IRS Identity Theft in 2012: Tips to Beat the Thief

By | March 15th, 2012|Uncategorized|

By Adam Kennedy, Experian Identity Restoration Supervisor; Certified Identity Theft Risk Management SpecialistImagine you’re on your favorite tax preparation software recalling incomes and deductions from the year past. Finally, you’ve reached the end of the seemingly endless questionnaire and the estimated refund number glares from the screen like a stuffed piggy bank waiting to be [...]

Protect Your Taxes From Prying & Spying Eyes

By | March 2nd, 2012|Uncategorized|

The IRS admittedly has little control over protecting your tax returns against identity theft. The problem is too big, the data too widely available, prevention too rarely attended to until it's already too late. Your tax returns are the Holy Grail of identity theft because they contain virtually every piece of information a fraudster needs [...]

IRS Overwhelmed by Tax Related Identity Theft

By | February 7th, 2012|Uncategorized|

By John Sileo, Experian consumer security expert It’s nerve racking to realize that the IRS increasingly struggles to control taxpayer identity theft. Since 2008, the IRS has identified 470,000 incidents of identity theft affecting more than 390,000 taxpayers. “Victims of tax-related identity theft are the casualties of a system ill-equipped to deal with the growing proficiency [...]

Data Privacy Day: Protect Your Company Data

By | January 31st, 2012|Uncategorized|

In honor of Data Privacy Day on January 28, initiated by the National Cyber Security Alliance, we have compiled a few simple best practices for businesses to protect and secure valuable data. Password Changes Encourage or require employees to regularly change passwords used for company servers, email and programs every 90 days. This will help [...]

The Changing Landscape of Spam

By | October 19th, 2011|Uncategorized|

PC Mag recently published an infographic that visualizes a study by Commtouch about “The State of Hacked Accounts.” Commtouch collected data from email users who have had their email accounts hacked to draw conclusions about email security and the motives of email hackers.Findings: The study found that two-thirds of hacked email accounts are used to [...]

Load More Posts