Get in Touch
Tax Season is fraud season. It's prime time for fraudsters and scammers looking to steal your personal and financial data.
IRS Impostor Phone Scam
These con artists can sound convincing when they call. They target the most vulnerable, like the elderly and immigrants with harassing phone calls. Victims are told they owe money to the IRS and it must be paid...
Social media is embedded in our lives—Facebook alone had 1.79 billion daily users as of September 2016—which means cyber criminals are not far behind.
As companies increasingly rely on this digital channel for marketing, recruiting, customer service and other business functions, social media also has become a highly effective vehicle for cyber attacks. Outside of the corporate network perimeter and...
Personal information may be valuable to your business, but it's also something your customers value. Consider taking the following actions to create a culture of respecting privacy, safeguarding data and enabling trust in your organization.
Don't count on your privacy notice as your only tool to educate consumers about your data practices. Communicate clearly and often to the public about...
Personal information may be valuable to your business, but it's also something your customers value. Consider taking the following actions to create a culture of respecting privacy, safeguarding data and enabling trust in your organization.
If you collect it, protect it. Follow reasonable security measures to protect individuals' personal information from inappropriate and unauthorized access.
Be open and honest about how...
Your mobile devices – including smartphones, laptops and tablets ‒ are always within reach everywhere you go, whether for work, travel or entertainment. These devices make it easy to connect to the world around you, but they can also expose a lot of info about you and your friends and family, like your contacts, photos, videos, location and health...
Your mobile devices – including smartphones, laptops and tablets ‒ are always within reach everywhere you go, whether for work, travel or entertainment. These devices make it easy to connect to the world around you, but they can also expose a lot of info about you and your friends and family, like your contacts, photos, videos, location and health...
Your mobile devices – including smartphones, laptops and tablets ‒ are always within reach everywhere you go, whether for work, travel or entertainment. These devices make it easy to connect to the world around you, but they can also expose a lot of info about you and your friends and family, like your contacts, photos, videos, location and health...
Information security is hard. Complete security is not just virtually implausible--it is pretty close to impossible. Enter BYOD--Bring Your Own Device--and the almost, practically, nearly impossible becomes whatever is worse than that.
The rattle bag of devices--smartphones, tablets and personal computers--people bring to work and use to access the network and an organization's sensitive data almost guarantee trouble. With so...
When a young Finnish programmer named Tatu Ylönen conjured up the Secure Shell (SSH) coding protocol in 1995, he had no inkling of the pivotal role his creation would play in the rapid evolution of network-centric commerce.
And Ylönen certainly never imagined that one day he would be consumed with spreading awareness about a darker aspect of SSH: his protocol...
No payment card or banking information was compromised in the latest 1 billion-user breach at Yahoo, according to expert reports. But what if there had been? The truth is that for most users it would be annoying, but not the end of the world.
So, why is this big news?
First of all, Yahoo can now claim two of the biggest...