Identity Theft Scout Blog

Get tips and advice for identity theft protection and prevention.

Read the most recent additions and updates to the website (just click on the permalinks below). Also subscribe to the RSS feed for notifications of our updates in the future.

If you have any questions or feedback please feel free to contact me!

Critical Reason To Sell EU GDPR Security To Your Board

The number one reason that organizations must comply with the European Union's General Data Protection is this:

Organizations found in breach of the Regulation can be fined up to Euros 20 million or four percent of global annual turnover - whichever is the greatest. It is clear that the cost on non compliance will far exceed the cost of ensuring an organization complies with the regulation. Taking advantage of the phasing in period is critical so that an organization's products, policies and procedures comply by implementation date of May 25, 2018.

Here is some help:

United Kingdom

United States

Continue reading "Critical Reason To Sell EU GDPR Security To Your Board"

The General Data Protection Regulation (GDPR) Applies 25 May 2018- Plan For It Now

The European Commission has introduced the GDPR effective 25 May 2018. It is a substantial change to strengthen and unify data protection for individuals within the European Union(EU).It will mean that you will have a two year transition period as it will replace the data protection directive 95/46/EC from 1995. It also applies to the export of personal data outside of the EU. If you are engaged with international transactions with the EU then it affects you and your business.The GDPR has strict data protection compliance requirements with severe penalties for businesses non compliance of up to 4% of worldwide turnover. It is very clear that non compliance is a substantial operational risk that needs to be addressed.Our strong recommendation to you and your business is that you start to understand this change now and plan for its implementation.Here are some sources of information about GDPR that you can obtain easily along with support for your IT Governance.

www.identity-theft-scout.com is participating in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for sites to earn advertising fees by advertising and linking to amazon.com.

We also disclose that wwww.identity-theft-scout.com is participating in the IT Governance.com affiliate program.

Continue reading "The General Data Protection Regulation (GDPR) Applies 25 May 2018- Plan For It Now"

SMEs Need To Use Penetration Testing Regularly - 5 Reasons Why

Critical to the Success of every online enterprise is the protection of their data, Here are our top 5 reasons you need to conduct penetration testing of your information technology systems:

1. Protecting the data on which your business relies on to make a profit is a fundamental risk management process.

2. Hacking happens to businesses every day, both large and small. If it has not happened to your business yet, it will. Do you know the daily cost to your business of the lack of access to your operational data? It is critical that you do!

3. Penetration testing is the cheapest form of cyber insurance because it helps prevent disaster by identifying where hackers can access your information technology (IT) hardware and software.

4. Once you have identified the weaknesses in your IT systems you can close the entry points whereby attackers may gain access to your systems.

5. Penetration testing also looks at your products, policies and procedures in relation to staff training that will impact on the cyber security of your business.

If you would like to know more about IT Governance click on the link below:

We liked IT Governance's material so much we became affiliates.

Private Virtual Networks Help

How private virtual networks can help to protect your online activity.

Continue reading "Private Virtual Networks Help "

Understanding How VPN Security Works

VPN security secures your sensitive information from prying eyes by encrypting your files and data.

Continue reading "Understanding How VPN Security Works"

99 Things You Wish You Knew Before Your Mobile Device Was Hacked

We are supporting Robert Siciliano’s community education program by posting extracts from his book with his permission.

How are mobile devices are changing the game

How are mobile devices are changing the game

Mobile Cybercrime

Mobile Cybercrime 2

Mobile Cybercrime 3

Mobile Cybercrime

99 Things You Wish You Knew Before Your Mobile Device Was Hacked

99 Things You Wish You Knew Before...Your Identity Was Stolen

Disclosure: www.identity-theft-scout.com is participating in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for sites to earn advertising fees by advertising and linking to amazon.com.

5 reasons to use Bitdefender Antivirus Plus for protecting yourself from cybercrime

Bitdefender Antivirus Plus 2014 is the most up-to-date in internet security from Softwin, which can protect you from cybercrime. Here we list 5 reasons why you should use Bitdefender Antivirus Plus:

- Bitdefender Antivirus Plus defends you and your PC from numerous online threats which include viruses, spyware, phishing scams, and much more.

