2014

September 17, 2014
Comments [0]

checklist

The breach at Home Depot...

Read More
September 15, 2014
Comments [0]

Rather than setting their sights on computers, cybercriminals are increasingly targeting point of sale systems to steal valuable customer information. With attacks against in-store systems growing, the payment industry is fighting back. The Payment Card Industry Security Standards Council (PCI SSC) recently overhauled its...

Read More
September 12, 2014
Comments [0]

While consumers are tired of being bombarded with ads every day, a more dangerous threat could be lurking in the background on webpages and their personal devices. Malicious advertising, also known as malvertising, is an emerging way cybercriminals are infecting new computers with malware,...

Read More
September 8, 2014
Comments [0]

When the federal health insurance marketplace HealthCare.gov was launched in October 2013, IT security experts were concerned about the potential for data breaches and other security glitches. Now their fears might be realized after government officials said the site experienced a breach that was detected on Aug....

Read More
September 4, 2014
Comments [0]

When someone hands their credit or debit card to a family member or friend, they might become a victim of identity theft, which could cost them financially. But giving someone else their health insurance information might cost their life. As their health records are tied to their personal identifying information, consumers...

Read More
By Admin
September 2, 2014
Comments [0]

Helpful Tips

Doing a bit of pre-holiday organizing and cleaning? Add these identity theft protection tips to your routine. It won't take but a few moments to follow these steps to safeguarding your personally identifiable information from...

Read More
September 2, 2014
Comments [0]

With more consumers using cloud services to upload pictures, documents and more, cybercriminals are infiltrating cloud accounts to steal valuable information. Hackers managed to access sensitive photos from celebrities' personal iCloud accounts and shared them with other Internet users,...

Read More
August 28, 2014
Comments [0]

Cybercriminals have different motivations to hack into protected systems, from taking bank information to sell in underground markets to stealing intellectual property to make another nation more competitive in the global market. Hackers can also be driven to infiltrate companies for political purposes. Recently,...

Read More
August 25, 2014
Comments [0]

While companies can spend millions on their IT security systems to prevent cyberattacks and other common security risks, they may be fighting a losing battle if their worst enemy already has the password and unrestricted access to their systems. While detecting breaches and other security events from external causes ...

Read More
August 21, 2014
Comments [0]

shutterstock_64869118

Nowadays, you don’t have to be a large corporation to attract the wrath of hackers. Limousine companies, escrow firms, and even hay-compressing companies have become the target of cyber attacks in...

Read More

Offer 24/7 CyberScout Protection

CyberScout's partnership options help you safeguard the identity and privacy of your policyholders, customers, members and employees. Discover how a customized program can help build brand loyalty, customer retention, and quickly generate long-term recurring revenue.

Get Started