<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:g-custom="http://base.google.com/cns/1.0" xmlns:media="http://search.yahoo.com/mrss/" version="2.0">
  <channel>
    <title>identitytheftsolutionstx.com</title>
    <link>https://www.identitytheftsolutionstx.com</link>
    <description />
    <atom:link href="https://www.identitytheftsolutionstx.com/feed/rss2" type="application/rss+xml" rel="self" />
    <image>
      <title>identitytheftsolutionstx.com</title>
      <url>https://irp.cdn-website.com/275cfcce/dms3rep/multi/file-6b8f2114.png</url>
      <link>https://www.identitytheftsolutionstx.com</link>
    </image>
    <item>
      <title>Leave Survivors Passwords to Resurrect Your Digital Life</title>
      <link>https://www.identitytheftsolutionstx.com/leave-survivors-passwords-to-resurrect-your-digital-life</link>
      <description />
      <content:encoded>&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/275cfcce/dms3rep/multi/Gary+Kasper-+FB2+%281%29.png" alt="A person is holding a shield with a padlock on it."/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
            Survivors generally desperately want to honor the last wishes of loved ones who have died. That's problematic when final wishes haven't been shared. An absence of guidance can double the pain of losing a dear friend or relative.
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           The same is true if you agree to manage their estate. You can't imagine some of the questions that will hit you if you're appointed executor. You won't even realize you lack the answers until it's too late.
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           Survivors struggling with grief don't need the added burden of an informational scavenger hunt, but in today's world, they run into one significant obstacle—
          
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.idshield.com/blog/password-safety/planning-your-estate-digital-world" target="_blank"&gt;&#xD;
      
                      
           accessing the digital records left behind
          
                    &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           . Increasingly, digital devices contain the primary history of the life someone lived, and those files probably need a guardian as much as any minor child would.
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h2&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           Misconceptions Abound
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h2&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            When someone dies, it can be difficult to
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.idshield.com/blog/password-safety/password-privacy-reduces-risks-financial-theft-and-account-takeover" target="_blank"&gt;&#xD;
      
                      
           gain access to password-protected
          
                    &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            phones and laptops. A death certificate is rarely enough. Further, a simple photo won't unlock that device via facial recognition.
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            Don't believe friends who tell you a funeral home can help access someone's smartphone after death. Many biometric evaluations run on infrared sensors or radio frequencies. These days, facial recognition programs can evaluate heat signatures or signs that the owner is paying attention to the screen.
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.idshield.com/blog/internet-privacy/open-your-eyes-and-ears-understanding-biometrics-risks" target="_blank"&gt;&#xD;
      
                      
           Biometrics that measure electrical conductivity
          
                    &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            may be hindered; the body's currents are no longer present.
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           Fingerprints won't be easy to utilize after death, either. Today, one major smartphone company disables Touch ID if it's not used in 48 hours also.
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           If you're close to a person in failing health and know you're designated to manage their final accounts, discuss how to gain access to all digital records. Being well-prepared will deliver peace of mind to both of you.
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           Discuss adding a second individual's fingerprints to devices before the need arises. In addition, some smartphones will allow you to add one additional face to your Face ID unlock formula to cover issues such as unexpected death.
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h2&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           The No. 1 Reason You Can't Find a Will
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h2&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           You'd think that more individuals would write Wills or establish estate plans. Unfortunately, the numbers tell a different story. A tally of Americans who've executed a Will decreased significantly over the last four years, and the numbers were surprisingly low before that decline.
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           Only 1 in 3 Americans has prepared a Will to guide survivors, according to a 2021 industry survey. Check this list of well-known folks who died without a Will—many worth millions: Jimi Hendrix, Pablo Picasso, Michael Jackson, Prince, Abraham Lincoln, Martin Luther King Jr. and Amy Winehouse. They all died without executing legal papers—a situation known as dying intestate. In these instances, estate wrangling and litigation have been costly.
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h2&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           Documents Survivors Need
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h2&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           Here's a shortlist of documents a single company might require from the executor or personal representative before they'll even disclose the balance of a deceased person’s 401(k) account:
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            Social Security card or an official document including the complete number 
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            A bill with the deceased's current address to confirm their last residence
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            Birth certificate(s) for the dead and any children
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            Death certificate
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            Marriage papers, if applicable
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            Divorce documents, if applicable
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            A driver's license or photo ID for the deceased
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            Letters of Appointment for the executor or personal representative
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            Collecting these documents to determine assets requires real detective work. The same is true for debts. If you inherit stacks of disorganized papers and need help locating vital pieces, this task becomes daunting. For example, most of us can't find our own
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.idshield.com/social-security-number-protection" target="_blank"&gt;&#xD;
      
                      
           Social Security cards
          
                    &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           , so what are the odds an executor can successfully locate one for the departed?
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           Each institution establishes its own rules. Some credit card issuers require a death certificate to cough up data, for example. Others don't. One gatekeeper may want to see photo IDs while another will disclose details immediately for someone identified as a close relative. Even the decedent's cat's health insurance provider might require official records to access the kitty's policy.
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h2&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           What To Know About Device Lock Out
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h2&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           Hopefully, some written instructions can guide you. When your father, daughter, brother or cousin dies without a Will, there is no road map. If estimates are correct, the average person holds 100 or more online accounts. That's a lot of data to comb through, even when you've located the needed credentials for access.
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            Cell phone and email providers
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.idshield.com/remembering-managing-and-securing-your-passwords-idshield" target="_blank"&gt;&#xD;
      
                      
           aren’t likely to hand over passwords
          
                    &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           . They're serious about privacy even if the departed probably isn't entitled to protection.
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            ﻿
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Wed, 12 Jan 2022 18:12:18 GMT</pubDate>
      <guid>https://www.identitytheftsolutionstx.com/leave-survivors-passwords-to-resurrect-your-digital-life</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>What is Risk-Based Vulnerability Management?</title>
      <link>https://www.identitytheftsolutionstx.com/post/what-is-risk-based-vulnerability-management1a569e11</link>
      <description>Risk-based vulnerability management (RBVM) is a cybersecurity  strategy in which organizations prioritize remediation of software ...</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
          Risk-based vulnerability management (RBVM) is a cybersecurity  strategy in which organizations prioritize remediation of software  vulnerabilities according to the risk they pose to the organization. A  risk-based vulnerability management strategy has several components.
         
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
          The need for risk-based vulnerability management
The need for risk-based vulnerability management is driven by the fact
          
                    &#xD;
    &lt;a href="https://www.kennaresearch.com/research/"&gt;&#xD;
      
                      
           that large enterprise networks contain more vulnerabilities than their cybersecurity teams can fix
          
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
          .   Simply put, the scale of vulnerability management at large  organizations makes the practice challenging. Cybersecurity executives  at large organizations can manage, on average, 80,000 IT assets  including laptops, servers, routers, and internet-connected printers.  Combined, these assets may hold 40 million vulnerabilities. However,  research by Kenna Security shows that companies have, on average, the  capacity to remediate just one out of every ten vulnerabilities on their  systems. 
Traditionally, organizations prioritized the vulnerabilities they  needed to patch according to a mix of gut feeling, regulatory and  compliance needs, and the theoretical damage a successful attack could  do. For example, one common metric, the Common Vulnerability Scoring  System (CVSS), scores vulnerabilities according to the damage it would  do if exploited. But many vulnerabilities with high CVSS scores pose  little or no risk of exploitation. Patching a vulnerability that is not  likely to be exploited represents a waste of scarce resources.
Sounds pretty hopeless right? It certainly has been for many  companies, but that’s where risk-based vulnerability management comes  in. If you look at the behavior of real-world hackers, they attack only a  small subset of security flaws. Our research indicates that
          
                    &#xD;
    &lt;a href="https://www.kennasecurity.com/prioritization-to-prediction-report-volume-two/"&gt;&#xD;
      
                      
           only 5 percent of enterprise vulnerabilities have known exploitation events
          
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
          .  Therefore, organizations can drastically improve their security and  minimize their risk by identifying and remediating the small subset of  vulnerabilities prone to exploitation. 
How to succeed with a risk-based vulnerability management program
The success of risk-based vulnerability management depends on the  quality of the data used to predict exploitability. Since 2009, data  scientists at
          
                    &#xD;
    &lt;a href="https://www.kennasecurity.com/"&gt;&#xD;
      
                      
           Kenna Security
          
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
          have worked to identify the factors threat actors use when choosing  which vulnerabilities to exploit and weaponize. Some examples of the  factors that predict weaponization of an exploit include:
         
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
          With knowledge of which factors make a vulnerability more likely to  be exploited, security teams can not only prioritize vulnerabilities  that pose an immediate risk but also patch software flaws before an  exploit is developed. 
The risk-based vulnerability management revolution
Risk-based vulnerability management is revolutionizing the way large  organizations approach vulnerability management. By prioritizing  vulnerabilities likely to be exploited, a risk-based system drives  tremendous efficiency gains while improving risk posture. To be clear, a  risk-based vulnerability strategy will leave some vulnerabilities  unpatched but allows companies to do so with confidence that these  weaknesses pose an acceptably low level of risk to the overall security  of the company. It is this ability to delay work that opens up  efficiency gains and reduces the risk of IT outages due to excessive  change. At the same time, security risk is reduced. Risk-based  vulnerability management really is a win-win for IT and Security.
Written and published By Kenna, Jason Rollesten, Chief Product Officer
         
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/275cfcce/dms3rep/multi/file-6b8f2114.png" alt="A person is pressing a button on a screen that says cyber security."/&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/275cfcce/dms3rep/multi/file-6b8f2114.png" length="33238" type="image/png" />
      <pubDate>Wed, 17 Nov 2021 18:13:00 GMT</pubDate>
      <author>office@egs-solutions.com (Stephani McGirr)</author>
      <guid>https://www.identitytheftsolutionstx.com/post/what-is-risk-based-vulnerability-management1a569e11</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/275cfcce/dms3rep/multi/file-6b8f2114.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/275cfcce/dms3rep/multi/file-6b8f2114.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Which States Have the Highest Rates of ID THEFT!</title>
      <link>https://www.identitytheftsolutionstx.com/post/which-states-have-the-highest-rates-of-id-theft</link>
      <description>How does Nevada stack up in terms of identity (ID) theft rates? Or  Alaska. Or North Carolina. Logical thinkers might predict that ID...</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    How does Nevada stack up in terms of identity (ID) theft rates? Or  Alaska. Or North Carolina. Logical thinkers might predict that ID theft  per capita would be the same across the nation, but they would be wrong.  Some states have much higher rates of identity theft than others.  Knowing your state's rate helps you understand the risks in your  vicinity. That knowledge could prove priceless in protecting your  identity from fraud or abuse. First, however, you'll need to grasp what  drives the statistics as well as the raw numbers.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h2&gt;&#xD;
  
                  
                  
  How State Rates Are Obtained

                
                &#xD;
&lt;/h2&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    The  federal government tracks ID theft rates and sorts them by state.  Annually, The United States Federal Trade Commission (FTC) releases the 
    
  
  
                    
                    &#xD;
    &lt;a href="https://register.consumersentinel.gov/" target="_blank"&gt;&#xD;
      
                      
                      
    
    
      Consumer Sentinel Network
    
  
  
                    
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
                    
  
  
     (CSN) yearly report, which covers identity theft, fraud, imposter scams and an array of other crimes.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Complaints  arrive at CSN from 25 states, the Better Business Bureau, local law  enforcement groups, the FBI and other entities. In addition, 
    
  
  
                    
                    &#xD;
    &lt;a href="https://register.consumersentinel.gov/Agency/AgencyLookup.aspx" target="_blank"&gt;&#xD;
      
                      
                      
    
    
      hundreds of crime-tracking agencies feed case data into the CSN report
    
  
  
                    
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
                    
  
  
    .
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    In 2020, FTC offices received 
    
  
  
                    
                    &#xD;
    &lt;a href="https://www.ftc.gov/news-events/press-releases/2021/02/new-data-shows-ftc-received-2-2-million-fraud-reports-consumers" target="_blank"&gt;&#xD;
      
                      
                      
    
    
      2.2 million fraud complaints
    
  
  
                    
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
                    
  
  
      directly. CSN added another 2.5 million to the year's total. Over 1.4  million complaints concerned identity theft, with some individuals  reporting their second or third ID theft experience. These thefts topped  CSN lists.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    "In 2020, people filed more reports about Identity  Theft (29.4% of all reports), in all its various forms, than any other  type of complaint. Imposter Scams, a subset of Fraud reports, followed  with 498,278 reports from consumers in 2020 (10.6% of all reports),"  according to Sentinel reporting.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h2&gt;&#xD;
  
                  
                  
  Are Identity Thieves Moving North?

                
                &#xD;
&lt;/h2&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    A  decade ago, Florida often topped the list of states where ID theft  occurred. Today, Florida has been dethroned as the nation's ID theft  queen. Since 2019, Georgia, Washington and Louisiana have surpassed the  Sunshine State. During the first half of 2021, Florida ranks #9 on the  list.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Kansas, Rhode Island, Illinois, Nevada and Washington  occupied the top five state slots on the list in 2020. Massachusetts  ranked #6, followed by Georgia, Arkansas, Maine and Louisiana.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
                      
    
    
      Top 10 States Where ID Theft Occurred in 2020
    
  
  
                    
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    1. Kansas
2. Rhode Island
3. Illinois
4. Nevada
5. Washington
6. Massachusetts
7. Georgia
8. Arkansas
9. Maine
10. Louisiana
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Source: 
    
  
  
                    
                    &#xD;
    &lt;a href="https://www.ftc.gov/reports/consumer-sentinel-network-data-book-2020" target="_blank"&gt;&#xD;
      
                      
                      
    
    
      U.S. Federal Trade Commission Consumer Sentinel Network Data Book 2020
    
  
  
                    
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Ranking  is one way to spot emerging hot spots for identity thieves. But it's  too early to predict a northward migration by identity thieves because  the pandemic skewed some of the statistics. Government benefits fraud,  for example, soared due to widespread unemployment compensation theft.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Unemployment  fraud recently hit Kansas very hard, which might explain some of its  meteoric rise to the top of the heap. Kansans experienced 1,438 identity  theft problems per 100,000 state residents in 2020. Neighboring  Nebraska reported only 113 per 100,000 inhabitants.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    For the first  half of 2021, Rhode Island claimed the top spot. Still, that rise may  prove fleeting if Hurricane Ida spread lots of 
    
  
  
                    
                    &#xD;
    &lt;a href="https://www.idshield.com/blog/identity-theft/what-pii-and-why-should-i-care" target="_blank"&gt;&#xD;
      
                      
                      
    
    
      personally identifiable information
    
  
  
                    
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
                    
  
  
      (PII) documents around that coastal state. In just six months, Rhode  Island reports 1,705 identity theft claims per 100,000 residents.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Check out the FTC's 
    
  
  
                    
                    &#xD;
    &lt;a href="https://public.tableau.com/app/profile/federal.trade.commission/viz/FraudandIDTheftMaps/IDTheftbyState" target="_blank"&gt;&#xD;
      
                      
                      
    
    
      interactive state map on identity theft;
    
  
  
                    
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
                    
  
  
      this tool lets you select different years and states. Individual states  will rise or fall in the rankings each year, but the device illustrates  state progress in thwarting ID theft. What you want to see is a  downward trend for your location.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h2&gt;&#xD;
  
                  
                  
  Reasons Why Some States Struggle

                
                &#xD;
&lt;/h2&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    You might think Florida became a perennial problem because of its aging population. That's one potential factor, but 
    
  
  
                    
                    &#xD;
    &lt;a href="https://www.idshield.com/blog/fraud-protection/plan-now-next-natural-disaster" target="_blank"&gt;&#xD;
      
                      
                      
    
    
      natural disasters
    
  
  
                    
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
                    
  
  
      also pump up the opportunity for crooks, and Florida endures more than  its share of those. All those years in the spotlight made the Sunshine  State a target not only for thieves. The U.S. Attorney's Office, Postal  Inspector and other government agencies made the state a major focus and  probably triggered its decline in the ratings.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Coronavirus has  likely impacted recent ID theft rates significantly. Jumps in areas  where unemployment hit an all-time high may soon start to reverse. While  advanced age may factor into scammer target selection, millennials get  targeted more and often fall harder for identity theft ploys.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Weather  and population density can also influence rankings. For example, more  temperate states could see more dumpster diving for discarded PII.  There's more activity in the Southern and Southwestern states in the  winter months, which may also feed stolen ID statistics. And, naturally,  urban areas are hot spots because they offer more targets to exploit.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Written and Published By IDShield,
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/275cfcce/dms3rep/multi/file-aabdc914.png" alt="A green highway sign that says welcome to internet highway" title=""/&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/275cfcce/dms3rep/multi/file-aabdc914.png" length="27205" type="image/png" />
      <pubDate>Wed, 10 Nov 2021 17:21:00 GMT</pubDate>
      <author>office@egs-solutions.com (Stephani McGirr)</author>
      <guid>https://www.identitytheftsolutionstx.com/post/which-states-have-the-highest-rates-of-id-theft</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/275cfcce/dms3rep/multi/file-aabdc914.png">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Scam of the Month: Phony Free Gift Texts. Don’t Click That Message</title>
      <link>https://www.identitytheftsolutionstx.com/post/scam-of-the-month-phony-free-gift-texts-don-t-click-that-message</link>
      <description>Loaded' Text Messages on the Rise "Here's a gift for you."  Those words have a nice ring to them, don't they? The message sounds ...</description>
      <content:encoded>&lt;h2&gt;&#xD;
  
                  
                  
  Loaded' Text Messages on the Rise

                
                &#xD;
&lt;/h2&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    "Here's a gift for you."  Those words have a nice ring to them, don't they? The message sounds  terrific, but data security specialists urge caution. You're now the  proud owner of what's sometimes referred to as a loaded text. This type  of SMS message has increased rapidly in the past two months, earning  this tactic a turn in the spotlight as our Scam of the Month.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Fraudulent text tactics aren't new. In 2014, the Federal Trade Commission (FTC) settled a complaint against a group of 
    
  
  
                    
                    &#xD;
    &lt;a href="https://www.consumer.ftc.gov/blog/2014/02/random-text-wait-wait-dont-click?page=7" target="_blank"&gt;&#xD;
      
                      
                      
    
    
      shady text senders
    
  
  
                    
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
                    
  
  
      who promised free gift cards to anyone that replied. The agency also  reclaimed $2.5 million consumers had lost. Unfortunately, this ploy has  aged well over time—for the scammers at least.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h2&gt;&#xD;
  
                  
                  
  Smish This!

