Data Security

By Admin
June 12, 2013
Comments [0]

6_NSA BMcG

Americans were taken aback recently when it was announced that the National Security Agency had obtained years of electronic data from calls made by cell phone customers. The person allegedly behind the leak has been identified as 29-...

Read More
May 13, 2013
Comments [0]

3_Zendesk

Zendesk, a company that offers online tech support to more than 25,000 clients, announced a security breach on Feb. 21. Hackers accessed support records for three of its customers: Twitter, Pinterest and Tumblr, according to...

Read More
May 13, 2013
Comments [0]

3_Data Diet

Losing some excess flab should be at the top of the list of New Year’s resolutions for your small to medium-sized business.

Not you, owner and proprietor. You look great. I's the reams of data...

Read More
By Admin
May 12, 2013
Comments [0]

Data breaches happen with startling regularity, but they rarely occur on the scale of the 2011 Sony PlayStation breach. When hackers cracked open the PlayStation Network, 77 million users were affected-their passwords, credit card information, security answers, physical addresses and more were all in the hands of thieves. It was a nightmarish scenario for those users and for Sony, but it...

Read More
By Admin
May 5, 2013
Comments [0]

Because most people now spend an enormous amount of time online, businesses and organizations are eager to find ways to use that activity to their advantage. In many cases, that means tracking user habits, which they use to tailor and target advertisements. On social media sites and even some retail sites, user information is logged and tracked, which has led to increased concern about...

Read More
By Admin
April 8, 2013
Comments [0]

Anyone who has logged into a financial institution's website in the last few years knows the drill. Enter an ID, a password and then answer a range of questions, ranging from the basic ("What's your mother's maiden name?") to the silly ("What was the name of your...

Read More
By Admin
April 1, 2013
Comments [0]

Brides and grooms are busy people in the months leading up (and even following) their weddings. There are flowers to be arranged, photographers and caterers to be hired, dresses to be purchased and honeymoons to be booked. But with all of that activity comes the risk of identity theft, which can put the brakes on marital bliss in a hurry.

Both before and after the wedding...

Read More
By Admin
March 25, 2013
Comments [0]

5_Egg basket

Getting a basketful of chocolate eggs is an Easter treat that anyone would love. But having a basketful of passwords stolen is a nightmare that no one wants to deal with. Protecting yourself from identity theft involves a number of steps, and being smart...

Read More
By Admin
March 17, 2013
Comments [0]

Unfortunately, it isn't very hard for a person with bad intentions to gather bits of personal identifying information and create fake accounts in a victim's name. And often, the victim's behaviors could lead to the identity theft in the first place.

Pay attention to how you're handling your personal identification numbers. If you have any of the following five bad habits,...

Read More
By Admin
March 11, 2013
Comments [0]

In the latest celebrity hacking scandal, the personal data and financial details of several public figures including Jay-Z, Beyoncé, Michelle Obama, and Hillary Clinton was illegally posted to a Russian website.

The FBI and Los Angeles Police Department are investigating several cases of doxxing, a new cybercrime in which information about a person is obtained or discovered...

Read More

Offer 24/7 CyberScout Protection

CyberScout's partnership options help you safeguard the identity and privacy of your policyholders, customers, members and employees. Discover how a customized program can help build brand loyalty, customer retention, and quickly generate long-term recurring revenue.

Get Started