Archive for February, 2012

Find out if your state is a hotbed for identity theft by viewing our slideshow.


The bad guys have a new favorite way to steal your identity.

Used to be crooks snagged a Social Security number to open a credit card and run up charges. Now they’ve found an easier way to make money, according to the , the Federal Trade Commission’s annual report on consumer complaints.


Tax scams abound during tax filing season. Taxpayers can steer clear of trouble by watching for these telltale signs that identity thieves have targeted them.


By , Arbol Financial Strategies

Just when you think you’ve heard the latest in identity theft, along comes a new and innovative way to rob you of your personal information and compromise your identity. It’s happening in condo and townhouse developments primarily, but it could also occur in a neighborhood of single-family homes.

There are a couple ways the theft happens.



Identity theft is on the rise, according to a report released today by Javelin Strategy & Research.

The crime struck almost 12 million victims in 2011, a whopping 13 percent increase from 2010. The main reasons why: the growing number of data breaches and increasing reliance on smartphones and social media.


By , partner, Jackson Lewis LLP

According to a study*, data breaches occurring in the hands of third-party vendors amounted to 39 percent of breaches in 2010. Whether it be cloud service providers, benefits brokers, medical billing services, debt collection companies, consultants, accountants, law firms, staffing services, shredding/data destruction services, cleaning service providers and other businesses, most companies utilize third party vendors to provide an array of services. Those services often involve letting the vendor access, store and/or process personal information, which creates additional risk and legal obligations for the company using the vendor, such as the service provider contract requirement in Massachusetts.



VeriSign Inc., the company responsible for assuring that more than half the world’s websites are authentic, was hacked multiple times in 2010, and the thieves succeeded in stealing information.

The company is one of the major pillars of the Internet, responsible for assuring the authenticity of all websites that end in .com, .gov and .net. VeriSign also processes up to 50 billion web queries a day, defends companies’ websites against cyber attacks, and tracks international hackers.


Click to enlarge image.

Millions of taxpayers are filing their returns online. But how safe is their personally identifiable information?

The IRS where taxpayers can submit their returns without charge if they meet certain eligibility criteria, such as age, income and state of residence.

Our experts took a closer look at the way these companies approach privacy and the handling of consumer data, and they graded the websites based on how well they protect a person’s personal information.


By Ondrej Krehel,

How do most corporate data breaches happen? Lost laptops and USB drives.

Now many businesses have some kind of security practice in place for lost corporate computers, whether it’s encrypted drives with remote wipe, or a call lost-and-reporting procedure. But how many have USB drive best practices on the books? Not many.