                
                &#xD;
&lt;/h2&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    This  technique to invade digital devices is known as smishing—a mash-up of  SMS or short message service and phishing. What's worthy with our Scam  of the Month honoree is a wave of imposters claiming to be your cell  phone provider. The ploy has hit AT&amp;amp;T, T-Mobile and Verizon users  hard.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Texts read "Here's a gift for you" or "Here's something for  you." One text approach claims to be a "thank you" gesture for your  recent bill payment. Another discusses "service concerns" or "recent  disruptions" in service. It would be swell if cell carriers provided  compensation for system downtime, but they generally don't make such  offers.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Texts offering free stuff often prove difficult to resist.  Messages will boost their credibility by addressing you by name. Your  cell number and name paired together were most likely compromised in a  recent data breach like T-Mobile's August attack that lost these exact  details for 850,000 customers. Information from older data breaches can  also work.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Do not click this bait! If you do, you're likely to  land on a spoofed website that perfectly impersonates the real deal. The  page requires you to log in at AT&amp;amp;T or Verizon, for example, and  presto! The hacker now has your account credentials and can roam through  your usage, spend your money or even switch passwords to lock you out  of the device. You may also receive a download of malware while visiting  the imitation web page.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h2&gt;&#xD;
  
                  
                  
  Patterns Persist

                
                &#xD;
&lt;/h2&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    The root cause  of a data leak often proves challenging to trace back to the initial  breach or source. However, that wasn't the problem when a lower-priced  service started to see actual device takeovers in early October of this  year. Instead, the company blamed the breaches on 
    
  
  
                    
                    &#xD;
    &lt;a href="https://www.idshield.com/blog/internet-security/how-they-do-it-major-risks-credential-stuffing" target="_blank"&gt;&#xD;
      
                      
                      
    
    
      credential stuffing
    
  
  
                    
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
                    
  
  
    —a  practice of using breached login details on hundreds of different  websites to determine what additional accounts they might unlock. An  essential element in such hacks is the terrible practice of password  recycling. Using the same password for numerous access points is a  terrible idea.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Worst of all, these intruders can authorize 
    
  
  
                    
                    &#xD;
    &lt;a href="https://twitter.com/Buttered_Pecans/status/1447413221057462275?s=20" target="_blank"&gt;&#xD;
      
                      
                      
    
    
      large purchases that flood your credit card on file
    
  
  
                    
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
                    
  
  
     with the carrier. Some customers reported $1,000 purchases, for example, that could max out cards. While 
    
  
  
                    
                    &#xD;
    &lt;a href="https://twitter.com/Visible/status/1448322446646554633?s=20" target="_blank"&gt;&#xD;
      
                      
                      
    
    
      the company addressed through social media
    
  
  
                    
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
                    
  
  
    , it quickly took its strategy private responding on a case-by-case level via direct messages (DMs).
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h2&gt;&#xD;
  
                  
                  
  Detection Tools

                
                &#xD;
&lt;/h2&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    The  old standby of hovering your mouse cursor over an embedded link won't  work here. Senders employ a link-shortening site like bitly.com to cloak  their accurate web address. You could end up anywhere if you clicked  that link.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    It doesn't always take a rocket scientist to spot the  scam. For example, a text on your work device could address you  personally. Likewise, one from a cell carrier you don't use is a dead  giveaway. Perhaps, a past provider shouldn't be texting you at your  current number regarding bill payments. Con artists are persistent,  however, and sooner or later, you'll get a loaded text you won't be able  to evaluate easily.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Written and Published By, IDShield
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/275cfcce/dms3rep/multi/file-bb00314b.png" alt="A person is holding a cell phone with an envelope on the screen." title=""/&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/275cfcce/dms3rep/multi/file-bb00314b.png" length="154027" type="image/png" />
      <pubDate>Wed, 10 Nov 2021 17:05:00 GMT</pubDate>
      <author>office@egs-solutions.com (Stephani McGirr)</author>
      <guid>https://www.identitytheftsolutionstx.com/post/scam-of-the-month-phony-free-gift-texts-don-t-click-that-message</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/275cfcce/dms3rep/multi/file-bb00314b.png">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Ransomware Hits Businesses &amp; Consumers in the Wallet</title>
      <link>https://www.identitytheftsolutionstx.com/post/ransomware-hits-businesses-consumers-in-the-wallet</link>
      <description>The headlines sure grab your attention: Ransomware Hits Over 1,000 Businesses Another Hospital Hit with Ransomware Attack Ransom Gang...</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    The headlines sure grab your attention:
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Worrisome  headlines, for sure. So, what is ransomware? Isn’t this primarily a  business problem? Consumers don’t need to be concerned, right?
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h2&gt;&#xD;
  
                  
                  
  Constantly Evolving Threat

                
                &#xD;
&lt;/h2&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Ransomware  continues to evolve rapidly, and answers to these questions change with  each emerging version. Nevertheless, this tactic impacts everyone and  everyone should be concerned.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    When the concept first appeared in  1989, 20,000 individuals attending a World Health Organization AIDS  conference in Stockholm became targets. The distributer was a biologist  and AIDS researcher who sent floppy discs to the list of attendees. Once  recipients loaded the floppy data into a computer, a message popped up  demanding the device owner send $189 to an address in Panama. It was  just a hint of the power this concept would eventually possess.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Over  the past decade, ransomware has spread like wildfire, and its use has  altered. First, the lure of financial gain switched the focus from  attacks on individuals who might cough up $200 toward big-time targets  with much deeper pockets. As a result, higher-value targets are now the  norm.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Today’s ransom demands can squeeze a single business for $10  million or more. While a company may pay the bill or hire a forensic  cybersecurity firm to search for alternatives, you’ll feel the pain,  too, if you’re a customer of that company. Damages can be swift and  severe.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h2&gt;&#xD;
  
                  
                  
  Defining Ransomware

                
                &#xD;
&lt;/h2&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Ransomware is a software tool  that infects digital devices like laptops and desk computers to prevent  the owners from accessing their stored data. Crooks have always offered  something in return for their hefty fee—a decrypt key is standard—but  these keys don’t always work. Increasingly, hackers also include threats  of exposing the stolen data online. In some cases, blackmail delivers  big payoffs.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Damages tend to trickle down to all sorts of folks.  That’s why you should learn all you can about the problem, solutions  that work, those that don’t, and which proactive steps might help if  hackers zeroed in on your business.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h2&gt;&#xD;
  
                  
                  
  Deep Damages

                
                &#xD;
&lt;/h2&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Ransomware  senders initially used a shotgun approach to hit targets. Thousands of  individuals were peppered with emails that carried malware, and names  like WannaCry or CryptoLocker dominated the news cycle. Today, detailed  research can lead to aiming at a single entity.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Phishing emails  still deliver malicious code. For example, if a worker clicks a link in a  targeted email while using a company machine, hackers often access  several company data systems. In other instances, malware arrives when a  device user visits a harmful website.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Once the target’s data  system is locked down, hackers then download files to misuse later.  Business operating systems like digital checkout registers won’t work,  making it impossible to buy goods. Gas pumps may run dry. So yes,  ransomware impacts us all.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    “Ransomware is a long-standing problem  and a growing national security threat,” a spokesman for the United  States Department of Justice said this summer when unveiling a new  collaborative way to report and share information about recent attacks.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Roughly  $350 million in ransom was paid to malicious cyber actors in 2020—more  than a 300% increase from the previous year. Unfortunately, 2021 has  already featured jaw-dropping ransomware attacks, and the trend  continues to worsen.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h2&gt;&#xD;
  
                  
                  
  Top Targets

                
                &#xD;
&lt;/h2&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Hackers are generally one  (or more) steps ahead of the hard-working people who work to block  intrusion attempts. So cyber investigators play catch up as they study  the hacker’s moves and search for data exfiltration.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Top targets include:
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Massive attacks make headlines, yet  government experts say they don’t tell the whole story. According to U.S  Department of Justice (DoJ) calculations, roughly 
    
  
  
                    
                    &#xD;
    &lt;b&gt;&#xD;
      
                      
                      
    
    
      75% of all ransomware attacks zero in on small businesses
    
  
  
                    
                    &#xD;
    &lt;/b&gt;&#xD;
    
                    
                    
  
  
    .
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    “Like  most cyber-attacks, ransomware exploits the weakest link. Many small  businesses have yet to adequately protect their networks,” the agency  stated.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Small businesses face direct attacks but also suffer from  attacks on their service providers. For example, in 2021, hackers aimed  at a Florida-based IT firm called Kaseya. The company delivers IT  assistance for businesses too small to have their own info tech  departments. Perpetrators seized massive amounts of data, and schools,  grocery stores and an estimated 2,000 additional firms felt the impact.  Hackers demanded $70 million to reverse the damage.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h2&gt;&#xD;
  
                  
                  
  Making Headway

                
                &#xD;
&lt;/h2&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Government  investigators work around the clock to track down perpetrators after an  attack like Colonial’s. The FBI and other law enforcement groups  strongly recommend against paying a ransom, but media reports indicate  that Colonial and JBS both paid millions for a decryption key.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    In  Colonial’s case, the price tag reached around $4.4 million, but the  software received was so slow, the company couldn’t use it. As a result,  the pipeline shutdown caused panic in southeastern states and empty gas  tanks up and down the coast.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    In late October, a group of U.S.  agencies including the Secret Service, U.S. Cyber Command and the FBI  collaborated with foreign governments to hack back at a ransomware gang  responsible for numerous attacks. Their takedown plan knocked REvil, a  group with apparent ties to Russia, offline after the crew claimed  responsibility for the JBS attack and several other major incidents.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h2&gt;&#xD;
  
                  
                  
  Reporting Figures Accurate?

                
                &#xD;
&lt;/h2&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    The  attacks we hear about are alarming, but there’s an additional  dimension—businesses that don’t report ransomware or other data  breaches. Anonymous surveys of business IT teams indicate that those  rates could be 35% or higher.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    In June, the DoJ launched a  dedicated website to address the ransomware issue and hopefully prompt  more reporting. StopRansomware.gov is a collaborative effort between  government agencies and the private sector. It’s hoped that a single  collection point for filing reports and sharing information about new  attacks will finally put a dent in hacker success rates.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    The FBI’s Internet Crime Complaint Center (IC3) recently confirmed that 2021 
    
  
  
                    
                    &#xD;
    &lt;a href="https://us-cert.cisa.gov/ncas/alerts/aa21-243a" target="_blank"&gt;&#xD;
      
                      
                      
    
    
      ransomware attacks are on pace to smash the record
    
  
  
                    
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
                    
  
  
      set in 2020. Today’s thieves have doubled up on extortion efforts, too.  In the current climate, some damages cannot be reversed even after the  ransom is paid.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    “Cybercriminals have also increasingly coupled  initial encryption of data with a secondary form of extortion, in which  they threaten to publicly name affected victims and release sensitive or  proprietary data exfiltrated before encryption,” a recent FBI alert  warned.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Written and Published By IDShield
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/275cfcce/dms3rep/multi/file-5810a314.png" alt="A man and a woman are standing in front of an open sign." title=""/&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/275cfcce/dms3rep/multi/file-5810a314.png" length="273030" type="image/png" />
      <pubDate>Wed, 10 Nov 2021 16:56:00 GMT</pubDate>
      <author>office@egs-solutions.com (Stephani McGirr)</author>
      <guid>https://www.identitytheftsolutionstx.com/post/ransomware-hits-businesses-consumers-in-the-wallet</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/275cfcce/dms3rep/multi/file-5810a314.png">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Shocking Stories of Identity Theft and the Unbelievable Damages They Trigger</title>
      <link>https://www.identitytheftsolutionstx.com/post/shocking-stories-of-identity-theft-and-the-unbelievable-damages-they-trigger-1</link>
      <description>Candida Gutierrez. Stephen Echols. Marcus Calvillo. They aren't household names, but their experiences with identity theft were epic....</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Candida Gutierrez. Stephen Echols. Marcus Calvillo. They aren't household names, but their experiences with identity theft were epic. Their "total" identity theft stories provide lessons we should study and heed. These abuses continued for decades. These three examples have been resolved but should not be forgotten. Unfortunately, similar thefts continue to impact other consumers today.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Government agencies may take up an individual case of ID theft, and their experts know a single identity theft issue may take years to resolve. Plus, that clock doesn't start 
    
  
  
                    
                    &#xD;
    &lt;a href="https://www.idshield.com/blog/identity-theft/would-you-know-if-your-data-was-compromised-three-out-four-consumers-dont"&gt;&#xD;
      &lt;u&gt;&#xD;
        
                        
                        
      
      
        until the victim discovers the crime
      
    
    
                      
                      &#xD;
      &lt;/u&gt;&#xD;
    &lt;/a&gt;&#xD;
    
                    
                    
  
  
    .
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h2&gt;&#xD;
  
                  
                  
  Houston Teacher's Total Theft Case

                
                &#xD;
&lt;/h2&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    After a 12-year struggle, elementary school teacher Candida Gutierrez finally faced her identity thief in federal court. Benita Cardona-Gonzalez, was an undocumented immigrant from Mexico who'd exploited that identity to find work, buy a house, obtain medical care, and provide for a growing family. Cardona-Gonzales was in court to receive an 18-month sentence for her crimes to be followed by automatic deportation.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    During the years when both women used Gutierrez's identity, the Houstonian had a wide range of crimes linked to her name. She eventually told her story to the Associated Press, and the tale of her "total" ID theft spread around the globe.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    "(Gutierrez) recounted how she learned that her identity had been used to take out a mortgage loan and even to get medical care for the birth of two children," read the 
    
  
  
                    
                    &#xD;
    &lt;a href="https://www.justice.gov/usao-ks/pr/woman-pleads-guilty-immigration-document-fraud"&gt;&#xD;
      &lt;u&gt;&#xD;
        
                        
                        
      
      
        statement from the U.S. Attorney's Office for Kansas
      
    
    
                      
                      &#xD;
      &lt;/u&gt;&#xD;
    &lt;/a&gt;&#xD;
    
                    
                    
  
  
     which prosecuted the case.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    The victim first learned of her identity theft when the bank rejected her own mortgage application. Twelve years of what officials view as complete or total identity theft required lots of government documents. Cardona-Gonzalez obtained a Social Security card and a Texas birth certificate in the name of another woman. Her thief even had a driver's license in Gutierrez's name and used that moniker on her own kids' birth certificates.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    One woman's quest to live the American dream had become the other's nightmare. In its wake, a mess of tangled records required correction to give Gutierrez a shot at restoring her good name.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h2&gt;&#xD;
  
                  
                  
  My Neighbor, My ID Thief

                
                &#xD;
&lt;/h2&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Stephen Echols had no idea he was an ID theft victim back in 1999, but he was about to receive his first clue.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    "It began one day in 1999 when he found several police officers with guns drawn standing on his front lawn. He was taken into custody and spent 5 and ½ months in jail before being released," a 
    
  
  
                    
                    &#xD;
    &lt;a href="https://www.military.com/veteran-jobs/security-clearance-jobs/2013/09/03/veteran-homeless-after-battle-with-identity-theft.html"&gt;&#xD;
      &lt;u&gt;&#xD;
        
                        
                        
      
      
        Military.com article on his experiences with identity theft
      
    
    
                      
                      &#xD;
      &lt;/u&gt;&#xD;
    &lt;/a&gt;&#xD;
    
                    
                    
  
  
     said.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    When the arrest occurred, Echols was a college student. Charges included stalking and making terrorist threats, so bail was set at $250,000—an amount he couldn't raise. Finally, after five months in jail, Echols was released and given court documents that indicated he wasn't the man wanted for this crime.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    At the time, Echols thought a case of mistaken identity triggered his arrest. The concept of identity theft never entered his mind.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    In 2000, a detective requested he stop by the station to look at some photos. One image jumped out at Echols; it was a photo of a bully from Echols' childhood. His neighborhood menace had misused Echols' name, even obtaining a new driver's license using it.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    The military veteran went on to secure a job at Los Angeles International Airport which required a security clearance. His high-tech job calibrating security equipment at LAX paid well. Clearance holders must complete extensive background checks frequently, but Echols had a letter from a judge indicating his innocence in two police cases involving his bully's crimes.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Unfortunately, he couldn't know that one discussion had been incorrectly recorded as an arrest, or he would have reported it to his employer. Accused of lying about an arrest, Echols lost the security clearance he needed to work. As a result, he and his new bride ended up homeless and living in their car after exhausting all their savings.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    It took over three years to clear up the government's mistake. Meanwhile, Echols applied for an estimated 3,500 jobs, and his wife lost two pregnancies. Finally, unimaginable stress prompted the couple to move to a new state and begin their lives again.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h2&gt;&#xD;
  
                  
                  
  26 Years of Headaches

                
                &#xD;
&lt;/h2&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Someone stole Marcus Calvillo's identity when he was around 15. Over the years, that thief used his ID to write bad checks and rack up dozens of parking tickets that were never paid. The con artist was also convicted of child sex abuse—under Calvillo's name.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Those actions cost Calvillo his driver's license, countless work opportunities and several jobs. His ID thief also secured jobs using the stolen identity, and Calvillo received IRS bills for back taxes on jobs he'd never held.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    He despaired of ever mending his damaged identity—until he read the story of Candida Gutierrez. He called the U.S. Attorney's Office for Kansas that had sent her ID thief to jail. Calvillo finally had an audience for his story.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    After two decades, the damage was extensive. He’d lost his home, ended up in divorce court and had no way to pay child support for his six kids. Thankfully, the U.S. Attorney's Office assisted in correcting court records and convictions improperly linked to his name.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h2&gt;&#xD;
  
                  
                  
  A Glimmer of Hope

                
                &#xD;
&lt;/h2&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    These cases are just a few of the extreme identity theft cases reported to government agencies or the media. Each yields a vital lesson in self-protection.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    These three victims understand the value of guarding their 
    
  
  
                    
                    &#xD;
    &lt;a href="https://www.idshield.com/blog/identity-theft/what-pii-and-why-should-i-care"&gt;&#xD;
      &lt;u&gt;&#xD;
        
                        
                        
      
      
        personally identifiable information
      
    
    
                      
                      &#xD;
      &lt;/u&gt;&#xD;
    &lt;/a&gt;&#xD;
    
                    
                    
  
  
     (PII) the right way. But the time to do throw up walls around your data is before a major theft, not after. IDShield is in the business of monitoring member PII around the clock so our members can sleep well and worry less. If their data leaks, our firm can alert them rapidly and advise them.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/275cfcce/dms3rep/multi/file-4389eca5.png" alt="A man is sitting on a window sill looking at his cell phone." title=""/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    We think you'll love the peace of mind that comes with the knowledge that someone's watching your data 24/7.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/275cfcce/dms3rep/multi/file-4389eca5.png" length="318466" type="image/png" />
      <pubDate>Wed, 27 Oct 2021 19:23:00 GMT</pubDate>
      <author>office@egs-solutions.com (Stephani McGirr)</author>
      <guid>https://www.identitytheftsolutionstx.com/post/shocking-stories-of-identity-theft-and-the-unbelievable-damages-they-trigger-1</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/275cfcce/dms3rep/multi/file-4389eca5.png">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Electronic Medical Records and Their Risks</title>
      <link>https://www.identitytheftsolutionstx.com/post/electronic-medical-records-and-their-risks</link>
      <description>Hackers Love to Steal Medical Records. Reduce your Risk. Electronic medical records (EMRs) were once heralded as the ideal way to store...</description>
      <content:encoded>&lt;h2&gt;&#xD;
  
                  
                  
  Hackers Love to Steal Medical Records. Reduce your Risk.

