2015

January 28, 2015
Comments [0]

The president has discussed the issues of data privacy and cyber security several times recently, both during press conferences and the State of the Union address. He has put forth a handful of proposals to encourage more robust and more effective information sharing between the federal, state and local governments and organizations in private industry. While the goal of improved information sharing is a good one, there may be some flaws in these proposals.

Communications...

Read More
January 28, 2015
Comments [0]

According to the Telephone Consumer Protection Act, it’s illegal to robocall a mobile phone number without permission. The American Bankers Association wants to change that, arguing that robocalls will help fight identity theft and other kinds of fraud. Opponents say that’s an overreach, one that will erode an important consumer protection.

... Read More
January 27, 2015
Comments [0]

Small and medium-size businesses outsource a number of IT functions to improve operations and reduce costs. As they face growing data security threats—employee error or theft, cyber attacks, and more—it’s critical for SMBs to develop robust information security programs.

While it may not make financial sense for SMBs to bring a chief information security officer on board, the organizational need for this resource is clear. A surprising 77 percent of SMBs...

Read More
January 26, 2015
Comments [0]

Small and medium-size businesses face mounting risks to their data security. Data breaches at large corporations such as Sony Pictures and Morgan Stanley make headlines. But many smaller organizations are typically more vulnerable to threats because they lack the technical and financial resources necessary to properly protect sensitive data.

There are a number of reasons why. Many SMBs are unaware of cybersecurity best practices, according to the National...

Read More
January 23, 2015
Comments [0]

It's easy to put off tax preparation when it's still early in the new year and many of us are focused on meeting resolutions.

But it's important for taxpayers to file their tax returns early to avoid tax-related identity theft. This fast-growing crime happens when someone uses your personal information—like a Social Security number—to file a fraudulent return and collect your refund. It can be difficult and time-consuming to resolve.

But you can take steps to protect yourself...

Read More
January 16, 2015
Comments [0]

While the FBI claims hackers were behind the Sony Pictures breach, other experts suggest the attack was from a more sinister source: a malicious insider.

Malicious insiders intentionally take confidential institutional data for their own purposes. They can be current and former employees, contractors, business partners, or anyone with access to the organization’s confidential personal or corporate information. So it’s critical for organizations to enter into employment and contractual...

Read More
January 9, 2015
Comments [0]

More couples are meeting on the Internet thanks to the growing number of online matchmaking businesses. This $1.2 billion industry attracts nearly 42 million sign-ups in the United States alone.

But with every successful match comes the potential for heartbreak and, sadly, fraud. It might be easy to let your guard down when you come across someone who seems perfect and says all the right things, especially after paying hefty...

Read More
January 9, 2015
Comments [0]

During the holiday season a missed or stolen package can be aggravating, which is doubtless why you eagerly watched for deliveries all December, calling the nanosecond you suspected a problem. Unfortunately, many employers don’t send tracking numbers when the packet of vital documents marked “Important Tax Information Enclosed” hits the mail destined for your home address.

We receive some of the most sensitive, potentially...

Read More
January 4, 2015
Comments [0]
While consumers and businesses believe the rise in data breaches in 2014 means the worst is over, hackers and identity thieves may be gearing up for even bigger attacks this year. Looking forward to cyberthreats likely to emerge in 2015, IT security professionals are cautious about the state of data security due to key cyber-related risks. 

Here are three threats to watch out for in 2015:

1. Higher Risk of Payment Data Breaches In 2014, millions of consumers were...

Read More
January 2, 2015
Comments [0]

In the past two years have revealed anything, it’s that every conceivable mode of communication comes with its share of serious privacy and security issues. Email can be hijacked, mail servers can be breached and malware can turn your smartphone into a peepshow. Wikileaks revealed that even our phone conversations are at risk....

Read More

Offer 24/7 CyberScout Protection

CyberScout's partnership options help you safeguard the identity and privacy of your policyholders, customers, members and employees. Discover how a customized program can help build brand loyalty, customer retention, and quickly generate long-term recurring revenue.

Get Started