The Dark Web & What It Means to Your Identity

What is the “Dark Web” ? 

Whether you’re an expert, or know nothing about it, something in our brain rightfully associates the term “Dark Web” with criminal activity. 

The Dark Web can be a scary place. It’s home to thousands of Web pages used to facilitate virtually any illegal activity you could imagine. But, it’s not that simple – the World Wide Web is massive, and the Dark Web is just one part of it. 

Confused yet? Great! Let’s learn more about the Dark Web, how it plays a role in the World Wide Web, and find out what really goes down in the online underground.   Continue reading

There’s No Expiration Date for Your Data on the Dark Web

Frozen Clock represents No Expiration Date Data Dark Web

With data breaches impacting organizations on what seems like a daily basis, there’s a very good chance that your personal information has been compromised — and once it is leaked onto the Dark Web, you are vulnerable forever. According to the 2018 End-of-Year Data Breach Report, the total number of data breaches decreased in 2018, however, the number of stolen records climbed more than 126 percent. Not only is that a significant increase in the amount of Personal Identifiable Information (PII) that is now in the hands of cybercriminals, but it is also an indication that breaches have become larger, exposing more pieces of data per incident. Continue reading

Identity Protection: The Benefits of a Long-Term Mindset

Breached Personal Information: The Shared Responsibility Between Consumers & Organizations

Our connected world has made us all more vulnerable to fraud and identity theft. With major security incidents from Equifax and Facebook compromising millions of consumers’ personally identifiable information (PII) – and now most recently Google+ – limited identity protection services for breach victims are staple items in organizations, big and small.

While reactive measures can help address and resolve identity crime after it occurs, the best way to address fraud and identity theft is by taking a proactive approach. It’s really a two-fold awareness strategy relying on both technology and human vigilance.  

Continue reading