                
                &#xD;
&lt;/h2&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Electronic medical records (EMRs) were once heralded as the ideal way to store patient files. Paper files were inches thick. Pages could fall out. The filing was a nightmare, and all those inches of files added up to massive stacks taking up lots of office space. So, the concept of digitizing a patient’s records had instant appeal. But since its debut in 1972, EMRs have proved to be both a boon and a bust for the medical field.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    EMRs also offered a fantastic way for medical professionals to share patient records with emergency rooms, specialists and other providers and share them fast. Facilities would store patient data, and EMRs would be accessible on a network. Doctors could find critical data with a simple search instead of paging through a stack of paper. Data accuracy would improve.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h2&gt;&#xD;
  
                  
                  
  Ransom Demands

                
                &#xD;
&lt;/h2&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Reality has fallen short of such lofty predictions, some professionals argue. One reason is the genuine risk to electronic information storage. That risk comes from data breaches, or a system infected with 
    
  
  
                    
                    &#xD;
    &lt;a href="https://www.fbi.gov/scams-and-safety/common-scams-and-crimes/ransomware"&gt;&#xD;
      &lt;u&gt;&#xD;
        
                        
                        
      
      
        ransomware
      
    
    
                      
                      &#xD;
      &lt;/u&gt;&#xD;
    &lt;/a&gt;&#xD;
    
                    
                    
  
  
    —computer malware that can lock up the system making files inaccessible.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    As ransomware continues to soar—some experts estimate it has increased 1,000% in the past year over the preceding 12-month period—EMRs have become a double-edged sword. Electronic records take up less space and might be more accurate. It’s easier to keep prying eyes out of EMR files if login credentials are not widely available. However, hackers can crack open a computer, and recent studies have detailed an alarming rate of password sharing amongst medical workers. Such a mix of good and evil isn’t reassuring when your personal health information, or PHI, is at stake.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h2&gt;&#xD;
  
                  
                  
  The Current Reality

                
                &#xD;
&lt;/h2&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Hospitals, doctor’s offices, laboratories and clinics are clear targets. Last fall, CISA, the federal government’s cybersecurity and infrastructure security agency, and the FBI issued an advisory to the medical field.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    The agencies stated they possessed “credible information of an increased and imminent cybercrime threat to US hospitals and healthcare providers.” While the joint effort included offering facilities advice on how to prepare, it’s not known how many provider organizations followed that advice.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Shortly after that October 2020 warning, a Maryland medical center experienced a ransomware attack that locked patient files. The intruders demanded a ransom paid in bitcoin within three days, or they’d destroy patient records. In May 2021, a San Diego hospital was the target. The medical center had to divert patients suspected of stroke or heart attack to other facilities, and these were just two of the hundreds of medical attacks in the past year.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Ransomware tactics occur weekly, if not more frequently, around the United States. The damage is significant. Government cyber groups reported, “activities include credential harvesting, mail exfiltration, crypto-mining, point-of-sale data exfiltration, and the deployment of ransomware.”
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Medical identity theft and insurance fraud can result. Medical identities sell for hefty prices—much higher than stolen credit card data. The hacker’s goal is economic, but these crimes also create life or death consequences for the sick and the injured.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h2&gt;&#xD;
  
                  
                  
  The Challenge

                
                &#xD;
&lt;/h2&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Television series like 
    
  
  
                    
                    &#xD;
    &lt;em&gt;&#xD;
      
                      
                      
    
    
      Chicago Med
    
  
  
                    
                    &#xD;
    &lt;/em&gt;&#xD;
    
                    
                    
  
  
     and 
    
  
  
                    
                    &#xD;
    &lt;em&gt;&#xD;
      
                      
                      
    
    
      Grey’s Anatomy
    
  
  
                    
                    &#xD;
    &lt;/em&gt;&#xD;
    
                    
                    
  
  
     create scripts around the chaos that would ensue when a hospital cannot access its records system. Doctors cannot read lab test results or patient histories. Specialists cannot share patient records with others who treat the same patient. It seems fictional, but these scenarios are facts.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    As hospital and clinic attacks rise, institutions don’t know whether records were transferred or accessed before the lockdown and ransom demand. As a result, some institutions treat these attacks like a data breach notifying the federal government and patients; others do not.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Responses to a ransom demand vary. Some facilities are desperate to get back up and running. Others discover their files were corrupted during an intrusion. For some organizations, the cost of recovering from an intrusion without paying the ransom and hacker help could equal or exceed the ransom requested, so they pay up.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    The FBI is clear in its opposition to paying a ransom for data. The bureau warned that there are no guarantees that hackers will restore data access and paying encourages more hacks.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    The U.S. Department of Health and Human Services (HHS) 
    
  
  
                    
                    &#xD;
    &lt;a href="https://ocrportal.hhs.gov/ocr/breach/breach_report.jsf"&gt;&#xD;
      &lt;u&gt;&#xD;
        
                        
                        
      
      
        tracks medical data loss
      
    
    
                      
                      &#xD;
      &lt;/u&gt;&#xD;
    &lt;/a&gt;&#xD;
    
                    
                    
  
  
     whenever it impacts more than 500 individuals. These days, most entries cite “Hacking/IT incident” as the cause. While some cases involve a small number of patients, others like August’s hack of a New Mexico university hospital involve over half a million individuals or more.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h2&gt;&#xD;
  
                  
                  
  Developing Solutions

                
                &#xD;
&lt;/h2&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Solutions for the health providers and their patient groups will differ. There is no one-size-fits-all fix.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    For providers, a backup not connected to the network is a strong option. Dividing or segmenting central computer systems to limit hackers’ access if they breach the system slashes risk. Patient records can be robustly encrypted. And a regular review of cyber response plan helps, too.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h2&gt;&#xD;
  
                  
                  
  Shield Yourself

                
                &#xD;
&lt;/h2&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    For patients, the risks are very personal. In an emergency, no paper record exists to fall back on. If the EMR is locked down, you may not receive needed treatment.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
                      
    
    
      Be proactive. Scan your personal medical files to digital form and save them on a computer.
    
  
  
                    
                    &#xD;
    &lt;/b&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
                      
    
    
      Password protect the drive
    
  
  
                    
                    &#xD;
    &lt;/b&gt;&#xD;
    
                    
                    
  
  
    , too A thumb drive loaded with the entire batch could be helpful at the emergency room during a medical event.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    In addition to emergencies, your medical data gets protected against corruption or unrecoverable files. That’s worth a great deal. While no one can offer a 100% guarantee that you’ll be immune to a hospital ransomware attack, this logical step reduces the impact.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    We see many cases of data theft at IDShield, and medical identity theft is one of the worst manifestations. A clever individual can use your identity to receive but not pay for medical care. You get the bills.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Even worse is the co-mingling of your accurate health records with those of an imposter. That’s the key reason why our members request monitoring for health policy numbers. If your insurance data is discovered somewhere on the Dark Web, we’ll alert you and work with you to find a solution. 
    
  
  
                    
                    &#xD;
    &lt;a href="https://www.idshield.com/plans-and-pricing"&gt;&#xD;
      &lt;u&gt;&#xD;
        
                        
                        
      
      
        Try our identity services free
      
    
    
                      
                      &#xD;
      &lt;/u&gt;&#xD;
    &lt;/a&gt;&#xD;
    
                    
                    
  
  
     for the first 30 days. We're confident you will recognize the value and peace of mind that IDShield delivers every day.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/275cfcce/dms3rep/multi/file-ef84cea1.png" alt="A caduceus with a snake around it and the words `` medical identity theft '' below it." title=""/&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/275cfcce/dms3rep/multi/file-ef84cea1.png" length="28292" type="image/png" />
      <pubDate>Wed, 27 Oct 2021 18:37:00 GMT</pubDate>
      <author>office@egs-solutions.com (Stephani McGirr)</author>
      <guid>https://www.identitytheftsolutionstx.com/post/electronic-medical-records-and-their-risks</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/275cfcce/dms3rep/multi/file-ef84cea1.png">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>My Identity’s Been Stolen. Can Identity Monitoring Still Help?</title>
      <link>https://www.identitytheftsolutionstx.com/post/my-identity-s-been-stolen-can-identity-monitoring-still-help</link>
      <description>No one wants to deal with identity theft—ever. It’s time-consuming, often costly and leaves a trail of emotional damage and stress in its...</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    No one wants to deal with identity theft—ever. It’s time-consuming, often costly and leaves a trail of emotional damage and stress in its wake. First-time victims often experience total panic initially, but that reaction accomplishes little, as 
    
  
  
                    
                    &#xD;
    &lt;a href="https://www.idshield.com/blog/identity-theft/which-states-have-highest-rates-id-theft" target="_blank"&gt;&#xD;
      &lt;u&gt;&#xD;
        
                        
                        
      
      
        1.4 million individuals who experienced identity theft discovered in 2020
      
    
    
                      
                      &#xD;
      &lt;/u&gt;&#xD;
    &lt;/a&gt;&#xD;
    
                    
                    
  
  
    .
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    That’s an average of 3,836 identities stolen each day of the year. Yikes! If you’ve been victimized don’t lament the fact that you didn’t purchase identity monitoring a month ago. There are still ways that IDShield can assist now.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    We offer invaluable guidance after theft detection. The initial damage has already occurred, so your ID theft is viewed as a pre-existing condition, but new members receive instant access to other services. You can still tap into consultation with trained experts. We’ll help 
    
  
  
                    
                    &#xD;
    &lt;a href="https://www.idshield.com/faq" target="_blank"&gt;&#xD;
      &lt;u&gt;&#xD;
        
                        
                        
      
      
        reduce the harm and restore your good name
      
    
    
                      
                      &#xD;
      &lt;/u&gt;&#xD;
    &lt;/a&gt;&#xD;
    
                    
                    
  
  
    .
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h2&gt;&#xD;
  
                  
                  
  Identity Restoration Is Complex

                
                &#xD;
&lt;/h2&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Whether someone else stole your identity to buy goods, 
    
  
  
                    
                    &#xD;
    &lt;a href="https://www.idshield.com/blog/identity-theft/identity-thief-rented-housing-using-my-name" target="_blank"&gt;&#xD;
      &lt;u&gt;&#xD;
        
                        
                        
      
      
        rent an apartment
      
    
    
                      
                      &#xD;
      &lt;/u&gt;&#xD;
    &lt;/a&gt;&#xD;
    
                    
                    
  
  
    , get free medical care or land a job, the devastation spreads like wildfire. So, the first goal of any recovery plan is: Stop the bleeding.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    You need to uncover all the details you can about how and where that breach of your 
    
  
  
                    
                    &#xD;
    &lt;a href="https://www.idshield.com/blog/identity-theft/what-pii-and-why-should-i-care" target="_blank"&gt;&#xD;
      &lt;u&gt;&#xD;
        
                        
                        
      
      
        personally identifiable information
      
    
    
                      
                      &#xD;
      &lt;/u&gt;&#xD;
    &lt;/a&gt;&#xD;
    
                    
                    
  
  
     (PII) occurred. Where should you begin? You may find it challenging to interpret if you receive a breach notification letter from a business you’ve patronized.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Access to professional identity experts is priceless now. They’re familiar with the steps to implement first and fast. You won’t spend hours locating the proper authorities to notify, either.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
                      
    
    
      Restoration assistance should include these key elements:
    
  
  
                    
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Should you 
    
  
  
                    
                    &#xD;
    &lt;a href="https://www.idshield.com/blog/identity-theft/should-i-file-police-report" target="_blank"&gt;&#xD;
      &lt;u&gt;&#xD;
        
                        
                        
      
      
        file a police report
      
    
    
                      
                      &#xD;
      &lt;/u&gt;&#xD;
    &lt;/a&gt;&#xD;
    
                    
                    
  
  
    ? Absolutely, but your local authorities might reject a request to submit one. They’re understandably swamped. If an online filing option with law enforcement isn’t available, try Plan B. 
    
  
  
                    
                    &#xD;
    &lt;a href="https://www.identitytheft.gov/" target="_blank"&gt;&#xD;
      &lt;u&gt;&#xD;
        
                        
                        
      
      
        Report the identity theft
      
    
    
                      
                      &#xD;
      &lt;/u&gt;&#xD;
    &lt;/a&gt;&#xD;
    
                    
                    
  
  
     to the Federal Trade Commission (FTC). If large sums are involved, ask your homeowner's or business insurance company what they require first.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Money losses hit a significant slice of identity theft victims. Unfortunately, you won’t be eligible for IDShield’s full restoration policy that can cover funds you lost for a pre-existing theft. Still, you may find your renter’s or homeowner’s policy includes a small amount of coverage for losses. It could provide several hundred dollars up to a few thousand in protection. IDShield members who sign up before identity theft occurs are covered up to $1 million.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    There’s no reason to wait if you fear your identity has been compromised. With the 
    
  
  
                    
                    &#xD;
    &lt;a href="https://www.idshield.com/blog/privacy-protection-just-tap-away" target="_blank"&gt;&#xD;
      &lt;u&gt;&#xD;
        
                        
                        
      
      
        IDShield mobile app
      
    
    
                      
                      &#xD;
      &lt;/u&gt;&#xD;
    &lt;/a&gt;&#xD;
    
                    
                    
  
  
    , you can summon help with the touch of a finger. So, you won’t have to wait a minute to launch the recovery and reclamation process.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/275cfcce/dms3rep/multi/file-fc0fe467.png" alt="A man in a mask is sitting at a desk using a laptop computer." title=""/&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/275cfcce/dms3rep/multi/file-fc0fe467.png" length="63057" type="image/png" />
      <pubDate>Wed, 27 Oct 2021 18:30:00 GMT</pubDate>
      <author>office@egs-solutions.com (Stephani McGirr)</author>
      <guid>https://www.identitytheftsolutionstx.com/post/my-identity-s-been-stolen-can-identity-monitoring-still-help</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/275cfcce/dms3rep/multi/file-fc0fe467.png">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Abandoned Online AccountsJune 04, 2021 | Social Media</title>
      <link>https://www.identitytheftsolutionstx.com/post/abandoned-online-accountsjune-04-2021-social-media</link>
      <description>How many social media accounts do you participate in? How many sites are there where you have an account that you no longer use to...</description>
      <content:encoded>&lt;h2&gt;&#xD;
  
                  
                  
  How many social media accounts do you participate in?

                
                &#xD;
&lt;/h2&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    How many sites are there where you have an account that you no longer use to socialize with others? Now consider two more questions, “What personal information of yours is stored within that account, even if it’s just the account profile?” and “What could happen if those abandoned accounts were breached by a hacker who then stole the data?”
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Old online accounts have at least two vulnerabilities: They could be viewable by others and the database of the website could suffer a data breach. When social networking first began, users were less aware than they are today of the need to restrict who could see their posted information. Someone viewing an old account of yours could potentially pick up data that would help them find information they could use elsewhere such as with answering security questions such as “Where were you born?,” “Where did you attend school?,” etc.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Data breaches suffered by social networking sites are becoming commonplace. Within just a six-month span of time in 2016, nearly one billion records from only four social networking or online dating sites were potentially accessed by hackers. A thief could take the user ID and password collected in a breach and then try it on other websites to see if the person who created the account used those same credentials on other accounts. Then they can collect personal information from that account as well or takeover the account and make use of it.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
                  
  What can be done about old accounts?

                
                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    If you are no longer using an account, delete it if possible. If not possible, replace your personal information with random data so that the account is not useful to a potential identity thief. The website www.accountkiller.com is a valuable resource of directions for closing online accounts of all kinds. Also, by reviewing it’s extensive list of websites, you may be reminded of an old account you forgot that you created.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    What to do going forward: If you’ve been in the habit of using the same login credentials on all of your websites, change the passwords (or user ID and password, if possible) so that you use different credentials for each account. Keep a list of the accounts you create online so you know where you information is online. Be particular about what personal information you add to your accounts. Every question doesn’t need to be answered in your account profile. Set privacy and security settings to have some control over who can see your data. Use backup email addresses on every account so that if you lose access to the primary email because of a job change or switch in email service provider, you can still access the account.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/275cfcce/dms3rep/multi/file-d793deb0.png" alt="A woman is standing in a kitchen holding a cup of coffee and looking at her phone." title=""/&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/275cfcce/dms3rep/multi/file-d793deb0.png" length="312862" type="image/png" />
      <pubDate>Mon, 11 Oct 2021 17:45:00 GMT</pubDate>
      <author>office@egs-solutions.com (Stephani McGirr)</author>
      <guid>https://www.identitytheftsolutionstx.com/post/abandoned-online-accountsjune-04-2021-social-media</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/275cfcce/dms3rep/multi/file-d793deb0.png">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>SIM Swapping Lets a Scammer Take Over Your Smartphone. Learn the Risks to Avoid This Scam</title>
      <link>https://www.identitytheftsolutionstx.com/post/sim-swapping-lets-a-scammer-take-over-your-smartphone-learn-the-risks-to-avoid-this-scam</link>
      <description>SIM. It stands for Subscriber Identity Module—a small object that’s an essential part of your smartphone. While SIMs do not contain a...</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    SIM. It stands for Subscriber Identity Module—a small object that’s an essential part of your smartphone. While SIMs do not contain a complete record of your phone’s usage, they contain important data regarding your account and carrier account details. Some also store contacts. Without this card, the device won’t make or accept any calls.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Your SIM key looks like the golden chip that’s on the front of most credit cards in circulation today, but bigger. Think of this microdevice as an on/off switch for your phone.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    SIMs offer flexibility in several situations. International travelers use SIMs to handle multiple phone numbers, for example. It’s handy to have a local number for the country you’re in so callers won’t have to pay international rates to reach you.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    SIM cards can pop in and out quickly, but a tiny, pointed object might help trigger the release. A thief who gets hands on your phone can also remove that SIM. However, that’s not the looming risk. The biggie is hackers who trick your cell carrier into moving your account and phone number to a SIM card they possess.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h2&gt;&#xD;
  
                  
                  
  How SIM Swapping Works

                
                &#xD;
&lt;/h2&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Porting your phone number to a different SIM card is common if your device is lost or damaged beyond repair. Switch the SIM, and your smartphone disconnects from the cellular network. From there, the possibilities for damage or account takeover are massive.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Unauthorized SIM card diversions are so common they’ve earned their own name—SIM swapping. It starts when a thief calls your carrier and attempts to persuade or convince a service rep into believing that they are you. 
    
