10 Tips for Protecting Your Information and Your Finances

May 5, 2015 | By:
Posted in: Personal Protection

Budget

What’s one of the best ways to get financially fit? Start a budget. It’s easy to do with the right educational tips and tools. Budgeting isn’t about reducing yourself to a ramen noodle diet or spending every weekend boarded-up in the house reading by candlelight. Instead, it’s a way to maximize your income and help …

Read More

What Small Business’ Need to Know about POS Systems

April 28, 2015 | By:
Posted in: Business Protection

POS System

Point-of-sale (POS) systems are making headlines after four different POS providers suffered data breaches in the past year — exposing customer information at a variety of small businesses. These businesses entrusted their POS providers with protecting customer information but were quickly subjected to harsh backlash from their defrauded consumers — 28 percent of fraud victims …

Read More

Local Commuters to Globetrotters — On-The-Go Information Security

April 13, 2015 | By:
Posted in: Personal Protection

Mobile Security

You’re busy. You’re running errands. You’re commuting to work, to school and back home. You may also be traveling out of town – from plane to hotel and various destinations in between. With such a jam-packed schedule, you’re often making choices on the fly. Naturally, you choose convenience as much as possible. But what about …

Read More

Better Credit Cannot Be Bought

April 7, 2015 | By:
Posted in: Personal Protection

Credit Repair Scams

A bad credit score can prevent you from advancing in life. You must postpone major purchases, endure high interest rates and be handicapped from making investments in your future — such as going back to school or starting your own business. It may seem relentless and overwhelming. But that doesn’t mean you have to take …

Read More

Laptop Security in Seven Simple Steps

March 24, 2015 | By:
Posted in: Business Protection

Laptop security

Imagine that tomorrow you wake up to find out a virus has infected your laptop and all your files have vanished. Your family photos, your spreadsheet of online passwords (a major security faux pas) and that report you need for a meeting later today — all gone. Scratch that. What if a burglar broke in …

Read More

Case Study: Tax Identity Theft

March 16, 2015 | By:
Posted in: Personal Protection

Someone filed my taxes

By January 31, the due date for W2s and other tax forms to be postmarked, accountant and tax preparer offices were already bustling with extra traffic. Employees at a tax office just outside Baltimore, MD noted the speed clients exhibited this year in scheduling appointments. Several clients commented that they wanted to get into the …

Read More

Apple, Google and Microsoft Devices Vulnerable to “FREAK” Security Flaw

March 11, 2015 | By:
Posted in: Personal Protection

FREAK security flaw

What happened? In recent weeks, technology researchers have discovered a decade-old security flaw, dubbed “FREAK,” that leaves Apple and Google devices and Microsoft Windows PCs vulnerable to hacking. Attackers compromise these devices through Apple’s Safari browser and Android’s default browser when the user visits certain websites, even on mobile devices. Microsoft announced in a recent …

Read More

50 Worst Charities Revealed

March 3, 2015 | By:
Posted in: Business Protection

worst charities

What happened? Charities and small businesses go hand-and-hand when it comes to helping their communities prosper. So it seems like a no brainer that they might team up in hopes of spreading some generosity. In fact, about 75 percent of small business owners make charitable donations each year. These partnerships are common and provide great …

Read More

Rebuilding After a Breach

February 17, 2015 | By:
Posted in: Business Protection

aftermath of a data breach

In 2014, the Identity Theft Resource Center reported that more than 85 million confidential files were compromised in data breaches. That’s 85 million customers, employees and patients who were failed by organizations they entrusted with their personal information. Those who are exposed must contact their banks, scour their statements for signs of fraud, monitor their …

Read More