Quantcast
Channel: Blog Feed 1
Browsing all 714 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

No child left untagged?

By Byron Acohido, ThirdCertaintyA study by The Learning Curve found that while 71 percent of parents believe technology has improved children’s education, 79 percent were concerned about the privacy...

View Article



Image may be NSFW.
Clik here to view.

Gamblers get fired up about data losses

By Byron Acohido, ThirdCertaintyFireKeepers Casino in Battle Creek, Mich., confirmed that customers’ credit and debit information might have been stolen from Sept. 7, 2014, to April 25. Compromised...

View Article

Image may be NSFW.
Clik here to view.

They have a right to sing the blues

By Byron Acohido, ThirdCertaintyAnthem’s massive data breach earlier this year is generating cases of identity theft, according to allegations in a growing number of lawsuits. Twenty-six people have...

View Article

Image may be NSFW.
Clik here to view.

Dashing down the road

By Byron Acohido, ThirdCertaintySens. Edward Markey, D-Mass., and Richard Blumenthal, D-Conn., members of the Commerce, Science and Transportation Committee, introduced legislation that would direct...

View Article

Image may be NSFW.
Clik here to view.

ITRC Monthly Twitter Chat: Back to School Security Tips for Parents and Students

Throughout the year, the Identity Theft Resource Center hosts informative Twitter chats on ways the public can protect itself from fraud and scams. Be sure to join us our August Twitter chat on...

View Article


Image may be NSFW.
Clik here to view.

Infographic: U.S. Targets Cyber Attackers with Sanctions Program

Culprits behind cyber attacks that threaten U.S. foreign policy, national security or economic stability will face sanctions under a new program recently introduced by President Obama.Such activities...

View Article

How SMBs Can Fight Threats with Managed Security Services

By Robert LemosProtecting sensitive data and systems is a tough job for large companies, even for those firms with a dedicated information security manager or team of skilled professionals.For the...

View Article

Find Out What Pieces of Your Identity May Have Been Exposed to Hackers

It's easy to become immune to the frequent headlines about data breaches that compromise consumers' personal data.That's why we give props to The New York Times reporters Josh Keller, K.K. Rebecca Lai,...

View Article


Image may be NSFW.
Clik here to view.

Fraud Resolution with a Personal Touch

Becoming a victim of identity theft is akin to entering your residence and discovering a burglar has ransacked your home.Anger and fear are typical reactions. ThirdCertainty recently sat down with...

View Article


Image may be NSFW.
Clik here to view.

For richer, for poorer?

By Byron Acohido, ThirdCertaintyVictims of identity theft might need to look close to home for the culprit. A thief stole a health care worker’s Social Security number and opened several new cards in...

View Article

You Know You're Talking to a Scammer When ...

It happens all the time—you check your email inbox or your phone rings, and on the other end, someone is trying to steal your money. Maybe you ignore it. Perhaps you hang up or delete the message. Then...

View Article

Image may be NSFW.
Clik here to view.

Tips to Protect Privacy on Instagram

Instagram is a convenient and fun site for sharing your videos and photos with friends, family and colleagues. But the service, which by default allows anyone to view your profile, can leave you open...

View Article

Image may be NSFW.
Clik here to view.

Infographic: How to Get an A in Classroom Privacy

The back-to-school rush is on, with parents vying for the best options for school clothes, supplies and teacher assignments.Don't let your child's identity get lost in the shuffle. Educational software...

View Article


Image may be NSFW.
Clik here to view.

An ocean of defense

By Byron Acohido, ThirdCertaintyAn arm of the Navy that typically deals with high-dollar contracts is taking the lead in the search for a contractor to provide protection services to victims of the...

View Article

Image may be NSFW.
Clik here to view.

Paying for services not rendered

By Byron Acohido, ThirdCertaintyHealth care identity-theft victims can be required to cover costs for services they didn’t get, as some providers push the consumer to pay. A Ponemon Institute survey...

View Article


Keep Seniors Safe from Internet Scams

August is typically the month for back-to-school preparations. With many schools starting in mere weeks, families are busy shopping for supplies and enjoying the final days of summer vacation. Some are...

View Article

Image may be NSFW.
Clik here to view.

I’m just here to help … myself

Scammers are posing as someone from a credit card fraud department to get consumers to reveal the security code on the back of their cards. Callers claiming to be fraud specialists will claim there is...

View Article


Cyber Insurance 101: What Your Business Needs to Know

Cyber liability exposures are becoming a fact of life for organizations of all sizes and industries.Consider major data breaches recent years: Target, Home Depot, Neiman Marcus, Sony Pictures, JP...

View Article

Cyber Insurance Gains New Converts

Companies in the financial services, healthcare and retail industries were first to recognize the need for cyber liability insurance coverage because their valuable data is prized by hackers.While they...

View Article

6 Tips for Businesses Shopping for Cyber Coverage

The grim warnings from cyber security and risk management experts are clear: The potential financial losses from cyber attacks should be taken as seriously as the carnage wreaked by fires, floods,...

View Article
Browsing all 714 articles
Browse latest View live




Latest Images