  
  
                    
                    &#xD;
    &lt;a href="https://www.fcc.gov/spoofing"&gt;&#xD;
      &lt;u&gt;&#xD;
        
                        
                        
      
      
        A spoofed caller ID using your name
      
    
    
                      
                      &#xD;
      &lt;/u&gt;&#xD;
    &lt;/a&gt;&#xD;
    
                    
                    
  
  
     adds an element of credibility to this pitch. A naïve, hasty, or unseasoned customer support agent then authorizes the requested swap.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    “If your provider believes the bogus story and activates the new SIM card, the scammer—not you—will get all your text messages, calls, and data on the new phone,” the Federal Trade Commission (FTC) warns consumers.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    After the substitution occurs, the scammer receives any communications meant for you, including one-time login codes. For example, if you’ve enabled 
    
  
  
                    
                    &#xD;
    &lt;a href="https://www.nist.gov/itl/applied-cybersecurity/tig/back-basics-multi-factor-authentication"&gt;&#xD;
      &lt;u&gt;&#xD;
        
                        
                        
      
      
        multi-factor (MFA) or two-factor authentication
      
    
    
                      
                      &#xD;
      &lt;/u&gt;&#xD;
    &lt;/a&gt;&#xD;
    
                    
                    
  
  
     (2FA) for sensitive websites, a crook must enter these digits for access. Then, with code in hand, the thief completes the second step to log in. As a result, your accounts become wide open to criminals. Their first step will probably be to change your passcode to shut you out.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Data breaches like the 
    
  
  
                    
                    &#xD;
    &lt;a href="https://www.idshield.com/blog/data-breach/t-mobile-data-breach-details-unravel-and-its-not-pretty-heres-what-you-should-know"&gt;&#xD;
      &lt;u&gt;&#xD;
        
                        
                        
      
      
        recent massive T-Mobile breach
      
    
    
                      
                      &#xD;
      &lt;/u&gt;&#xD;
    &lt;/a&gt;&#xD;
    
                    
                    
  
  
     leaked buckets of personal information for 53 million applicants and users. All these details boost a scammer’s odds of success—even when faced with security questions they must answer. Would-be con artists already possess the last four numbers on your Social Security card and payment card or know where to buy those details.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h2&gt;&#xD;
  
                  
                  
  Risky Business

                
                &#xD;
&lt;/h2&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    What could possibly go wrong? A year ago, a group of Princeton University researchers released study results on the authentication process of five wireless carriers that offered prepaid plans. T-Mobile, Verizon, and AT&amp;amp;T were on that list. The researchers’ conclusion? Quite a lot can and does go wrong.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    “We found that 
    
  
  
                    
                    &#xD;
    &lt;a href="https://www.issms2fasecure.com/"&gt;&#xD;
      &lt;u&gt;&#xD;
        
                        
                        
      
      
        all five carriers use insecure authentication challenges
      
    
    
                      
                      &#xD;
      &lt;/u&gt;&#xD;
    &lt;/a&gt;&#xD;
    
                    
                    
  
  
     that can easily be subverted by attackers,” the authors wrote.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    The group also examined 140 popular websites identifying 17 websites that had questionable security. Princeton’s team then notified those 17 companies last spring. After 60 days passed, the team found that just over half of the businesses had failed to fix their vulnerabilities. That 2020 list included PayPal, Venmo, AOL and Amazon. It’s unknown whether those sites were later updated or not.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    If 2FA is easily defeated, what about other options like one-time tokens or keys? While some experts may advocate for alternatives like one-time tokens or keys, not all websites offer an alternative to 2FA.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h2&gt;&#xD;
  
                  
                  
  A Time-Consuming Headache

                
                &#xD;
&lt;/h2&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Here’s how one FTC.gov reader explained her SIM swap experience: “The only clue that something was wrong was the text from ATT stating my account password had been changed. SCARY. Needless to say, I have since changed all my social media and email passwords again.”
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Another victim described the experience this way, “It ruined my life for at least 3 weeks while I went around plugging holes. They got into everything using my sim: email, bank account, credit card even the credit card processing for my business.”
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    The mess that a SIM swap creates can take weeks to clean up. The surge in recent data losses worldwide keeps feeding the market for new attacks on unsuspecting customers. So, a rise in SIM swaps may be just around the corner.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Time loss is not the worse impact, either. If you’re the victim of a SIM swap, the intruder proceeds to crack accounts like Amazon or Costco along with bank holdings. Hackers hunt for credit accounts where card data has been stored. They can run up huge bills before detection. Gift cards are a popular purchase as they’re readily monetized.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    That said, financial losses could be temporary thanks to federal consumer protection laws. Credit issuers generally don’t hold cardholders liable for unauthorized purchases. Even banks routinely restore stolen funds, but these actions can take days or weeks. However, gift cards probably aren’t covered if you voluntarily surrender access details.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h2&gt;&#xD;
  
                  
                  
  Shield Yourself

                
                &#xD;
&lt;/h2&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Take some proactive steps to prevent a swap. These include:
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    IDShield monitors member phone numbers 24/7 along with bank account and credit card details. We can detect stolen 
    
  
  
                    
                    &#xD;
    &lt;a href="https://www.idshield.com/blog/internet-privacy/look-dark-side-stolen-data-what-and-where-dark-web"&gt;&#xD;
      &lt;u&gt;&#xD;
        
                        
                        
      
      
        Social Security numbers for sale on the Dark Web
      
    
    
                      
                      &#xD;
      &lt;/u&gt;&#xD;
    &lt;/a&gt;&#xD;
    
                    
                    
  
  
    , too. If your data turns up anywhere it shouldn’t be, we alert you and work with you to solve the problem. 
    
  
  
                    
                    &#xD;
    &lt;a href="https://www.idshield.com/plans-and-pricing"&gt;&#xD;
      &lt;u&gt;&#xD;
        
                        
                        
      
      
        Check out IDShield's individual and family monitoring plans
      
    
    
                      
                      &#xD;
      &lt;/u&gt;&#xD;
    &lt;/a&gt;&#xD;
    
                    
                    
  
  
    .
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/275cfcce/dms3rep/multi/file-166bdda4.png" alt="A bunch of sim cards are stacked on top of each other" title=""/&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/275cfcce/dms3rep/multi/file-166bdda4.png" length="321532" type="image/png" />
      <pubDate>Mon, 11 Oct 2021 16:57:00 GMT</pubDate>
      <author>office@egs-solutions.com (Stephani McGirr)</author>
      <guid>https://www.identitytheftsolutionstx.com/post/sim-swapping-lets-a-scammer-take-over-your-smartphone-learn-the-risks-to-avoid-this-scam</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/275cfcce/dms3rep/multi/file-166bdda4.png">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Cybercrime Risk: Small Business</title>
      <link>https://www.identitytheftsolutionstx.com/post/cybercrime-risk-small-business9f318956</link>
      <description>Running a small business is no small  task. While handling all of the moving parts involved in a successful  small business, it’s easy...</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
          Running a small business is no small  task. While handling all of the moving parts involved in a successful  small business, it’s easy for cybersecurity to slip through the cracks.  According to
          
                    &#xD;
    &lt;a href="https://www.symantec.com/security-center/threat-report"&gt;&#xD;
      
                      
           Symantec
          
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
          *,
          
                    &#xD;
    &lt;b&gt;&#xD;
      
                      
           43 percent of cyber attacks target small businesses
          
                    &#xD;
    &lt;/b&gt;&#xD;
    
                    
          .  From phishing to ransomware to data breaches, there are several ways  that cybercriminals target small businesses. Let’s discuss the risks and  the recovery process involved in these cyber-attacks:
         
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
           1. Phishing
          
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
          We’ve all seen phishing attempts come  to our inbox. An email with urgent language like “click now” or “action  required” pops-up. The purpose of phishing emails is to use social  engineering to get you to click the malicious link in the message. At  first glance, the email may even appear to come from a sender that you  recognize. It’s important to pay attention to detail; are there  misspellings? Does the email address match the contact name?
         
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
          If you or someone within your small  business clicks on a phishing email, your entire network could be at  risk. These attacks should be taken seriously, we highly recommend that  you consider security awareness training for your staff. Our sponsor,
          
                    &#xD;
    &lt;a href="https://info.knowbe4.com/cybercrime-support-network"&gt;&#xD;
      
                      
           KnowBe4
          
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
          ,  has phishing simulation software to prepare your employees for phishing  attempts. Once a phishing email is clicked, you should immediately  remove the infected device from your small business’s network and change  all passwords. Run a virus scan on all devices to determine the extent  of the damage. For detailed information on how and where to report the  phishing incident, visit us
          
                    &#xD;
    &lt;a href="https://fightcybercrime.org/phishing/"&gt;&#xD;
      
                      
           here
          
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
          .
         
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
           2. Ransomware
          
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
          Ransomware is malicious software that  holds your organization’s information or systems hostage. Ransomware  typically enters your network via a phishing email or a malicious  website. If the ransom is not paid, the cybercriminal threatens to  delete the data. It’s important to note that even if you pay the ransom,  the data may not be returned.
         
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
          If your organization is exposed to ransomware, the first thing you need to focus on is damage control. Immediately remove infected computers or devices from your business network and change all of your account and network passwords. Report the incident to the
          
                    &#xD;
    &lt;a href="https://www.ic3.gov/default.aspx"&gt;&#xD;
      
                      
           FBI Internet Crime Complaint Center (IC3)
          
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
          and visit us
          
                    &#xD;
    &lt;a href="https://fightcybercrime.org/ransomware/"&gt;&#xD;
      
                      
           here
          
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
          for recovery help.
         
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
           3. Data Breach
          
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
          A data breach is an incident where  confidential data stored within your organization is leaked. This data  may include banking information, Social Security numbers, passwords, emails, and other private employee or customer information. In 2018,
          
                    &#xD;
    &lt;a href="https://enterprise.verizon.com/resources/reports/DBIR_2018_Report.pdf"&gt;&#xD;
      
                      
           Verizon
          
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
          * found that 58 percent of data breach victims are small businesses. As a small business owner, the risk of a data breach is considerable.
         
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
          If a data breach occurs, start by changing any compromised passwords or credentials. Our affiliate partners,
          
                    &#xD;
    &lt;a href="https://fightcybercrime.org/additional-resources/"&gt;&#xD;
      
                      
           WhiteHawk and TechStak
          
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
          , can help you begin the recovery process. Review your state’s data breach notification laws on the NCSL’s
          
                    &#xD;
    &lt;a href="http://www.ncsl.org/research/telecommunications-and-information-technology/security-breach-notification-laws.aspx"&gt;&#xD;
      
                      
           website
          
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
          .  Properly reporting, recovering and reinforcing your organization’s  cybersecurity after a data breach is crucial. Visit FraudSupport.org’s
          
                    &#xD;
    &lt;a href="https://fightcybercrime.org/data-breach/"&gt;&#xD;
      
                      
           data breach
          
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
          incident recovery page.
         
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
          There are several cybercrime risks  facing small businesses every day. We aim to provide relief in the wake  of cyber-attacks. For recovery help and next steps to get your small  business back on track, utilize our online resource database
          
                    &#xD;
    &lt;a href="https://fightcybercrime.org/"&gt;&#xD;
      
                      
           FraudSupport.org
          
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
          .
         
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h6&gt;&#xD;
  
                  
         Sources*
Verizon: 
      https://enterprise.verizon.com/resources/reports/DBIR_2018_Report.pdf
Symantec: 
      https://www.symantec.com/security-center/threat-report
        
                &#xD;
&lt;/h6&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/275cfcce/dms3rep/multi/Screen+Shot+2021-10-15+at+12.26.38+PM.png" alt="A woman is standing in a kitchen holding a cup of coffee and looking at her phone." title=""/&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/275cfcce/dms3rep/multi/Screen+Shot+2021-10-15+at+12.31.05+PM.png" length="204510" type="image/png" />
      <pubDate>Tue, 28 Sep 2021 19:49:00 GMT</pubDate>
      <author>office@egs-solutions.com (Stephani McGirr)</author>
      <guid>https://www.identitytheftsolutionstx.com/post/cybercrime-risk-small-business9f318956</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/275cfcce/dms3rep/multi/Screen+Shot+2021-10-15+at+12.31.05+PM.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/275cfcce/dms3rep/multi/Screen+Shot+2021-10-15+at+12.31.05+PM.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>2021 Cyber Attack Statistics, Data, and Trends</title>
      <link>https://www.identitytheftsolutionstx.com/post/2021-cyber-attack-statistics-data-and-trends132ae509</link>
      <description>A cyber attack is an attempt to  invade a computer system, multiple computers, or a network  infrastructure with the intent to cause some...</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
          A cyber attack is an attempt to  invade a computer system, multiple computers, or a network  infrastructure with the intent to cause some sort of harm.  Cybercriminals launch cyberattacks to disrupt, disable or gain  unauthorized access to someone else’s computer or network. A successful  cyberattack can enable cybercriminals or hackers to steal, manipulate or  destroy critical data on the victim’s computer. Alternatively,  cybercriminals can also leverage a compromised system to further launch  attacks against other computers or environments.
         
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
          From financial gains to swaying  public opinion to cyber warfare, there’s a multitude of objectives  driving cyber attacks. And over the years, the bad actors have evolved  from the script kiddies of the 90s to the sophisticated, advanced  cybercriminals, and groups that have access to nation-state technology,  and resources. They are forcing IT and cybersecurity teams, already  grappling with the stringent budgets and the widening skills gap, to  prioritize their resources to combat the new wave of advanced cyber  threats.
         
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
          Forewarned is forearmed. So, here we  have compiled relevant data and statistics for cyber attacks in 2021 to  give you a better idea of the evolving threat landscape and enable you  to strengthen your defenses and strategically invest in cybersecurity.
         
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h2&gt;&#xD;
  
                  
         General Cyber Attack Stats
        
                &#xD;
&lt;/h2&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
          Let’s take a look at the cost, facts, and implications of cybercrime incidents as they unfolded over the past year.
         
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
          Although the average cost of a data breach has gone down from
          
                    &#xD;
    &lt;a href="https://www.mcafee.com/enterprise/en-us/assets/reports/rp-hidden-costs-of-cybercrime.pdf"&gt;&#xD;
      
                      
           $3.92 million
          
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
          in 2019, the trend wasn’t consistent across all organizations and  industries — those that were prepared with the best cybersecurity  practices and processes and trained incident response(IR) teams were  clearly at an advantage.
         
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
          And yet, the staggering number of  organizations still lacking an effective incident response and  prevention strategies is alarming.
         
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
          Let’s also take a look at some of the  most common vulnerabilities and security loopholes that have exposed  companies and their data over the past year (and beyond).
         
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
          Despite the abysmal stats regarding  security vulnerabilities, cyberattack preparedness — or the lack thereof  — and the questionable effectiveness of implemented strategies, there  are some positive trends on the horizon.
         
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h2&gt;&#xD;
  
                  
         Biggest Cyber Attacks and Data Breaches
        
                &#xD;
&lt;/h2&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
          A ransomware attack on the Dusseldorf  Hospital in Germany allegedly claimed the life of a patient in need of  urgent care. It could very well have been the first human death directly  related to a cyber attack. However, a detailed investigation later  revealed that the outcome would’ve been the same regardless of the cyber  attack. But the incident was a huge wake-up call for public and  government organizations to see the writing on the wall — it’s just a  matter of time before the ramifications of cyber attacks start extending  beyond monetary and reputational loss.
         
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
          Here are some of the most notorious cyber attacks and data breaches from the past years:
         
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h2&gt;&#xD;
  
                  
         1. Malware Statistics
        
                &#xD;
&lt;/h2&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
          Malware is a blanket term for all kinds of malicious software that are designed to damage computer systems. Different
          
                    &#xD;
    &lt;a href="https://parachutetechs.com/types-of-malware/"&gt;&#xD;
      
                      
           types of malware
          
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
          include viruses, trojans, worms, ransomware, adware, spyware, botnets,  and rootkit. Existing since the early 1970s, malware has been used for  causing disruptions, making money, implementing cyber warfare  strategies, and much more.
         
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h2&gt;&#xD;
  
                  
         2. Ransomware Statistics
        
                &#xD;
&lt;/h2&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
          Ransomware is a type of malware that  encrypts the files in the infected system, often displaying a message  that specifies an amount that must be paid to retrieve the encrypted  files. Depending on the type of ransomware, it may either be downloaded  on opening a malicious file or email attachment, or it can be  self-propagating like a worm — making it even more difficult to  contain.
         
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h2&gt;&#xD;
  
                  
         3. Phishing Statistics
        
                &#xD;
&lt;/h2&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
          One of the most prevalent forms of  cyber attacks, phishing involves a malicious actor impersonating a  trustworthy entity to obtain private data. Such attacks can be carried  out via emails, websites, or other means. Attackers can either trick  victims into providing sensitive information — such as credit card  information or passwords — or downloading malicious attachments.
         
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h2&gt;&#xD;
  
                  
         4. DDoS and IoT Statistics
        
                &#xD;
&lt;/h2&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
          A DDoS is a cyber attack that  disrupts the availability of online services or systems by overwhelming  the server with huge traffic/request volume. To launch a DDoS attack,  attackers must first assume control of multiple computer systems,  including IoT devices.
         
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h2&gt;&#xD;
  
                  
         5. Cryptocurrency Statistics
        
                &#xD;
&lt;/h2&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
          Cybercriminals can utilize the  victim’s computing resources to mine cryptocurrency. This type of cyber  attack is also known as cryptojacking. Cybercriminals can either infect a  website with cryptomining code or convince a user to click on or  download a malicious link.
         
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h2&gt;&#xD;
  
                  
         Cyber Attack Stats by Industry
        
                &#xD;
&lt;/h2&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
          The statistics and impact of cyber  attacks can vary greatly from industry to industry. For instance, while  the average cost of a data breach in heavily regulated industries like  healthcare and financial services is
          
                    &#xD;
    &lt;a href="https://www.ibm.com/security/data-breach"&gt;&#xD;
      
                      
           $7.13 and $5.86 million
          
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
          respectively; it is less than $2 million for others — such as media and  hospitality.  Similarly, the average lifecycle of a data breach in the  healthcare sector is 329 days, whereas the overall average is 280 days.
         
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
          So, here are some industry-specific  cyber attack statistics to give you an idea about the current state of  cybercrimes in each sector.
         
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
         1. Energy Statistics
        
                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
         2. Healthcare Statistics
        
                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
         3. Financial Statistics
        
                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
         4. Education Statistics
        
                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
         5. Government Statistics
        
                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
         6. Gaming Statistics
        
                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h2&gt;&#xD;
  
                  
         Small Business Statistics
        
                &#xD;
&lt;/h2&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h2&gt;&#xD;
  
                  
         Cybersecurity Statistics
        
                &#xD;
&lt;/h2&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
          Managed Service Provider Cyber Attack Statistics
         
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
          COVID-19 Statistics
         
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
          Cyber Attack FAQs
          
                    &#xD;
    &lt;b&gt;&#xD;
      
                      
           What are the most common types of cyber attacks?
          
                    &#xD;
    &lt;/b&gt;&#xD;
    
                    
          The most common types of cyber attacks are:
   – Malware like ransomware, spyware, and viruses.
   – Phishing and spear-phishing 
   – DDoS 
   – SQL injection 
   – Zero-day exploit
   – DNS tunneling
   – Man-in-the-middle
          
                    &#xD;
    &lt;b&gt;&#xD;
      
                      
           How many cyber attacks happened in 2020?
          
                    &#xD;
    &lt;/b&gt;&#xD;
    
                    
          About
          
                    &#xD;
    &lt;a href="https://www.globenewswire.com/news-release/2020/04/28/2023282/0/en/Arkose-Labs-Reveals-20-Spike-in-Fraud-as-Digital-Behavior-Shifts-During-COVID-19.html"&gt;&#xD;
      
                      
           445 million cyber attacks
          
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
          occurred just in the first half of 2020.
          
                    &#xD;
    &lt;b&gt;&#xD;
      
                      
           What percentage of cyber attacks are successful?
          
                    &#xD;
    &lt;/b&gt;&#xD;
    
                    
          In a recent survey,
          
                    &#xD;
    &lt;a href="https://www.statista.com/statistics/221394/successful-cyber-attacks-launched-against-businesses-worldwide/"&gt;&#xD;
      
                      
           45.5%
          
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
          of survey respondents claimed that their organization faced between one and five successful attacks during the past year.
          
                    &#xD;
    &lt;b&gt;&#xD;
      
                      
           What is the most dangerous cyber attack?
          
                    &#xD;
    &lt;/b&gt;&#xD;
    
                    
          Malware and DDoS attacks can be the  most dangerous attacks depending on the scale of the attack and the  targeted industry. For instance, a DDoS attack launched against a  hospital can prevent patients from accessing critical care and put  several lives at risk.
          
                    &#xD;
    &lt;b&gt;&#xD;
      
                      
           Where do cyber attacks come from?
          
                    &#xD;
    &lt;/b&gt;&#xD;
    
                    
          Cyber attacks are launched by threat actors — a person or a group behind malicious activities and incidents.
         
