineering became the No. 1 attack technique as attackers shifted away from automated exploits and instead engaged people to do the dirty work—infecting systems, stealing credentials, and transferring funds.

Read More
Standard Post with Image

Can a Fridge Steal your ID?

In a recent public service announcement, the Federal Bureau of Investigation (FBI) warned that “weak security capabilities” and “lack of consumer security awareness” can provide criminals with opportunities to exploit these devices.

Read More
Standard Post with Image

13.1 Million Identity Fraud Victims in 2015

The 2016 Identity Fraud Study by Javelin Strategy & Research, revealed that 13.1 million consumers were victims of identity fraud in the U.S. last year. The study also found that Chip Pin credit cards (EMV) have already had a significant impact on fraudsters’ behavior, which drove a 113 percent increase in incidence of new account fraud.

Read More
Standard Post with Image

Four Ways to Help Protect Your Virtual Assets [REPOST]

If you use a free online service, such as an email account or social network, then you have virtual assets that are stored online. But do you know what will happen to that data in the future—even if you no longer use the site?

Read More
Standard Post with Image

Life Unlocked - $100,000,000 Fine Paid to FTC

The Federal Trade Commission (FTC) initiated a contempt proceeding against LifeLock following an extensive investigation.

Read More
Standard Post with Image

Will Your Small Business Survive a Breach?

Most identity fraud originates from a sensitive, personal information breach in the workplace.

60% of small businesses that have a data breach . . . go out of business after six months.

Read More
Standard Post with Image

Public Wi-Fi is NOT safe

Wi-Fi has changed the way we communicate, connecting us with the digital world from anywhere. However, the convenience of free Wi-Fi comes with some serious risk, from computer viruses to identity theft.

Read More
Standard Post with Image

What is the Dark Web

Search engines like Google and Yahoo only access 4% of the entire Internet. The other 96% is made up of the "dark web," or "deep web," a vast online space commonly favored by mass hackers and smugglers. So how exactly does the dark web work? And why is Facebook currently tapping into it?

Read More
Standard Post with Image

Easy Prey: The Five Groups Identity Thieves Like to Target [REPOST]

Nearly all Americans, from the youngest infant to the oldest retiree, have what identity thieves want: a Social Security number. However, some groups tend to be more susceptible to identity theft than others.

Read More
Standard Post with Image

Passwords

L38, R7, L15 ? No, not GPS coordinates...

Do you remember your locker combination? No worries, because if you forgot it, all you had to do was open your notebook to the back page, where you wrote it along the bottom edge - you know, the 'secret' spot.

Read More
Standard Post with Image

Impact of OPM breach could last decades.

Intelligence and security experts say recovering from the massive data breach at the Office of Personnel Management won't happen until most retire. Many of our security partners have had, or still have top secret clearance and are seriously concerned about their personal and family security. One investigator said, "If they're planning to give us free credit monitoring, it will prove to be useless since this data has nothing to do with our credit."

Read More
Standard Post with Image

How to Recognize Phishing Scam Emails

One of our most trusted IT partners was recently a target of a phishing scam - here's the article by Joe Tricker, at Mother G. "MotherG was recently the target of a phishing scam (yes, even IT managed service providers can be targeted). I’m thankful that we were the target, not the victim due to our diligent staff. If we hadn’t been so fortunate, I’d either be writing a different blog or updating my resume. Admittedly, the manner in which the bait was presented was quite clever. I want to share our experience, discuss why we were the target – not the victim, and provide steps to take if you’re targeted by a phishing scam."

Read More
Standard Post with Image

Cybersecurity Insurance Fills Important Gaps in Liability Insurance Coverage

The twenty-first century challenges posed by data breaches and cyber crimes do not fit neatly into the space occupied by traditional liability insurance policies. As a result, courts have had a difficult time grappling with data breach claims under such policies, which highlights the need for companies to consider cybersecurity liability insurance coverage as a more targeted option to cover against losses incurred by cyber crimes and data breaches.

Read More
Standard Post with Image

Annoying New Ransomware Attack Uses Girl Resumes

The SANS InfoSec Forums noted that since Monday May 25th a new version of CryptoWall 3.0 ransomware started, using both malicious spam and the Angler exploit kit (EK). The attack wave has increased significantly since Monday June 8th, and the use of the Angler EK appears to have started around the same time.

Read More
Standard Post with Image

Social Security's Death File Aids in ID Theft

Living in a mansion, driving a luxury car and lavishing expensive jewelry on himself, Sirhon "Ron" Rivers was at the top of the world — thanks to those who are six feet under. Over four years, he stole $2.3 million by filing more than 800 fraudulent state income tax refunds — all by using the identities of people who had died.

