Identity theft isn’t new, but the ways criminals steal and use your personal information are constantly evolving. It’s more important than ever to understand the different forms it can take, especially the distinction between traditional identity theft and the newer, more sophisticated synthetic identity theft. We outline the two types of identity theft and the steps you can take to …
Safeguarding Your Workplace: Unveiling Strategies to Combat Identity Theft
In an era dominated by digital connectivity, the threat of identity theft looms larger than ever, necessitating proactive measures to safeguard against its costly and disruptive repercussions. Recently, Dr. Kim Miller, Ph.D., CFE, Director of Investigative Intelligence and Analysis at Porzio Compliance Services, a seasoned expert in public safety and leadership with a focus on criminal justice, and Diane Averell, …
Protecting Your Employees and the Workplace: Minimize Their Internet Footprint and Reduce Identity Theft
1/31/2024 | 12:00 PM – 1:00 PMWebinar Personal identifying information appears on the internet from many sources- property deeds, voter records, telephone directory listings, marketing subscriptions, newspaper articles, social media, to name a few. This internet footprint, combined with data breaches, leaves an individual vulnerable to identity theft, credit card fraud, and virtual and real-life harassment. Join Dr. Kim E. Miller, Director …
Unemployment Fraud and COVID-19: The Perfect Storm
No one ever thinks that identity theft can happen to them — especially over the course of the COVID-19 pandemic. Little did people realize that fraudsters never rest and that the COVID-19 pandemic created the perfect opportunity for stealing identities and wreaking havoc on people’s lives. As businesses shut down due to the health emergency, unemployment applications increased and created …
Information Security 101 : FBI K-12 Distance Learning Warnings and What to do next?
For most IT professionals working at K-12 schools, every day is challenging and even more so over the last 12 months. Porzio Compliance Services continues to receive inquiries from districts about what to do about these warnings.
The Impact of Technology in the K-12 Classroom and the Challenges of Protecting Student Information
Broad changes have been taking place both inside and out of the classroom as new applications and devices are being used by teachers to instruct students in person and online.
Employment Checks are Not Just for Pre-Employment
How do you reduce risk, perform due diligence, and get the most qualified person for the job? With the vigorous combination of background checks and ongoing employee checks during employment, this goal can be achieved. Hire a Licensed Private Detective/Certified Fraud Examiner to conduct the pre-employment and ongoing employment checks. People Change Employee background checks are no longer just for …
30 Minutes and Your Identity is Stolen!
Within 30 minutes of searching the Internet, a fraudster can find your personal information and begin the process of stealing or compromising your identity. Three Years to Three Months – How Soon Can You Tell If Your Identity Was Stolen? Based on Experian.com, it typically takes three months for the majority of people to discover they have been victims …
What is: Data Classification Policy
Data classification policies establish criteria for ranking data based on the resulting impact of loss or theft on an organization.
The California Consumer Privacy Act (“CCPA”) is Now Effective: What Does It Mean for Your Business?
Did you know? The California Consumer Privacy Act of 2018 (the “CCPA”), one of the most stringent and far-reaching consumer privacy laws in the country, became effective as of January 1, 2020. The CCPA significantly expands the privacy rights of California consumers by imposing new requirements on businesses to disclose what categories of personal information will be collected, the purpose …
- Page 1 of 2
- 1
- 2