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
          Category:
          
                    &#xD;
    &lt;a href="https://parachutetechs.com/category/cybersecurity/"&gt;&#xD;
      
                      
           Cybersecurity
          
                    &#xD;
    &lt;/a&gt;&#xD;
    &lt;a href="https://parachutetechs.com/author/alukehart/"&gt;&#xD;
      
                      
           By Ashley Lukehart
          
                    &#xD;
    &lt;/a&gt;&#xD;
    &lt;a href="https://parachutetechs.com/2021/02/23/"&gt;&#xD;
      
                      
           February 23, 2021
          
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/275cfcce/dms3rep/multi/Screen+Shot+2021-10-15+at+12.26.45+PM.png" alt="A man is sitting on a window sill looking at his cell phone." title=""/&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/275cfcce/dms3rep/multi/Screen+Shot+2021-10-15+at+12.33.32+PM.png" length="1133837" type="image/png" />
      <pubDate>Tue, 28 Sep 2021 19:46:00 GMT</pubDate>
      <author>office@egs-solutions.com (Stephani McGirr)</author>
      <guid>https://www.identitytheftsolutionstx.com/post/2021-cyber-attack-statistics-data-and-trends132ae509</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/275cfcce/dms3rep/multi/Screen+Shot+2021-10-15+at+12.33.32+PM.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/275cfcce/dms3rep/multi/Screen+Shot+2021-10-15+at+12.33.32+PM.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Protect Your Kids’ School Data Without Locking Yourself Out</title>
      <link>https://www.identitytheftsolutionstx.com/post/protect-your-kids-school-data-without-locking-yourself-out0df2848b</link>
      <description>his might be your child’s first year of Kindergarten or their final college year. It doesn’t matter. Student admissions, registrations,...</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
          This might be your child’s first year of Kindergarten or their final college year. It doesn’t matter. Student admissions, registrations, and activities demand a lot of each child’s private data, and hackers know that very well. Schools and universities are high-value targets, so you should know how they guard your child’s data. Often the answer can surprise you since educators are in the business of sharing data, not locking it up.
         
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
          Each education milestone in your child’s life brings risks and pitfalls. Learn all you can about ID theft involving kids, school data breaches, ransomware, and other hacks that can siphon off your child’s private data in an instant. It will be time well spent.
         
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h2&gt;&#xD;
  
                  
         Earlier Education
        
                &#xD;
&lt;/h2&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
          First-time parents with a preschooler or 1st grade student may be stunned by the scope of data schools collect. Some details are needed, but others are not. Be selective with what you share. Ask yourself if private data is required before filling in the blanks or leaving those lines blank.
         
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
          Social Security Numbers (SSN) are a top request. It’s best to decline these demands whenever possible. Years ago, doctors, dentists, school principals and other care providers required your child’s SSN on forms. That was before the Age of Identity Theft, which we all live in today. If the data’s really needed, someone can track you down after registration to make a case for getting your child’s sensitive, 9-digit number.
         
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
          An SSN is probably the most critical data point each of us needs to guard throughout life so protect your child’s well. Younger kids can experience massive
          
                    &#xD;
    &lt;a href="https://www.idshield.com/blog/identity-theft/child-id-theft-rates-higher-adults-harder-detect"&gt;&#xD;
      
                      
           child identity theft
          
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
          without your knowledge. Their particulars are valued for synthetic identity theft too.
         
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
          When college applications come around, remember that some institutions won’t consider your student for scholarships without that SSN.
         
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
          You won’t need a FERPA release or a PoA for your elementary or high school kids unless they are already18. The federal law also gives parents and students an opt-out if
          
                    &#xD;
    &lt;a href="https://www2.ed.gov/policy/gen/guid/fpco/ferpa/parents.html"&gt;&#xD;
      
                      
           they don’t want their contact information shared
          
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
          in a school directory or other documents like event programs.
         
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
          Most schools provide an online student portal or website for everything from absences to trips to the zoo. Field trip and other activity forms often reside here. Such electronic advancements may help with permission forms lost on the way home, but electronic files do carry more risk of data loss.
         
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h2&gt;&#xD;
  
                  
         The College Years
        
                &#xD;
&lt;/h2&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
          It’s often a shock for parents who’re paying college fees and tuition to learn they have no legal access to their child’s college files. The
          
                    &#xD;
    &lt;a href="https://studentprivacy.ed.gov/frequently-asked-questions"&gt;&#xD;
      
                      
           Family Educational Rights and Privacy Act
          
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
          (FERPA) considers your kid an adult at age 18, and that could leave parents who bankroll higher education with no access to grades or other vital data.
         
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
          Planning for college is the right time to discuss having that young man or woman sign a FERPA release. Higher ed institutions often provide an online form to complete if you desire or expect access. Still, most operate on the belief that students should handle their affairs with no parental involvement. None.
         
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
          Some parents view FERPA releases as an invasion of their offspring’s privacy, but others believe that they’re the banker, so they deserve access to records. Think of it as the “Trust but Verify” approach.
         
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
           Note:
          
                    &#xD;
    &lt;/b&gt;&#xD;
    
                    
          the U.S. Dept. of Education states that
          
                    &#xD;
    &lt;a href="https://www.idshield.com/plans-and-pricing?utm_source=google&amp;amp;utm_medium=cpc&amp;amp;utm_campaign=G_IDS-US_BRAND_Search_IDSBrand&amp;amp;utm_term=%2Bidshield&amp;amp;gclid=Cj0KCQjwxJqHBhC4ARIsAChq4avVc-kb7trLZGoFddPfmyDECag9FqIhHKy2jgjh5I250IIKOf-RSjgaAibmEALw_wcB"&gt;&#xD;
      
                      
           parents retain access rights if the student’s still a dependent
          
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
          on your tax return, but colleges and universities may not know that. It’s just easier to have a FERPA release in their student file.
         
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
          Even the most reliable college student could take an unexpected detour. If you want to know whether your kid is attending classes or turning in assignments, you’ll need a release.
         
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
          Financial and health matters are parents’ top two concerns. You’ll need a Health Information Privacy &amp;amp; Portability Act (HIPAA) release to get data from the campus health clinic. Again, most centers catering to students should provide the forms.
         
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
          Legal and banking matters are quite a different story. For example, if your child runs into a police problem or experiences a hack of their checking account, a Power of Attorney (PoA) signed by your student is needed to gain access.
         
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
          Power documents are a service members receive from IDShield's sister agency,
          
                    &#xD;
    &lt;a href="https://www.legalshield.com/"&gt;&#xD;
      
                      
           LegalShield.com
          
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
          . Medical PoAs let you determine care if your 19-year-old is incapacitated and can’t make medical decisions. These are also available through LegalShield.com.
         
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h2&gt;&#xD;
  
                  
         Self-Protection and Data Selectivity
        
                &#xD;
&lt;/h2&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
          The trick is sharing only a few details you need to divulge. Ask why other information is required. Then ask a second official if that answer doesn’t make sense. Intake forms have contained a spot for SSNs for decades, and everyone may be familiar with the request, but that doesn’t make it wise. Share only what you must when you must.
         
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h2&gt;&#xD;
  
                  
         Beyond Graduation
        
                &#xD;
&lt;/h2&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
          Recent graduates are also top hacker targets, given their limited experience in finance matters, renting, and other adult transactions. Be sure to warn them of bogus scams like the federal student tax, which doesn’t exist.
         
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
          Student loan scams are also prevalent. (DJ link to July scam of the month when you post that) Recent federal records show those fraud involving government student loans jumped 188% in 2019. Non-government loan fraud reported was up 74%. Statistics on loan fraud trended even higher in 2020. A popular theme is loan consolidation to lower monthly payments, but that savings break could also wipe out federal benefits of loan forgiveness for those who qualify. Costs could end up being more than the current loans, in the long run, so urge caution here and do the math.
         
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h2&gt;&#xD;
  
                  
         Shield Yourself and Yours
        
                &#xD;
&lt;/h2&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
          The best time for action is today. Or tomorrow. Don’t wait until a significant data loss occurs. Ask any school your child attends for its data privacy policy. You might be surprised by some of the details or omissions. A policy should delineate how the institution shares the data, too.
         
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
          Learn all you can about why
          
                    &#xD;
    &lt;a href="https://www.idshield.com/blog/data-breach/your-students-data-hackers-dream"&gt;&#xD;
      
                      
           hackers love student data
          
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
          . Hackers are always seeking a new angle to compromise that
          
                    &#xD;
    &lt;a href="https://www.idshield.com/blog/identity-theft/what-pii-and-why-should-i-care"&gt;&#xD;
      
                      
           personally identifiable information
          
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
          or PII.
         
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
          Identity theft and oversharing data should be family concerns. They can inflict financial damages or impact your child’s personal safety. That’s one reason why
          
                    &#xD;
    &lt;a href="https://www.idshield.com/plans-and-pricing"&gt;&#xD;
      
                      
           IDShield provides a family policy
          
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
          that will cover your kids until age 26—even if you have 10 of them.
         
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;em&gt;&#xD;
      
                      
           IDShield is a product of Pre-Paid Legal Services, Inc. d/b/a LegalShield (“LegalShield”). LegalShield provides access to identity theft protection and restoration services. For complete terms, coverage, and conditions, please see an identity theft plan. All Licensed Private Investigators are licensed in the state of Oklahoma. This is meant to provide general information and is not intended to provide legal advice, render an opinion, or provide any specific recommendations.
          
                    &#xD;
    &lt;/em&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/275cfcce/file.png" alt="A man and a woman are standing in front of a store with an open sign." title=""/&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/275cfcce/dms3rep/multi/Screen+Shot+2021-10-15+at+12.31.20+PM.png" length="488426" type="image/png" />
      <pubDate>Tue, 24 Aug 2021 19:43:00 GMT</pubDate>
      <author>office@egs-solutions.com (Stephani McGirr)</author>
      <guid>https://www.identitytheftsolutionstx.com/post/protect-your-kids-school-data-without-locking-yourself-out0df2848b</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/275cfcce/dms3rep/multi/Screen+Shot+2021-10-15+at+12.31.20+PM.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/275cfcce/dms3rep/multi/Screen+Shot+2021-10-15+at+12.31.20+PM.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>The T-Mobile Data Breach Is One You Can’t Ignore</title>
      <link>https://www.identitytheftsolutionstx.com/post/the-t-mobile-data-breach-is-one-you-can-t-ignore07d14233</link>
      <description>Hackers claim to have obtained the data of 100 million people—including sensitive personal information. NOT ALL DATA breaches are created...</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
                      
    
    
      Hackers claim to have obtained the data of 100 million people—including sensitive personal information.
    
  
  
                    
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
                      
    
    
      NOT ALL DATA
    
  
  
                    
                    &#xD;
    &lt;/b&gt;&#xD;
    &lt;a href="https://www.wired.com/story/wired-guide-to-data-breaches/" target="_blank"&gt;&#xD;
      
                      
                      
    
    
      breaches
    
  
  
                    
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
                    
  
  
     are created equal. None of them are good, but they do come in varying degrees of bad. And given how regularly they happen, it’s understandable that you may have become inured to the news. Still, a T-Mobile breach that hackers claim involved the data of 100 million people deserves your attention, especially if you’re a customer of the “un-carrier.”
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    As first reported 
    
  
  
                    
                    &#xD;
    &lt;a href="https://www.vice.com/en/article/akg8wg/tmobile-investigating-customer-data-breach-100-million" target="_blank"&gt;&#xD;
      
                      
                      
    
    
      by Motherboard
    
  
  
                    
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
                    
  
  
     on Sunday, someone on the dark web claims to have obtained the data of 100 million from T-Mobile’s servers and is selling a portion of it on an underground forum for 6 bitcoin, about $280,000. The trove includes not only names, phone numbers, and physical addresses but 
    
  
  
                    
                    &#xD;
    &lt;a href="https://www.wired.com/story/t-mobile-breach-much-worse-than-it-had-to-be/" target="_blank"&gt;&#xD;
      
                      
                      
    
    
      also more sensitive data like social security numbers
    
  
  
                    
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
                    
  
  
    , driver's license information, and 
    
  
  
                    
                    &#xD;
    &lt;a href="https://www.wired.com/story/phone-numbers-indentification-authentication/" target="_blank"&gt;&#xD;
      
                      
                      
    
    
      IMEI numbers
    
  
  
                    
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
                    
  
  
    , unique identifiers tied to each mobile device. 
    
  
  
                    
                    &#xD;
    &lt;a href="https://www.vice.com/en/article/akg8wg/tmobile-investigating-customer-data-breach-100-million" target="_blank"&gt;&#xD;
      
                      
                      
    
    
      Motherboard confirmed
    
  
  
                    
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
                    
  
  
     that samples of the data “contained accurate information on T-Mobile customers.”
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    A lot of that information is already widely available, even the social security numbers, which can be found on any number of public records sites. There’s also the reality that most people’s data 
    
  
  
                    
                    &#xD;
    &lt;a href="https://www.wired.com/story/collection-one-breach-email-accounts-passwords/" target="_blank"&gt;&#xD;
      
                      
                      
    
    
      has been leaked
    
  
  
                    
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
                    
  
  
     at some point or another. But the apparent T-Mobile breach offers potential buyers a blend of data that could be used to great effect, and not in ways you might automatically assume.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    “This is ripe for using the phone numbers and names to send out SMS-based phishing messages that are crafted in a way that’s a little bit more believable,” says Crane Hassold, director of threat intelligence at email security company Abnormal Security. “That’s the first thing that I thought of, looking at this.”
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Yes, names and phone numbers are relatively easy to find. But a database that ties those two together, along with identifying someone’s carrier and fixed address, makes it much easier to convince someone to click on a link that advertises, say, a special offer or upgrade for T-Mobile customers. And to do so en masse.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    The same is true for identity theft. Again, a lot of the T-Mobile data is out there already in various forms across various breaches. But having it centralized streamlines the process for criminals—or for someone with a grudge, or a specific high-value victim in mind, says Abigail Showman, team lead at risk intelligence firm Flashpoint.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Brian Barnett, The Wired report, 08/16/2021
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/275cfcce/file.png" alt="A man and a woman are standing in front of a store with an open sign." title=""/&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/275cfcce/dms3rep/multi/Screen+Shot+2021-10-15+at+12.44.55+PM.png" length="115552" type="image/png" />
      <pubDate>Fri, 20 Aug 2021 18:14:00 GMT</pubDate>
      <author>office@egs-solutions.com (Stephani McGirr)</author>
      <guid>https://www.identitytheftsolutionstx.com/post/the-t-mobile-data-breach-is-one-you-can-t-ignore07d14233</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/275cfcce/dms3rep/multi/Screen+Shot+2021-10-15+at+12.44.55+PM.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/275cfcce/dms3rep/multi/Screen+Shot+2021-10-15+at+12.44.55+PM.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>What is Risk-Based Vulnerability Management?</title>
      <link>https://www.identitytheftsolutionstx.com/post/what-is-risk-based-vulnerability-management</link>
      <description>Conventional vulnerability management has been in the market for nearly two decades, with an initial emphasis on identifying...</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Conventional vulnerability management has been in the market for nearly two decades, with an initial emphasis on identifying vulnerabilities. Discovery and scanning drove innovation, and the only deliverables were reports that detailed the vulnerabilities identified by scanners. The teams responsible for fixing or remediating those vulnerabilities worked largely on their own to decide which ones should be remediated. Moreover, there were fewer vulnerabilities to worry about in the early days of vulnerability management: 4,932 vulnerabilities were published in the National Vulnerability Database (NVD) in 2005, compared with 17,306 in 2019. Those figures account for just new vulnerabilities published, and don’t include the cumulative totals of the years prior, a much larger number in 2019 than 2005, when the CVSS vulnerability scoring system was introduced.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    During this time, there were no tools to assess the risk of individual vulnerabilities on networks beyond the CVSS score: a good first step, but a flawed metric when relied solely upon. Only in the past few years have we seen an emergence of technologies and solutions that work to classify the risk of individual vulnerabilities on individual networks.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;em&gt;&#xD;
      &lt;b&gt;&#xD;
        
                        
                        
      
      
        What are the Basics of Risk-Based Vulnerability Management?
      
    
    
                      
                      &#xD;
      &lt;/b&gt;&#xD;
    &lt;/em&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Risk-based vulnerability management is a strategy for handling the myriad vulnerabilities on a typical enterprise network, according to the risk each individual vulnerability poses to an organization. At first blush, the concept of risk-based vulnerability management sounds relatively simple. But when most organizations are confronted with tens of thousands (or hundreds of thousands, or millions) of vulnerabilities, determining which pose the most risk to the organization is a significant undertaking. The key to risk-based vulnerability management – and the primary departure from the static, one-size-fits-all CVSS score – is a comprehensive analysis of each vulnerability in its context on the network and in the current external threat environment.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
                      
    
    
      Five basic vulnerability management categories are used to construct a context-based risk score. Each category contains multiple subfactors, totaling more than 40. The categories are:
    
  
  
                    
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    By considering these factors when assessing the risk of an individual vulnerability, security operations teams can receive a 360-degree view of potential threats to the organization. Doing so for each vulnerability means the organization can risk rank all its vulnerabilities, no matter how numerous, and make intelligent decisions on where to deploy precious remediation resources. This is the essence of risk-based vulnerability management.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
                  
  What is the Strategy Behind Risk-Based Vulnerability Management?

                
                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Risk-based vulnerability management is designed to address two key objectives:
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Confronted by an existing vulnerability count that can number in the millions on some enterprise networks, security and IT teams are often overwhelmed by the sheer volume of vulnerabilities. Couple that with seemingly endless pronouncements about the latest “critical” vulnerability that must be patched “ASAP,” and it’s difficult to overstate the confusion and challenge confronting organizations pursuing legitimate vulnerability risk reduction.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Risk-based vulnerability management helps to confront the vulnerability overload challenge that just about every organization encounters. With the means to identify the vulnerabilities that truly pose a risk to the organization out of the hundreds of thousands on the network, risk-based vulnerability management suggests a remediation roadmap for IT teams to follow. If followed, that roadmap ultimately leads to a legitimate reduction in enterprise vulnerability risk.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;em&gt;&#xD;
      &lt;b&gt;&#xD;
        
                        
                        
      
      
        Is Risk-Based Vulnerability Management Easy?
      
    
    
                      
                      &#xD;
      &lt;/b&gt;&#xD;
    &lt;/em&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    With the advent of modern vulnerability management solutions, including advanced tools like contextual vulnerability prioritization, risk-based vulnerability management is certainly easier than ever. There is an argument that practically accomplishing a risk-based vulnerability management program has only been possible with the introduction of such technical capabilities. For example, if an organization had to manually determine which vulnerabilities out of 200,000 pose the highest risk to the organization, that simply isn’t feasible.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    A solution like Secureworks® Taegis™ VDR can evaluate each vulnerability on a given network. VDR is driven by machine learning and features a software-driven contextual prioritization engine that uses more than 40 factors to determine the relative risk of each vulnerability, all without any human intervention. Such technology makes implementing a risk-based vulnerability management program infinitely easier than it would have been just a few years ago.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      &lt;em&gt;&#xD;
        
                        
                        
      
      
        Is Prioritization Important in Risk-Based Vulnerability Management?
      
