In today’s connected world, cyber crime seems to be everywhere—at home, at work and in the devices we carry with us around the clock. Information security threats are more complex, widespread and challenging to address than ever before. And their speed has increased, as new vulnerabilities are discovered and exploited on a daily basis. Organizations and government agencies of all sizes are under attack, putting the personal information of millions of people at...Read More
Your policyholders may not even be aware that their networks are part of the Internet of Things. All it takes is adding any kind of smart device that connects to the internet, such as a baby monitor, TV, virtual assistant, thermostat, security camera or any type of appliance, to their home network. These devices add convenience to our lives—but they are also a convenient way for hackers to gain access to our networks and personal information.... Read More
Cyber security is a top concern for many organizations—and their corporate counsel. More than half of in-house counsel report greater investments in cyber security at their companies, according to a report from the Association of Corporate Counsel Foundation. One-third said their organizations had experienced a data breach already.
The high-profile dismissal of Yahoo’s chief...Read More
A massive, fast-moving cyber attack has hit as many as 74 countries. The ransomware attack first appeared Friday morning in the United Kingdom and has impacted computer systems at a wide range of organizations including hospitals, telecom, universities and businesses.
According to news reports, the malicious software is a variant...Read More
At first glance, internet-connected dolls, robots or other “smart” devices that can interact with your children may seem really cool. After all, your children already talk to their toys, right? Well how do you feel about a hacker listening into everything they say to a doll?
Suddenly the toys go from cool to creepy.
The truth is that beneath the shiny surface of smart toys there is a lot going on that could put your...Read More
Travelers are facing more privacy risks as domestic and foreign governments take a greater interest in social media accounts and require devices to be stowed in checked luggage.
Fortunately there are a number of steps travelers can take to protect their rights and privacy. This Personal Tech Column from The New York Times offers seven...Read More
Brace yourself: Tax fraud isn't going away, and if you haven't already filed your return, you could be the next victim.
Tax identity theft happens when someone files a phony tax return using your personal information—like your Social Security number (SSN)—to get a tax refund from the IRS. It also can occur when someone uses your SSN to secure a job or claims your child as a dependent on a tax return. Tax identity theft is the most common form of identity...Read More
By now, most in the finance and insurance sectors have been introduced to the New York Department of Financial Services’ (NYDFS) imminent cybersecurity regulations. Rather than proffering a construct for another “voluntary” framework to accurately gauge cybersecurity risk, New York boldly sets forth a set of minimum standards by which to judge the...Read More
Are you losing your identity?
The good folks at Equifax suggest you very well may be. Check out their infographic with the latest information about the state of identity fraud in the United Kingdom.
If you suspect you're a victim of identity fraud, be sure to contact your providers. You already may receive identity management services from CyberScout via your financial institution, employer...Read More
Employers collect and store vast amounts of personally identifiable information from job candidates and employees: Social Security numbers, birth dates, driver’s licenses, protected health information, financial and investment account information, emails and passwords, and more.
All of this data—often the domain of accounting and payroll departments—is valuable to identity thieves who employ methods ranging from simple dumpster-diving to sophisticated...Read More