Video Game Virtual Vulnerabilities: Impact on Your Real Identity

Young boy playing video games in the dark

Cybercriminals are Playing Dirty

Online gamers of all ages may not realize the real-life dangers of sharing personal information, leaving them susceptible to vulnerabilities such as fraud, swatting, and identity theft.

The Global Game Market Report estimates that downloaded, digital game revenues took 91% of the global video game market in 2018 ($125.3 billion), with boxed games making up the remainder. This gamer ecommerce channel opens a massive gateway for cybercriminals to hack and commit fraud by preying on unsuspecting online players. Continue reading

New Year’s Resolution: Protect Your Family’s Digital Footprint

Young Children On Devices

Fostering a Familial Digital Resilience

Our constant internet usage empowers cybercriminals to formulate countless methods for hijacking our personal information and then use it to commit identity theft and fraud. And, although different generations within a household may have different priorities online, all generations within the family are vulnerable.

The start of a New Year is a great time to emphasize the importance of safe online behavior for all those you care for and care about. Let’s review some safe practices that provide increased protection for keeping personal information secure. Continue reading

Identity Protection: The Benefits of a Long-Term Mindset

Breached Personal Information: The Shared Responsibility Between Consumers & Organizations

Our connected world has made us all more vulnerable to fraud and identity theft. With major security incidents from Equifax and Facebook compromising millions of consumers’ personally identifiable information (PII) – and now most recently Google+ – limited identity protection services for breach victims are staple items in organizations, big and small.

While reactive measures can help address and resolve identity crime after it occurs, the best way to address fraud and identity theft is by taking a proactive approach. It’s really a two-fold awareness strategy relying on both technology and human vigilance.  

Continue reading