Case Study: Tax Identity Theft

March 16, 2015 | By:
Posted in: Personal Protection

Someone filed my taxes

By January 31, the due date for W2s and other tax forms to be postmarked, accountant and tax preparer offices were already bustling with extra traffic. Employees at a tax office just outside Baltimore, MD noted the speed clients exhibited this year in scheduling appointments. Several clients commented that they wanted to get into the …

Read More

Apple, Google and Microsoft Devices Vulnerable to “FREAK” Security Flaw

March 11, 2015 | By:
Posted in: Personal Protection

FREAK security flaw

What happened? In recent weeks, technology researchers have discovered a decade-old security flaw, dubbed “FREAK,” that leaves Apple and Google devices and Microsoft Windows PCs vulnerable to hacking. Attackers compromise these devices through Apple’s Safari browser and Android’s default browser when the user visits certain websites, even on mobile devices. Microsoft announced in a recent …

Read More

50 Worst Charities Revealed

March 3, 2015 | By:
Posted in: Business Protection

worst charities

What happened? Charities and small businesses go hand-and-hand when it comes to helping their communities prosper. So it seems like a no brainer that they might team up in hopes of spreading some generosity. In fact, about 75 percent of small business owners make charitable donations each year. These partnerships are common and provide great …

Read More

Rebuilding After a Breach

February 17, 2015 | By:
Posted in: Business Protection

aftermath of a data breach

In 2014, the Identity Theft Resource Center reported that more than 85 million confidential files were compromised in data breaches. That’s 85 million customers, employees and patients who were failed by organizations they entrusted with their personal information. Those who are exposed must contact their banks, scour their statements for signs of fraud, monitor their …

Read More

Are You or Your Friends Sharing a Scam?

February 9, 2015 | By:
Posted in: Personal Protection

Sharing a Scam

Social media is a great way to connect with others and share what you love. But all that sharing can become problematic if due diligence is left out of the conversation. Do you think any of your friends are guilty of sending links without checking them first? In Norton’s 2012 Cybercrime Report, they found that …

Read More

What to Consider Before Signing up for Automatic Bill Pay

February 5, 2015 | By:
Posted in: Personal Protection

Automatic Bill Pay

Want a free and easy way to keep your finances in line? Consider enrolling in automatic bill pay. Numerous financial institutions are offering this service to their time-strapped customers, but surprisingly only 50 percent of U.S. consumers pay their bills online. So what’s stopping consumers from signing up? Many perceive automatic bill pay as not …

Read More

The Four Stages of a Small Business Under Cyber Attack

January 27, 2015 | By:
Posted in: Business Protection

cyber attack

With the growing number of cyber attacks on businesses—including Target, Home Depot, Kmart and Staples—attacks can easily seem commonplace in today’s increasingly connected world. Cyber attacks lead to exposed personal, financial and business information. These exposed documents may jeopardize the security of your customers’ or employees’ identities, create fraud within your business or simply leave …

Read More

Fraudsters Target Military Personnel

January 20, 2015 | By:
Posted in: Personal Protection

Military Identity Theft

Current and former military members are at an increased risk of identity theft. In 2013, the Federal Trade Commission found that military consumers filed identity theft complaints at twice the rate of the general public. Victims of identity crimes face numerous obstacles including fraudulent charges and damaged credit. But military members have added challenges and …

Read More

Five Tips for Better Data Security and a Happier You!

January 9, 2015 | By:
Posted in: Personal Protection

Data Security and Your Happiness

Findings from the 2014 Unisys study show that identity theft is the number two fear that Americans have, topped only by fraudulent credit card usage. Here are five important steps you can take to improve your data security and, thus, your happiness and peace of mind.

Read More