Black Friday is just ahead. But in the mad rush for fabulous deals—online and in stores—we still have concerns about how retailers protect our payment card data, according to a new survey from the Identity Theft Resource Center and IDT911. Here’s a quick snapshot of our love-hate relationship with holiday shopping online.


When it comes to personal data security, there’s no such thing as waiting ’til next year. That’s why the time is now to make resolutions about safeguarding your identity for 2015.

Here are five simple steps you can take even while viewing this article on your device: (more…)

With technology driving business growth, more companies are implementing bring your own device policies in the workplace. Almost 2 in 3 IT professionals believe employee carelessness is connected to major data breaches that exposed customer information, according to a study by IT security firm Check Point. With the risk of employees causing data breaches of customer and corporate information, employers should consider potential problem areas that could leave sensitive details vulnerable.

Here are five unseen employee behaviors that could cause data breaches:

1. Browsing on Social Media 
Compared to other distractions at work, social media might be one of the most dangerous for cybersecurity. About 36 percent of respondents log into their computer to look at social media sites, according to a survey by GFI Software/Opinion Matters. While browsing through a friend's post online looks harmless, massive data breaches in the past have been caused by social…

As retailers gear up for the holiday shopping season, cybercriminals lurk as an unknown threat for point-of-sale systems and computer networks. With the value of financial information on black markets, criminals are likely to exploit security flaws in retailers' POS systems using phishing, malware and other hacking tools. 

A recent study by IT security firm BitSight Technologies found 1 in 3 retailers may be vulnerable to cyberattacks because of security flaws at their third-party vendors. 

The study highlights the importance of ensuring strong cybersecurity for all parts of the supply chain, not just the company's headquarters or stores. 

Vulnerabilities at Third-Party Vendors
In the past, retailers struggled with keeping their payment systems secure because of supply chain risks. The Target data breach that exposed the information of 110 million people began after cybercriminals stole the credentials of the company's third-party vendor. After acquiring the necessary login information, they…


It’s beginning to look a lot like Christmas . . . for identity thieves. Don’t let them spoil your cheer. Follow these tips from IDT911 experts to protect your personal information when shopping online or in store, and traveling for the holidays.



Don’t let a data breach spoil the holidays. Protect your business from lapses in security with these tips from IDT911 experts.



During the holiday shopping season, millions of Americans will take advantage of the convenience, speed and ease of online shopping: Spot it, love it, click it, and it’s on the way.

A recent survey found that 77 percent of respondents said they shop on the Internet, and the National Retail Federation predicts online sales during November and December to jump 8 to 11 percent from 2013, accounting for $105 billion. (more…)

A rise in cyber threats around the world underlines the importance of cybersecurity in a technology-rich and reliant world. Most businesses and countries have made cyber security a top priority, even finding it to be one of their main businesses risks. However, this focus hasn't stopped the increasing number of attacks, and it may not be improving companies' strategies to combat the issues.

The number of cybersecurity incidents grew 66 percent at a compound annual growth rate between 2009 and 2014, according to PricewaterhouseCoopers LLP's Global State of Information Security Survey 2015. In 2013, there was a 48 percent increase alone, which equates to 117,339 attacks launched each day of the year.

Lack of executive buy in
As the number and variety of attacks rise, many companies' budgets are decreasing or staying the same, PwC found. Last year saw a 48 percent increase in…


Around this time last year, hackers pulled off what was then one of the largest retail data breaches the industry has seen. They unleashed Backoff malware on computer networks that have now reportedly attacked thousands of retailers’ point-of-sale systems. The largest victim then was Target, from which hackers stole millions of credit and debit card numbers.

So what can you do to keep your identity safe during this busy time of year? Follow a few simple tips to build smart habits, for now and into the new year. (more…)

With the 2015 tax season fast approaching, the Internal Revenue Service is working to warn consumers about potential identity theft scams, as it predicts cases of stolen identities will rise next year. The IRS is plagued with problems concerning identity theft as thieves are more sophisticated in how they take consumers' personal information to submit fake tax returns. Now, the IRS is cautioning consumers that scammers are calling taxpayers, saying they are required to mail their tax returns, Forbes reported.

However, while these calls may sound official and even claim that consumers have been victim of identity thieves during this contact, it was actually part of an elaborate plan to steal this information. These and other similar schemes have made it more difficult for the IRS to determine which tax returns are from legitimate taxpayers and which ones were sent as a result of identity theft. 

Criticism Against the IRS