How to Protect Yourself from Identity Theft Tax Refund Fraud

Identity Theft Tax Refund Fraud Tax season is officially upon us. It’s time to gather your W-2s, crunch numbers and mail your annual income taxes to Uncle Sam. It’s also time to learn about the number one fraud of the season: identity theft tax refund fraud. Understanding how cyber criminals pull it off and what the consequences are for victims can help protect yourself. Identity theft tax refund fraud occurs when someone uses another person’s [...]

By | January 19th, 2016
Security Awareness|Comments Off on How to Protect Yourself from Identity Theft Tax Refund Fraud

Automating Banking Fraud: How It Works

By | April 22nd, 2013
Industry InSights, Network Security & Solutions|Comments Off on Automating Banking Fraud: How It Works

Five Steps to Take When Your Twitter Account Has Been Hacked

If your Twitter account is sending tweets and/or direct messages that you haven't actually sent, your Twitter account has been hacked. Some of the messages may look like this: Hey someone is spreading nasty rumors about you: <link added> LOL! I’m laughing so hard at this pic of you:  <link added> Did you see this funny tweet about you? <link added> Watches on Sale! $99 <link added> Lose weight fast! <link added> If your Twitter [...]

By | November 20th, 2012
IT Infrastructure, Social Media|Comments Off on Five Steps to Take When Your Twitter Account Has Been Hacked

Malware, Viruses, Trojans, OH MY!

Malware. What is it and why should I care? Two years ago, there were nearly 3 million unique forms of malicious code, and thousands of new ones are discovered daily. The risk of being infected is greater than ever because every single possible data communication method can be used to transmit malware. And we know this is true because we so often see it in the news. But what exactly is malware? Malware = MALicious [...]

By | August 10th, 2012
IT Infrastructure|Comments Off on Malware, Viruses, Trojans, OH MY!

Holiday Shopping Security Tips

By | December 6th, 2011
Industry InSights, Network Security & Solutions|Comments Off on Holiday Shopping Security Tips

Tips for Securing Mobile Devices in the Enterprise

As smartphone and tablet sales continue to increase, more employees are bringing their personal mobile devices into the corporate environment. Allowing these devices to connect to your network enterprise without any guidelines can pose a serious risk. Securing mobile devices is one of the biggest challenges facing IT security professionals as cyber criminals turn their attention to this platform. Research firm IDC says global spending on mobile security is on track to balloon to $1.9 [...]

By | October 17th, 2011
Industry InSights, IT Infrastructure, Network Security & Solutions|Comments Off on Tips for Securing Mobile Devices in the Enterprise

How Hackers Target Your Twitter Account

Can you guess how many of the top 10 Twitter users have been hacked? Or what the most common password was before Twitter had to ban it for security reasons? There’s a lot to learn from this infographic from MediaBistro, especially if you’re good at learning from others’ mistakes

By | September 27th, 2011
Industry InSights|Comments Off on How Hackers Target Your Twitter Account

The New FFIEC Guidance – Five Tips to Ensure Compliance

By now, the new FFIEC guidance should have found its way onto your desk and to the top of your ‘To Do List”. After all, the January compliance deadline is fast approaching, so it’s time to get busy. The question everyone is asking is no longer “What is this?”, but “How do I do this? Where do I begin?” To help you, we’ve identified five key starting points for financial institutions. 1. Enforce strong step-up [...]

By | August 15th, 2011
Compliance & Business Continuity, Network Security & Solutions|Comments Off on The New FFIEC Guidance – Five Tips to Ensure Compliance

Mobile Menace: Trends in Mobile Threats Infographic

By | August 11th, 2011
IT Infrastructure|Comments Off on Mobile Menace: Trends in Mobile Threats Infographic