Identity Theft

Showing page 3 of 20 pages.

  • Can Your Cell Phone Number Be Easily Stolen?

    Yes, if you’ve gotten a recent text alert from T-Mobile, it’s legitimate and thieves could steal your cell phone number if you don’t secure it properly. The company is urging its customers to require a second password to authorize “porting” those ten digits to another carrier, and even customers on other networks should pay attention. […] Read more

  • Majority of Medical Providers Share Passwords Putting Patient Data at Risk

    A new study indicates that nearly three out of four health professionals surveyed obtained and used electronic medical record (EMR) passwords from a colleague. Could password misuse be one of the culprits behind the medical industry’s high rate of data loss? Statistics on Password Sharing The study, published in the September 2017 issue of Healthcare […] Read more

  • Sticky Notes Are Wrong Place for Passwords

    An inaccurate warning of an incoming missile attack rocked Hawaii on January 13, 2018, as the world watched. It was simply an error—an internal test of the alert system made public unintentionally. Now, under this intense scrutiny, Hawaiian government password practices have been revealed and have citizens and security experts anxious about security. Evidence has […] Read more

  • Looking Ahead to New Security Challenges in 2018

    If you’re on the alert for a batch of new data security threats to hit in 2018, check your rearview mirror instead. Many of the “big hits” from 2017 will generate another run at stealing your data this year. After all, why should hackers change their approach if it’s working? A look at the money […] Read more

  • How to Avoid Income Tax Refund Theft

    The 2018 tax season has begun, so it’s time to proactively protect your income tax refund. Each tax year, fraudsters claim billions of dollars in fake tax refunds. They create huge losses for the US Treasury and significant delays in return processing for legitimate taxpayers. The more you learn about this challenge, the less likely […] Read more

  • Hit the Road, but Protect Yourself and Private Data During Your Travels

    Travel can create lasting memories, but you don’t want yours to be nightmares about identity theft. Consider taking some proactive measures to minimize your risks before you head out on your spring break adventure or that winter cruise. Don’t Leave Home with an Outdated Operating System  If you have a laptop or tablet, it’s probably […] Read more

  • Using the Right Tools Can Help You Strike Back at Phishing Emails

    Several months ago, a convincing phishing scam started popping up in inboxes across the U.S. Chuck Fordham was reaching out to share a large Dropbox file. Do you know Chuck Fordham? Neither do we, but he grabbed our attention with one of the best-crafted phishing emails we’ve seen in a long time. Such phish bait […] Read more

  • 4 Big Myths About Protecting Your Private Information in a Natural Disaster

    Whenever a disaster hits, the risk to your personally identifiable information (PII) increases dramatically. Wind, rain, or flooding can destroy vital documents. Important papers can also be swept up or blown away. The good news is that you can take steps to help lock down your PII before it goes airborne. But, don’t be fooled […] Read more

  • Where You Sleep for the Holidays Could Affect Your Data Safety

    Dorothy was right. There’s no place like home. It’s where many of us feel like our personal information is safe. So if you’re one of the many Americans who travel during the holiday season, add data security to your packing list and lock down your sensitive information. You’ll sleep easier on the road, even when […] Read more

  • Hollywood Hackers Target Schools with Threats of Violence and Ransom Demands

    It’s not often that a school district in Montana or Iowa finds itself connected to a Hollywood studio, but these entities have all become targets for an aggressive hacker group that demands ransom for stolen data. The name Dark Overlord is notorious throughout the data security world. This international hacker group has claimed credit for […] Read more