Category Archives: Business Identity Theft

Is an Insider Stealing Your Employees’ Private Identifying Information?

Tax Identity Theft is more profitable than drugs, with less risk. Forbes: Refund Tax Fraud, iPhone, Feed Identity Theft By Employees Former federal prosecutor Latour Lafferty, says “The old identity theft was `may we send you a fake email and … Continue reading

Posted in Business Identity Theft, Identity Theft Protection, Security Culture | Tagged , , , , , , , , , , | Leave a comment

Are Employers who ask for Facebook Login Information playing with Fire?

Data Information Security Rule # 1: Never Collect and Store Private Information you do not need. A Business/Organization/Institution is responsible for the Private Information they collect. Only collect sensitive personal identifying information that has a legitimate business need. Then only … Continue reading

Posted in Business Identity Theft, Business Law, Identity Theft Protection | Tagged , , , , , , , , , | Leave a comment

The Global Gangs that Can Break Banking Institutions

4 Crime Rings to Watch The Brothers’ Circle, a group based primarily in Russia with connections to the Middle East, Africa and Latin America that focuses on card fraud; The Camorra, based in Italy and focused on counterfeiting and narcotics … Continue reading

Posted in Business Identity Theft, Identity Theft Protection | Tagged , , , , , , , , , , , , , , | Leave a comment

FTC Warns that Mobile Apps May Violate Fair Credit Reporting Act

Agency Sends Letter to Marketers of Six Apps for Background Screening The Federal Trade Commission warned marketers of six mobile applications that provide background screening apps that they may be violating the Fair Credit Reporting Act. The FTC warned the … Continue reading

Posted in Business Identity Theft, Business Law, Identity Theft Protection | Tagged , , , , , , , , , , , , , , , | 1 Comment

Banking Malware Finds New Weakness

Ice IX Steals Phone Numbers to Compromise Accounts A new Zeus variant has the attention of security experts – not because of its sophistication, but because of its automation. Named Ice IX, this new malware targets online banking users’ login … Continue reading

Posted in Business Identity Theft, Identity Theft Protection | Tagged , , , , , , , , , , | Leave a comment

Senators Unveil Major Cybersecurity Bill

The long-awaited, wide-ranging cybersecurity legislation that would update the laws that govern how the federal government secures its information systems as well as help safeguard the vital private networks in which American society depends on was introduced in the Senate … Continue reading

Posted in Business Identity Theft, Business Law, Identity Theft Protection, Military, Security Culture | Tagged , , , , , , , , , , , , , | Leave a comment

Is Your Business Compliant with FACTA Disposal Rule?

FACTA – Fair and Accurate Credit Transactions Act A small business can be liable to a federal fine of $2,500 per employee or even a class-action lawsuit under FACTA laws. Congress passed FACTA legislation in 2003 to protect consumers against … Continue reading

Posted in Business Identity Theft, Business Law, Identity Theft Protection | Tagged , , , , , , , , , , , , | Leave a comment

Are Your Employees on the Clock 24×7?

Employers have liability when employees commit crimes using company resources. The liability could also involve personal devices that are used for work. Does your employment policy cover employee owned devices? Employers need to be aware that misuse of company smartphones, … Continue reading

Posted in Business Identity Theft, Business Law, Identity Theft Protection | Tagged , , , , , , , , , , , , , , , , | 1 Comment

Do you use the same login & password for all accounts?

Ramnit Worm Threatens Online Accounts and Targets Facebook Seeking Log-in Credentials. “We suspect that the attackers behind Ramnit are using the stolen credentials to log in to victims’ Facebook accounts and to transmit malicious links to their friends, thereby magnifying … Continue reading

Posted in Business Identity Theft, Identity Theft Protection, Security Culture | Tagged , , , , , , , , , , , | Leave a comment

Do You Know Your Cost of a Lost Laptop?

In 2009 the Cost of a Lost Laptop study was conducted by Ponemon Institute and sponsored by Intel Corporation. It was the first benchmark study to estimate the full cost associated with a lost or stolen laptop. The average value … Continue reading

Posted in Business Identity Theft, Identity Theft Protection | Tagged , , , , , , , , , , , , , , , , , , , , , | 1 Comment