Back-to-School: Getting Online Reputations in Check

By | August 9th, 2013|Uncategorized|

It’s back-to-school time – the time of year that most people associate with buying pencils, books and laptops. But it may be time to start considering another topic when heading back to school: helping students check and manage their online presence.Why? First of all – their futures could be at stake. Inappropriate online content about [...]

10 Ways to Prevent Identity Theft While Traveling

By | July 24th, 2013|Uncategorized|

Summer is a prime time for traveling, and travelers are prime targets for identity thieves. Why? Because they typically carry more personal identifiable information with them than usual, including passports, airline tickets and extra credit cards. Additionally, people on vacation typically travel with more money in their bank accounts, making identity theft a high priority [...]

Managing Your Online Reputation

By | July 10th, 2013|Uncategorized|

The digital world is the real world. Our lives are so connected with the Internet that our online personas tell the world who we are as people, as professionals and as companies. This can be great – the Internet provides an outlet for us to share who we are, connect and grow relationships – but [...]

News Recap: Yahoo plans to “recycle” old email addresses, causing identity theft concerns

By | June 20th, 2013|Uncategorized|

Yahoo announced that they are planning to “recycle” inactive email accounts in order to free up old email addresses for active users. Security experts are worried that this move will allow criminals to claim identities of the inactive account’s previous owner.Mat Honan, senior writer at Wired who was attacked by hackers last year, called this [...]

News Recap: Cybersecurity Hearing Highlights National Security Agency Testimony

By | June 14th, 2013|Uncategorized|

The Senate Appropriations Committee held a hearing about cybersecurity and workforce training this week during which Gen. Keith Alexander, chief of both the National Security Agency (NSA) and the U.S. Cyber Command, testified. Recent scrutiny on the NSA’s surveillance government programs – which has collected millions of telephone records and monitored Internet activity – were [...]

Security Insights: Web-borne Attacks Are On The Rise

By | May 10th, 2013|Uncategorized|

“Web-borne attacks are on the rise as cybercriminals and others who do harm to computer systems for profit or malice prey on the web’s areas of vulnerability, and businesses are feeling the effects of the attacks on their resources. Currently the weakest link is the web browser. Vulnerabilities in browser add-ons like Java, Flash and [...]

#Youridentity and Social Networks

By | May 2nd, 2013|Uncategorized|

This blog post comes from Adam Kennedy, Product Analyst at Experian. With the rise in social networks and the increasing desire to share personal data in public forums, it’s no surprise identity thieves are targeting Facebook, LinkedIn, and Twitter to steal your identity.What are they after?Your Facebook page and Twitter profile page will show your [...]

ID360 Conference 2013 – The Global Forum on Identity

By | May 1st, 2013|Uncategorized|

We spent the past couple days at ID360, the UT Center for Identity’s annual conference that gathers information security professionals from around the world to discuss issues in security, privacy and identity. Some of the hottest topics this week included identity management, Big Data and analytics, the definition of privacy and the shifting cybersecurity ecosystem. [...]

Industry News Recap: Cybersecurity bill CISPA passes House vote

By | April 19th, 2013|Uncategorized|

The highly debated Cyber Intelligence Sharing and Protection Act (CISPA) was passed by the House of Representatives on Thursday on a bipartisan vote of 287-127, with 18 representatives not voting. This bill is meant to help prevent cyber attacks by allowing companies and the government to share cybersecurity information with one another.According to Alex Fitzpatrick, [...]

Security Insights: Are you a “safe surfer”? How Crooks Steal Your Data

By | April 10th, 2013|Uncategorized|

Do you consider yourself a “safe surfer”? A “safe surfer” can be defined as someone who avoids the suspicious parts of the web, only downloads files that they are expecting, and one who inputs confidential data on only https sites. Even if you do practice these measures, you are still at risk. However, your level [...]

Load More Posts