Do you? Currently and depending on who is speaking, there are varying and frequently opposing answers – even among experts – leaving consumers grasping for a better understanding of what it means for them. This is a significant problem that creates some serious issues that need to be addressed as an industry. Perhaps a discussion about the current definitions and categorizations doesn’t t go far enough in addressing these issues, but there has to be starting point. It’s a beginning but not...Read More
The Trump Administration’s National Security Council want to scrap an Obama-era directive for approving government-sanctioned cyberattacks.
Presidential Policy Directive 20 (or PPD 20) was created to promote greater oversight on the government’s cyber activities, and requires executive approval on operations “of significant consequence.” It also installed a bureaucratic process of approval for smaller scale offensive actions that effectively added a layer of pause in actions that have...Read More
The U.S. Department of Commerce’s National Institute of Standards and Technology (NIST) has released its first major revision to their standards and best practices for cybersecurity policy this month.
The update was compiled after a two-year research period and sought to address some of the newer and more prolific threats to cybersecurity since the...Read More
Cybercriminals are earning more than ever before, with an annual haul of $1.5 trillion according to a new study conducted by Dr. Michael McGuire, a senior lecturer in criminology at the University of Surrey.
The study revealed crimes of every description are being committed using new technology, ranging from drug deals and money laundering to human trafficking and even terrorism.
The Cambridge Analytica story, McGuire says, was “just the tip of the iceberg,” stating that there...Read More
By Denise Szott
Brokers, now more than ever, need a proactive strategy to help employer clients meet a growing demand for enhanced employee benefits.
To do so, brokers must be ready to leverage their resources. An expanded employee benefits voluntary products portfolio, which may include identity theft protection, financial counseling or casualty coverage, among others, will help them meet their clients’ demands and desire to boost worker...Read More
Net Neutrality is dead and the Internet is increasingly a playground for data mining schemes, social networks, and identity thieves. The possibility of true online privacy has never seemed more remote.
The use of a VPN (Virtual Private Network) has long been viewed as a silver bullet. Historically, VPNs have been used by dissidents trying to avoid persecution from governments, hackers wishing to cover their tracks, and mainstream consumers looking for ways to...Read More
A recent Reuters article by Tom Bergin takes a look at what data mining companies may or may not know about particular individuals in the wake of the Cambridge Analytica story. Bergin uses his own data in an intensely un-scientific, yet interesting investigation.
First of all, Bergin is not from the U.S. As a citizen of the European Union, he enjoys certain...Read More
The New York Times reported this week on a hacking attempt at a petrochemical plant in Saudi Arabia last August that sought to physically sabotage the facilities and trigger an explosion. This represents a potentially alarming new trend in cyber attacks where the goal isn’t to steal information or gain control of a system, but rather to cause actual damage to people and property.
Utilizing hacking as a means of industrial sabotage isn’t necessarily new; the...Read More
For many people, knowing a tax refund is on the way can be a big relief, an exciting treat, or both. And the sooner the refund arrives the better.
For victims of tax identity theft, however, the wait can drag on for almost a year. Not to mention they may have to deal with a lot of red tape to get what’s rightfully theirs. That’s why it’s critical to understand:How tax-related identity theft works How to reduce chances of becoming a victim What to do, if you do become a victim