The Ultimate Guide to Child Identity Theft: Types, Warning Signs & Prevention Strategies

Child identity theft is a significant problem in the US. A recent report by Javelin Strategy & Research, sponsored by AARP, found that 915,000 children, or 1 in 80, were victims of identity theft in the past year. Additionally, 1 in 43 children were affected by a data breach from July 2021 to [...]

The Rise of AI Social Engineering Scams

In today's digital age, social engineering scams have become an increasingly prevalent threat. In fact, last year, scams accounted for 80% of reported identity compromises to the Identity Theft Resource Center (ITRC). This was a 3% increase compared to the previous year. Social engineering scams leverage psychological manipulation to deceive individuals and exploit the [...]

Buying a Home? Here’s How Your Credit Will Affect Your Mortgage Rate

To buy a home, you need to apply for a mortgage. But before you do that, you should know how important your credit score is in the mortgage application process since it can significantly impact the mortgage rate you'll be offered.  In this blog, we break down the relationship between credit scores and [...]

Is It Safe to Do a Dark Web Scan?

Criminals who obtain an individual’s personally identifiable information (PII) may share it or sell it online using the dark web. Many companies offer dark web scans that will search the dark web for your information and alert you if they find anything. But it’s important to remember the limitations of dark web scans and [...]

How Do You Know if Your Information Is On the Dark Web?

The dark web is a hidden part of the internet most people can't access. It's where illegal activities, like buying and selling drugs, weapons, and stolen personal information, take place. If you're not familiar with the dark web, you might be wondering what it is, how information gets there, and what happens if your [...]

Is Dark Web Monitoring Worth It?

In a world where cyber threats are increasingly prevalent, the dark web has become a breeding ground for criminal activity. This has left individuals and businesses wondering whether dark web monitoring is worth the investment. This blog explores the ins and outs of dark web monitoring, including what it is, how it works, and [...]

The Growing Threat of Google Voice Scams

Imagine this: You're eagerly selling an antique dresser on Facebook Marketplace and a prospective buyer communicates interest in it. However, they express concern that you may be trying to scam them. In an effort to establish your credibility as a legitimate seller, they request you confirm your identity with a verification code. Soon enough, [...]

Juice Jacking: The Latest Cyber Threat to Your Personal Information and Devices

Juice jacking, a new cybercrime trend, is targeting people who charge their phones or tablets at public charging stations. This blog delves into the specifics of juice jacking, including how it operates, the various attack types, the associated risks, measures to help safeguard yourself, and actions to take if you fall prey to it. [...]

Credential Stuffing Attacks: What They Are & How To Prevent Them

Hackers can use different techniques to steal your passwords. One way they can use your stolen personal data is called credential stuffing. Read on to learn more about credential stuffing and how you can help protect yourself. What is Credential Stuffing? Credential stuffing is a cyberattack involving hackers using software to try multiple combinations of [...]

What Do I Do If My Social Security Card is Stolen?

When your Social Security card is stolen, it can be a major cause for concern. The primary concern with a stolen Social Security card is identity theft. With just your Social Security number, identity thieves can wreak havoc in your name, negatively impacting your credit, finances and even commit crimes in your name. As [...]

NFT Scams – How They Work and How To Spot Them

In recent years, the market for non-fungible tokens (NFTs) experienced a significant increase with its value exceeding $23 billion last year alone, according to DappRadar. However, this growth also led to an increase in NFT scams where bad actors stole login credentials or deceived buyers. In this blog, we explain how these scams operate [...]

Home Title Theft – How It Works & How To Prevent It

Home title theft is a growing threat that can risk your property and financial well-being. Protect yourself by reading this blog, which explains how home title theft works and provides practical advice to help you prevent it. What Is Home Title Theft & How Does It Happen? Home title theft is a type of fraud [...]

Credit Card Fraud VS. Debit Card Fraud: Are you Protected?

Do you know that how you dispute fraudulent charges on a debit card is different than on a credit card? Consumer protection laws differ in each case and knowing the differences can help to keep your accounts safe from identity theft. Mainly, if you need to dispute a fraudulent debit card charge, the funds you [...]

