Category Archives: Blog

Black Hat 2016: Threats & Solutions for Identity Theft

black hat 2016

  Black Hat 2016: What we learned at the conference At the annual Black Hat USA 2016 cybersecurity conference, held August 1-4 in Las Vegas, researchers and companies from around the world gathered to assess the latest threat environment and discuss solutions. The consensus opinion is that the bad guys are still far ahead, but there […]

Employment Identity Theft

Employment Identity Security Theft

Employment Identity Theft Identity theft is a federal crime. You’ve either probably heard about it in the news or might even know someone who has been an identity theft victim. It occurs when one’s identification is used or transferred by another person for unlawful activities. Identity theft is often committed to facilitate other crimes such […]

Temporary Fraud Alert

Temporary Fraud Alert
[vc_row][vc_column][vc_column_text] Temporary Fraud Alert A temporary fraud alert is a cautionary 90-day note that goes into your credit report. Specifically, the alert warns lenders and service providers to be extra vigilant to anyone seeking your credit file or information. In such an instance, an identity thief may be trying to open a credit account in […]

Ghost Terminal

Ghost Terminal
[vc_row][vc_column][vc_column_text] What is a ghost terminal? Used in recent reports of skimming crimes, ghost terminals are electronic devices tailored to copy a credit card’s magnetic strip and Personal Identification Number in order to steal money from an account. How does this scheme work? Ghost terminals are manufactured devices that appear to be real ATM touch pads […]

Parents are Stealing Identities of Their Own Children?

Parents are Stealing Identities of Their Own Children

Why are parents targeting their own children? The main responsibilities of being a parent are to shelter and protect their children and prepare them for life. Vague, I know, but not at all untrue. Parents would do anything in their power to help their children and safeguard them from potential danger. They’d loan them money, give […]

Typosquatting

Typosquatting
[vc_row][vc_column][vc_column_text] What is Typosquatting? Typosquatting is when a cyber-criminal targets people that type a web address incorrectly, and sends them to an alternate website that may or may not mirror the original website searched for. Essentially the criminals target individuals making typos, for example e.g. (“Gooogle.com instead of Google.com.”) Due to the advancement of technology, […]

How do Businesses Defend Against Ransomware Attacks?

Business Ransomware

  What is ransomware? Ransomware is software that criminals use to lock you out of your own computer by encrypting the computer’s files and holding them hostage until you pay a “ransom.” The best way to protect your business from Ransomware, is by installing File Level Encryption. This is a form of encryption where individual […]