Examining the Financial Consequences of a Data Breach

The likelihood of a company, big or small, facing a security incident has increased, and an estimated one in three organizations will fall victim in the next two years. As long as cybercriminals can make a profit from consumer and business data on the Dark Web, organizations will continue to be targeted by hackers. Businesses must be empowered to better protect and prepare their organization against a data breach. The consequences are costly, but the good news is the damages, and the expense, can be mitigated. Continue reading

Filed for a Tax Extension? You’re Still at Risk of Fraud

If you are one of the millions of taxpayers who have filed for a tax extension in 2019, the October 15th deadline is just around the corner. Fraudsters may have attempted to steal your identity and tax information throughout the year using a number of IRS tax fraud scams, and filing for an extension leaves you vulnerable to tax fraud for an extended amount of time. Keep an eye out for signs you are a victim of tax identity theft and take the appropriate steps to protect your tax information. Continue reading

Refund Denied: What to Do if You’re a Victim of Tax Fraud

Rejected Tax Notice

Now that April 15th has come and gone, it’s still critical for you to stay vigilant and to keep a watchful eye for any suspicious activity that may signal tax fraud.  

Fraudsters have been busy, and may have already been working behind the scenes to steal your refund. The 2018 Consumer Sentinel Network Data Book classifies tax fraud as one of the top three reported types of identity theft submitted to the Federal Trade Commission. Continue reading

Identity Protection: The Benefits of a Long-Term Mindset

Breached Personal Information: The Shared Responsibility Between Consumers & Organizations

Our connected world has made us all more vulnerable to fraud and identity theft. With major security incidents from Equifax and Facebook compromising millions of consumers’ personally identifiable information (PII) – and now most recently Google+ – limited identity protection services for breach victims are staple items in organizations, big and small.

While reactive measures can help address and resolve identity crime after it occurs, the best way to address fraud and identity theft is by taking a proactive approach. It’s really a two-fold awareness strategy relying on both technology and human vigilance.  

Continue reading