Why Your Business Requires Security

The States and Federal Identity Theft and Privacy Protection Laws now require businesses, agencies and organizations of all sizes to protect all personal information they store, and report to all their customers whenever a breach occurs. The financial ramifications after having a data breach can be very substantial to both present and future business. In some many cases a company never does recover from a breach and is forced to close down. Currently, the average cost on a company is $3.7M per incident.

Author Archive

Apr
16

PIN Crackers

Posted by: | Comments Comments Off on PIN Crackers

We all know what a PIN is (Personal Identification Number). When one uses only a PIN to authenticate a user it is refered to as single-factor authentication (something you know) which is the weakest of all authentications for network security. Today’s security standards now require at least tw0-factors (something you have and something you know). The best is security to protect against identity theft is a PIN protected, smartcard-based, password manager which offers double-two factor authentication.

Reader what Kim Zetter of Wired Magazine writes on how hackers have crossed into new frontiers by devising sophisticated ways to steal large amounts of personal identification numbers, or PINs, protecting credit and debit cards.  Click here to read the entire Wired article.

Categories : Uncategorized
Comments Comments Off on PIN Crackers
Apr
08

Cyber Attacks on the Grid

Posted by: | Comments Comments Off on Cyber Attacks on the Grid

Here is a recent article on the threat of cyberspies and cyberterrorism. While the news like to publish these big articles, smaller businesses are just as much at risk. While anti-virus programs are needed, some attackers are breaking in due to weak passwords and poor password management by employees. That is why the government in many security directives is strongly suggesting two-factor authentication. Look into adding a smartcard based password manager as another tool to protect your networks.

Read More→

Comments Comments Off on Cyber Attacks on the Grid
Apr
01

Security Talk #7 – Don’t use SSN for ID

Posted by: | Comments Comments Off on Security Talk #7 – Don’t use SSN for ID

In the past schools and businesses like to use a person’s social security number as an identification or account number. Listen to why this practice can be very costly to your business.

Categories : Audio Interviews
Comments Comments Off on Security Talk #7 – Don’t use SSN for ID
Mar
28

Security Talk #6 – Importance of Paper Shredder Selection

Posted by: | Comments Comments Off on Security Talk #6 – Importance of Paper Shredder Selection

FACTA requires secure disposal of documents that contains a customer’s or employee’s personal information. Shredding is one of the easiest ways to start protecting your company from a violation. With so many different shredders and options on the market, Nancy Heaton of Fellowes will help explain how to match the shredder to your business environment.

valid-rss

Comments Comments Off on Security Talk #6 – Importance of Paper Shredder Selection
Mar
21

FTC – A Business Guide to Protecting Data

Posted by: | Comments Comments Off on FTC – A Business Guide to Protecting Data

The Federal Trade Commission (FTC) offers many training documents to help businesses understand how to protect themselves from identity theft and data breaches. Since they are also the main government arm that fines businesses after a data breach, it is great that they also helping to avoid their wrath.

Recently they produced an online video chocked full of basic information that hits on many of the same topics we at IDProtectionExpert.com discuss. Click the link below to view their training video and then come back and listen to what our different experts have to say on specific areas.

FTC – Protection Personal Information: A Business Guide

Comments Comments Off on FTC – A Business Guide to Protecting Data
FLEXCAP
SiteLock