Monthly Archives: October 2011

The FBI’s Child ID App

The FBI has created an iPhone App that provides a convenient place to electronically store photos and vital information about your children so that it’s literally right at hand if you need it. You can show the pictures and provide … Continue reading

Posted in Child Identity Theft, Identity Theft Protection | Tagged , , , , , , , , | 1 Comment

Laptop and Smart Phone Security

Restrict access and storage of customer and employee Non-Public Information on portable devices that leave the office. We hear news reports about lost laptops that contained sensitive information all the time. Do not let your company become a similar headline. … Continue reading

Posted in Business Identity Theft, Identity Theft Protection | Tagged , , , , , , , | 2 Comments

Secure Business Password Management

Your company needs to have a password policy to secure sensitive customer and employee information. The security of your network is only as good as the weakest entry point. The weakest point in most business networks are weak passwords. Passwords … Continue reading

Posted in Business Identity Theft, Identity Theft Protection | Tagged , , , , , , , , | 3 Comments

Electronic Security of Business Information on Your Network

You need to start with the general security of your network. Which computers and servers store sensitive personally identifying information of your customers and employees. Do not forget employees’ personal notebooks and home computers connecting remotely. Do your digital copiers, … Continue reading

Posted in Business Identity Theft, Identity Theft Protection | Tagged , , , , , , , , , , | 2 Comments

The Physical Security of Information Your Business Stores

Do not forget the old fashion way of stealing personally identifying information of your customers and employees – the paper records. Keep paper documents containing non-public identifying information in a locked cabinet and/or locked room. Limit access to employees with … Continue reading

Posted in Business Identity Theft, Identity Theft Protection | Tagged , , , , , , , , | 1 Comment