Some people are willing to spend an obscene amount of money on their weddings, and businesses can really cash in on others’ extravagance. Say, for example, you own a restaurant where someone wants to get married: You can make tens of thousands of dollars off hosting The Big Day. Even with the hassle of logistics and the preparation necessary for a large event...Read More
August is typically the month for back-to-school preparations. With many schools starting in mere weeks, families are busy shopping for supplies and enjoying the final days of summer vacation. Some are even readying their high school and college seniors for the last hurrah. But what about the other seniors in your life? National Senior Citizens Day is Aug. 21, and these family members should receive some recognition this month as well. Take a few minutes to think...Read More
College students are prime targets for identity thieves. They are busy and distracted, and rarely are actively engaged in managing their credit. And they are usually required to fill out a flurry of paperwork as school begins that includes the most sensitive information, such as Social Security numbers. In additional to financial aid, enrollment forms or rental documents, many will encounter credit card applications for the first time, not to mention creation of...Read More
The back-to-school rush is on, with parents vying for the best options for school clothes, supplies and teacher assignments.
Don't let your child's identity get lost in the shuffle. Educational software programs are the latest rage in tracking behavior, performance and in classroom management.
Learn how to protect their personally identifiable information—and their reputation in years to come...Read More
Instagram is a convenient and fun site for sharing your videos and photos with friends, family and colleagues. But the service, which by default allows anyone to view your profile, can leave you open to identity thieves if you don’t take steps to protect yourself.
You can protect your privacy and personally identifiable information (PII) on Instagram by making sure you adjust your privacy settings according to your tolerance...Read More
It happens all the time—you check your email inbox or your phone rings, and on the other end, someone is trying to steal your money. Maybe you ignore it. Perhaps you hang up or delete the message. Then again, you might not.
You may think you know someone is trying to trick you, but keep in mind scammers succeed often enough to be successful, otherwise these things wouldn’t happen. For the most part, thieves employ one of a few...Read More
Becoming a victim of identity theft is akin to entering your residence and discovering a burglar has ransacked your home.
Anger and fear are typical reactions. ThirdCertainty recently sat down with Maria Valenzuela, senior fraud investigator at CyberScout, whose job it is to help victims move past despair and respond proactively to identity theft. (...Read More
By Robert Lemos
Protecting sensitive data and systems is a tough job for large companies, even for those firms with a dedicated information security manager or team of skilled professionals.
For the numerous smaller firms and less-affluent larger companies, it’s a Sisyphean effort, made worse by the current...Read More
Culprits behind cyber attacks that threaten U.S. foreign policy, national security or economic stability will face sanctions under a new program recently introduced by President Obama.
Such activities can now be defined as a national emergency, which lets the U.S. Treasury Department freeze assets and bar financial transactions of entities participating in cyber attacks, according to an executive order. The order comes at as the Obama administration gets tough on cyber crime.