Read More
Standard Post with Image

Is employee awareness and training the holy grail of cyber security?

They may be based in North Korea, Russia, China, or the United States. They may call themselves “Deep Panda,” “Axiom,” Group 72,” the “Shell_Crew,” the “Guardians of Peace,” or the “Syrian Electronic Army.” But no matter how exotic or mundane the origins of a particular cyber-criminal organization, all that it needs to initiate a major cyber attack is to entice one of your employees to click on a malicious link in an email, inadvertently disseminate malware throughout the network servers, and potentially cause tremendous damage and loss of business.

Read More
Standard Post with Image

Leading Online Password Manager LastPass Hacked

While we have been skeptical of using online password managers for fear of them being enormous targets for hackers, others have argued that the benefits outweigh the risks. Unfortunately, this incident, the first reported breach of an online password manager, verifies our concerns. The now, very sophisticated dark web industry of identity theft has set it's sites on the "mother-load" of online databases...virtual password storage servers. The alarms are sounding, "change your master password" immediately! We recommend that you consider removing your data from these online password systems, and securely store it offline...and we can show you how.

Read More
Standard Post with Image

Did you know you have a public XFINITY WiFi Hotspot at your house?

When Comcast introduced their latest and greatest home modems, about this time last year, they included the XFINITY WiFi Home Hotspot. This is an unsecured free public access point at your house, available to anyone nearby, searching for an XFINITY Hotspot.

Read More
Standard Post with Image

Cyberattacks target small to midsize firms, security experts say

Obscurity is not security. Just because your business is small and isn't a household name, like Target or Apple, doesn't mean it's safe from cyber criminals. Small and midsize companies are probably more at risk because they don't always have adequate staffing to manage their websites and online business, said William J. Adams, a vice president with the Merit Network, a Michigan nonprofit that assists government and businesses with cyber security issues.

Read More
Standard Post with Image

2015 is already the year of the health-care hack — and it’s only going to get worse.

Most breaches of data from health organizations are small and don't involve hackers breaking into a company's computer system. Some involve a stolen laptop or the inappropriate disposal of paper records, for example -- and not all necessarily involve medical information. But hacking-related incidents disclosed this year have dramatically driven up the number of people exposed by breaches in this sector.

Read More
Standard Post with Image

Jeb Bush Releases Years of Emails, Leaking Names, Social Security Numbers

In an unintentional Doxing, presidential hopeful Jeb Bush published over 250,000 personal emails ... how many identity thieves around the world downloaded the data, before it was finally removed?

Read More
Standard Post with Image

A Bad Idea - How NOT to use your credit card!

A coworker shared a recent incident that involved a common occurrence. She was using Instant Messenger to communicate with a business partner to handle a transaction with one of their vendors. She was buying the items from the vendor online, and had the vendor rep on the phone…a communication technology trifecta.

Read More
Standard Post with Image

Four Ways to Help Protect Your Virtual Assets

If you use a free online service, such as an email account or social network, then you have virtual assets that are stored online. But do you know what will happen to that data in the future—even if you no longer use the site?

Read More
Standard Post with Image

Easy Prey: The Five Groups Identity Thieves Like to Target

Nearly all Americans, from the youngest infant to the oldest retiree, have what identity thieves want: a Social Security number. However, some groups tend to be more susceptible to identity theft than others.

Read More
Standard Post with Image

Prosecutors: Car dealer ID-theft case may involve 44 victims

Missouri Attorney General Chris Koster said former Kansas City-area used car dealer Terry Morrow may have used information from as many as 44 customers in an identity-theft fraud scheme.

Read More
Standard Post with Image

Amazing mind reader reveals his 'gift'

Dave is an extremely gifted clairvoyant who finds out specific financial information. This video reveals the magic behind the magic, making people aware of the fact that their entire life can be found online. And by doing so urging everybody to be vigilant.

Read More
Standard Post with Image

Rising Threat of Identity Theft

Identity theft topped the Federal Trade Commission's complaints list for the 12th year in a row in 2011 and victims struggle to clear their names. But there are steps you can take to prevent it or effectively deal with identity theft if it happens to you.

Read More
Standard Post with Image

Contact-less Credit Cards Can Lead to Contact-Less Crime

While card issuers downplay the risks, a technology increasingly found in credit and debit cards could allow those with the know-how to reach into your wallet without you ever knowing..

Read More