Identity Theft Steps to Take
Today's COVID-19 business environment has resulted in an increase of business related identity fraud for opportunistic scammers. As some business owners have been forced to close doors, identity theft criminals have been active in finding new sinister ways to defraud businesses. There are a few well known methods the scam artists are using to defraud
Nearly everyone is wearing a mask to help curb the spread of COVID-19. Its now perceived as an encouraging sign of commitment and responsibility to contain the threat of Corona virus where, in the past, even wearing a hood was discouraged. When it comes to identifying people, a mask creates an advantage for those who
Online shopping can be unavoidable with a pandemic at large. It is important to stay away from all the online shopping scams that exist today. Some scams have been around as long as the internet has been selling goods while new scam variations can pop-up frequently leaving no online transactions too safe to scrutinize. Fake
Payment apps have been around for a long time, but the use of them is growing exponentially in the United States. The most notable being Venmo, Cash App, and Zelle, all gaining popularity over the once dominant PayPal. While apps like Alipay and WeChat Pay are dominating the payment app space in China. PayPal was
Google's answer to facebook and other social media networks is Google Plus also known as Google+. Although the use of Google+ is not nearly as ubiquitous as facebook or Instagram, Google+ does have a significant number of users. Today, there are many reports of a massive data flaw that exposed the private data of Google+
A laptop is an easy target to obtain a nicely packaged source of sensitive personally identifiable information. It's almost a guarantee that your laptop contains your name, your address, your phone number, your email addresses, some passwords, some account information, and even the names of family members. It is a perfect package for an identity
LifeLock sells a security product designed to alert subscribers to any fraudulent activity by monitoring transactions from bank accounts, credit reports, credit cards, investment accounts, social security numbers, and crime databases. They sell 3 different packages that come with different levels of protection and reimbursement insurance for stolen funds. The lowest level has a stolen
When travelling for business or pleasure, it is important to consider the risks of your choice of method of payment which you will be using. Many business travelers like to use business credit cards for ease of tracking expenses, but, for personal use, it might also be easier to use cards also these days instead
Intercepting data from your cell phone can be done as easily as getting you to log into a "Free Wifi" network. As soon as you sign in to a network, any data that you send through the connection can be captured and used. When you sign into a new network on your laptop, Windows automatically