A Bitcoin and Cryptocurrency Primer

Man using tablet to buy bitcoin

A Beginner’s Guide to Bitcoin

You’ve heard of bitcoin, right? Some people say it’s the currency of the future; some say it’s a glorified pyramid scheme; and then there’s the rest of us, who have no idea what it is or how it works.

Bitcoin just turned ten years old, so it has demonstrated more staying power than a lot of people thought it had. Now let’s take a step back and a deep breath and see if we can arrive at a basic understanding of the world’s first cryptocurrency. Continue reading

Identity Protection: The Benefits of a Long-Term Mindset

Breached Personal Information: The Shared Responsibility Between Consumers & Organizations

Our connected world has made us all more vulnerable to fraud and identity theft. With major security incidents from Equifax and Facebook compromising millions of consumers’ personally identifiable information (PII) – and now most recently Google+ – limited identity protection services for breach victims are staple items in organizations, big and small.

While reactive measures can help address and resolve identity crime after it occurs, the best way to address fraud and identity theft is by taking a proactive approach. It’s really a two-fold awareness strategy relying on both technology and human vigilance.  

Continue reading

Protecting Your Identity One Year After Equifax

Can you believe it’s been a year since the Equifax data breach

Many of us remember feeling the direct impact of the Equifax mega breach on Sept. 7, 2017. With the final tally of affected consumers nearing 148 million U.S. adults, the first word that comes to mind is “massive.” 

The Equifax data breach was far-reaching in the quality and quantity of highly-sensitive Personally Identifiable Information (PII) exposed. And, the  overall impact hit both consumers and small businesses. Even though we’ve identified what happened, and the key mistakes that were made, it doesn’t change the fact that our data is still out there. We’re all still forever vulnerable.   Continue reading

Fake Charging Stations Can Hack Your Smartphone

Is the Juice Worth the Squeeze? 

Nobody wants to run out of battery power while they’re out and about. In fact, a recent study found that we check our phones at least 80 times a day. This attitude has become prevalent in today’s connected world simply because we use our mobile devices for more than just making calls. 

In a world where we rely on our phones for virtually everything – from online banking and email accounts, to social media, games and more – public charging stations can be the ultimate lifesavers when your battery is running low. 

But security experts warn that the juice is never worth the squeeze if a charging station is rigged to steal your data.  Continue reading