CSID Presents at the Fall UT Center for Identity Symposium

By | October 3rd, 2012|Uncategorized|

Do you know the risks that your company’s data faces when stored on a cloud? Do you know what to look for in a cloud provider? Do you know how to better secure your own information? Last week our VP of Information Systems and Operations Isaac Chapa addressed questions like these at an Identity Symposium [...]

Webinar Recap: What to do when a password is no longer secure?

By | October 1st, 2012|Uncategorized|

We recently hosted a webinar featuring Experian VP Marc Ostryniec and Toopher CEO Josh Alexander. Marc and Josh discussed consumer password habits, supplemented by statistics from our  recent consumer survey. The two also revealed how these habits put consumers and businesses at risk for compromise, and what businesses can do to mitigate these risks now [...]

Consumer Password Habits Unveiled

By | September 25th, 2012|Uncategorized|

Did you know that nearly 90 percent of consumers feel secure with their current password management and use habits yet 61 percent of those consumers reuse passwords across multiple sites? In a world where security breaches make the headlines seemingly every day, consumers are still careless about password creation, management and security. This is an [...]

Security Insights: Information Technology Security Part II

By | September 18th, 2012|Uncategorized|

As mentioned in Part I of this post, security breaches are an imminent threat and danger. While there are many types of data that should be secured, finding concise ways to improve technology security can be difficult.Here are some steps and tips to improving your company’s information technology security.Companies can help improve information technology security [...]

UDID’s and Non-Credit Monitoring

By | September 12th, 2012|Uncategorized|

Last week, 12-million Apple UDID’s were exposed in a breach that stemmed from the company BlueToad. Luckily, UDID’s don’t have much relevance to your personal identity. Nevertheless, this news did get us thinking about types of information that you should monitor that may not be as obvious as your social security number, credit report or [...]

Webinar: Mitigating the Risk of Poor Password Practices

By | September 6th, 2012|Uncategorized|

When it comes to securing passwords, companies can encrypt, hash and salt to their hearts’ content but they will still be at risk. Why? Because people can be careless when it comes to password creation and management. If one consumer uses the same password on multiple sites, and one of those sites is compromised, the [...]

Security Insights: Information Technology Security Part I

By | August 29th, 2012|Uncategorized|

In today’s world, companies need to be prepared to secure all assets including confidential documents and employee data, client enterprise data and customer data so that information does not get into the wrong hands. Companies should take all precautions and employ information technology security practices to avoid any compromised data in the event of a [...]

CSID’s Global ID Protector is on a Roll

By | August 27th, 2012|Uncategorized|

We did it again. Our Global ID Protector has been honored with another award—the International Business Awards has selected Experian’s Global ID Protector technology as the winner of the Silver Stevie Award for Best New B2B Product of the Year. As the only globally scalable comprehensive identity protection solution on the market, our technology has [...]

SXSW 2013 Panel Picker – Vote for CSID!

By | August 16th, 2012|Uncategorized|

It’s that time again… to vote for Experian for SXSW 2013!The 2013 SXSW Interactive Festival will bring together professionals from all over the world, including technology and security enthusiasts, and Experian is excited for the chance to take part. We need your help to keep our panels in the running!All you have to do is [...]

Securing Your Digital Life: Lessons from the Mat Honan Hack

By | August 9th, 2012|Uncategorized|

With just a few easy details in hand, a hacker can drastically change your life. Wired technology reporter Mat Honan’s digital life was recently abolished by a couple of hackers who ultimately sought access to his three-letter Twitter handle, @Mat. Within a matter of minutes, they deleted his Google account, erasing years of communication with [...]

Load More Posts