Security Insights: Information Technology Security Part I

By | August 29th, 2012|Uncategorized|

In today’s world, companies need to be prepared to secure all assets including confidential documents and employee data, client enterprise data and customer data so that information does not get into the wrong hands. Companies should take all precautions and employ information technology security practices to avoid any compromised data in the event of a [...]

Securing Your Digital Life: Lessons from the Mat Honan Hack

By | August 9th, 2012|Uncategorized|

With just a few easy details in hand, a hacker can drastically change your life. Wired technology reporter Mat Honan’s digital life was recently abolished by a couple of hackers who ultimately sought access to his three-letter Twitter handle, @Mat. Within a matter of minutes, they deleted his Google account, erasing years of communication with [...]

Security Insights: Handling Credit Card Data

By | July 16th, 2012|Uncategorized|

According to the Unisys Security Index, credit and debit card fraud is the no. 1 fear of Americans in the midst of the global financial crisis. This concern regarding fraud supersedes that of terrorism, computer and health viruses, and personal safety.Now, that is big deal – especially as data breaches become more apparent and more [...]

Security Insights: Security Breaches

By | June 14th, 2012|Uncategorized|

A security breach is an act from an outside organization that bypasses or contravenes security policies, practices, or procedures. A similar internal act is called a security violation (businessdictionary.com).While a security breach can seem imminent at times, there are ways to avoid IT security breaches within a company. Take a look at 10 simple measures [...]

Lesson From the LinkedIn Breach: Be Proactive.

By | June 7th, 2012|Uncategorized|

Hackers recently posted 6.5 million unique hashed passwords from LinkedIn, with already 200,000 of these passwords cracked. LinkedIn is a global social networking site for professionals—and it’s likely that many of the site’s users use the same password with other sites, including online retail stores, news websites and sites related to their employers.What does this [...]

Saving Brands From Breach

By | May 22nd, 2012|Uncategorized|

When a company is breached, it suffers more than just data exposure and recovery expenses—the company brand can take a significant hit. Studies show that data breaches often have long-term effects on brand value. Organizations that have been breached have reported losing anywhere from $184 million to more than $300 million in brand value per [...]

Hacker Speak

By | May 18th, 2012|Uncategorized|

Don’t know a mule from a ripper? Here is a quick tutorial on what you need to know when talking about the seedy underworld where hackers buy and sell stolen credit cards, identities and more.  Bins – Bank bins are the first 6 digits of a card. Carders (see below) selling credit cards will advertise [...]

Password Complexity: Why It Makes a Difference in a Breach

By | May 15th, 2012|Uncategorized|

By: Joel Carleton, Experian Director of Cyber EngineeringWe’ve all heard that it’s important to pick long, complicated passwords. What you may not realize is why this becomes crucial in the context of a breach. While ensuring you don’t pick from some of the most common passwords is important, it’s still not enough. Some background information on how passwords [...]

IRS Identity Theft in 2012: Tips to Beat the Thief

By | March 15th, 2012|Uncategorized|

By Adam Kennedy, Experian Identity Restoration Supervisor; Certified Identity Theft Risk Management SpecialistImagine you’re on your favorite tax preparation software recalling incomes and deductions from the year past. Finally, you’ve reached the end of the seemingly endless questionnaire and the estimated refund number glares from the screen like a stuffed piggy bank waiting to be [...]

Protect Your Taxes From Prying & Spying Eyes

By | March 2nd, 2012|Uncategorized|

The IRS admittedly has little control over protecting your tax returns against identity theft. The problem is too big, the data too widely available, prevention too rarely attended to until it's already too late. Your tax returns are the Holy Grail of identity theft because they contain virtually every piece of information a fraudster needs [...]

Load More Posts