Monthly Archives: October 2011

CYBERBULLYING

Advice from the Federal Trade Agency: Cyberbullying is bullying or harassment that happens online. It can happen in an email, a text message, an online game, or comments on a social networking site. It might involve rumors or images posted … Continue reading

Posted in Child Identity Theft, Identity Theft Protection | Tagged , , , , , , , , , , | 3 Comments

Danger of shortened URLs

Wikipedia: “Another use of URL shortening is to disguise the underlying address. Although this may be desired for legitimate business or personal reasons, it is open to abuse.” https://bdemarest.wordpress.com/2011/10/28/danger-of-shortened-urls/ shortened to  http://wp.me/p1adOj-48. http://www.wellsfargo.com could be shortened to http://bit.ly/urlWellsF or http://tinyurl.com/ulrWellsF. … Continue reading

Posted in Identity Theft Protection | Tagged , , , , , , , , , , | 1 Comment

Scamming the Unemployed

There are two broad areas of scams – Job-Hunting and Fake Jobs Job-Hunting Scams “Show me the money and I guarantee you a job.” Run don’t walk away from anyone who promises to get you a job. Don’t send them … Continue reading

Posted in Identity Theft Protection | Tagged , , , , , , , , , , , | Leave a comment

What Landlords Need to Know About Using Consumer Reports

Are you in compliance with the Fair Credit Reporting Act (FCRA)? FCRA is designed to protect the privacy of consumer report information and to guarantee that the information supplied by consumer reporting agencies (CRAs) is as accurate as possible. The … Continue reading

Posted in Business Identity Theft, Identity Theft Protection | Tagged , , , , , , , , , , | Leave a comment

Do Crooks know Where You Are?

We all know to stop the newspaper and mail when we go on vacation. However, if you are using geolocation services like Forsquare, Loopt and Gowalla, the world knows you are not at home every moment of every day. Are … Continue reading

Posted in Identity Theft Protection | Tagged , , , , , , , , , , , , | 1 Comment

Medical Identity Theft Could be Dangerous to Your Health

Medical Identity Theft may be the most dangerous form of Identity Theft, because it could mean life or death. It may change your medical and health insurance records. A record is created with the imposter’s medical information which might be … Continue reading

Posted in Identity Theft Protection, Medical Identity Theft | Tagged , , , , , , , , , | 2 Comments

Use Firewalls to Protect Your Network from Hackers

Your computer network needs to be isolated from the internet. Computers with sensitive information – like financial account numbers and Social Security Numbers – need to be isolated from the rest of the network. Only employees with a need to … Continue reading

Posted in Business Identity Theft, Identity Theft Protection | Tagged , , , , , , , , , , , | 1 Comment

The FBI’s Child ID App

The FBI has created an iPhone App that provides a convenient place to electronically store photos and vital information about your children so that it’s literally right at hand if you need it. You can show the pictures and provide … Continue reading

Posted in Child Identity Theft, Identity Theft Protection | Tagged , , , , , , , , | 1 Comment

Laptop and Smart Phone Security

Restrict access and storage of customer and employee Non-Public Information on portable devices that leave the office. We hear news reports about lost laptops that contained sensitive information all the time. Do not let your company become a similar headline. … Continue reading

Posted in Business Identity Theft, Identity Theft Protection | Tagged , , , , , , , | 2 Comments

Secure Business Password Management

Your company needs to have a password policy to secure sensitive customer and employee information. The security of your network is only as good as the weakest entry point. The weakest point in most business networks are weak passwords. Passwords … Continue reading

Posted in Business Identity Theft, Identity Theft Protection | Tagged , , , , , , , , | 3 Comments