Protecting Personal Information

A growing privacy and cybersecurity risk is that cyber criminals are actively seeking Personally Identifiable Information (PII) and payment card data. This is accomplished by either stealing PII from personal and home devices, or hacking into data stored by large organizations.

Using a computer and visiting a website are not the only way to potentially expose your information to criminals. Emerging threats, such as voice over internet (VoIP) and wireless devices and applications, have added a host of new avenues for security breaches. For example, if your phone is connected via the internet, it may not be protected by firewalls that are configured for VoIP security. Think about this when it comes to privacy: How often are you disclosing personal or financial information over the phone, such as when ordering an item, making a payment on a credit card, or accessing any organization using an account number? You can quickly see that all of these conveniences are leaving you vulnerable.
Continue reading

Posted in General Risk | Tagged , , | Leave a comment

The Cybercrime Financial Threats You May Be Overlooking

Technology has become an integral part of everyday life. However, with nearly 400,000 identity theft complaints reported to the government in 2016, it’s no secret that the benefits of technological advancements are accompanied by numerous, unforeseen threats that leave personal, financial and intellectual information vulnerable to theft. Continue reading

Posted in General Risk | Tagged , , | Leave a comment

Can You Be Spared from Hackers?

Staying safe online and preventing hackers from stealing your identity or personal information doesn’t seem to be so easy to do these days. In recent months, organizations ranging from social media networks to Internet services companies have made headlines when … Continue reading

Posted in General Risk | Tagged , , | Leave a comment

Are You Practicing Safe Gaming?

In a gamer’s quest to win big, many will overlook the broader cybersecurity risks of online gaming. Many app users remain woefully unaware of how unsafe gaming can lead to real-life vulnerabilities. I’ve outlined a few tips to better protect yourself below. Continue reading

Posted in General Risk | Tagged , , | Leave a comment

Password Practices Key

The announcement this week that a cache of five million passwords allegedly belonging to Gmail accounts has been posted to an online message board in Russia provides another reminder about the importance of creating — and routinely changing — strong … Continue reading

Posted in General Risk | Tagged | Leave a comment