Identity Theft: Preventing and Responding to Identity Fraud

Identity theft: a criminal running away with stolen personal information from a compromised tablet computer.

Following the recent public disclosure that hackers believed to be operating on behalf of a foreign government breached the networks of the U.S. government and multiple US companies, it is safe to assume that online frauds and scams like identity theft will follow.

Identity theft, or identity fraud, is a crime that can have substantial financial and emotional consequences. Take precautions with personal information. If you become a victim, act immediately to minimize the damage.

Is identity theft just a problem for people who submit information online?

You can be a victim of identity theft even if you never use a computer. Malicious people may be able to obtain personal information (such as credit card numbers, phone numbers, account numbers, and addresses) by stealing your wallet, overhearing a phone conversation, rummaging through your trash (a practice known as dumpster diving), or picking up a receipt at a restaurant that has your account number on it.

If a thief has enough information, he or she may be able to impersonate you to purchase items, open new accounts, or apply for loans.

The internet has made it easier for thieves to obtain personal and financial data. Most companies and other institutions store information about their clients in databases; if a thief can access that database, he or she can obtain information about many people at once rather than focus on one person at a time.

The internet has also made it easier for thieves to sell or trade the information, making it more difficult for law enforcement to identify and apprehend the criminals.

(more…)

Share

Comments Off on Identity Theft: Preventing and Responding to Identity Fraud

Social Networking: Staying Safe on Social Networking Sites

Secure social networking on mobile devices

The popularity of social networking sites continues to increase, especially among teenagers and young adults. The nature of these sites introduces security risks, so you should take certain precautions.

What are social networking sites?

Social networking sites build upon the concept of traditional social networks where you are connected to new people through people you already know. The purpose of some networking sites may be purely social, allowing users to establish friendships or romantic relationships, while others may focus on establishing business connections.

Although the features of social networking sites differ, they all allow you to provide information about yourself and offer some type of communication mechanism (forums, chat rooms, email, instant messages) that enables you to connect with other users. On some sites, you can browse for people based on certain criteria, while other sites require that you be “introduced” to new people through a connection you share. Many of the sites have communities or subgroups that may be based on a particular interest.

(more…)

Share

Comments Off on Social Networking: Staying Safe on Social Networking Sites

Remote Working: 3 Ways Technology Can Close The Productivity Gap

People in various remote working scenarios

Now, more than ever, we’re seeing a rapid change in the way the world does business, and where the world does business from, making technology more essential than ever. And when it comes to getting work done, 71% of small and medium-sized businesses (SMBs) use desktops as their primary computer, which can make working at home or remote working, a huge challenge for many and has greatly increased the demand for mobile, work-from-home devices.

If there’s one thing that current events have shown, it is that nothing will be the same again. In particular, the way we work. The new workforce, now spanning the different work styles of five generations, has already changed the way our businesses are organized.

Our workplaces have to be far more flexible.

Remote workplaces need to support the shiny, new technologies we’re increasingly used to as consumers, while delivering the superior performance and reliability that business demands. Work is no longer a designated space in the office but an activity that we do, when and where we choose, whether that’s a coffee shop or in a home office. (more…)

Share

Comments Off on Remote Working: 3 Ways Technology Can Close The Productivity Gap

Web Conferencing: Getting The Most Out of Business Collaboration

web conferencing business users

You need the right technology to get the best value from web conferencing. Without good connectivity; via wired, wireless or WiFi networks and high-performance hardware and software needed to support great video and audio, it will be hard to achieve the optimal experience.

It’s all about the app

Ultimately, everything depends on the capabilities of the app you use for your web conferencing. Even with great connections and hardware, you won’t get the best outcomes from your online meetings unless your app can deliver what you need.

Your app should be well integrated with your operating system and business suites such as Microsoft 365. This makes Microsoft Teams, the Windows conferencing and collaboration app included with Microsoft 365, the ideal option for anyone using a Windows PC. It’s already built-in with the software they are using every day. (more…)

Share

Comments Off on Web Conferencing: Getting The Most Out of Business Collaboration

Two-Factor Authentication: Protecting Your Online Accounts

Laptop and two-factor authentication devices

Two-factor authentication, or 2FA, is one of the easiest and most available multi-factor authentication approaches to protecting online accounts.

Analysis of recent online account breaches indicate that weak and reused passwords continue to be a common entry point for account or identity takeover and network intrusions.

Some simple steps and tools like two-factor authentication can help your end users employ unique, strong passwords for their dozens of accounts.

Wouldn’t it be nice if your accounts could let you know when someone new is trying to get into them? Even better, wouldn’t it be terrific to make a stolen password useless to others?

Were you tricked into revealing your password through a phishing scam? Rest easy, your account is safe! That’s essentially the control that two-factor authentication (2FA) — also known as two-step verification or login approval — gives to you. And, it only takes about two minutes to set up and two seconds to use. That’s a lot of power for very little effort!

How does it work?

Once you’ve activated two-factor authentication on an account, whenever an account login with your password comes from a different device from what you’ve already permitted, an authorization check will come to your smartphone or other registered device.

Without your approval or current code, a password thief can’t get into your account. (more…)

Share

Comments Off on Two-Factor Authentication: Protecting Your Online Accounts

Electronic Payments: Protecting Your Employees and Organization

Electronic Payments and Protection

Employees or small organizations are using electronic payments more than ever before. As the use of credit cards to make purchases and payments replaces the use of cash, and online merchants supplant brick-and-mortar stores, protecting electronic payments becomes more important.

Whether you are making payments for your own personal consumption or on behalf of your organization, electronic payments need to be protected.

Online sales in the United States grew to a record high of nearly 19 percent during the 2019 holiday season. At the same time, the convenience of using credit cards and other electronic payment services is compelling consumers to rapidly reduce their use of cash.

The 2019 Diary of Consumer Payment Choice report shows that cash is used about 50 percent of the time for in-person transactions under $10 (for things like lunch or coffee). For larger purchases of $25 or more, cash is used only 10 percent of the time. Cyber-criminals are taking advantage of the increase in electronic payments. (more…)

Share

Comments Off on Electronic Payments: Protecting Your Employees and Organization