Cyber Security Moves to the C-suite

July 03, 2017 | Daily Herald | Jim Kendall
– You know the situation has worsened when George Vroustouris talks about social engineering and the need for C-suite leadership to combat what has morphed from certainly serious but by comparison relatively straightforward identity theft to cyber security issues.

With vulnerable data including employee personal information, customer information, vendor data and such intellectual property as formulas and other key processes, the security issue should move to the C-level…” Vroustouris says. Full Article

Millions of U.S. Voters Data Was Exposed Online

Voter data on 198 million (yes that’s million) US Citizens was improperly stored and freely available for 12 days on the internet.

There has never been a data breach this big. The information includes birth-dates, home addresses, telephone numbers, political views, suspected religious affiliations, ethnic background, where they stood on topics like gun control, the right to abortion and stem cell research.

This type of data can easily be used for nefarious purposes, from identity fraud to harassment or intimidation of people who hold an opposing political view. Worst of all, when the bad guys get a hold of this data, they can send highly personalized phishing attacks to you, looking like something totally legit. At this point, from here on out, treat any email you get at the house or the office with a healthy dose of suspicion and ask yourself if it could be a scam. Do not click on links in emails and do not open attachments you did not ask for. Also, be careful with robocalls, and phone scammers that seem to know a lot about you.

Summer time is a busy hectic time for many of us, mistakes are easily made.
Remember, Think Before You Click!

Protecting Against Elder Fraud

March 15, 2017 | Daniellah Salario, owner of Assisting Hands Home Care

At first glance, it looked like a local contractor was doing a good deed for the elderly in under-served Chicago communities.

Mark Diamond would seek out aging African-American homeowners on Chicago’s West and South sides, and offer them the opportunity to fix up their homes through a free government program.

In reality, however, Diamond was signing them up for reverse mortgages and running off with the cash without doing zilch, according to WGN. Over the summer, a judge found Diamond guilty of scamming some 47 homeowners out of a total of $2.3 million.

Full article, senior best practices and resources to protect against identity fraud

CBS News 60 Minutes “Can a phone be hacked?”

Well, the short and now obvious answer (Apple vs USA) is of course, yes. And possibly the more important follow up is, “What is the impact of my smart phone getting hacked?” 60 Minutes has provided an in-depth, insider view of the hacker world, with a very real taste of the impact cell phone hacking can have on our lives.

Threat From ‘Ransomware’ Is Expected to Grow

One thing for sure, Ransomware is not going away, in fact it is getting more prevalent than ever before.While it is true that some of the original group distributing and profiting from the crime have been caught, the new wave of thieves are more sophisticated than the prior group. According to Forbes this new strain of ransomware “Locky”is infecting as many as 90,000 systems per day.

ID Theft in 2015 – 5 Things We Learned

Each year, hundreds of thousands of Americans file identity theft complaints with the Federal Trade Commission and other agencies.

Related data is compiled into the Consumer Sentinel Network Data Book. This Investigator Insight from Kroll shares five key facts pulled from the data.

This is why Undo Identity Theft has been saying for years, credit monitoring alone is not enough.