- This anti-virus program works more effectively and successfully blocking, removing and preventing malware infections.

- It is not simply antivirus software; it monitors privacy settings on Facebook and Twitter.

- Bitdefender Safepay feature runs all bank account activity in a separate, secure browsing session.

- Customer Help and Support includes: live chat, email and phone support.

Click here to get your Bitdefender Antivirus Plus 2014 from Amazon.com

Disclosure

www.identity-theft-scout.com is participating in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for sites to earn advertising fees by advertising and linking to amazon.com.

Five reasons why having a USB Charger for Your Mobile Device Matters

A robust USB charger offers the ability to charge your mobile devices anytime and anywhere. Here we list 5 reasons why having a USB Charger for Your Mobile Device Matters!

- No more batteries running out. You can simply plug in your mobile device to the Power Bank via USB and get your device charged.

- Much needed tool for Travelers. Portable USB phone charger is especially useful if you travel a lot where the power is not reliable.

- USB charger is fantastic to have if you live in areas with severe storms. You are able to charge your phone up to four or five times with a powerful USB charger if there is a power outage.

- You can charge multiple mobile devices at a time with your USB power bank.

- You can charge most types of mobile devices via USB.

Click here to check this portable USB mobile device charger on Amazon.com

Disclosure

www.identity-theft-scout.com is participating in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for sites to earn advertising fees by advertising and linking to amazon.com.

How To Check If A Site Is Safe From Heartbleed

How to protect yourself from #Heartbleed if of great interest to all internet users. Robert Siciliano has written an article in the Huffington Post about McAfee's free software to check the vulnerability of your blog or website. Access to the free tool is here:http://tif.mcafee.com/heartbleedtest . However, I recommend that you read the article. By following this link: http://www.huffingtonpost.com/robert-siciliano/heartbleed-free-tool-to-c_b_5137993.html

With the author’s consent we are publishing extracts from Robert Sicliano's excellent books. If you wish to comment on an extract or share an identity theft story click here.

United States
United Kingdom

If you would like to comment or share a story about identity theft please click here.

Submissions are subject to editorial approval prior to publication.

John Cosstick

Continue reading "How To Check If A Site Is Safe From Heartbleed"

Protect Your Identity While Travelling - Ten Tips

Learn how to stay safe from identity theft while you are travelling.

Continue reading "Protect Your Identity While Travelling - Ten Tips"

What To Watch Out For In Emails

Robert Siciliano is one of the leading advocates for consumer protection in relation to cyber security. In his recent post to Huffington Post's Tech Blog he looked at 11 ways a consumer could protect himself.

Emails are one of the main ways computer hackers can gain access to your computer and knowing what to watch out for is an important step forward.

Robert has written the book "99 Things You Wish You Knew Before Your Mobile Device Was Hacked" You can buy a Amazon Kindle edition here:

United States

United Kingdom

John CosstickModerator

Continue reading "What To Watch Out For In Emails"

What Identity Theft Really Costs You (Part 2)

This article has been contributed by Jessica Norman from How Much Is It.

http://www.howmuchisit.org/

Cost of creditworthiness

The obvious real-world impact of identity theft is in the obliteration of your credit worthiness. Suddenly you will be needing to keep more money inyour bank accounts or worse you will no longer allowed to write checks or to use your debit card at a certain level. If you get victimized from identitytheft you will have fewer options for your banking needs. It would become harder to exist because you have doubts when you transact with financial institutions.

Cost of peace

You are suddenly pushed into the spotlight when you get victimized by identity thieves. If you are enjoying your life in peaceful seclusion you suddenly find yourself in the middle of chaos all because someone made a mess out of your identity by putting the blame on you for something somebody else did.

