What we can learn from Apple’s open letter to its customers

By | February 19th, 2016|Industry News|

In the wake of the San Bernardino tragedy, the Federal Bureau of Investigation (FBI) seized an iPhone that was used by one of the shooters. Recently, the FBI obtained a court order from a California district court, requesting Apple’s assistance in cracking the phone’s passcode. This has sparked an interesting debate around encryption, the outcome [...]

The Worst Passwords of 2015

By | January 22nd, 2016|Business Security, Industry News|

In our line of defense against hackers, our passwords may be the first – or last – hurdle between malicious cybercriminals and our most sensitive information. Unique, complex logins should be used to protect our emails, social networks, bank accounts, shopping transactions and more. It is important to take great care crafting these passwords; however, [...]

Keeping Kids Safe From Identity Theft

By | December 7th, 2015|Identity Protection|

It’s something you may not think about very often—your child’s personally identifiable information being used for identity theft. Most children’s Social Security number (SSN) and personal information remain unused until they turn 18, leaving years for identity thieves to cause serious damage. It’s common for parents to use a child’s SSN for routine activities, like [...]

Firewall Chats, Ep. 4: The Internet of Things

By | December 1st, 2015|Firewall Chats|

Today, our fourth episode of Firewall Chats is live! In this special edition, we put the spotlight on Experian’s own Chief Innovation Officer, Adam Tyler. Tyler’s expertise spans far across the ever-changing security landscape. He speaks frequently around the globe on identity protection and fraud detection, cybersecurity trends, and evolving hacking and attack methods. Additionally, [...]

Ransomware in Review

By | November 24th, 2015|Business Security, Malware and Scams|

One of the scariest cyber security trends of 2015 was the evolution and uptick of ransomware attacks. Ransomware is a type of malware that, once installed on user’s device, will block access to the device until a ransom is paid to the cyber criminal to unlock and remove the malware. The FBI recently reported that [...]

Firewall Chats, Ep. 3: Simple Steps to Control Your Privacy

By | November 10th, 2015|Firewall Chats|

Did you log in to Facebook recently to see post after post of “privacy notices?” Those ineffective status updates were spawned by rumors of how people assume online privacy operates. There are a lot of unnerving rumors and myths circulating on the best way to control your information. In this week’s episode of Firewall Chats, [...]

Firewall Chats, Ep. 2: Cybersecurity Trends with Passcode

By | October 27th, 2015|Firewall Chats|

It’s Tuesday, and time for us to share the second episode of our new podcast series, Firewall Chats. Today’s headlines are constantly competing to warn the public of the latest data breach and cybersecurity developments. Consumers want to learn the facts fast, and from a reliable source. Out of the noise, one outlet is quickly [...]

National Cybersecurity Awareness Month Kicks Off Today – We’re Proud to Be a Champion

By | October 1st, 2015|Company News, Industry News, Online Safety|

October is National Cyber Security Awareness month (NSCAM), and we’re excited to be involved and show our support as an official champion! While it’s important to keep cyber security top-of-mind throughout the year, NCSAM provides a dedicated time for companies and organizations to share tips, best practices, and collaborate on how to stay safe online. [...]

Data Breaches Continue to Dominate 2015

By | September 11th, 2015|Breach, Business Security|

Last week Fortune.com claimed the “word” for 2015 was cybersecurity. It’s not too surprising, as headlines for the past two years have been fraught with news of big breaches and security hacks. Affected (and unaffected) companies are implementing new habits and establishing security standards to help mitigate their risk of being breached, while consumers attempt [...]

Securing All the Things: IoT Myths and Realities

By | September 4th, 2015|Uncategorized|

The Internet of Things isn’t a new concept – but it’s certainly one that has gained momentum, particularly within the last year. Recently, we’ve seen more and more connected devices come to market. While connecting our world may bring added convenience to our everyday lives, it’s important to question what we may be sacrificing from [...]

Load More Posts