    
    
                      
                      &#xD;
      &lt;/em&gt;&#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Meaningful vulnerability and remediation prioritization is not only important, it is the essence of risk-based vulnerability management. It’s simply impossible to have one without the other. The operative word is “meaningful.” There are many superficial ways to prioritize vulnerabilities, but only a comprehensive, contextualized view of the risk of each vulnerability provides the confidence remediation teams need to trust the result. Risk-based vulnerability management assumes that not all vulnerabilities are going to be remediated, so it’s very important those identified as high risk and earmarked for timely remediation be the right ones.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/275cfcce/dms3rep/multi/file-62317f9a.png" alt="A person is pressing a button that says risk on it." title=""/&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/275cfcce/dms3rep/multi/file-62317f9a.png" length="74916" type="image/png" />
      <pubDate>Tue, 10 Aug 2021 19:02:00 GMT</pubDate>
      <author>office@egs-solutions.com (Stephani McGirr)</author>
      <guid>https://www.identitytheftsolutionstx.com/post/what-is-risk-based-vulnerability-management</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/275cfcce/dms3rep/multi/file-62317f9a.png">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Key Takeaways from President Biden’s Cybersecurity Executive Order</title>
      <link>https://www.identitytheftsolutionstx.com/post/key-takeaways-from-president-biden-s-cybersecurity-executive-order</link>
      <description>Over the last week, Americans have been riveted by  scenes of panic buying at the pump after a ransomware attack shut down  the Colonial...</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Over the last week, Americans have been riveted by  scenes of panic buying at the pump after a ransomware attack shut down  the Colonial Pipeline, a critical source of fuel for the entire East  Coast. For the first time, many are reflecting on the national security  implications of cybersecurity attacks on everyday life – and the US  government is responding. On May 12, 2021, President Joe Biden signed an  Executive Order (EO) on “Improving the Nation’s Cybersecurity,”  signaling potentially increased regulatory oversight of cybersecurity  laws and regulations.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The EO responds to recent high-profile  cybersecurity attacks, including the most recent Colonial Pipeline  incident. On May 7, Colonial Pipeline announced that a cyberattack  forced the company to proactively close down operations and freeze IT  systems. The Georgia-based company provides roughly 45% of the East  Coast’s fuel, transporting more than 100 million gallons of fuel daily  from Texas to New York – and the shutdown soon resulted in shortages and  panic buying across the Southeast in particular.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    During a May 13 press conference, President Biden  assured the American public that fuel lines would soon be restored.  However, the President noted that “it is clear to everyone that we need  to do more than what we are doing now and the federal government can be a  significant value added in making that happen.”
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The President announced that the new EO “calls for  federal agencies to work more closely with the private sector – to  share information, strengthen cybersecurity practices, and deploy  technologies that increase resiliency against cyberattacks.”  Accordingly, the EO aims to make significant contributions to  modernizing the federal government’s cybersecurity practices,  particularly its software security, and under an aggressive timeline.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Broadly, the EO:
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    While announcing the EO, the President argued  that the US is competing with the world economically, adding, “we’re  not going to win it competing with an infrastructure that is out of the  20th century. We need a modern infrastructure.” Likewise, the former US  Secretary of Transportation, Rodney E. Slater, noted that “this  administration is taking the timely lead to make significant investments  in our digital infrastructure and make the bold changes necessary to  secure America’s national security interest.”
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Biden officials will continue prioritizing  cybersecurity and its respective enforcement of cybersecurity laws and  regulations, as means to continue to protect the everyday American and  the country’s economic recovery more broadly. For companies of all  sizes, industries and locations, this means ensuring that your  organization has conducted due diligence to mitigate the risk of, and be  prepared to respond to, cyberattacks as they arise.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/275cfcce/dms3rep/multi/file-12c998cd.png" alt="" title=""/&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/275cfcce/dms3rep/multi/file-12c998cd.png" length="93369" type="image/png" />
      <pubDate>Tue, 10 Aug 2021 18:33:00 GMT</pubDate>
      <author>office@egs-solutions.com (Stephani McGirr)</author>
      <guid>https://www.identitytheftsolutionstx.com/post/key-takeaways-from-president-biden-s-cybersecurity-executive-order</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/275cfcce/dms3rep/multi/file-12c998cd.png">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Business Identity Theft is a Big Threat to Small Business</title>
      <link>https://www.identitytheftsolutionstx.com/post/business-identity-theft-is-a-big-threat-to-small-business</link>
      <description>Identity theft is a serious problem—not just for individuals, but for businesses as well. Last year almost 16.7 million individuals were...</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Identity theft is a serious problem—not just for individuals, but for businesses as well. Last year almost 
    
  
  
                    
                    &#xD;
    &lt;a href="https://www.cbsnews.com/news/identity-theft-hits-record-high/"&gt;&#xD;
      
                      
                      
    
    
      16.7 million individuals
    
  
  
                    
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
                    
  
  
     were victims of identity theft. There was also a 
    
  
  
                    
                    &#xD;
    &lt;a href="https://www.pymnts.com/news/b2b-payments/2018/ncss-business-identity-theft-cybersecurity-cybercrime/"&gt;&#xD;
      
                      
                      
    
    
      46 percent increase
    
  
  
                    
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
                    
  
  
     in the number of reported cases of business identity theft, according to the National Cybersecurity Society (NCSS).
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    “Small business identity theft—stealing a business’ identity to commit fraud—is big business for identity thieves,” says Mary Ellen Seale, CEO of NCSS.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Unlike larger corporations, small businesses don’t always have the required security controls in place to detect and deter fraudulent activity, which can make them easier targets. There is also a general unawareness, among large and small businesses alike, of the magnitude of the threat and the devastating effects that business identity theft can have.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h2&gt;&#xD;
  
                  
                  
  What information are business identity thieves after?

                
                &#xD;
&lt;/h2&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Business identity thieves focus on stealing key business identifiers and credentials—such as officers’ names or your federal tax employer identification number—in order to manipulate or falsify state business filings and impersonate the business in other ways. Armed with this information, criminals can open a line of credit, obtain better terms with vendors, or apply for a loan. And, business credit cards, with credit limits of up to $100,000, provide another avenue for thieves to make purchases at the 
    
  
  
                    
                    &#xD;
    &lt;a href="http://www.businessidtheft.org/"&gt;&#xD;
      
                      
                      
    
    
      expense of small businesses
    
  
  
                    
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
                    
  
  
    .
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h2&gt;&#xD;
  
                  
                  
  Stealing a business identity or creating a new one is easy

                
                &#xD;
&lt;/h2&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Criminals can capitalize on the abundance of information made available to the public online. Businesses are required by law publish sensitive details which may include financial statements, stakeholder information, and key identifiers such as employee identification numbers, and sales tax and business numbers.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    This information and more can also be purchased legally through the internet. Often times, an application for a line of credit is approved based on public and re-cycled information found on the web.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h2&gt;&#xD;
  
                  
                  
  How identity thieves operate

                
                &#xD;
&lt;/h2&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Today, criminals are finding more sophisticated ways to impersonate and defraud businesses. While emulating a company’s letterhead, or sending fake correspondence are commonly used methods, other more advanced tactics are continuing to emerge. Some of these include
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h2&gt;&#xD;
  
                  
                  
  Stopping business identify theft

                
                &#xD;
&lt;/h2&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Most states have criminal statutes that only recognize identity crimes against individuals. In 2006, California became the first state to establish identity theft laws that officially recognized crimes targeting business entities. Effective October 2015, Florida implement new law that provides businesses the same protection as individuals when it comes to identity theft.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    So, what does this mean in terms of managing the investigation and prosecution of inter-state and business identity crimes that fall under federal jurisdiction? As is the case with state laws, the statutory language contained in federal identity theft laws does not include business entities, making it extremely difficult to prosecute inter-state crimes.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    As it appears the threat of business identity theft is not going away anytime soon, it is important that businesses, both small and large, recognize the real risk that identity theft poses, and take the necessary precautionary measures to prevent serious financial loss and other damages.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/275cfcce/dms3rep/multi/file-3f500aed.png" alt="How to prevent and protect yourself from business and identity theft" title=""/&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/275cfcce/dms3rep/multi/file-3f500aed.png" length="22309" type="image/png" />
      <pubDate>Tue, 20 Jul 2021 15:36:00 GMT</pubDate>
      <author>office@egs-solutions.com (Stephani McGirr)</author>
      <guid>https://www.identitytheftsolutionstx.com/post/business-identity-theft-is-a-big-threat-to-small-business</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/275cfcce/dms3rep/multi/file-3f500aed.png">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Could business ID theft put you out of business?</title>
      <link>https://www.identitytheftsolutionstx.com/post/could-business-id-theft-put-you-out-of-business</link>
      <description>Identity theft hits millions of Americans each year.  What many business executives don’t know is that ID thieves are using a variation...</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Identity theft hits millions of Americans each year.  What many business executives don’t know is that ID thieves are using a variation on the crime to prey on legitimate companies.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    What’s the crooks’ 
    
  
  
                    
                    &#xD;
    &lt;em&gt;&#xD;
      
                      
                      
    
    
      modus operandi
    
  
  
                    
                    &#xD;
    &lt;/em&gt;&#xD;
    
                    
                    
  
  
    ?  They typically alter business records filed with a state government so they can impersonate companies in good financial standing.  For example, thieves might change official documentation that lists a business’ address, corporate officers, or its registered agents.  Using altered documents, they’ll get lines of credit in the company’s name and siphon off money.  Once they’ve drained a business dry, they move on to the next victim, leaving the company with its credit — and reputation — in shambles.  Banks and retailers take a hit, too, with a stack of worthless receivables rung up by the con artists.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    The National Association of Secretaries of State (NASS) is taking the lead on getting out the word about business identity theft, steps to prevent it, and what your business can do to fight back.  What’s NASS’ advice for businesses?
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/275cfcce/dms3rep/multi/file-4cbb646b.png" alt="A man and a woman are standing in front of a store with an open sign." title=""/&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/275cfcce/dms3rep/multi/file-4cbb646b.png" length="1022749" type="image/png" />
      <pubDate>Tue, 20 Jul 2021 15:22:00 GMT</pubDate>
      <author>office@egs-solutions.com (Stephani McGirr)</author>
      <guid>https://www.identitytheftsolutionstx.com/post/could-business-id-theft-put-you-out-of-business</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/275cfcce/dms3rep/multi/file-4cbb646b.png">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Identity Theft Doubled in 2020: What Steps Are You Taking to Protect Yourself?</title>
      <link>https://www.identitytheftsolutionstx.com/post/identity-theft-doubled-in-2020-what-steps-are-you-taking-to-protect-yourself</link>
      <description>Hackers, scammers, thieves, criminals – whatever you want to call them – thrive in times of confusion. That’s not a throwaway comment,...</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Hackers, scammers, thieves, criminals – whatever you want to call them – thrive in times of confusion. That’s not a throwaway comment, either. As soon as the full force of the coronavirus pandemic hit last year, it became clear that scammers would look to capitalize. They knew, for instance, that there would be confusion over stimulus checks; you would be getting more packages delivered than usual; that you might be filing for unemployment for the first time. All of these things help scammers with successful phishing campaigns, which were increased during the pandemic.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    But perhaps the most notable criminal byproduct of the pandemic has been the rise in identity theft. The FTC reported that the number of reported cases doubled in 2020, 
    
  
  
                    
                    &#xD;
    &lt;a href="https://www.ftc.gov/news-events/press-releases/2021/02/new-data-shows-ftc-received-2-2-million-fraud-reports-consumers"&gt;&#xD;
      
                      
                      
    
    
      with around 1.4 million
    
  
  
                    
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
                    
  
  
     people said to have been impacted. As mentioned, the criminals involved see an opportunity in the pandemic and the seismic changes in work-life and society. One of the notable rises was in the identity theft used to apply for government benefits, with a rise of almost 3,000% recorded by the FTC.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    So, with so many scammers looking to profit from folks right now – what are the best ways to protect yourself from identity theft? Below we have highlighted 
    
  
  
                    
                    &#xD;
    &lt;a href="https://www.usa.gov/identity-theft"&gt;&#xD;
      
                      
                      
    
    
      some of the key advice
    
  
  
                    
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
                    
  
  
     from USAGov:
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
                      
    
    
      Protection available from insurers
    
  
  
                    
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    The above is just a small selection of the advice given by the government, but it clearly might not be enough. Nobody expects to be a victim of identity fraud – but it happened to 1.4 million Americans last year. Many insurance companies do have protection plans in place that both prevent identity theft through sophisticated monitoring software and get you back on your feet should the worst happen. 
    
  
  
                    
                    &#xD;
    &lt;a href="https://www.top10.com/id-theft/reviews/zander-identity-theft"&gt;&#xD;
      
                      
                      
    
    
      Zander Identity Theft
    
  
  
                    
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
                    
  
  
     is one of the industry leaders in this area and worth checking out if you are worried.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    One area where the USAGov official advice does not fully cover is social media. Ask yourself this question – how much could a fraudster learn about you by scrolling through 
    
  
  
                    
                    &#xD;
    &lt;a href="https://eminetra.com/big-tech-critics-push-to-reorganize-to-rebuild-facebook/618742/"&gt;&#xD;
      
                      
                      
    
    
      your Facebook
    
  
  
                    
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
                    
  
  
    , Twitter or Instagram accounts? Your date of birth? The names of your kids? Your address? Your place of work? The dates you are on vacation? We live our lives virtually now – more so during the pandemic – and we leave so much of a print on our feeds. Nobody is saying you shouldn’t celebrate a birthday with your friends on Facebook, but it is certainly worth making sure you have the right privacy settings.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Indeed, some of the things we might see as innocuous can be scams. Consider those (silly in most people’s views) games you find on social media, which claim they can tell something about you by inputting information. They might ask you the name of your pet or the first street that you lived on or your mother’s maiden name – all common security questions for banks and other sensitive accounts. Most of these games are harmless, but some most definitely are not.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    You can take the advice of the government and, perhaps, add some identity theft protection from an insurer. But above all, you should have a mindset that you, too, can fall afoul of identity theft scams. There is sometimes a sense that scams of this sort happen to other people because they are foolish. Sure, some may have been lax and made a mistake, but the majority do not – the only thing they have is the hindsight after the identity theft happens. Live your life as normal, online and offline. But take precautions and be aware that it could happen to anyone.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/275cfcce/dms3rep/multi/file-2e2a3262.png" alt="A person is pressing a button on a screen that says cyber security." title=""/&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/275cfcce/dms3rep/multi/file-2e2a3262.png" length="33238" type="image/png" />
      <pubDate>Thu, 15 Jul 2021 14:43:00 GMT</pubDate>
      <author>office@egs-solutions.com (Stephani McGirr)</author>
      <guid>https://www.identitytheftsolutionstx.com/post/identity-theft-doubled-in-2020-what-steps-are-you-taking-to-protect-yourself</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/275cfcce/dms3rep/multi/file-2e2a3262.png">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>FBI warns pandemic created a pathway for identity theft</title>
      <link>https://www.identitytheftsolutionstx.com/post/fbi-warns-pandemic-created-a-pathway-for-identity-theft</link>
      <description>What You Need To Know FBI received 30,000 ID theft cases nationwide in the first 4 months of 2021 FBI had 40,000 cases in all of last...</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
                      
    
    
      What You Need To Know
    
  
  
                    
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    According to FBI data, in the first four months of 2021, the FBI received about 30,000 cases of identity theft nationwide. Compare that to the 40,000 cases the FBI received all last year.   
“I got a strange email from someone I never dealt with, asking me why I sent them a bill for photography services for almost $1,000,” said Michael Pagano, who had his identity first stolen in February.
Pagano says he immediately called law enforcement and filed a report, which is exactly what the FBI recommends.
“You absolutely want to file a police report, because that will be part of your proof when you contact the companies to try and dispute the charges or anything that has happened to your identity,” said FBI Special Agent in Charge Ronald Hopper.
But in the following four months, Pagano says someone opened up a credit card in his name, changed his mailing address, and even signed up for informed delivery — a service which allows you to track your mail before it’s delivered.
“They were then able to see all our mail coming in, and it wasn’t just me at that point, it was also my daughter and wife,” said Pagano.
According to FBI reports, in 2019 — there were 2,953 reports of identity theft in Florida. In 2020, there were 6,334 reports.
And for 2021?
"It's on track to grow three times what it is already currently and the pandemic is a large part,” said Hopper.
Hopper says with more people working from home and networking online, criminals from anywhere in the world have easier access to your personal information.
“Personally, I was a victim of it. I actually have a set up on my credit card anytime more than $1 is charged, I get an email or text and I verify it,” said Hopper. “I was a little shocked at first, but it makes you realize that no one is immune to it.”
Pagano describes the online world as the wild, wild west — one with few security measures.
“To file a change of address, there’s almost no background check,” said Pagano.
The United State Postal Service is investigating Pagano’s case, but declined to share details.
An agency spokesman says it processes 37 million address changes a year and says most are legitimate.
The spokesman issued a statement reading in part, “… As these situations arise, the USPS reevaluates their internal controls to address security concerns.”
For Pagano, while he’s taking all the precautions he can, he still doesn’t feel totally protected.
Hopper says unfortunately, it is difficult to find those criminals, which is why he is urging everyone to take the safety steps before you’re a victim.
He says the most important step is creating strong passwords, and changing them every few months.

    
  
  
                    
                    &#xD;
    &lt;b&gt;&#xD;
      
                      
                      
    
    
      Protect Yourself
    
  
  
                    
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
                      
    
    
      Report Fraud
    
  
  
                    
                    &#xD;
    &lt;/b&gt;&#xD;
    
                    
                    
  
  
    
If you're a victim of identity theft or have information about these types of crimes, you can:
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
                      
    
    
      Cyber Crime Vulnerability Tips
    
  
  
                    
                    &#xD;
    &lt;/b&gt;&#xD;
    
                    
                    
  
  
    
The following tips can help protect individuals and businesses from being victimized by cyber actors:

    
  
  
                    
                    &#xD;
    &lt;b&gt;&#xD;
      
                      
                      
    
    
      DO:
    
  
  
                    
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
                      
    
    
      DON'T:
    
  
  
                    
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    If private sector partners have additional questions, you can reach out to local FBI Field Office Private Sector Coordinators. If you have evidence your child's data may have been compromised, if you are the victim of an internet scam or cybercrime, or if you want to report suspicious activity, please visit the FBI's Internet Crime Complaint Center at 
    
  
  
                    
                    &#xD;
    &lt;a href="https://www.ic3.gov/"&gt;&#xD;
      
                      
                      
    
    
      www.ic3.gov
    
  
  
                    
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
                    
  
  
    .
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/275cfcce/dms3rep/multi/file-d6198888.png" alt="The seal of the department of justice federal bureau of investigation." title=""/&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/275cfcce/dms3rep/multi/file-d6198888.png" length="90189" type="image/png" />
      <pubDate>Fri, 09 Jul 2021 14:51:00 GMT</pubDate>
      <author>office@egs-solutions.com (Stephani McGirr)</author>
      <guid>https://www.identitytheftsolutionstx.com/post/fbi-warns-pandemic-created-a-pathway-for-identity-theft</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/275cfcce/dms3rep/multi/file-d6198888.png">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Widespread ransomware attack likely hit ‘thousands’ of companies on eve of long weekend</title>
      <link>https://www.identitytheftsolutionstx.com/post/widespread-ransomware-attack-likely-hit-thousands-of-companies-on-eve-of-long-weekend</link>
      <description>Hackers hit a major IT software provider, which allowed their attack to spread downstream into many small businesses that now face ransom...</description>
      <content:encoded>&lt;h2&gt;&#xD;
  
                  
                  
  Hackers hit a major IT software provider, which allowed their attack to spread downstream into many small businesses that now face ransom demands to unlock their computer networks.