Cost of a simple life

When you are a victim of identity theft ,your life changes forever. You are constantly worried that someone somewhere may be using your identity to commit crimes. You can no longer have that simple life choice where you live a quiet life. You will be spending the rest of the days figuring out how to straighten out the mess that was caused by somebody else.

It pays to be vigilant and to observe identity security at all times. Restrict the information that you make public online. Limit your banking transactions online and to make sure that you correspond with legitimate sites to prevent phishing that happens when you transact with posers on the Internet. It is better to be safe than sorry.

Jessica Norman is from How Much Is It -- a large collection of cost reduction help guides. Whether you want to know the pricing of something finance related or a specific surgery, there's a good chance it's there.

Moderator's Comments

This is the second half of Jessica's contribution. The first half is in the previous blog post.

If you would like to visit:

If you would like to visit:here or copy and paste http://www.howmuchisit.org/

If you would like to learn more about identity theft prevention then click on the icon below.

John Cosstick

Moderator

Continue reading "What Identity Theft Really Costs You (Part 2)"

What Identity Theft Really Costs You (Part 1)

This article has been contributed by Jessica Norman from How Much Is It http://www.howmuchisit.org/.

What Identity Theft Really Costs You

Identity theft is a real and present danger. About 60 percent of Americanshave become victims and some of them are continually exposed to the risks.When you get a better understanding about identity theft and how much itcould cost you then you have better coping skills on to prevent identitythieves from victimizing you.

Cost of time

There is a victim in South Africa whose identity was stolen in 2008. This man has been spending hours in dealing with people to rectify the damage that has been done. The identity thief used the victim's ID number to take out numerous loans that the victim was not aware of. As a consequence the victim isbeing accused of defaulting loans which obliterated his credit profile.This man has spent more than 100 thousand in South African Rand and worselost productivity hours just to clear his name. As we all know time isgold. Even if you have all the proof in the world, it can take agesbefore everything is finalised.

Cost of reputation

When your identity gets stolen one of the things that gets affected isyour reputation. All of a sudden you are tagged as someone that is unscrupulous even if you did nothing to deserve the negative perception. Often victims of identity theft become victims of two separate crimes. The crimes are the obvious identity theft and having your good name besmirched for something that you did not commit. The sad part is that 47 percent of victims know the perpetrators.

Moderator's Comments

This is the first half of Jessica's contribution. The second half is in the next blog post.

If you would like to visit:here or copy and paste http://www.howmuchisit.org/

If you would like to learn more about identity theft prevention then click on the icon below.

John Cosstick

Moderator

Continue reading "What Identity Theft Really Costs You (Part 1)"

Simple tips to avoid cyber threats when bringing your own device to work - Part Two

The use of passwords: When you are at your work place, you will never know who accesses your device without your knowledge. Installing a password on your device ensures that only you have access to your device hence reducing the risk of it getting infected with viruses and Trojans. This helps in cases of peer-to-peer file sharing systems too. Enabling your device with a password of code will ensure that you can approve the type of information you receive from others on a network.

Do not set your device to automatically run programs or open devices. The macro virus is one of the growing threats to data and is spread through word processors such as word and spread sheet programs. For this case, configure your browser to launch word pad or Notepad instead of MS Word through its email program. When it comes to devices such as flash drives, ensure that auto run on your computer does not open automatically. This allows you to first scan the contents of a device before launching them on your computer.

Enable automatic windows updates to your computer. If your computer cannot do this on its own, you can download updates constantly to ensure that your operating system is patched from vulnerabilities.

See more tips in the first section of this article.

About the author Julie Fernandez: Julie is a passionate blogger from London. Julie is fascinated about technology and loves to write articles on the subject. She is currently doing research on Norton Guide. Julie suggests everyone to have Norton Contact in order to protect their apps from hacking and cybercrimes.