Crypto Scams are On The Rise. Here’s out How To Avoid Them

Cryptocurrency scams have become increasingly common as the popularity of digital assets continues to rise. With the potential for significant financial losses, knowing how to help avoid falling victim to these scams is crucial. This blog covers the most prevalent crypto scams and provide tips on helping protect yourself. The Basics on Cryptocurrency What [...]

Why Are Military Members More Vulnerable to Identity Theft?

As May is Military Appreciation Month, a month-long observance to honor active service members and veterans, it's important to note that serving in the military doesn't guarantee protection against identity theft. Unfortunately, military personnel and their loved ones are at higher risk of becoming victims of identity theft and other types of fraud. Here [...]

What are the Benefits of a Password Manager?

Passwords are essential when keeping your information safe on your devices. But unfortunately, many people use weak or the same password, making it easy for hackers to crack them. Research shows that 52% of people reuse passwords for multiple accounts. Luckily, password managers can help by creating and storing strong passwords for different websites and apps [...]

What is Employment Identity Theft and How Can It Happen?

Employment identity theft is when someone uses your name and personal information to gain employment. Like other forms of fraud, employment identity theft is illegal and can have devastating financial consequences for its victims. Here’s what you need to know about employment identity theft, and what to do if you find out you’ve become [...]

Tax Season Scams: How to Protect Your Identity

While it’s important to be on high alert and protect your identity all year long, tax season is an especially vulnerable time. Every tax season, identity thieves run a variety of scams to get their hands on taxpayers’ personal information. Many scams occur, but most have a common goal: filing a fraudulent tax return [...]

How Does Identity Theft Affect Your Credit Score?

Identity theft is no joke. Unfortunately, it can have some serious consequences for your financial health. One of the most significant impacts it can have is on your credit score. This blog explains how identity theft affects your credit score and gives tips to help protect it. How Does Identity Theft Impact Your Credit [...]

Top 7 Data Security Practices for the Workplace

As businesses become increasingly reliant on technology, protecting sensitive information is more important than ever. Data breaches and cyberattacks can result in costly consequences, making strong data security practices essential. In this blog, we cover the top-seven data security practices every workplace should implement to help protect valuable information and more. Why is Data [...]

Tax Identity Theft: A Comprehensive Guide

Tax season can sometimes be stressful even when things go according to plan, but what happens when you are the victim of tax identity theft? Here's a comprehensive guide on tax identity theft, how it works, and what to do if you suspect it. What Is Tax Identity Theft? Tax identity theft happens when someone [...]

The IRS Phone Scam: Understanding the Tactics Used by Fraudsters

Tax season allows con artists to scam taxpayers out of their hard-earned money each year in the United States. These scams range from simple to sophisticated, but many are initiated using a single phone call. Here’s how phone fraudsters are targeting taxpayers this tax season and how you can spot an IRS phone scam. [...]

How to Protect Yourself from Airline Scams

Scammers are always looking for ways to take advantage of people, and the airline industry is no exception. Whether through fake airline ticket booking sites or fake flight cancellation emails, travelers need to be vigilant and protect themselves from airline scams. In this blog, we provide tips and advice on recognizing and avoiding airline [...]

Romance Scams and Relationship Scams: What’s the Difference?

Romance Scams Romance scams are a type of fraud that involves criminals using deception to take advantage of victims looking for companionship. These scams typically involve criminals posing as potential partners on dating websites or social media platforms. They can often use fake profiles and photos. And they often claim to be from another [...]

What Is Ransomware and How Does It Work?

Ransomware is one of the most common types of cyberattacks. With how vastly the internet has become embedded in our day-to-day lives, cyberattacks such as ransomware can cause costly disruptions. According to the Harvard Business Review, the amount of money paid to ransomware hackers increased 300% from 2020 to 2021. This is after ransomware attacks rose [...]

5 Common Hotel Scams and How to Avoid Them

Staying at a hotel should be an enjoyable experience. But unfortunately, there are many scams out there that can make it a nightmare. To help protect your personal information and money, it is important to be aware of the most common hotel scams and how to help avoid them. 5 Common Hotel Scams Hotels [...]

