Category Archives: Business Identity Theft

Are Your Employees on the Clock 24×7?

Employers have liability when employees commit crimes using company resources. The liability could also involve personal devices that are used for work. Does your employment policy cover employee owned devices? Employers need to be aware that misuse of company smartphones, … Continue reading

Posted in Business Identity Theft, Business Law, Identity Theft Protection | Tagged , , , , , , , , , , , , , , , , | 1 Comment

Do you use the same login & password for all accounts?

Ramnit Worm Threatens Online Accounts and Targets Facebook Seeking Log-in Credentials. “We suspect that the attackers behind Ramnit are using the stolen credentials to log in to victims’ Facebook accounts and to transmit malicious links to their friends, thereby magnifying … Continue reading

Posted in Business Identity Theft, Identity Theft Protection, Security Culture | Tagged , , , , , , , , , , , | Leave a comment

Do You Know Your Cost of a Lost Laptop?

In 2009 the Cost of a Lost Laptop study was conducted by Ponemon Institute and sponsored by Intel Corporation. It was the first benchmark study to estimate the full cost associated with a lost or stolen laptop. The average value … Continue reading

Posted in Business Identity Theft, Identity Theft Protection | Tagged , , , , , , , , , , , , , , , , , , , , , | 1 Comment

Business Culture of Security: Do you audit your vendors?

Over the last few months we have examined what your business needs to do: Know what Private Personal Information you have in your files and on your computers. Keep only what Private Personal Information your business needs to conduct business. … Continue reading

Posted in Business Identity Theft, Identity Theft Protection, Security Culture | Tagged , , , , , , , , , , , | Leave a comment

Are you living and working in a culture of security?

Recently I was asked, “What is your purpose?” I loved the question and the more I thought about it the more I loved it. Why do I do what I do? Why do I blog and tweet? Why do I … Continue reading

Posted in Business Identity Theft, Child Identity Theft, Identity Theft Protection, Medical Identity Theft, Military, Security Culture | Tagged , , , , , , , , , | Leave a comment

Human Firewall aka the Weak Link

You have spent thousands on infrastructure. You have the best Cisco firewall money can buy. Your Information Security Officer has every certification the industry offers. Yet you can still be breached. Your employees’ SSN and birthdates can be stolen. Your … Continue reading

Posted in Business Identity Theft, Identity Theft Protection | Tagged , , , , , , , , , , | 1 Comment

What Landlords Need to Know About Using Consumer Reports

Are you in compliance with the Fair Credit Reporting Act (FCRA)? FCRA is designed to protect the privacy of consumer report information and to guarantee that the information supplied by consumer reporting agencies (CRAs) is as accurate as possible. The … Continue reading

Posted in Business Identity Theft, Identity Theft Protection | Tagged , , , , , , , , , , | Leave a comment