Safeguarding Your Workplace: Unveiling Strategies to Combat Identity Theft

In an era dominated by digital connectivity, the threat of identity theft looms larger than ever, necessitating proactive measures to safeguard against its costly and disruptive repercussions. Recently, Dr. Kim Miller, Ph.D., CFE, Director of Investigative Intelligence and Analysis at Porzio Compliance Services, a seasoned expert in public safety and leadership with a focus on criminal justice, and Diane Averell, …

Protecting Your Employees and the Workplace: Minimize Their Internet Footprint and Reduce Identity Theft

1/31/2024 | 12:00 PM – 1:00 PMWebinar Personal identifying information appears on the internet from many sources- property deeds, voter records, telephone directory listings, marketing subscriptions, newspaper articles, social media, to name a few. This internet footprint, combined with data breaches, leaves an individual vulnerable to identity theft, credit card fraud, and virtual and real-life harassment. Join Dr. Kim E. Miller, Director …

Unemployment Fraud and COVID-19: The Perfect Storm

No one ever thinks that identity theft can happen to them — especially over the course of the COVID-19 pandemic. Little did people realize that fraudsters never rest and that the COVID-19 pandemic created the perfect opportunity for stealing identities and wreaking havoc on people’s lives. As businesses shut down due to the health emergency, unemployment applications increased and created …

Employment Checks are Not Just for Pre-Employment

How do you reduce risk, perform due diligence, and get the most qualified person for the job? With the vigorous combination of background checks and ongoing employee checks during employment, this goal can be achieved. Hire a Licensed Private Detective/Certified Fraud Examiner to conduct the pre-employment and ongoing employment checks. People Change Employee background checks are no longer just for …

30 Minutes and Your Identity is Stolen!

Within 30 minutes of searching the Internet, a fraudster can find your personal information and begin the process of stealing or compromising your identity.   Three Years to Three Months – How Soon Can You Tell If Your Identity Was Stolen? Based on Experian.com, it typically takes three months for the majority of people to discover they have been victims …

The California Consumer Privacy Act (“CCPA”) is Now Effective: What Does It Mean for Your Business?

Did you know?  The California Consumer Privacy Act of 2018 (the “CCPA”), one of the most stringent and far-reaching consumer privacy laws in the country, became effective as of January 1, 2020. The CCPA significantly expands the privacy rights of California consumers by imposing new requirements on businesses to disclose what categories of personal information will be collected, the purpose …

Finding Vulnerabilities is a Good Thing

No matter how cautious a company is in designing and defending its information security systems, there is always the potential for data breaches and cybersecurity incidents. One method to find these vulnerabilities before a threat actor does is to test your security using some of the same techniques that criminals do, first. Penetration tests cause no actual damage if conducted by a reputable professional, and can be a vital tool for understanding a particular weakness in more than Information Technology systems.