                
                &#xD;
&lt;/h2&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Listen to article
5 min
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    July 3, 2021 at 11:17 a.m. CDT
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/275cfcce/dms3rep/multi/file-3705debd.png" alt="A computer screen with the words cyber attack written on it" title=""/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    A sprawling 
    
  
  
                    
                    &#xD;
    &lt;a href="https://www.washingtonpost.com/business/2021/05/12/ransomware-attack/?itid=lk_inline_manual_2"&gt;&#xD;
      
                      
                      
    
    
      ransomware
    
  
  
                    
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
                    
  
  
     attack that hit hours before the beginning of the July Fourth holiday weekend has already affected hundreds of businesses and is likely to hit many more, researchers said.
On Saturday morning, the information technology company Kaseya confirmed that it had suffered a “sophisticated cyberattack” on its VSA software — a set of tools used by IT departments to manage and monitor computers remotely. The company said that only about 40 customers had been affected.

But because Kaseya’s software is used by large IT companies that offer contract services to hundreds of smaller businesses, the hack could have spread to thousands of victims. Kaseya told all of its nearly 40,000 customers to disconnect their Kaseya software immediately. The cybersecurity firm Huntress Labs said it had tracked 20 IT companies, known as managed-service providers, that had been hit. More than 1,000 of those companies’ clients, mostly small businesses, also had been affected by the hack, 
    
  
  
                    
                    &#xD;
    &lt;a href="https://www.reddit.com/r/msp/comments/ocggbv/crticial_ransomware_incident_in_progress/?utm_campaign=CY21-Q3-RapidResponse-KaseyaVSA&amp;amp;utm_content=171826755&amp;amp;utm_medium=social&amp;amp;utm_source=twitter&amp;amp;hss_channel=tw-3330464153"&gt;&#xD;
      
                      
                      
    
    
      Huntress Labs said on Reddit
    
  
  
                    
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
                    
  
  
    .

Advertisement


“I wouldn’t be surprised if it was thousands of companies,” said Fabian Wosar, the chief technology officer of Emsisoft, a company that provides software and advice to help organizations defend against ransomware attacks. “We just don’t know yet because of the long weekend in the U.S.”
A major grocery chain in Sweden said Saturday that its IT provider had been hit by an attack and that its cash registers were locked up. It had to shut down hundreds of stores, the company, Coop Sweden, said on its 
    
  
  
                    
                    &#xD;
    &lt;a href="https://www.facebook.com/CoopSverige/"&gt;&#xD;
      
                      
                      
    
    
      Facebook page
    
  
  
                    
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
                    
  
  
    .
Because of the vast number of companies potentially affected, the attack could prove to be one of the biggest in history. Researchers said REvil, the hacker group that attacked the meat processor JBS this spring, was behind this attack.

    
  
  
                    
                    &#xD;
    &lt;a href="https://www.washingtonpost.com/business/2021/06/04/white-house-fbi-ransomware-attacks/?itid=lk_interstitial_manual_11"&gt;&#xD;
      &lt;em&gt;&#xD;
        
                        
                        
      
      
        The Biden administration seeks to rally allies and the private sector against the ransomware threat
      
    
    
                      
                      &#xD;
      &lt;/em&gt;&#xD;
    &lt;/a&gt;&#xD;
    
                    
                    
  
  
    
The assault could increase tensions between the United States and Russia, as it comes just weeks after President Biden met with Russian President Vladimir Putin in Geneva, warning him that the United States would hold Moscow accountable for cyberattacks that originate in Russia. Many cybersecurity threat analysts think that REvil operates largely from Russia. The recent spate underscores the challenge the Biden administration faces in deterring ransomware attacks conducted by criminals given safe harbor in countries like Russia.

Advertisement


Instead of a careful, targeted attack on a single large company, this hack seems to have used managed-service providers to spread its harm indiscriminately through a huge network of smaller companies. Unlike most ransomware attacks, it doesn’t appear that REvil tried to steal sensitive data before locking its victims out of their systems, Wosar said.
“At this point, at least it seems it was more a spray-and-pray attack. They didn’t try to exfiltrate data from all the victims,” he said. “It was more like carpet bombing.”
“We believe that we have identified the source of the vulnerability and are preparing a patch to mitigate it,” Kaseya CEO Fred Voccola wrote in a 
    
  
  
                    
                    &#xD;
    &lt;a href="https://www.kaseya.com/potential-attack-on-kaseya-vsa/"&gt;&#xD;
      
                      
                      
    
    
      statement
    
  
  
                    
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
                    
  
  
     Friday night.

    
  
  
                    
                    &#xD;
    &lt;a href="https://www.washingtonpost.com/technology/2021/06/09/jbs-11-million-ransom/?itid=lk_interstitial_manual_18"&gt;&#xD;
      &lt;em&gt;&#xD;
        
                        
                        
      
      
        JBS paid $11 million in ransom after hackers shut down meat plants
      
    
    
                      
                      &#xD;
      &lt;/em&gt;&#xD;
    &lt;/a&gt;&#xD;
    
                    
                    
  
  
    
Researchers said cybercriminals were sending two different ransom notes on Friday — demanding $50,000 from smaller companies and $5 million from larger ones.

Advertisement


The U.S. Cybersecurity and Infrastructure Security Agency 
    
  
  
                    
                    &#xD;
    &lt;a href="https://us-cert.cisa.gov/ncas/current-activity/2021/07/02/kaseya-vsa-supply-chain-ransomware-attack"&gt;&#xD;
      
                      
                      
    
    
      urged companies in a statement
    
  
  
                    
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
                    
  
  
     to follow Kaseya’s advice and said it is “taking action to understand and address the recent supply-chain ransomware attack.”
“It is absolutely the biggest non-nation-state supply-chain cyberattack that we’ve ever seen,” Allan Liska, a researcher with the cybersecurity firm Recorded Future, said Friday. “And it’s probably the biggest ransomware attack we’ve seen, at least the biggest since WannaCry.”
He noted that it could be the largest number of companies hit in one ransomware attack. The companies affected could include a wide range of small to large firms, and many are likely to be small to midsize businesses that use managed IT services. Kaseya also counts a number of state and local governments as customers, Liska said.

Advertisement


The WannaCry computer worm affected hundreds of thousands of people in 2017. The National Security Agency eventually linked the North Korean government to the creation of the worm.

    
  
  
                    
                    &#xD;
    &lt;a href="https://www.washingtonpost.com/technology/2021/05/15/ransomware-colonial-darkside-cyber-security/?itid=lk_interstitial_manual_28"&gt;&#xD;
      &lt;em&gt;&#xD;
        
                        
                        
      
      
        Ransomware is a national security threat and a big business — and it’s wreaking havoc
      
    
    
                      
                      &#xD;
      &lt;/em&gt;&#xD;
    &lt;/a&gt;&#xD;
    
                    
                    
  
  
    
Ransomware attacks increased significantly in frequency and severity during 2020. A report from a task force of more than 60 experts said nearly 2,400 governments, health-care systems and schools in the country were hit by ransomware in 2020. Organizations paid attackers more than $412 million in ransoms last year, according to the analysis firm Chainalysis.
After a May attack on Colonial Pipeline — which led to panicked lines at gas pumps and empty fuel stations — the U.S. government increased its emphasis on addressing cybersecurity issues and urged corporate America to strengthen its computer security.

Ransomware attacks have been on the rise as hackers 
    
  
  
                    
                    &#xD;
    &lt;a href="https://www.washingtonpost.com/technology/2021/05/15/ransomware-colonial-darkside-cyber-security/?itid=lk_inline_manual_32"&gt;&#xD;
      
                      
                      
    
    
      band together and form cybercriminal gangs
    
  
  
                    
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
                    
  
  
     to extort companies for payment. The attacks are often carried out by attackers in Russia and Eastern Europe.

Advertisement

Hackers gain access to a company’s computer system using tactics such as sending “phishing” emails, which are designed to trick employees into inadvertently installing malware on their computers.

    
  
  
                    
                    &#xD;
    &lt;a href="https://www.washingtonpost.com/technology/2021/06/17/ransomware-axa-insurance-attacks/?itid=lk_interstitial_manual_35"&gt;&#xD;
      &lt;em&gt;&#xD;
        
                        
                        
      
      
        Ransomware claims are roiling an entire segment of the insurance industry
      
    
    
                      
                      &#xD;
      &lt;/em&gt;&#xD;
    &lt;/a&gt;&#xD;
    
                    
                    
  
  
    
Once inside, cybercriminals will lock down parts of a company’s networks and demand payment to release them back to the owner. Additionally, hackers often steal private company information and threaten to leak it online if they are not paid.
It is still unclear how attackers gained access to Kaseya’s system. The company has been a popular target of REvil, Liska said, probably because it serves so many other organizations as customers.
The attackers included a ransom note directing victims to a website to make a payment, although Liska said the site had been down all of Friday afternoon and evening.

    
  
  
                    
                    &#xD;
    &lt;a href="https://www.washingtonpost.com/business/2021/05/12/ransomware-attack/?itid=lk_interstitial_manual_39"&gt;&#xD;
      &lt;em&gt;&#xD;
        
                        
                        
      
      
        Ransomware attacks could reach ‘pandemic’ proportions. What to know after the pipeline hack.
      
    
    
                      
                      &#xD;
      &lt;/em&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    0 Comments
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Advertisement
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    MOST READ
    
  
  
                    
                    &#xD;
    &lt;a href="https://www.washingtonpost.com/technology/"&gt;&#xD;
      
                      
                      
    
    
       TECHNOLOGY
    
  
  
                    
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/275cfcce/dms3rep/multi/file-3705debd.png" length="56212" type="image/png" />
      <pubDate>Tue, 06 Jul 2021 15:09:00 GMT</pubDate>
      <author>office@egs-solutions.com (Stephani McGirr)</author>
      <guid>https://www.identitytheftsolutionstx.com/post/widespread-ransomware-attack-likely-hit-thousands-of-companies-on-eve-of-long-weekend</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/275cfcce/dms3rep/multi/file-3705debd.png">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Synthetic Identity Theft Rises in Southeast Asia</title>
      <link>https://www.identitytheftsolutionstx.com/post/synthetic-identity-theft-rises-in-southeast-asia</link>
      <description>imply stated, synthetic identity theft is when a fraudster combines the personal information of different real-life people to create an...</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    imply stated, synthetic identity theft is when a fraudster combines the personal information of different real-life people to create an authentic-looking digital identity.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    These identities can include Personally Identifiable Information (PII) such as name, identity card number, birth date and home address (including the use of children’s IDs since they have no credit records).
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    This data often comes from the global breaches we hear about on a near-daily basis.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    When these data points are combined in the right way, new identities are crafted to use the real-world parts to create a convincing online consumer.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Yet, synthetic identity theft isn’t a quick crime of opportunity but a complex and large scale fraud scheme that designs user accounts to mimic a real-world person in order to trick a bank or company into providing goods or lines of credit to a user who doesn’t exist.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    And while this fraud scheme can take months to years to develop, it’s growing in Asia.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
                  
  How Big of a Threat is Synthetic Identity in Asia?

                
                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    FICO, during its 
    
  
  
                    
                    &#xD;
    &lt;a href="https://www.fico.com/blogs/apac-banks-say-fraudulent-synthetic-identities-rise"&gt;&#xD;
      
                      
                      
    
    
      Asia Pacific Fraud Forum in 2018
    
  
  
                    
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
                    
  
  
    , reported that 6 of the 10 banks in Asia Pacific were experiencing a rise in application fraud with synthetic identities.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    And as the Aite Group predicts in a recent BankInfoSecurity article, synthetic identity fraud may grow to 
    
  
  
                    
                    &#xD;
    &lt;a href="https://www.bankinfosecurity.com/how-defining-synthetic-id-fraud-helps-mitigation-a-16403"&gt;&#xD;
      
                      
                      
    
    
      $2.42 billion in 2023
    
  
  
                    
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
                    
  
  
    .
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    These accounts not only seem real, fraudsters use these accounts to acquire items or credit and pay the bills for these accounts, just like good customers.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Over time, with the increased credit, the fraudsters apply for additional accounts with bigger lines of credit from lenders.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    They may take months or years to nurture an identity to preserve the integrity of these profiles and establish credibility.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    A talented fraudster might create synthetic identities to maintain strong credit scores. A Singapore fraudster may take time to build a solid CBS Credit Score.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Their American counterpart, meanwhile, has spent months or even years building a high FICO score.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Then, all of a sudden, the credit cards get maxed out and the money, and the user, disappear. Attempts to recuperate money fail because the user was never a real person, making it harder to find those responsible.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
                  
  Spotting Fraud

                
                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    With growing demand for lenders and goods, it is often difficult for any business to ensure that their customer base is free of these criminals.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    In 
    
  
  
                    
                    &#xD;
    &lt;a href="https://bit.ly/3cGDlF3"&gt;&#xD;
      
                      
                      
    
    
      Ekata’s eBook, Synthetic Identity Theft
    
  
  
                    
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
                    
  
  
    , readers can learn more about the common techniques fraudsters employ to commit fraud, why synthetic identity is difficult to find and how 
    
  
  
                    
                    &#xD;
    &lt;a href="https://bit.ly/3jlbo9S"&gt;&#xD;
      
                      
                      
    
    
      Ekata
    
  
  
                    
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
                    
  
  
     can help reduce the threat.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/275cfcce/dms3rep/multi/file-38886563.png" alt="A blue fingerprint with the words `` synthetic identity fraud '' written on it." title=""/&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/275cfcce/dms3rep/multi/file-38886563.png" length="106832" type="image/png" />
      <pubDate>Tue, 29 Jun 2021 15:43:00 GMT</pubDate>
      <author>office@egs-solutions.com (Stephani McGirr)</author>
      <guid>https://www.identitytheftsolutionstx.com/post/synthetic-identity-theft-rises-in-southeast-asia</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/275cfcce/dms3rep/multi/file-38886563.png">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Data breaches: Most victims unaware when shown evidence of multiple compromised accounts</title>
      <link>https://www.identitytheftsolutionstx.com/post/data-breaches-most-victims-unaware-when-shown-evidence-of-multiple-compromised-accounts</link>
      <description>t’s been nine years since the LinkedIn data breach, eight years since Adobe customers were victims of cyber attackers and four years...</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    t’s been nine years since the LinkedIn data breach, eight years since Adobe customers were victims of cyber attackers and four years since Equifax made headlines for the exposure of private information of millions of people.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    The number of data breaches and victims has multiplied rapidly over the past decade or so, but aside from these well-publicized cases, most participants in a recent University of Michigan study remained unaware that their email addresses and other personal information had been compromised in five data breaches on average.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    In the first known study to ask participants about actual data breaches that impacted them, researchers from the U-M School of Information showed 413 people facts from up to three breaches that involved their own personal information. The international team from U-M, George Washington University and Karlsruhe Institute of Technology found people were not aware of 74% of the breaches.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    “This is concerning. If people don’t know that their information was exposed in a breach, they cannot protect themselves properly against a breach’s implications, e.g., an increased risk of identity theft,” said 
    
  
  
                    
                    &#xD;
    &lt;a href="https://www.si.umich.edu/people/yixin-zou"&gt;&#xD;
      
                      
                      
    
    
      Yixin Zou
    
  
  
                    
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
                    
  
  
    , U-M doctoral candidate.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    The researchers also found that most of those breached blamed their own personal behaviors for the events—using the same password across multiple accounts, keeping the same email for a long time and signing up for “sketchy” accounts—with only 14% attributing the problem to external factors.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    “While there’s some responsibility on consumers to be careful about who they share their personal information with, the fault for breaches almost always lies with insufficient security practices by the affected company, not by the victims of the breach,” said 
    
  
  
                    
                    &#xD;
    &lt;a href="https://www.seas.gwu.edu/adam-aviv"&gt;&#xD;
      
                      
                      
    
    
      Adam Aviv
    
  
  
                    
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
                    
  
  
    , associate professor of computer science at George Washington University.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    The 
    
  
  
                    
                    &#xD;
    &lt;a href="https://haveibeenpwned.com/"&gt;&#xD;
      
                      
                      
    
    
      Have I Been Pwned
    
  
  
                    
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
                    
  
  
     database used in this study lists nearly 500 online breaches and 10 million compromised accounts over the last decade. According to the Identity Theft Resource Center, the overall number of data breaches affecting U.S. consumers is even higher, reporting more than 1,108 breaches in the United States in 2019 alone.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Prior research asked about concerns and reactions to data breaches in general, or it relied on self-reported data to determine how a particular incident impacted people. This study used public records in the Have I Been Pwned dataset of who was affected by breaches. The research team gathered 792 responses involving 189 unique breaches and 66 different exposed data types. Of the 431 participant email addresses queried, 73% of participants were exposed in one or more breaches, with the highest number of 20.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Of all information that was breached, email addresses were compromised the most, followed by passwords, usernames, IP addresses and dates of birth.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Most participants expressed moderate concern and were most worried about the leak of physical addresses, passwords and phone numbers. In response to their compromised accounts, they reported taking action or an intention to change passwords for 50% of the breaches.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    “It could be that some of the breached services were considered ‘not important’ because the breached account did not contain sensitive information. However, low concern about a breach may also be explained by people not fully considering or being aware of how leaked personal information could potentially be misused and harm them,” said 
    
  
  
                    
                    &#xD;
    &lt;a href="https://secuso.aifb.kit.edu/english/Staff_Mayer.php"&gt;&#xD;
      
                      
                      
    
    
      Peter Mayer
    
  
  
                    
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
                    
  
  
    , postdoctoral researcher at Karlsruhe Institute of Technology.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Risks range from credential stuffing—or using a leaked email address and password to gain access to other accounts of the victim—to identity theft and fraud.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Most of the breaches never made the news, and often they involved little or no notification to those impacted.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    “Today’s data breach notification requirements are insufficient,” Zou said. “Either people are not being notified by breached companies, or the notifications are crafted so poorly that people might get an email notification or letter but disregard it. 
    