How to Prevent Tax Identity Theft

Every year, tax season presents a seasonal opportunity for criminals seeking monetary gain from identity theft. There are many ways that scammers may try to obtain personal information, but the end goal is to file a falsified tax return in the taxpayer’s name and claim a tax refund. The scheme may not be discovered [...]

How to Add Utility Payments to Your Credit Report

The traditional way to build credit requires getting a credit card and/or loan and making monthly payments on time. But that activity doesn’t include all the other utility bills you pay. So, it only represents a small portion of your financial behavior. Most utility providers don’t report payment activity to the credit bureaus, which [...]

What to Do If Your Phone Is Lost or Stolen

Losing your phone can feel like the end of the world. One minute it's in your pocket, and the next you can't find it anywhere! Whether it was dropped somewhere, taken by someone, or completely disappeared into thin air, you're now in a whirlwind of worry and frustration. No doubt you are concerned about [...]

Can Hackers Create Fake Hotspots?

We rely on the internet, from communicating with loved ones on social media to working and conducting business. As a result, vulnerability to cybercrime is a serious concern. One of the ways hackers attempt to exploit people is by creating Wi-Fi hotspots that imitate a legit business, organization or even an airport and acts [...]

What is a Keylogger and What Does Keylogging Mean?

You might not realize it, but your computer or phone constantly records everything you do. Every keystroke, every website you visit, and every password you type is recorded by a piece of software or hardware called a keylogger or keystroke logger. Keyloggers are used for many different things - from tracking employees' activity to [...]

What Happens If You Open a Spam Email on Your Phone?

Spam emails only become dangerous depending on how you handle them. So, while opening a spam email won't necessarily cause harm, what you do next is crucial. This blog will discuss what you can do if you accidentally open a spam email on your smartphone. What Happens If You Accidentally Open a Spam Email [...]

What You Should Know About ‘Pig Butchering Scams’

Scammers are back at it again with a new scheme – called “pig butchering scams” – that targets people looking for love online. This highly sophisticated scam lures people into long-term relationships before selling them on fake online investment opportunities.  The scam is quickly spreading. The FBI’s Internet Crime Complaint Center recently saw more than [...]

Looking for Love Online? Be Aware of Scammers and Fraud

Most people know a couple who met on an online dating site. What was once a stigma has now become commonplace as access to the internet has grown, and so has the number of online dating sites. Finding love online is now as simple as downloading an [...]

7 Tips to Follow for Safer Internet Day

The 20th annual Safer Internet Day is taking place on February 7! Safer Internet Day is a campaign that aims to educate the public on internet safety and encourage everyone to take part in creating a safer internet. Why is Safer Internet Day Important? Online safety is a global issue, with 60% of the [...]

SIM Swap Scams: How SIM Swapping Works and How To Protect Yourself

According to the Federal Bureau of Investigation, SIM swap scams are on the rise. The FBI reported that they had received 1,611 SIM swapping complaints with losses of more than $68 million in 2021. If you're unfamiliar with this scam, it takes advantage of people's lack of knowledge of how SIM cards work and [...]

Bluetooth Hacks – How Your Devices are Targeted

Bluetooth is a widely used, convenient technology included on every smartphone, tablet, and laptop computer these days. You can share files, play media, and more with a wireless connection. But like with unsecured Wi-Fi networks, hackers can target your Bluetooth-enabled devices to commit identity theft, install malware, or spam you with messages. This blog will discuss [...]

How Can I Find Out If Someone is Using My Social Security Number?

As the threat of identity theft continues to rise yearly, it’s important to watch out for signs that someone is using your Social Security number (SSN). In this blog post, we will explore the steps you can take to find out if someone is using your SSN and what to do if you discover [...]

6 Tips for Sharing Files Safely and Securely

Whether you have a project you are working on or want to give someone a couple of photos, there are several scenarios where you find yourself in need of sharing files. Regardless of the file type you want to share, it is important to consider the safety of the methods you use. In this [...]

