1/31/2024 | 12:00 PM – 1:00 PMWebinar Personal identifying information appears on the internet from many sources- property deeds, voter records, telephone directory listings, marketing subscriptions, newspaper articles, social media, to name a few. This internet footprint, combined with data breaches, leaves an individual vulnerable to identity theft, credit card fraud, and virtual and real-life harassment. Join Dr. Kim E. Miller, Director …
The FBI, CISA, and the MS-ISAC released a Joint Cybersecurity Advisory, “StopRansomware: Vice Society”
Recently, the Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), and the MultiState Information Sharing and Analysis Center (MS-ISAC) released a joint advisory regarding increased criminal activity directed toward information systems and student data of K-12 Schools.
Unemployment Fraud and COVID-19: The Perfect Storm
No one ever thinks that identity theft can happen to them — especially over the course of the COVID-19 pandemic. Little did people realize that fraudsters never rest and that the COVID-19 pandemic created the perfect opportunity for stealing identities and wreaking havoc on people’s lives. As businesses shut down due to the health emergency, unemployment applications increased and created …
The Impact of Technology in the K-12 Classroom and the Challenges of Protecting Student Information
Broad changes have been taking place both inside and out of the classroom as new applications and devices are being used by teachers to instruct students in person and online.
Employment Checks are Not Just for Pre-Employment
How do you reduce risk, perform due diligence, and get the most qualified person for the job? With the vigorous combination of background checks and ongoing employee checks during employment, this goal can be achieved. Hire a Licensed Private Detective/Certified Fraud Examiner to conduct the pre-employment and ongoing employment checks. People Change Employee background checks are no longer just for …
30 Minutes and Your Identity is Stolen!
Within 30 minutes of searching the Internet, a fraudster can find your personal information and begin the process of stealing or compromising your identity. Three Years to Three Months – How Soon Can You Tell If Your Identity Was Stolen? Based on Experian.com, it typically takes three months for the majority of people to discover they have been victims …
The California Consumer Privacy Act (“CCPA”) is Now Effective: What Does It Mean for Your Business?
Did you know? The California Consumer Privacy Act of 2018 (the “CCPA”), one of the most stringent and far-reaching consumer privacy laws in the country, became effective as of January 1, 2020. The CCPA significantly expands the privacy rights of California consumers by imposing new requirements on businesses to disclose what categories of personal information will be collected, the purpose …
Finding Vulnerabilities is a Good Thing
No matter how cautious a company is in designing and defending its information security systems, there is always the potential for data breaches and cybersecurity incidents. One method to find these vulnerabilities before a threat actor does is to test your security using some of the same techniques that criminals do, first. Penetration tests cause no actual damage if conducted by a reputable professional, and can be a vital tool for understanding a particular weakness in more than Information Technology systems.
A Risk Assessment Will Identify a Path to Success
A risk assessment is a process to uncover gaps and to document a road map for better cybersecurity practices and organizational resilience. It can often determine the cost and likelihood of an incident while quantifying the need for security spending.
Incident Response Planning: Having a Play in Your Playbook
An Incident Response Plan is an operational playbook that helps minimize the financial and reputational impact caused by an incident for an organization. By creating an Incident Response plan and team, organizations respond better to cybersecurity incidents, quickly resuming normal business operations, and promptly alerting relevant stakeholders, authorities, and regulatory agencies to meet all regulatory requirements.