Identity Protection: The Benefits of a Long-Term Mindset

Breached Personal Information: The Shared Responsibility Between Consumers & Organizations

Our connected world has made us all more vulnerable to fraud and identity theft. With major security incidents from Equifax and Facebook compromising millions of consumers’ personally identifiable information (PII) – and now most recently Google+ – limited identity protection services for breach victims are staple items in organizations, big and small.

While reactive measures can help address and resolve identity crime after it occurs, the best way to address fraud and identity theft is by taking a proactive approach. It’s really a two-fold awareness strategy relying on both technology and human vigilance.  

Continue reading

12 Quick Ways to Secure Your Personal Data

Jump to:

1   2   3   4   5   6   7   8   9   10   11  12  


Secure Your Personal Data

Think about the many places your personal data lives – the documents that contain it, the businesses collecting it, the devices storing and sharing it, the websites and apps using it. Fraudsters work by targeting those sources of data to ultimately profit from it.

Despite the “how” and “why,” security incidents like data breaches, phishing scams and more can leave you wondering: What should I do?  The good news is that awareness and prevention are often the best remedy for many of these threats.

Here are 12 tips (that will take five minutes or less!) to help better secure your personal data. Continue reading

Beware of Phone and Mail Scams

Scammers Still Call & Mail Victims

With the increasing numbers of connected devices, social media platforms and other digital services, we’ve become accustomed to the threats that target us online. But two not-so-new phone and mail scams prove that fraudsters are still using traditional scamming methods to facilitate their crimes.

Unfortunate but true, our Resolution Center gets calls about phone and mail scams all the time. This new wave of malicious phone and mail scams reminds us just how effective traditional social engineering and scare tactics can be. Continue reading