Tax Prep Checklist: What You Need to File Your Taxes and Help Prevent Tax Fraud

With the New Year comes the time for filing your taxes. You should already be preparing to get your information together to file last year’s taxes. When the time comes to officially file, you do not want to end up with missing documents or information. This can significantly lengthen the filing process and even [...]

What is Shoulder Surfing?

Shoulder surfing is a type of identity theft practice where someone tries to steal confidential information by spying over their target's shoulder. The objective of shoulder surfing is to steal sensitive information such as passwords, credit card numbers or personal identification numbers (PINs) that can later be used to access accounts for financial gain.

Statement Balance vs. Current Balance: What’s the Difference?

Have you ever looked at your bank statement and wondered, what's the difference between your statement balance and your current balance? Don't worry. You're not alone! In this blog, we're breaking down the differences between a statement balance and a current balance. What is a Statement Balance? The statement balance is the total amount you owe [...]

How to Not Get Scammed Buying Tickets

If attending the biggest sporting events, festivals and concerts is a big part of your vacation plans, it can be a bummer to find out that the ticket deal you scored is a scam. After all, you are making a hefty investment to be there, which you know after budgeting out your vacation. And it [...]

What is a Good Credit Score? Credit Score Ranges Explained

With good credit scores come significant financial advantages. This includes better loan options, lower interest, and more negotiating power. Yet, many people are unsure of precisely what constitutes a “good” credit score. This blog will review credit score ranges and factors that could impact your credit scores. What is a Credit Score? A credit score [...]

LifeLock Data Breach Compromises Thousands! Learn How to Help Protect Your Online Identity

Recently, thousands of Norton LifeLock customer accounts were compromised in a data breach. Criminal hackers attempted to break into Norton LifeLock customer accounts and possible password managers, meaning they might have gained access to customers’ usernames, passwords and other personal information. The company reports credential stuffing as the likely culprit for the attack.  Credential [...]

Top 10 IdentityIQ Blog Posts of 2022

With a final look back at 2022, we’re rounding up the most searched and visited blog posts from last year. Our most popular topics were primarily concerned with identifying and preventing different types of identity theft and scams. Our readers were interested in topics that covered how criminals can steal their money, access their [...]

Tax Preparer Fraud: How to Choose the Right Tax Preparer

With the tax season back, so are tax preparer fraudsters. While many trustworthy and honest tax preparers are willing to help you complete your tax returns, it’s still good to be cautious, especially when you want to protect your identity. Here’s how to avoid tax preparer fraud and what to look for when choosing [...]

5 Things You Should Not Share on Social Media

Social media has become some of the most popular platforms people spend their time on. Whether you want to check up on your family members, post photos or even meet new people, social media is the way to go. Even businesses take up social media to promote their products and services. What you post on [...]

Can Your Identity Be Stolen From Your Passport?

Most of us are familiar with the concept of identity theft – someone stealing your personal information and using it to commit fraud or other crimes. You can try to take all the proper precautions, but, unfortunately, your identity still might be at risk. For example, this can happen if your passport falls into [...]

Is It Safe to Open a Holiday E-Card?

With the holiday season upon us, e-cards are a popular way to spread holiday cheer! An e-card is a digital greeting card, typically sent via email. E-cards are slowly taking the place of traditional holiday cards for many reasons. They are  typically cheaper, easier to send, more convenient and more animated than a normal [...]

How Can College Students Avoid Identity Theft?

College students have many different things competing for their attention, from classes to school activities to an active social life. With all these demands, fighting identity theft might not seem like a pressing matter. But students are prime targets for identity theft, which can cause long-term damage to their finances and credit. Why Are [...]

Is IdentityIQ a Scam?

Is IdentityIQ a scam? Does a company that protects you and your family’s identity really exist? Yes, in fact, IdentityIQ services not only monitor your identity, but you also receive credit report monitoring, meaning your identity and credit are protected. IdentityIQ plans also feature device security with anti-virus and VPN. So, you have complete [...]

How Identity Theft Damages More Than Just Your Credit Scores

Having a good credit score can be extremely beneficial when pursuing important financial goals like opening a credit card, taking out a loan or buying a car or a home. It can even help you land certain types of jobs or rent your dream apartment. For this reason, it’s very important to protect your [...]

