How to Protect Yourself from Identity Theft Tax Refund Fraud

Identity Theft Tax Refund Fraud Tax season is officially upon us. It’s time to gather your W-2s, crunch numbers and mail your annual income taxes to Uncle Sam. It’s also time to learn about the number one fraud of the season: identity theft tax refund fraud. Understanding how cyber criminals pull it off and what the consequences are for victims can help protect yourself. Identity theft tax refund fraud occurs when someone uses another person’s [...]

By | January 19th, 2016
Security Awareness|Comments Off on How to Protect Yourself from Identity Theft Tax Refund Fraud

What’s a Security Awareness Program and why do I need one?

What’s this Security Awareness Program you speak of? In case you didn’t know, a security awareness program is a crucial piece of the newest multi-factor authentication (MFA) guidance that was put in place January of 2012. So if you’re a financial institution looking for a good example of why you should have a security awareness program, or you’re just trying to figure out what people are talking about pertaining security awareness, this is where you’re [...]

By | June 20th, 2013
Compliance & Business Continuity, Industry InSights|Comments Off on What’s a Security Awareness Program and why do I need one?

Automating Banking Fraud: How It Works

By | April 22nd, 2013
Industry InSights, Network Security & Solutions|Comments Off on Automating Banking Fraud: How It Works

Mobile Phishing

Mobile Phishing By: Pierluigi Paganini Emails are considerable as a primary vector for cyber-attacks against mobile devices, principal security firms revealed that phishing activities in the last few years have increased exponentially, targeting every sector from industry to government agencies. RSA’s October Online Fraud Report 2012 described an impressive increase in phishing attacks, up 19% over the second half of 2011. The total loss for various organizations sums up to $2.1 billion over the last 18 months; [...]

By | April 2nd, 2013
Network Security & Solutions|Comments Off on Mobile Phishing

Are Your Smartphone Apps Leaking Personal Information In Clear Text?

Are Your Smartphone Apps Leaking Personal Information? For many years now, we have been trained to look for the SSL icon on our browsers, and have told our family and friends to do the same. It’s a basic security measure that ensures our traffic cannot be intercepted and spied on. The last thing we want when doing online banking, reading our email or shopping online is having someone sitting there and watching our every move, [...]

By | March 13th, 2013
Industry InSights, IT Infrastructure|Comments Off on Are Your Smartphone Apps Leaking Personal Information In Clear Text?

Five Steps to Take When Your Twitter Account Has Been Hacked

If your Twitter account is sending tweets and/or direct messages that you haven't actually sent, your Twitter account has been hacked. Some of the messages may look like this: Hey someone is spreading nasty rumors about you: <link added> LOL! I’m laughing so hard at this pic of you:  <link added> Did you see this funny tweet about you? <link added> Watches on Sale! $99 <link added> Lose weight fast! <link added> If your Twitter [...]

By | November 20th, 2012
IT Infrastructure, Social Media|Comments Off on Five Steps to Take When Your Twitter Account Has Been Hacked

Holiday Shopping Security Tips

By | December 6th, 2011
Industry InSights, Network Security & Solutions|Comments Off on Holiday Shopping Security Tips

Ten Tips to Stay Safe on Cyber Monday

Cyber Monday is the day when all employers cringe. They know that many employees will spend a portion of their work hours making online holiday purchases instead of working. For employees who spend time making purchases either at lunch, break time, or at the end of the work day, here are some tips to stay safe on the largest online activity day of the year. [1] Make sure your desktop computer, laptop, smartphone, or mobile [...]

By | November 22nd, 2011
Industry InSights, Network Security & Solutions, Security Awareness|Comments Off on Ten Tips to Stay Safe on Cyber Monday

Threat Morphosis: Two Decades of Malware

By | November 14th, 2011
Industry InSights, Network Security & Solutions|Comments Off on Threat Morphosis: Two Decades of Malware