Overview of 2015 Verizon Data Breach Investigations Report

By | April 21st, 2015|Breach, Uncategorized|

Every year Verizon takes a thorough look at the global breach landscape in the company’s annual Data Breach Investigations Report. This year’s report offers a wealth of information on the threats, vulnerabilities and actions that plagued businesses in 2014. The report is long, but interesting and worth a read. To make it easier for you, [...]

March Recap: SXSW Comes to a Close, CSID Employees Give Back

By | April 8th, 2015|Uncategorized|

It was a busy month for Experian! After months of prepping for SXSW, we were excited to see the fruits of our labor come together. Between all of the SX madness, we were also happy to spend some time unwinding and giving back to the community. Check out our March recap below.Wellness Week: Unwinding and [...]

5 Steps to Remedy Taxpayer Identity Theft

By | April 2nd, 2015|Uncategorized|

As we approach the 2014 tax filing deadline, many taxpayers gearing up to file their taxes may find that someone else has already fraudulently filed for them – and have cashed in their refund check. During the 2013 tax filing period, $5.8 billion was paid in identity theft refund costs, according to the U.S. Accountability [...]

Don’t Fall for Scareware

By | March 26th, 2015|Uncategorized|

Have you seen one of these lately? If you have, you are not alone. These pop-ups are called scareware and their sole purpose is to try and trick consumers into downloading malicious pieces of software or contacting a malicious entity who will then try to secure personal or financial information. Scareware has been around for [...]

CSID at SXSW 2015

By | March 12th, 2015|Uncategorized|

Tomorrow, March 13 marks the first day of the SXSW Interactive conference. Over the next five days more than 50,000 of tech and digital’s best and brightest will converge on Austin and talk about emerging technology, digital creativity and all things inherent with the two.Cyber security promises to be a key issue this year, especially [...]

Safer Internet Day Recap: Top 5 Ways to Protect Your Business

By | February 18th, 2015|Uncategorized|

With the explosion of social media sites in the last 10 years, employees are more connected than ever to the Internet, putting their personal information and the businesses they work for at risk for data breaches. In fact, IBM’s 2014 Cyber Security Intelligence Index reports that cyber criminals have begun targeting negligent employees more and [...]

Tips For Consumer Data Security After The Anthem Breach

By | February 10th, 2015|Breach, Uncategorized|

As the dust settles after Anthem Healthcare Insurance announced last week that approximately 80 million of its customers may have had their personal information exposed in a data breach, consumers are once again left wondering how they can protect themselves and their data in the wake of another high profile hack. Though it’s being called [...]

January Recap: Ramping Up For The New Year

By | February 6th, 2015|Uncategorized|

Cyber Security Took Center Stage in the State of the Union AddressOn January 20, President Obama delivered his annual State of the Union Address and this year cyber security was a major focus. President Obama detailed his plans for increasing online security, electronic privacy and the prevention of identity theft for the American people. Check [...]

Customer Alert: “GHOST” Vulnerability on Linux Systems

By | January 30th, 2015|Uncategorized|

On January 27, 2015, Qualys, Inc., the leading provider of cloud security and compliance solutions, announced that its security research team discovered a vulnerability in the Linux GNU C Library known as (glibc). This vulnerability, called "GHOST (CVE-2015-0235),” allows attackers to remotely take control of a system without having prior knowledge of system credentials. This [...]

The Implications of Sharing Personal Data

By | January 28th, 2015|Uncategorized|

Did you know that privacy policies do not guarantee that your information will be kept private? Most companies use privacy policies to inform customers about how their personal information may be used, i.e. sold, shared, exchanged, not necessarily guaranteeing absolute confidentiality. In today’s increasingly digital world where exchanging personal information – your name, email address, [...]

Load More Posts