Tag "Identity Theft"

Back to homepage
Identity Theft Software

Phished credentials caused twice as many breaches than malware in the past year

Personal device use for remote work poses the biggest security risk to organisations safeguarding their increasingly mobile and cloud-based IT environment, according to a new survey of 100 UK-based senior

Identity Theft

Identities Are The New Security Perimeter

There’s been a 135% year-over-year increase in financial data for sale on the Dark Web between the first half of 2017 and the first half of 2018. The Dark Web is now

Identity Theft

Machine Identity Failings Expose Firms

Nearly all IT decision makers believe that protecting machine identities is as important or more important that human identity management, but most struggle to deliver that protection, according to a

Identity Theft

The Consequences Of The Superdrug Data Breach

It was reported that Superdrug had warned its online customers to change their passwords after criminals claimed to have obtained their personal details. The chain said the group claimed they had stolen details of

Identity Theft

Breaking the credential reuse cycle

Using the same password after a data breach can put your accounts and data at great risk. Data breaches affecting large online service providers persist even as these incidents bring

Identity Theft

Making informed decisions: The importance of data driven security

When deciding what product to buy, the information the vendor offers about the product is helpful, but not nearly enough: you need to analyze individual product results and peruse comparative

Identity Theft

Cyber-Security: Preventing live chat data breaches

Whether you’re employing live chat operators or chatbots, protecting your business from a data breach has never been more important. Ticketing retailer Ticketmaster disclosed “a widespread hack that compromised the

Identity Theft

How to Stop Employee Theft and Fraud Before It Happens

Employee theft and fraud are one of the most pervasive causes of loss among business owners. They are also highly preventable, and with Ongoing effective leadership, employees will often feel obligated

Industry Insights

Back to Basics: Retro Cybersecurity Lessons Still Matter

We are all too familiar with the game of leapfrog being played between cybersecurity personnel and hackers as stories of data theft, identity theft and malware are reported daily. Luckily,

Identity Theft

How did the TimeHop data breach happen?

Compromise of an employee’s credentials, lack of multi-factor authentication, and weak insider threat analysis all played a factor in the recent TimeHop data breach in which 21 million user accounts