Security Insights: Protecting Your Business in 2013

By | January 14th, 2013|Uncategorized|

Knowing the emerging and continuing trends of threats in cybersecurity gives us an idea of where to start improving for the new year. Cyber criminals historically have followed the trends of the majority of the cyber community. Their goal is to negatively impact as many individuals and corporations as possible. With that said, it is [...]

Tis the Season: Security Tips for Online Holiday Shopping

By | December 5th, 2012|Uncategorized|

It’s that time of year again! As you finish your holiday décor and put your gifts under the tree, make sure you stay safe while shopping for your loved ones online this season with these quick tips.Make sure your devices are up-to-date. Any device you use for shopping; including smartphones, tablets and computers; should have [...]

Three Security Trends That Will Shape 2013

By | November 16th, 2012|Uncategorized|

This week Symantec announced their “Top 5 Security Predictions for 2013.” The company listed some interesting trends and the article definitely warrants a read-through.  This list also got us thinking about our own predictions for 2013. Here are a few we see happening: Your email address and password will become more valuable to identity thieves. Think [...]

Security Insights: Securing Mobile Devices and Applications

By | November 7th, 2012|Uncategorized|

This year has shown just the start of threats to mobile devices and the applications that run on them. Employees and individuals are moving primarily to mobile devices and applications for most of their daily computing needs. Cybercriminals are very aware of this trend in mobile devices and applications and have been putting more and [...]

October is National Cyber Security Awareness Month

By | October 18th, 2012|Uncategorized|

In honor of National Cyber Security Awareness Month and Protect Your Identity Week (Oct. 20–27), we’d like to share a few tips to keep you and your business safe, secure and prepared.Be smart and aware. Many people have the mindset that identity theft won’t happen to them, but it’s one of the fastest growing crimes, [...]

Security Insights: Cybersecurity Emerging Trends and Threats

By | October 12th, 2012|Uncategorized|

In the name of cybersecurity threats, 2012 has pretty much followed every pre-written article in 2011. The future of threats continues to develop and has become a hot security issue.Existing and Emerging Trends and ThreatsThe Multi-State Information Sharing & Analysis Center has rounded up the cybersecurity threat landscape, highlighting the challenges to come within the [...]

CSID Presents at the Fall UT Center for Identity Symposium

By | October 3rd, 2012|Uncategorized|

Do you know the risks that your company’s data faces when stored on a cloud? Do you know what to look for in a cloud provider? Do you know how to better secure your own information? Last week our VP of Information Systems and Operations Isaac Chapa addressed questions like these at an Identity Symposium [...]

Webinar Recap: What to do when a password is no longer secure?

By | October 1st, 2012|Uncategorized|

We recently hosted a webinar featuring Experian VP Marc Ostryniec and Toopher CEO Josh Alexander. Marc and Josh discussed consumer password habits, supplemented by statistics from our  recent consumer survey. The two also revealed how these habits put consumers and businesses at risk for compromise, and what businesses can do to mitigate these risks now [...]

Security Insights: Information Technology Security Part II

By | September 18th, 2012|Uncategorized|

As mentioned in Part I of this post, security breaches are an imminent threat and danger. While there are many types of data that should be secured, finding concise ways to improve technology security can be difficult.Here are some steps and tips to improving your company’s information technology security.Companies can help improve information technology security [...]

Webinar: Mitigating the Risk of Poor Password Practices

By | September 6th, 2012|Uncategorized|

When it comes to securing passwords, companies can encrypt, hash and salt to their hearts’ content but they will still be at risk. Why? Because people can be careless when it comes to password creation and management. If one consumer uses the same password on multiple sites, and one of those sites is compromised, the [...]

Load More Posts