Continue reading "Simple tips to avoid cyber threats when bringing your own device to work - Part Two"

Simple tips to avoid cyber threats when bringing your own device to work

Companies whose staff use the Internet require to take certain measures to avoid cyber threats which can cost a lot of money and valuable data. One of the measures include forbidding workers to use personal computers at the work place. If this is not forbidden, however, one can use their own devices such as flash disks and laptops at work. To avoid being a victim to cyber threats, one should ensure that their device is installed with an anti-virus. One is the Norton anti-virus by the Symantec corp which can be used to detect and eliminate spyware from your computer. Norton automatically sends its product updates which keeps the installed version up to date. It also has a customer support center and offers a Norton Contact Centre

for those wishing to get help or added information about a product.

Another way to avoid threats when working with your device at work is to avoid clicking on links or going to sites that are not approved. Most work places create a linked work network that allows sharing of information to all computers on the network. Unfortunately, this can also lead to sharing of Malware and Spyware. When you take your device to work, avoid opening links or websites that are not approved. You can do this effectively by turning on your firewall which will only connect your computer to networks that are allowed by you.

Sharing of certain devices can also expose your device to cyber threats. When you use a contaminated hard drive or flash drive on your personal computer at work, you risk contaminating it too. To avoid this, make sure that anything you use on or with your own device is clean by scanning it for viruses. If infected, you should clean it before use.

About the author Julie Fernandez: Julie is a passionate blogger from London. Julie is fascinated about technology and loves to write articles on the subject. She is currently doing research on Norton Guide. Julie suggests everyone to have Norton Contact in order to protect their apps from hacking and cybercrimes.

See more tips in the second of this series.

Continue reading "Simple tips to avoid cyber threats when bringing your own device to work"

Are You A Business Owner Who Believes That What You Don't Know Can't Hurt You?

Robert Siciliano in his excellent book "99 Things You Wish You Knew Before Your Identity Was Stolen" at Item #1 Robert asked this question "What are the six basic categories of identity theft?". I could not answer immediately. Robert went on to explain that in his experience the six basic categories of identity theft are:

1. New Account Fraud

2. Account Takeover Fraud

3. Criminal Identity Theft

4. Identity Cloning

5. Medical Identity Theft

6. Business or Commercial Identity Theft

I now have Robert's book. If you are in business it is important that you understand identity theft and how to minimize the possibility of you or your business being a victim. It is simply better risk management.

John Cosstick

Moderator

Continue reading "Are You A Business Owner Who Believes That What You Don't Know Can't Hurt You?"

What Is The Value Of The Assets On Your Mobile Device

Important share from Robert Siciliano and McAfee. Imagine that you held on your laptop computer the required software and data to run a business that produces,say,$10,000 income p.a.. If you capitalize this at,say, three per cent the answer is $333,333.00 (unless my calculator is wrong). Important issue! More information here :http://www.identity-theft-scout.com/laptop-security.html

If you would like read more about mobile device security I recommend that you obtain a copy of Robert Siciliano's book "99 Things That You Wish You Knew Before Your Mobile Device Was Hacked" which you can obtain from either: http://bit.ly/12pQpGL (Barnes & Noble: Books) OR http://amzn.to/127vy6e (Amazon Kindle : eBooks)

Regards

John CosstickModerator

Continue reading "What Is The Value Of The Assets On Your Mobile Device"

Senior citizen

On or about Sep 24, 2012, I received a letter in the mail from Brooklyn, NY. The New York City police department was seeking payment on a parking ticket

Continue reading "Senior citizen"

Cyber Bullying: The Threat Of Online Bullying

Cyber Bullying occurs when someone uses the internet, mobile phones or other digital technologies to threaten others.

Continue reading "Cyber Bullying: The Threat Of Online Bullying"

The Best Internet Security Software: Tips for Your Selections

Tips for choosing the best internet security software for your needs.

Continue reading "The Best Internet Security Software: Tips for Your Selections"

Why You Shouldn't Leave Your Laptop In Your Car

Do You Leave Your Laptop In Your Locked Car? I received this email from a friend: Quote: I locked my car. As I walked away I heard my car door unlock.

