New Year’s Resolution: Protect Your Family’s Digital Footprint

Young Children On Devices

Fostering a Familial Digital Resilience

Our constant internet usage empowers cybercriminals to formulate countless methods for hijacking our personal information and then use it to commit identity theft and fraud. And, although different generations within a household may have different priorities online, all generations within the family are vulnerable.

The start of a New Year is a great time to emphasize the importance of safe online behavior for all those you care for and care about. Let’s review some safe practices that provide increased protection for keeping personal information secure. Continue reading

VPN: An Essential Tool in Your Security Toolbox

VPN Security Tool on Mobile Device

Everything You Need to Know About VPNs

Are you reading this blog post on a Virtual Private Network – a VPN? If you are, you can stop right here. You’re probably well versed already on the added online security this easy-to-use tool offers. But, if you’re unfamiliar with VPNs, this article is for you. Because people who use the Internet – everyone, in other words – should do so over a Virtual Private Network. Continue reading

A Bitcoin and Cryptocurrency Primer

Man using tablet to buy bitcoin

A Beginner’s Guide to Bitcoin

You’ve heard of bitcoin, right? Some people say it’s the currency of the future; some say it’s a glorified pyramid scheme; and then there’s the rest of us, who have no idea what it is or how it works.

Bitcoin just turned ten years old, so it has demonstrated more staying power than a lot of people thought it had. Now let’s take a step back and a deep breath and see if we can arrive at a basic understanding of the world’s first cryptocurrency. Continue reading

Identity Protection: The Benefits of a Long-Term Mindset

Breached Personal Information: The Shared Responsibility Between Consumers & Organizations

Our connected world has made us all more vulnerable to fraud and identity theft. With major security incidents from Equifax and Facebook compromising millions of consumers’ personally identifiable information (PII) – and now most recently Google+ – limited identity protection services for breach victims are staple items in organizations, big and small.

While reactive measures can help address and resolve identity crime after it occurs, the best way to address fraud and identity theft is by taking a proactive approach. It’s really a two-fold awareness strategy relying on both technology and human vigilance.  

Continue reading