Sorry, you need to enable JavaScript to visit this website.

Blog

October 30, 2017
Comments [0]

The odds you don’t know already know about Apple’s latest attempt at market domination — the iPhone X — are about even with the possibility that President Trump will stop using hand gestures when explaining something. That said, it is quite possible that you have not yet heard why the iPhone X should worry you.

“In its continuing war on inconvenience,” Andy Greenberg of ...

Read More
October 24, 2017
Comments [0]

Spam is supposed to be a thing of the past, but it’s not—and today it comes weaponized with manifold data-grabbing threats—from ransomware to keystroke recorders and beyond. Your email has never been more dangerous.

There was a time in the early 2000s when email spam and malicious botnets were viewed as mere nuisances. A confident Bill Gates waved it away at the 2004 World Economic Forum in Davos, Switzerland: “Two years from...

Read More
October 13, 2017
Comments [0]

The number of Internet of Things (IoT) devices in use is forecasted to hit 8.4 billion this year. That’s more than the human population on planet Earth. And with successful attacks like Mirai (which was the malware used in the 2016 Dyn cyberattack) already a part of the IoT story, there’s plenty to worry about.

...

Read More
September 25, 2017
Comments [0]

When Equifax announced the historic data compromise that exposed the sensitive personal information of up to 143 million consumers, the company said victims would have access to credit freezes for a month free of charge. This was not exactly a solution to the fresh hell it had just announced.

Frankly, it...

Read More
September 18, 2017
Comments [0]

Some time ago, the popular show Mythbusters wanted to find out if the Lone Ranger was right about silver bullets being better than lead ones. Turns out silver bullets are actually slower and less accurate.

When it comes to cybersecurity, quick-fix silver bullets are also less effective than tried-and-true approaches. The most effective cybersecurity strategies begin with two certainties: mistakes will be made, and breaches like...

Read More
September 11, 2017
Comments [0]

Tax identity theft and related fraud are putting high net worth individuals, executives and other business professionals at great risk. With more than $4 billion in potential damage tallied through fraudulent returns in 2016 alone, tax identity theft is a serious problem affluent families and corporate leaders must confront in order to avoid life disrupting events.

Why scammers continue to thrive

... Read More
September 7, 2017
Comments [0]

You’ve seen the dramatic footage of rescues and calamities, shots of stranded families, pets, and wildlife—even giant carp—and you’ve probably had the same reaction many other Americans had the past few weeks: “How can I help?”

There are myriad ways you can ease the suffering and hardship being experienced in the wake of Hurricane Harvey, but there are also a number of pitfalls to watch out for.

... Read More
September 4, 2017
Comments [0]

Data compromises and the identity-related crimes that flow from them are now the third certainty in life, right behind death and taxes. That said, there is plenty you can do to stay as crime-proof as possible.

According to Risk Based Security, more than 4.2 billion records were compromised worldwide in 2016 alone....

Read More
September 1, 2017
Comments [0]

With the announcement of Verizon Up, a new wireless rewards program that provides users with customer incentives, first-dibs opportunities on things like VIP tickets and other exclusive deals, we thought it was time to review how reward marketing plans work.

First, the good news: Verizon Up is free!

Like their intrusive cousin the loyalty program, reward-based marketing schemes usually...

Read More
August 26, 2017
Comments [0]

The only reason you have not yet been the victim of an identity-related crime (and that includes credit card fraud) is that no one practiced in the art has had the opportunity to separate you from your available credit, health care, or other bankable soft assets—yet.

The figures on data compromises vary, but ...

Read More

Offer 24/7 CyberScout Protection

CyberScout's partnership options help you safeguard the identity and privacy of your policyholders, customers, members and employees. Discover how a customized program can help build brand loyalty, customer retention, and quickly generate long-term recurring revenue.

Get Started