Ever wonder what happens to your information once it is exposed in a data breach? In most cases, the data is put up for sale to cybercriminals operating in the dark web — the black market of the internet where individuals can act privately and anonymously, and which requires specific “dark web browsers” to access. But one website was designed to house stolen data on the surface, bringing it out of the dark web and putting it at the fingertips of anyone who performed a simple search — starting as low as $2! Continue reading
Data breaches have become all-too-common amongst retailers, businesses, educational institutions and health care facilities. Last year, 1,093 data breaches led to over 36 million compromised records in the United States, leaving millions of Americans’ personal information exposed.
The best way you can protect your information from compromise is by taking proactive measures to safeguard it, especially after a data breach. Follow us as we break down what can happen to your information after a data breach, what the law says about notifying you of breached data and how to secure information that has already been compromised. Continue reading
Don’t get caught in a scam!
Tax scams come in all shapes and sizes. From phone calls to phishing emails, and even by your own tax preparer, criminals are continuing to find new ways to scam you out of your money and personal information. Tax-related scams can be particularly threatening because the information stolen is often used to commit more serious crimes such as tax identity theft.
Follow us as we explore the top-3 tax scams to watch out for this year. Continue reading
The Internet is the world of free information. Thanks to online public databases, people finder websites and social media networks, we have instant access to vast amounts of information at our fingertips.
Because the Internet is such an open environment, we rely on it to not only make information immediately available, but to also handle our data securely. Personal information can be used to gain automatic access to certain programs, like using your Facebook credentials to play games or connecting your Gmail account to YouTube and other social media platforms. With the Internet boosting convenience and efficiency, some big information security questions remain:
What information of yours is available on the Internet? Where is it available, and to whom? How do applications use your personal information across different platforms? And, most importantly, how can you remove that information from the Internet? Continue reading