How Are Elderly Americans Vulnerable to Identity Theft?

Elderly Americans are facing a drastic increase in cybercrime, identity theft and financial abuse. Adults over age 60 last year reported $1.3 billion in cybercrime losses to the FBI’s Internet Crime Complaint Center (IC3) – a 74% increase from the previous year. The fact is, older Americans are a popular target for criminals who [...]

What Happens If a Scammer Has Your Email Address?

It can be scary finding out that a scammer has stolen your email address, whether it’s your personal or work address. Sadly, there are many ways scammers and hackers can source their victims’ email addresses, including buying them from data providers or the dark web, email harvesting, social engineering, fake websites or social media. [...]

Can My Identity be Stolen from My Birth Certificate?

For most U.S. citizens, an official birth certificate may be the most critical document to have in their possession. Birth certificates back up your identity using your name, date of birth, place of birth, your sex/gender as recorded at birth and the identity of your parents. They’re commonly referred to as “breeder documents” because [...]

Can Someone Change Your Address Without Your Knowledge?

No one ever expects to be a victim of identity theft. But the unfortunate truth is that it happens more often than you might think. According to AARP, one in four people is the victim of identity theft in the United States. Unfortunately, criminals don't always need your personal information to steal your identity [...]

Surya Pochareddy Named Head of M&A and Strategy at IDIQ

New Role Further Develops Company’s Strategic Growth Across Identity and Credit Solutions Temecula, California, Sept. 14, 2022 – IDIQ, an industry leader in identity theft protection and credit monitoring, has named Surya Pochareddy to the role of executive vice president, head of M&A and strategy. In this new role, Pochareddy is responsible for spearheading [...]

Do People Go Through Trash to Steal Your Identity?

When people mention identity theft, it’s only natural that your mind goes to the internet, dark web and digital identity theft. However, you’d be surprised to learn about the number of people actively digging through your trash to find information on your identity. Statistics from the Green Team indicate that Americans receive more than 4 million tons [...]

Do You Still Need to Buy Antivirus Software?

Computer viruses are malicious programs that can disrupt computer systems, hijack or steal sensitive data, spy on users and spread to other computers on the same network. Technology improvements may mean the “Wild West” days of rampant computer viruses are over, but you still need to take steps to protect your devices. Most modern [...]

How to Avoid Rideshare Scams While Traveling

If you’re planning a vacation around the country, traveling has never been easier, especially with so many rideshare opportunities available to make it easy to get around. Apps like Uber and LYFT are highly accessible and easy to use. Many people rely on them, but it’s important to know that ride sharing apps are associated [...]

What to Do If My Email Is Found on The Dark Web?

Pretty much everyone uses email. It’s part of your daily life. But what do you do if your email address is found on the dark web? People might be trying to access your accounts. Unfortunately, the dark web is where you can find a number of criminals and cybercriminals trying to break into your [...]

Should I Report Identity Theft to the Police?

It's natural to feel sleepless, worried and anxious once you realize you've become a victim of identity theft. You might wonder what to do. You might also wonder if you should report the identity theft to police. Here’s help in finding out if you should report identity theft to your local police department. When Should [...]

How to Help Protect Your Identity Offline

The media often covers data breaches and cyberattacks that expose the personal data of large groups of people, leaving them vulnerable to identity theft and other forms of fraud. One of the best ways to help protect yourself from digital threats like these is to safeguard your data online. But your personal data isn’t just [...]

4 Ways to Avoid Payment App Scams

Peer-to-peer, or P2P, payment platforms like PayPal, Venmo, and CashApp are popular because they’re quick, convenient, and easy ways to send money to other people electronically. When used as intended, payment apps are relatively safe, but they lack some fraud protections and features that traditional payment methods like credit cards and debit cards have. There [...]

4 Tips to Help Avoid Identity Theft During the Homebuying Process

When you apply for a mortgage loan to buy a home, you have to share a lot of personal information with your mortgage broker and lender. You may need to provide sensitive information such as your name, address, Social Security number, pay stubs, bank statements, information about your investment and retirement accounts, copies of your [...]

