Lock image on coding

One study found that 43% of cyber attacks target small business, and 60% of small companies go out of business within six months of a cyber attack.¹ Business owners are also required to protect their customers’ personal information. In 47 states, and the District of Columbia, businesses are required to notify individuals of security breaches…

Read More
Lock image on coding

According to the United States Computer Emergency Readiness Team, Tax Identity Theft Awareness Week is January 29 to February 2, and many federal agencies are offering information and resources to help consumers learn to protect themselves from tax-related identity theft and Internal Revenue Service (IRS) imposter scams. As stated on their website, the US-CERT “encourages consumers…

Read More

BE AWARE! Cyber criminals are about to ramp up their efforts to steal employee W-2s. Just like other businesses, cyber criminals seek efficiency. If they can get just one member of your HR or finance staff to send W-2 forms, they can profit directly by filing fraudulent tax returns and stealing refunds. Beazley Breach Response…

Read More

The Internet Crime Complaint Center (IC3) has released an alert warning consumers of music gift card scams. This type of scam targets victims, gains their confidence, and tricks them into providing gift card information. To stay safer online, review the IC3 alert on Online Scammers Require Payment via Music Application Gift Cards and the US-CERT…

Read More

The Internal Revenue Service (IRS) has released an alert warning of various types of summertime scams targeting taxpayers this summer. The alert describes common features of these cyber crimes, including: robocalls, private debt collection, and scams that target taxpayers with limited English proficiency. Taxpayers and tax professionals are encouraged to review the IRS alert and US-CERT’s…

Read More

What security implications do these social networking sites present? Social networking sites rely on connections and communication, so they encourage you to provide a certain amount of personal information. When deciding how much information to reveal, people may not exercise the same amount of caution as they would when meeting someone in person because the…

Read More

You can be a victim of identity theft even if you never use a computer. Malicious people may be able to obtain personal information (such as credit card numbers, phone numbers, account numbers, and addresses) by stealing your wallet, overhearing a phone conversation, rummaging through your trash (a practice known as dumpster diving), or picking…

Read More