Why Your Business Requires Security

The States and Federal Identity Theft and Privacy Protection Laws now require businesses, agencies and organizations of all sizes to protect all personal information they store, and report to all their customers whenever a breach occurs. The financial ramifications after having a data breach can be very substantial to both present and future business. In some many cases a company never does recover from a breach and is forced to close down. Currently, the average cost on a company is $3.7M per incident.

Archive for Employee Security

Apr
17

Tufin Survey Finds One in Six New York Teenagers Hack — And Rarely Get Caught

Posted by: | Comments Comments Off on Tufin Survey Finds One in Six New York Teenagers Hack — And Rarely Get Caught

(NOTE from the IDProtectionExpert: Here is an article that I wanted to share. The teenage hacker is alive and well.)

Ramat Gan, Israel, April 14, 2010: Tufin Technologies, the leading provider of Security Lifecycle Management Solutions, today announced survey results that reveal the hacking habits of 1000 New York City teenagers. Exactly half (50%) of US kids sampled revealed they’d had their Facebook or email account hacked, which may explain why 75% feel hacking is wrong and 70% think it should be considered a criminal offense. However, 39% of the teens surveyed think hacking is “cool” and 16%, or roughly one in six, admitted to trying their hand at it. Only 15% of the entire sample has either been caught or knows someone who has – particularly disturbing considering 7% of young hackers reported they did so for money and 6% view it as a viable career path. Read More→

Comments Comments Off on Tufin Survey Finds One in Six New York Teenagers Hack — And Rarely Get Caught
Aug
25

Twitter, Facebook, etc. Cyber Terrorism

Posted by: | Comments Comments Off on Twitter, Facebook, etc. Cyber Terrorism

Phishing and Shear phishing emails from unknown babes and beef cakes want to frined you and they want you to click on the link to add. These people are trying to place a virus on your computer.

Don’t friend these people.

A tip off is you see how many people are following them it usually a very low number. You also want to be sure you have a strong anti-virus program to protect your computer.

Be careful of who you friend and if you don’t know them or they are not part of your circle don’t accept them. And no matter what don’t click onto any of their links or pictures.

Comments Comments Off on Twitter, Facebook, etc. Cyber Terrorism
Apr
17

Employees Cause Data Security Breaches – Not Malware

Posted by: | Comments Comments Off on Employees Cause Data Security Breaches – Not Malware

When business owners look around their office and see how sensitive documents are handled it is no wonder that the weakest security link is the employee. But it is not always the employee’s fault since they have never been trained or given the security tools to protect data.

A Symantec report says that most breaches at small to midsize businesses are caused by people, not malware. Click here to read the entire article.

Look at all the four vulnerability point: Building – Employee – PC – Network and start implementing training, policies and solutions that are inexpensive and work.

Comments Comments Off on Employees Cause Data Security Breaches – Not Malware
Mar
21

FTC – A Business Guide to Protecting Data

Posted by: | Comments Comments Off on FTC – A Business Guide to Protecting Data

The Federal Trade Commission (FTC) offers many training documents to help businesses understand how to protect themselves from identity theft and data breaches. Since they are also the main government arm that fines businesses after a data breach, it is great that they also helping to avoid their wrath.

Recently they produced an online video chocked full of basic information that hits on many of the same topics we at IDProtectionExpert.com discuss. Click the link below to view their training video and then come back and listen to what our different experts have to say on specific areas.

FTC – Protection Personal Information: A Business Guide

Comments Comments Off on FTC – A Business Guide to Protecting Data
Feb
07

Reg Flags are Coming! Red Flags are Coming!

Posted by: | Comments Comments Off on Reg Flags are Coming! Red Flags are Coming!

Enforcement of the “Red Flag Rules” starts May, 1st 2009. The Red Flag Rules specifies that “financial institutions and creditors” protect an individual’s personal information from identity theft by raising a “red flag”. The companies must establish policies and procedures to recognize, detect, and respond to an identity theft attack. However, the scope of who has to comply may be larger than originally thought. Read More→

Comments Comments Off on Reg Flags are Coming! Red Flags are Coming!
FLEXCAP
SiteLock