News Recap: Employees’ Personal Activities at Work Can Lead to Data Breaches & Malware

By | July 18th, 2013|Uncategorized|

Recent surveys from Europe and the United States show that employees spend up to 30% of their working hours on personal matters. According to Infosecurity Magazine, “all of those non-productive hours could translate to not just lost output, but actual negative equity in the form of malware attacks and hacking incidents.”Kaspersky Lab Expert Kirill Kruglov [...]

Managing Your Online Reputation

By | July 10th, 2013|Uncategorized|

The digital world is the real world. Our lives are so connected with the Internet that our online personas tell the world who we are as people, as professionals and as companies. This can be great – the Internet provides an outlet for us to share who we are, connect and grow relationships – but [...]

National Internet Safety Month: Keeping Children and Teens Safe on Mobile

By | June 27th, 2013|Uncategorized|

This June, organizations across the country are celebrating National Internet Safety Month, a nationwide effort to spread awareness on Internet dangers and provide resources to educate children, teens and adults on preventative measures.National Internet Safety Month was passed as a resolution in 2005 by the U.S. Senate to raise awareness of the need for online [...]

Join CSID in Twitter Chat About SMB Security Best Practices

By | May 29th, 2013|Uncategorized|

Next week, we’re partnering up with the Identity Theft Resource Center (ITRC) to co-host their monthly Identity Theft Twitter Chat (#IDTheftChat). With National Small Business Week coming up in June, ITRC and Experian will hone in on security issues that affect small businesses. Many small businesses are unaware that 20 percent of all cyber attacks [...]

Industry News Recap: Twitter Launches Two-Factor Authentication

By | May 23rd, 2013|Uncategorized|

This week, Twitter introduced a two-factor authentication login security measure that users can opt into, helping to protect users from email phishing schemes or password breaches. Users need a confirmed email address and a verified phone number on their account to set up the login verification feature on their Twitter settings page.“The two-factor system mirrors [...]

#Youridentity and Social Networks

By | May 2nd, 2013|Uncategorized|

This blog post comes from Adam Kennedy, Product Analyst at Experian. With the rise in social networks and the increasing desire to share personal data in public forums, it’s no surprise identity thieves are targeting Facebook, LinkedIn, and Twitter to steal your identity.What are they after?Your Facebook page and Twitter profile page will show your [...]

Kids as Young as Two Have an Online History

By | February 27th, 2013|Uncategorized|

This guest blog post comes from Russ Warner, CEO of ContentWatch – makers of parental control software, Net Nanny. Remember when you brought your first date home? My siblings delighted in showing her embarrassing photos of me. Well, there isn't much reason to pull out the ole photo album anymore. Most people can "friend" you [...]

Avoiding Social Spam on Facebook and Twitter

By | January 30th, 2012|Uncategorized|

By John Sileo, Experian consumer security expert The post appears like it’s coming from a known friend. It's enticing ("check out what our old high school friend does for a living now!"), feeds on your curiosity and good nature, begs you to click. A quick peek at the video, a chance to win a FREE [...]

Load More Posts