shutterstock_137117807

More British organizations are likely to experience security breaches—and the costs are going up, according to a survey from the Department for Business Innovation and Skills. Learn more in this handy infographic that reveals five key takeaways for businesses.

(more…)

Download this infographic.

Embed Our Infographic On Your Site!

With cyber-related threats increasing as criminals find new ways to infiltrate computer and mobile systems, businesses and consumers might find themselves vulnerable to the rippling economic impact of cyberattacks. A company on average spent $3.5 million to respond to a data breach – a rise of 15 percent compared to the previous year, according to a 2014 report by Ponemon Institute

Not only are businesses facing costs related to downtime and repairing their systems after a breach, but they also might be named the defendant in class action lawsuits. The basis of these lawsuits is often claims of financial loss because data breaches could lead to identity theft.

In addition to consumer-driven lawsuits, businesses that work with other corporations that experienced a data breach could sue for revenue losses associated with data breaches and other cybercriminal activity.

Recently, a Tennessee industrial maintenance and construction firm filed a lawsuit against TriSummit Bank for…

As more Americans become conscious about their health and strive to achieve fitness goals, they may choose to buy wearable activity monitors that collect information about their heart rate, steps taken and more. While many consumers consider these devices to be a lifesaver when it comes to tracking their achievements, others are concerned about lack of privacy protection. 

Since activity monitors gather data related to consumer personal information, such as age, weight, diet and even location, third parties may be seeking out this same data, according to Consumer Reports. From insurance providers to data brokers, these companies are likely to use this data for marketing and business purposes. 

The value of the global wearable devices market, which includes heart rate and activity monitors, is projected to increase to $5.8 billion by 2019, according to market research firm ResearchMoz. Activity monitors will be especially in demand…

shutterstock_104843165

Identity theft can wreak havoc on a person’s life—impacting their finances, health and good standing in the community. This growing crime poses an even greater threat for military personnel who require security clearance to do their jobs.

Security clearance gives military personnel, as well as civilians working for the government or contractors, access to classified information. But to earn it, they must undergo a rigorous review of their employment history, medical history, criminal record and finances to ensure a company’s or the government’s security.

(more…)

shutterstock_189022316

Even for a celebrity death, the worldwide response to Robin Williams’ passing has been remarkable. Within minutes on Monday, news of the comedian’s death was dominating trending topics on Twitter and filling up Facebook news feeds. Unfortunately, that makes it a tremendous opportunity for scam artists and computer virus writers, who never fail to take advantage of major news events for nefarious purposes.

After tragedies such as the earthquake in Haiti, fake charities emerge almost instantly. That’s unlikely to happen here. Instead, celebrity deaths generally send people, understandably, searching for answers. Those can come in the form of last words, last pictures or an alleged suicide note. Williams did in fact send out a Tweet and Instagram message recently, a birthday wish to his daughter.

However, there are already generic warnings about some of the more sensational ways these scammers…

With the risk of data breaches plaguing the health care sector, participants at the Black Hat conference for cybersecurity professionals discussed the struggles associated with protecting medical devices, according to Infosecurity Magazine. Medical devices present a unique challenge for IT security teams because the definition of this technology is very broad and the protections used to protect information for other sectors of the economy often do not apply to medical devices. 

The U.S. Department of Health and Human Services (HHS) said the No. 1 source of security issues in 2012 were laptops, with 27 percent of all breaches, according to the Annual Report to Congress on Breaches of Unsecured Protected Health Information. Portable devices accounted for 9 percent of data breaches in 2012, down from 13 percent the previous year. Although incidents involving portable technology like medical devices might be declining, the danger…

As millions of users log into Facebook every day and send requests to join others' social media networks, there are some friends that will quickly turn out to be enemies. A growing trend among cybercriminals is called farcing – or when strangers send friend requests on social media to steal information for fraud or identity theft. Cybercriminals are exploiting the popularity of social media sites to worm themselves into inner social circles. Once a cybercriminal has managed to gain access to an individual's network of friends and family, he or she can then become friends with others to pilfer their information, according to study by the University of Buffalo

With the personal information social media users put out on their profiles and in status updates, identity thieves could collect this data for fraudulent purpose while disguising themselves as legitimate users.

Arun Vishwanath, associate professor of communication at the University of…

6toprisks

Don’t let identity thieves go back to school with your children. Check out our latest infographic with the Identity Theft Resource Center to get tips on how to protect your kids’ personal information.

(more…)

shutterstock_113785711

The first step when it comes to identity theft is admitting you have a problem. Knowing your ID IQ is a good place to start.

You’ve probably seen those red-and-white buttons that warble when swatted, “That was easy!” However, on the battlefield of identity theft awareness, nothing is easy. People know it’s a threat, but try getting anyone to pay attention to the ever-evolving threats that are out there and perhaps you will understand why I’ve been shopping for a button that says, “Duh!”

(more…)

As parents and children shop for back-to-school savings, identity thieves may be looking for a different way to save money by stealing names, Social Security numbers and more. Children are often targets for identity thieves because they have clean lines of credit, which make them easier to use for fraudulent purposes, CBS News reported

"It is probably much more lucrative and attractive to criminals to use a child's Social Security number, simply because they have a blank slate for credit," said Kathryn Searles, an inspector with the U.S. Postal Inspection Service, according to CBS News. "And they usually don't have a pre-existing profile in the credit reporting companies."

As parents give out their child's personal information to doctor's offices, schools and other organizations, they may want to be careful about protecting this valuable data. Searles said parents should question why they are being asked for their…