A tough race: Protecting clients against risks associated with information technology system failures is a leading concern of the insurance industry, underwriters and brokers told risk managers at the RIMS 2015 Conference. Steve McGill, group president with Aon, an insurance and reinsurance brokerage based in the United Kingdom, said more companies offer cyber insurance. But the rapid rise of cyber threats may make it difficult for insurers to stay ahead of the curve. “...Read More
Mother’s Day is a special time to celebrate all those kisses and hugs, the rides to the mall, the doctors’ appointments, the countless soccer-basketball-baseball games, a special note tucked into a pocket or care package sent to camp. But remember sometimes it’s what a person doesn’t do that matters, and some moms are just bad to the bone.More than 30% of identity theft cases involve a family member or close friend. The reason is simple: access. Whether it’s... Read More
Las Vegas casinos are renowned for their stringent physical security. Security cameras and bouncers don’t necessarily discourage cyberattacks, however, and a major Vegas property disclosed this weekend that hackers had spent the past seven months stealing credit card data from its systems.The Hard Rock Hotel & Casino Las Vegas... Read More
Think identity theft mostly happens to older people? Or to higher income earners? Or college students? The truth is that identity thieves focus their efforts wherever the opportunities are, and there are plenty of opportunities across most age groups. Here are three groups identity thieves target and why.
What Personal Factors do Identity Thieves Focus On?
At first glance, age could be considered an afterthought to identity thieves, according to...Read More
Eight isn’t great: A class-action lawsuit says hackers had access to Premera Blue Cross systems for about eight months before they were detected. The insurance company said on March 17 that hackers might have gained access to the personal information of 11 million people, including names, dates of birth, Social...Read More
Driven by the fallout of major data breaches at Target, Sony Pictures, Anthem and hundreds of other large and small organizations, cybersecurity is now a problem of strategic importance in organizations of all sizes.
ThirdCertainty sat down last week at the RSA Conference in San Francisco with Howard Schmidt, former White House Cybersecurity Advisor under...Read More
Legislation that would establish new nationwide privacy protections for American consumers was introduced by a group of high-profile Democratic senators on Thursday, including Pat Leahy (Vermont) and Elizabeth Warren (Massachusetts). The Consumer Privacy Protection Act would establish federal standards for notification of consumers when their data is lost or stolen...Read More
Identity thieves don’t want you to read this article.
They’ve made an entire industry out of living off of other peoples’ good names. And when you know their typical tricks, stealing your identity is much harder.
Unfortunately, not enough people know what puts their identities at risk for theft. And that has helped keep...Read More
Usually you hear the phrase “too much information,” or TMI, in a funny context. Like when you reveal a little too much about a personal situation, or something people simply are not interested in.
When it comes to the Internet, however, providing TMI is no laughing matter. When you over-share, you compromise your privacy and even leave your identity, reputation, and property vulnerable to criminals. Practically every click on the Internet reveals...Read More