In the News Posts

An #ITpsychic for a Day

An #ITpsychic for a Day

If you had a crystal ball and could predict the future, what would you foretell?

In the real world, we have to rely on our visionary leaders to predict the future as they see it unfold.

That’s why we were excited to chat with our Consumer Chief Information Security Officer Neil Daswani upon hearing that he would be making a bold prediction about information security at a recent event called secureCISO. Joining him in San Francisco were CISOs from Twitter, Maxim Integrated and SoFi, and industry expert Scott Shuster.

Don’t Let Identity Theft Become This Year’s Headliner

Don’t Let Identity Theft Become This Year’s Headliner

There are many things to get excited about as music festival season approaches—the release of lineups, finding the perfect outfits to slay in all weekend, booking the swankiest hotel or glamping site with your crew, and sunshine and filtered photos. But there’s one thing that could derail your fun: identity theft. Just ask the folks at Coachella.

The Internet of Things: Teddy Bear Edition

The Internet of Things: Teddy Bear Edition

Soft and sweet, but not very secure. That’s how you might describe the CloudPets “smart” teddy bear after news of yet another Internet of Things snafu. This one follows the February 2017 story about a potentially eavesdropping doll in Germany.

4 Types of Identity Fraud on the Upswing

4 Types of Identity Fraud on the Upswing

If you thought that the promising (albeit modest) drop in the total dollars stolen by identity thieves in 2015 was a harbinger of things to come, think again. According to the just released 2017 Identity Fraud Study from Javelin Research, the number of victims of this crime—in all its permutations—climbed to a record high of 15.4 million last year. And, despite the fact that the average amount per fraud went down, the total cost topped $16 billion, also an all-time high. What does that say about efforts to rein in identity thieves? “We’ve gotten pretty good at closing the door once the horse has left the barn,” says Al Pascual, Javelin senior vice president and head of fraud and security. But we need work when it comes to “barring the door” to begin with.

Stop the Phish: Three Steps to Enhance Your Company’s Security Posture

Stop the Phish: Three Steps to Enhance Your Company’s Security Posture

As you may know, phishing is a cyber-attack in which criminals bait their victims to take an action that allows the criminals to acquire sensitive information, such as usernames, passwords, and credit card numbers. Once criminals obtain the victims’ information, they can use it for any number of nefarious purposes, including to steal identities, empty bank accounts, and gain access to corporate networks and private email systems.

Spear-phishing is similar to phishing but targets a specific company, person or organization. The criminal crafts a context-specific campaign that increases the odds that their targeted victim will take the action they desire.