Continue reading "Why You Shouldn't Leave Your Laptop In Your Car"

Top 5 Reasons Why Radio Frequency Identity Theft Prevention Matters

RFID or radio frequency identification has always been mired in controversies. Ever since the RFID cards made way into the public domain, there have been numerous questions over its security and speculations have always been high if these RFID cards are viable for widespread use. With the increase in use of RFID cards today when the financial industry is mulling over the idea to replace swipe cards and access cards already using radio frequency widely around the world, debate on the radio frequency identity theft has gained prominence once again.Here are top 5 reasons why radio frequency theft prevention matters.

Compromising Personal Details

People who have enough technical knowledge can easily use radio frequency from a distance to procure personal details that are encrypted on RFID cards. A victim would be compromising on his name, social security and every other information that is on the card.

Invasion Of Privacy

Radio frequency identity theft which is also known as electronic pick pocketing can seriously jeopardize anyone’s privacy. Not only can someone obtain personal details but even minute details such as employment status, families and all details of a person pertaining to his history, present whereabouts and also financials.

Financial Fraud

Talking about financial details, radio frequency identity theft can easily lead people to obtain credit card, debit card and other banking information which can then lead to banking frauds, fraudulent transactions and the possibilities are virtually endless.

Passport Fraud

With passports that use radio frequency, there can be a serious identity issue. People can remotely scan passports or steal information and use the exact details to emulate a similar passport for a different individual. There have already been cases in Germany and the UK where a group of people have stolen data from numerous passports that use radio frequency.

Legal Troubles

Radio frequency identity theft can lead people into legal troubles for crimes they may not have been involved in. Emulating access cards, credit cards and passports can seriously endanger anyone’s life.

Radio Frequency Identity Theft Prevention Matters

Thus, it is not subject to any imagination that radio frequency identity theft prevention matters and as of now, RFID blocking wallets are the only solutions.

Amazon are now marketing RFID Blocking Products which can be checked out herehttp://amzn.to/LavZZ1

Continue reading "Top 5 Reasons Why Radio Frequency Identity Theft Prevention Matters"

NZ Young People Deserve Better

We have a high rate of youth suicide here in New Zealand. One of our justice ministers has pushed for the law commission to act now over cyberbullies.

Continue reading "NZ Young People Deserve Better"

IT SHOULDN'T HAVE TO BE LIKE THIS!

Recently, my children's school asked for the students to bring in photos of themselves using the computer. The photos would be used for an ICT display

Continue reading "IT SHOULDN'T HAVE TO BE LIKE THIS!"

You are right -- the expense is worth the peace of mind...

Just read the article about identity theft insurance and had to post and tell you what I think. I have never been a victim of identity theft so why should

Continue reading "You are right -- the expense is worth the peace of mind..."

Computer Hacking a Serious Threat to Your Identity Security

Computer hacking poses a serious threat to your identity security, for obvious reasons.

Continue reading "Computer Hacking a Serious Threat to Your Identity Security"

Is Your Wi-Fi Hacking Welcome Mat Out?

Robert Siciliano has written another important blog post about the vulnerabilities of business Wi-Fi networks to hacking.

If you have left the security settings of your Wi-Fi network untouched or on default than these is more than a good chance that a hacker driving down the street in a car can get access to your computer systems. It is hard to believe isn't it?

These are three questions that you need to ask yourself:

- is the details of your business banking accessible through your computer?

- are the personal details of owners and/or employees payroll banking details on your computer?

- who bears the liability for any loss if a case of identity theft occurs if the security of your business computer is breached?

If you want to read more about hacking then follow this link:

http://www.identity-theft-scout.com/computer-hacking.html

If you have a comment please use the form below.

Regards

John Cosstickhttp://www.identity-theft-scout.com/

Continue reading "Is Your Wi-Fi Hacking Welcome Mat Out?"

About Identity Theft Scout

About Identity Theft Scout

Continue reading "About Identity Theft Scout"

New! Comments

Have your say about what you just read! Leave me a comment in the box below.