6 Common Facebook Marketplace Scams and How to Avoid Them

Are you looking to sell a couch, buy gently used patio furniture or offload that baby swing sitting in your basement for years? Facebook’s Marketplace is a one-stop platform that lets you do all of this – connecting you beyond your friend network to members of your community, enabling you to buy and sell [...]

How Virtual Phone Numbers Can Help Protect Your Identity

Do you freely give out your phone number when you’re signing up on a shopping website or meeting a new acquaintance? If so, you should know that criminals can use your phone number to commit identity theft. For example, scammers may try to spoof (impersonate) your legitimate phone number to contact your friends and family, [...]

Are College Students Targeted by Identity Thieves?

When it comes to identity theft, young adults are a primary target. Students are four times more likely to be targets of fraud that can go undetected for years compared to other consumers. In fact, 15% of students deal with severe or moderate impacts from fraud, according to a report from Tulane University. Criminals [...]

How to Protect Yourself from Rental Scams

Competition grows fiercer by the day in the nation’s hottest housing markets, and that translates to a competitive rental market as well. But this uptick in demand for apartments and rental homes has resulted in a tighter rental market, opening the door for scammers preying on the desperate. In fact, the Better Business Bureau warns renters [...]

Common Tech Support Scams and How to Avoid Them

These days, we live our lives online. Whether we’re ordering groceries or looking for new shoes, all we need to do is create an account, fill out some basic personal details and log in. But what happens when that account is compromised – or when we think that account is compromised? Maybe you get an [...]

What is Social Media Account Cloning?

When a scammer has the right information, they can easily impersonate you on social media by cloning your account. It’s pretty simple to do when much of the information that scammers need is publicly available on the real person’s profile. Criminals can use cloned social accounts to scam your friends, commit identity theft and even [...]

Avoid Fake Donation Sites Amid the Russia-Ukraine War

Times of tragedy often bring out acts of charity. But unfortunately, they also bring out scammers hell-bent on exploiting the situation. And the Russian-Ukraine War is no different. As Russia continues to invade Ukraine, more and more Ukrainians are getting displaced, and millions are fleeing the country. So, it makes sense for people to [...]

How to Avoid and Report Boss Scams

A boss scam is a phishing (email) or smishing (text messages) scam used by hackers. Hackers send fraudulent emails or texts in the boss scam, impersonating your boss or another executive. Information gathered through such scams can then be used for illegal activities and identity theft. The Better Business Bureau has warned the public [...]

How to Protect My Business from Identity Theft?

According to recent reports, identity theft is on the rise. Javelin Strategy reported identity theft resulted in an annual loss of $56 million in a mixed result of different criminal and fraudulent activities last year. When it comes to keeping your business database secure, there can be numerous challenges. If you are worried about [...]

SIM Swapping Attacks on the Rise- Here’s How to Keep Safe

SIM swapping, also called SIM splitting or hijacking, is a technique employed by online fraudsters to gain access to, seize and control a victim's phone number and SIM information. They gain access to the victim’s identity and information through their phone company and use the information to conduct theft and other fraudulent activities online. Recently, [...]

How Important are Phone Software Updates?

As annoying as software updates are on your phone, they are necessary to help protect you. With every update that you get, your phone's performance can improve. On the other hand, ignoring these updates can make your phone slow, hang frequently and be incompatible with different apps and software. It can also make your [...]

Can “Buy Now, Pay Later” Apps Be Trusted with My Personal Data?

It may be tempting to look for new ways to manage personal finances. For example, one of the latest credit options is to use a so-called “buy-now, pay-later” app, which can fund your purchase today and act as a digital layaway platform until you can fully repay the debt.  Considering this type of app is [...]

What Do You Need to Do When Your Employer Gets Hacked?

The risk of identity theft is a concept that most of us are probably familiar with given the rise of cybercrime and data breaches. Yet a new report by Identity Theft Resource Center and DIG. Works has revealed that most employees do little to protect themselves when they learn their personal information has been [...]

Can Robocalls Steal Your Identity?

Have you ever received a call to update your car warranty, but you have no car? Did the message sound like a recording? Well, that’s a robocall or an automated call. A robocall is a pre-recorded message delivered by a computerized dialer. These calls are often associated with telemarketing companies and political parties. But, [...]

How to Spot a Fake Shopping Website this Holiday Season

Americans are expected to spend $1.2 trillion this holiday season, with the majority of shoppers planning to buy most of their gifts online. Unfortunately, all that online spending is a huge motivator for scammers. Cyber-criminals set up fake shopping websites with the aim of selling consumers knockoff goods, stealing their information, or just taking their [...]

Gift Card Scams and How to Avoid Them

Gift cards can make for great gifts. They show your loved ones that you know their interests and give them the option to pick something of their own choice. They're an ideal gift for the upcoming holiday celebrations because they're an excellent way to work around product shortages and shipping delays. Problems with the [...]

8 Common Identity Theft Scams

Would you believe that incidents of identity fraud increased by more than 40% from 2019 to 2020? A report created by GIACT titled U.S. Identity Theft: The Stark Reality found financial loss related to identity theft rose by approximately 42% in 2020. With that huge increase, how can you protect yourself? The answer is [...]

Tips to Avoid Holiday Job Scams

During the holiday season, many begin looking to earn some extra cash by picking up some seasonal work. But all may not be merry and bright with scammers ramping up during the holidays. Along with legitimate “Now Hiring” signs dotting retail stores and restaurants across the United States, job ads are popping up in social [...]

What to Do If You’re a Victim of a Hospital Data Breach

A hospital in Worcester, Massachusetts, disclosed an email hack of its employee email system, which may have exposed the personal information of thousands of patients. Earlier this month, UMass Memorial Health alerted patients who were affected by the hospital data breach, according to the AP News. In a notice to affected patients, the hospital [...]

Why K-12 Schools Are Prime Targets for Cybercriminals

Private companies and large government agencies aren’t the only organizations that need to prioritize cybersecurity. Kindergarten through 12th-grade schools are also targeted by cybercriminals with hacks, ransomware, phishing scams, data breaches and more. According to the K-12 Security Information Exchange, last year set a record of cyber incidents in schools, with 408 disclosed incidents. [...]

October is Cybersecurity Awareness Month: Here Are 4 Cybersecurity Tips to Keep Protected

October is Cybersecurity Awareness Month and the theme for 2021 is “Do Your Part. #BeCyberSmart.” There’s never been a better time than right now to review the processes you have in place to avoid the latest cybersecurity risks lurking in the corners of our everyday digital lives. The top cybersecurity concerns for consumers regarding [...]

Scam School: Bad Practices on Social Media Could Put Your Identity at Risk

With the increased global use of social media, there are more opportunities than ever for scammers to steal identities or perpetrate fraud online. It can even put your family at physical risk. For example, did you know that your status updates posted on Twitter, Facebook, Instagram and many other social media sites can be [...]

How Independent Contractors Can Use Employee Identification Numbers to Help Prevent Identity Theft

If you’re a sole proprietor or independent contractor, there’s a good chance you’ve used your Social Security number (SSN) to conduct business. Whether you’re filing taxes, applying for a business credit card or other general business activities, sole proprietors often have to use a SSN when there isn’t an alternative. Unfortunately, using your SSN [...]

Protect Your Personal Documents to Avoid Medical Identity Theft

Personal medical documents are valuable assets. Unfortunately, that means criminals are after those documents, too. Medical documents may contain personal information that includes your name, location, contact information, insurance policies, Social Security number and history of medical treatment. Criminals can use this information to open fraudulent accounts or even receive medical treatment using your identity. Your [...]

Cloudstar Remains Compromised Following Ransomware Attack

Cloudstar, one of the title industry's primary cloud providers, remains compromised after a recent ransomware attack disrupted its services. The company also provides services to real estate, legal, insurance, financial services, petrochemical and the oil and gas industries. The Victim of a Ransomware Attack Here’s what happened, according to a notice on the Cloudstar [...]

Go to Top