  
  
                    
                    &#xD;
    &lt;a href="https://doi.org/10.1145/3290605.3300424"&gt;&#xD;
      
                      
                      
    
    
      In prior work
    
  
  
                    
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
                    
  
  
    , we analyzed data breach notification letters sent to consumers and found that they often require advanced reading skills and obscure risks.”
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    At the end of the study, researchers showed participants the full list of breaches affecting them and provided information for taking protective steps against potential risks from data breaches.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
                      
    
    
      GUIDE TO AVOID DATA BREACHES
    
  
  
                    
                    &#xD;
    &lt;/b&gt;&#xD;
    
                    
                    
  
  
    
FOR DATA BREACH VICTIMS:
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    REDUCE CHANCE OF BREACHES
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    “The findings from this study further underline the failure and shortcomings of current data and security breach notification laws,” said 
    
  
  
                    
                    &#xD;
    &lt;a href="https://www.si.umich.edu/people/florian-schaub"&gt;&#xD;
      
                      
                      
    
    
      Florian Schaub
    
  
  
                    
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
                    
  
  
    , U-M assistant professor of information. “What we find again and again in our work is that important legislation and regulation, which is meant to protect consumers, is rendered ineffective in practice by poor communication efforts by the affected companies that need to be held more accountable for securing customer data.”
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    The researchers point to Europe’s General Data Protection Regulation that legislates hefty fines for companies that don’t protect consumers as a means toward solving the issue. The law led companies worldwide to retool their privacy programs and safeguards.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/275cfcce/dms3rep/multi/file-3705debd.png" alt="A computer screen with the words cyber attack written on it" title=""/&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/275cfcce/dms3rep/multi/file-3705debd.png" length="56212" type="image/png" />
      <pubDate>Tue, 22 Jun 2021 14:39:00 GMT</pubDate>
      <author>office@egs-solutions.com (Stephani McGirr)</author>
      <guid>https://www.identitytheftsolutionstx.com/post/data-breaches-most-victims-unaware-when-shown-evidence-of-multiple-compromised-accounts</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/275cfcce/dms3rep/multi/file-3705debd.png">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Free Genetic Test is Really Medicare Fraud</title>
      <link>https://www.identitytheftsolutionstx.com/post/free-genetic-test-is-really-medicare-fraud</link>
      <description>This Medicare scam is back! Con artists are claiming to offer “free” genetic testing kits that allegedly screen for heart conditions or...</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    This Medicare scam is back! Con artists are claiming to offer “free” genetic testing kits that allegedly screen for heart conditions or cancer. It’s really a ruse to steal your Medicare information for fraudulent billing and/or identity theft.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
                      
    
    
      How the Scam Works
    
  
  
                    
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    You get a call from someone claiming to be from Medicare or an official-sounding organization. (One victim reported to BBB Scam Tracker receiving a call from “the Cardiac Test Center.”) The caller claims to be providing free genetic testing kits. All you need to do is agree to receive a kit in the mail, swab your cheek, and return the vial. The test will tell you if you have a genetic predisposition to heart disease, cancer, or another common condition. The caller insists that the test will be totally covered by Medicare.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    This sounds like a useful (and free) test, so you agree. Of course, there’s a catch! Before the company can mail your kit, they need your Medicare ID number and a lot of personal information. Targets of this scam report being asked extensive questions about their health, such as their family medical history and previous diagnoses.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    As always, there are several variations of this con. Previous versions involved scammers going door-to-door or setting up tables at health fairs. Con artists may even provide gift cards or other giveaways in exchange for your participation.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    While genetic testing is a legitimate service—some victims do actually receive a genetic testing kit—the scammers are trying to commit fraud by billing Medicare for the unnecessary tests. For the victims, these cons can lead to medical identity theft and, in some instances, a bill for thousands of dollars. Consumers should always consult with their primary care doctor before agreeing to tests.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
                      
    
    
      Protect yourself from this scam:
    
  
  
                    
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
                      
    
    
      Be wary of any lab tests at senior centers, health fairs, or in your home.
    
  
  
                    
                    &#xD;
    &lt;/b&gt;&#xD;
    
                    
                    
  
  
     Be suspicious of anyone claiming that genetic tests and cancer screenings are “free” or “covered by Medicare.”If a product or test is truly “free,” you will not have to provide your Medicare number.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
                      
    
    
      Don’t share your Medicare number.
    
  
  
                    
                    &#xD;
    &lt;/b&gt;&#xD;
    
                    
                    
  
  
     If anyone other than your physician's office requests your Medicare information, do not provide it. Also, protect your Medicare card by keeping it in a safe place (not your wallet).
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
                      
    
    
      Do not trust a name or phone number.
    
  
  
                    
                    &#xD;
    &lt;/b&gt;&#xD;
    
                    
                    
  
  
     Con artists often use official-sounding names or appear to be calling from a government agency or related area code. Medicare will never call you to confirm your personal information, your Medicare number, or ask questions about your personal health.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
                      
    
    
      Report Medicare fraud.
    
  
  
                    
                    &#xD;
    &lt;/b&gt;&#xD;
    
                    
                    
  
  
     If you think you are a victim of Medicare fraud, be sure to report it. Go here on 
    
  
  
                    
                    &#xD;
    &lt;a href="http://medicare.gov/"&gt;&#xD;
      &lt;u&gt;&#xD;
        
                        
                        
      
      
        Medicare.gov
      
    
    
                      
                      &#xD;
      &lt;/u&gt;&#xD;
    &lt;/a&gt;&#xD;
    
                    
                    
  
  
     to get started.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/275cfcce/dms3rep/multi/file-53f8aef5.png" alt="A medicare card is sitting on top of a pile of money." title=""/&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/275cfcce/dms3rep/multi/file-53f8aef5.png" length="102397" type="image/png" />
      <pubDate>Tue, 15 Jun 2021 14:26:00 GMT</pubDate>
      <author>office@egs-solutions.com (Stephani McGirr)</author>
      <guid>https://www.identitytheftsolutionstx.com/post/free-genetic-test-is-really-medicare-fraud</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/275cfcce/dms3rep/multi/file-53f8aef5.png">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>High Court Clarifies When Employee’s Data Misuse Violates Federal Fraud Act</title>
      <link>https://www.identitytheftsolutionstx.com/post/high-court-clarifies-when-employee-s-data-misuse-violates-federal-fraud-act721d3a41</link>
      <description>Do employees who are authorized to access information on a work computer violate the Computer Fraud and Abuse Act (CFAA) if they use such...</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Do
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/275cfcce/file.png" alt="A man and a woman are standing in front of a store with an open sign." title=""/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    employees who are authorized to access information on a work computer violate the Computer Fraud and Abuse Act (CFAA) if they use such information for unauthorized purposes?
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    In 
    
  
  
                    
                    &#xD;
    &lt;a href="https://www.supremecourt.gov/opinions/20pdf/19-783_k53l.pdf" target="_blank"&gt;&#xD;
      
                      
                      
    
    
      a 6-3 decision
    
  
  
                    
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
                    
  
  
    , the U.S. Supreme Court found that a person violates the CFAA when he or she accesses a computer with authorization but obtains information—such as files, folders or databases—located in areas of the computer that are off-limits to him or her.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    However, the court said, the act does not cover people who misuse information that is otherwise available to them.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    "This is a common concern in business settings, where employees have daily access to work computers and proprietary data," noted Scott Wenner, an attorney with Schnader in New York City and San Francisco.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Here's what employers need to know about the ruling.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    When Is Authorized Access Exceeded?
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    The dispute in 
    
  
  
                    
                    &#xD;
    &lt;a href="https://www.scotusblog.com/case-files/cases/van-buren-v-united-states/" target="_blank"&gt;&#xD;
      &lt;em&gt;&#xD;
        
                        
                        
      
      
        Van Buren v. United States
      
    
    
                      
                      &#xD;
      &lt;/em&gt;&#xD;
    &lt;/a&gt;&#xD;
    
                    
                    
  
  
     focuses on how to interpret the CFAA, which generally targets computer hackers and makes it a crime to intentionally access a computer without authorization or to exceed authorized access.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    In this case, a police officer allegedly accepted money from a criminal to log into a law-enforcement database and search for a license plate number. He used valid credentials to access information he was authorized to obtain, but he did so for non-law-enforcement purposes, which violated a department policy.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    The question in the case was whether the officer's conduct "exceeds authorized access" under the CFAA. The term "exceeds authorized access" means "to access a computer with authorization and to use such access to obtain or alter information in the computer that the accesser is not entitled so to obtain or alter," according to the statute.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    The officer and the government agreed that the officer accessed the computer with authorization, but they disagreed on whether he was "entitled so to obtain" the information.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    The Supreme Court found that, while the officer's conduct "plainly flouted his department's policy," it did not violate the CFAA. The act "does not cover those who … have improper motives for obtaining information that is otherwise available to them," the court said.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    So what does the ruling mean for employers? Employers can't sue criminally under the CFAA but can refer matters to federal authorities for criminal prosecution, noted Mark Srere, an attorney with Bryan Cave Leighton Paisner in Washington, D.C. Or, employers can sue civilly where damages are $5,000 or more.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    "Ultimately, employers will not be able to use the CFAA to gain a 'hook' into federal court where an employee or former employee misappropriates confidential information, if the employee had access to such information for proper business purposes," explained Dawn Mertineit, an attorney with Seyfarth Shaw in Boston. However, she said, "the impact of this decision is lessened by the fact that the Defend Trade Secrets Act (DTSA) of 2016 confers federal jurisdiction on trade-secret misappropriation claims."
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    For employers, the main concern is when an employee absconds with confidential information that does not meet the DTSA's definition of a "trade secret." In that case, she said, the employer will need to rely on any contractual provisions prohibiting disclosure or misuse of confidential information.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Workplace Implications
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    The Supreme Court cautioned that if the CFAA's "exceeds authorized access" clause criminalized every violation of an employer's computer-use policy, "then millions of otherwise law-abiding citizens" would be criminals, perhaps by checking sports scores or paying bills on a work computer.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    "Employers commonly state that computers and electronic devices can be used only for business purposes," Justice Amy Coney Barrett wrote for the court. So "an employee who sends a personal e-mail or reads the news using her work computer" would violate the CFAA under the government's reading of the statute.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    The court said that the only question in the case was whether the officer could use the department's system to retrieve license-plate data. "Both sides agree that he could," the court noted. Accordingly, the officer did not exceed authorized access to the database, even though he obtained the data for an improper purpose.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    "This case is a good reminder that employers should make sure that they strictly limit their employees' computer access solely to the information that they need for business purposes," Mertineit said. Employers can still bring CFAA claims against employees who access information that they aren't authorized to access (which is known as internal hacking), but it will no longer be sufficient under the CFAA to say that employees lawfully accessed information and used it for an improper purpose, she explained.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/275cfcce/dms3rep/multi/335410_2e6ab0d6d877414e8db1357b1e79e0c7-mv2.jpeg" length="24445" type="image/jpeg" />
      <pubDate>Tue, 08 Jun 2021 17:14:00 GMT</pubDate>
      <author>office@egs-solutions.com (Stephani McGirr)</author>
      <guid>https://www.identitytheftsolutionstx.com/post/high-court-clarifies-when-employee-s-data-misuse-violates-federal-fraud-act721d3a41</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/275cfcce/dms3rep/multi/335410_2e6ab0d6d877414e8db1357b1e79e0c7-mv2.jpeg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Identity Theft: Impact on Victims Is Getting Worse</title>
      <link>https://www.identitytheftsolutionstx.com/post/identity-theft-impact-on-victims-is-getting-worse1f2333d3</link>
      <description>The Identity Theft Resource Center, a nationally recognized nonprofit organization established to support victims of identity crime, has...</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    The Identity Theft Resource Center, a nationally recognized nonprofit organization established to support victims of identity crime, has published research that shows nearly 30% of people who contact the ITRC are victims of more than one identity crime.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
                      
    
    
      See Also:
    
  
  
                    
                    &#xD;
    &lt;/b&gt;&#xD;
    &lt;a href="https://www.bankinfosecurity.com/webinars/live-webinar-role-passwords-in-hybrid-workforce-w-3267" target="_blank"&gt;&#xD;
      
                      
                      
    
    
      Live Webinar | The Role of Passwords in the Hybrid Workforce
    
  
  
                    
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    The 
    
  
  
                    
                    &#xD;
    &lt;a href="https://www.idtheftcenter.org/the-identity-theft-resource-centers-2021-consumer-aftermath-report-reveals-impacts-on-covid-19-identity-crime-victims/" target="_blank"&gt;&#xD;
      
                      
                      
    
    
      ITRC 2021 Consumer Aftermath Report
    
  
  
                    
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
                    
  
  
     includes a special focus on victims of pandemic-related identity fraud, including 33% who did not have enough money to buy food or pay for utilities, 40% who were unable to pay their routine bills and 14% who were evicted for nonpayment of rent or mortgage.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Both fraud rates and the trauma that victims experience continue to increase, says Eva Velasquez, the president and CEO of the ITRC. “The one thing that isn't increasing are the resources that we're providing to victims,” she adds.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    To tackle the problem, Velasquez would like “to see industry step up efforts with multifactor authentication.” She also recommends the creation of more uniform processes, similar to the credit freeze, “where people can create an account, lock it down and freeze it so that even if someone does have access to your identity credentials, they still will not be able to use them.”
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    In a video interview with Information Security Media Group, Velasquez discusses:
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Velasquez is the president and CEO at the Identity Theft Resource Center. She previously served as the vice president of operations for the San Diego Better Business Bureau and spent 21 years at the San Diego District Attorney’s Office. She is a recipient of the National Crime Victim Service Award from the Department of Justice and the Office for Victims of Crime and the Florence Kelley Consumer Leadership Award from the National Consumers League.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    ITRC's Eva Velasquez on Reducing ID Fraud and Increasing Victim Resources
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/275cfcce/file.png" alt="A man and a woman are standing in front of a store with an open sign." title=""/&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/275cfcce/dms3rep/multi/335410_41ec48d2e7b44dc188a805657b270582-mv2.jpeg" length="21076" type="image/jpeg" />
      <pubDate>Tue, 08 Jun 2021 14:06:00 GMT</pubDate>
      <author>office@egs-solutions.com (Stephani McGirr)</author>
      <guid>https://www.identitytheftsolutionstx.com/post/identity-theft-impact-on-victims-is-getting-worse1f2333d3</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/275cfcce/dms3rep/multi/335410_41ec48d2e7b44dc188a805657b270582-mv2.jpeg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Forbes Advisors, voted IDShield best restoration service 2021</title>
      <link>https://www.identitytheftsolutionstx.com/post/forbes-advisors-voted-idshield-best-restoration-service-20213c856a19</link>
      <description>Our Verdict IDShield  offers comprehensive identity monitoring and credit monitoring services  for individuals and families. Pricing is...</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Our Verdict
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    IDShield  offers comprehensive identity monitoring and credit monitoring services  for individuals and families. Pricing is higher than some of the  competing identity theft companies offering services today, but the  value you get in return is exceptional. We like the fact that you get a  30-day free trial, and that all of their plans come with up to $1  million in identity theft protection coverage.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Our Verdict
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    IDShield  offers comprehensive identity monitoring and credit monitoring services  for individuals and families. Pricing is higher than some of the  competing identity theft companies offering services today, but the  value you get in return is exceptional. We like the fact that you get a  30-day free trial, and that all of their plans come with up to $1  million in identity theft protection coverage.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    IDShield Plans  are unique because they all come with comprehensive identity theft  monitoring and protection, the only difference being that you can pay  for monitoring of one of your credit reports (TransUnion) or all three.  You can also choose a plan for an individual or a family plan that  covers up to 10 children.
IDShield plans start at $11.95 per month for individuals, or $15.95  per month for monitoring of all three credit reports. If you’re  considering a family plan, you’ll pay $24.95 per month or $29.95 per  month depending on whether you want one bureau or all three credit  bureau reports overseen.
All IDShield plans come with incredibly comprehensive benefits that  help them stand out against the competition. You may pay more for  identity theft monitoring from IDShield, but you’ll get more coverage  and monitoring than some competitors offer for a slightly lower monthly  rate. Here are the main protective benefits you can expect from your  plan from IDShield:
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    The biggest  benefit of signing up for identity theft protection is the peace of mind  you gain. However, there are some ways to make the most use of your  plan, and these include:
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Other Benefits
 All IDShield  plans come with an array of benefits that can help protect you if you’re  a victim of fraud. However, IDShield does include some unique perks  worth noting. These include:
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Fine Print
 IDShield plans  are free of hidden or fine print for the most part, but there is one  important detail you should know about their plans. IDShield says that  pre-existing identity theft issues are not covered under the full  restoration benefit, so you cannot expect to get this coverage with your  plan if you wait to buy it until after you’re a victim of identity  theft.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    For the highest level of protection, we recommend paying more for  monitoring of all three of your credit reports. Before you pull the  trigger, however, we suggest spending some time comparing all the top  identity monitoring providers on the market today. You may find that one  company offers a plan with exactly what you want for an amount you’re  willing to pay, but you’ll never know how providers stack up unless you
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/275cfcce/file.png" alt="A man and a woman are standing in front of a store with an open sign." title=""/&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/275cfcce/dms3rep/multi/335410_4c11f23effc744c1b84a329dbf187336-mv2.jpeg" length="9145" type="image/jpeg" />
      <pubDate>Fri, 21 May 2021 18:05:00 GMT</pubDate>
      <author>office@egs-solutions.com (Stephani McGirr)</author>
      <guid>https://www.identitytheftsolutionstx.com/post/forbes-advisors-voted-idshield-best-restoration-service-20213c856a19</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/275cfcce/dms3rep/multi/335410_4c11f23effc744c1b84a329dbf187336-mv2.jpeg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Vulnerabilty Management, The Front Line Protection For Small Businesses</title>
      <link>https://www.identitytheftsolutionstx.com/post/vulnerabilty-management-the-front-line-protection-for-small-businessesf024de14</link>
      <description>Today’s business environment constitutes highly connected devices,  security products, applications, and users, significantly increasing...</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Today’s business environment constitutes highly connected devices,  security products, applications, and users, significantly increasing the  complexity and the attack surfaces. To take advantage of this scenario  and use this advantage when exploiting their victims, attackers  continuously develop and reinvent sophisticated and intrusive attack  techniques. Consequently, cyberattacks have become highly targeted and  pervasive.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    It is just a matter of “when” an organization comes under cyberattacks in such a situation.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Cybercriminals often go for low-hanging fruit and exploit publicly  disclosed vulnerabilities that are less complicated and require fewer  resources, in general. Therefore, it is critical for an organization to  manage risk by timely detecting and to mitigate various vulnerabilities  in their infrastructure, essentially vulnerability management.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Vulnerability management is a proactive process of finding,  classifying/prioritizing, and fixing security vulnerabilities to create a  less attack-susceptible environment. It is a continuous process that  involves:
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    • Identification and classification of assets
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    • Vulnerability assessment
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    • Risk classification and prioritization
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    • Patch evaluation
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    • Pre-test the patch
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    • Approve of the patch
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    • Deploy the patch
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    • Re-scan and verify that patches are deployed and functioning correctly
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Looking at the recent trends in cyberattacks, cybercriminals actively  target small businesses as those organizations are more prone to  cyberattacks. Because the small businesses have the lesser ability  (could be due to the budget and/or lack of skilled cybersecurity  resources) to keep up with the current security threats and trends.  Thus, such businesses need to develop vulnerability management  strategies to remediate risk proactively.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Some of the strategic considerations in vulnerability management for small businesses are as follows.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
                      
    
    
      • Reduce product clutter 
    
  
  
                    
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    As the network grows, organizations tend to add more products to  their security stack in the hope of creating a cyber-resilient  environment. However, these added devices are the seed to creating a  complex business environment, which is the source of vulnerability. With  complexity, the number of vulnerabilities increases.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Thus, the first step to manage vulnerabilities is to identify all the  devices in your infrastructure, identify their capabilities, and retire  those products that are no longer required. You will be amazed to see  that there could be multiple devices with similar features, and removing  the redundant will surely enhance the security posture.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
                      
    
    
      • Deploy advanced vulnerability management tools 
    
  
  
                    
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Employ vulnerability management tools with automation capability to  minimize manual management, maximize accuracy, and dynamically remediate  vulnerabilities faster.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Various vulnerability management tools scan assets for  vulnerabilities and prioritize vulnerabilities based on the severity of  the risk and the threat to the business. Then, it automates the  mitigation process to fix the vulnerabilities timely. Overall, small  businesses should deploy vulnerability management tools that fix the  vulnerabilities from start to finish.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Security for Everyone (S4E) is one of the most trusted and affordable  security solutions for vulnerability management. S4E provides a  repository of more than 500 free cybersecurity assessment tools to meet  different needs. These tools can effectively help to prioritize  vulnerabilities and the application of patches. Moreover, S4E  understands the technology and automatically prioritizes and performs  security assessments without needing technical expertise.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
                      
    
    
      • Red team and blue team exercise 
    
  
  
                    
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    The red team and blue team together can measure the performance of  security controls. While the red team focuses on penetration testing and  vulnerability assessment, the blue team assesses the capability of  controls to counter attacks.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    S4E consists of certified professionals who deliver excellent  penetration testing services to help both red and blue teams achieve  their targets.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Moreover, S4E also provides services to test IoT and mobile  applications. IoT and mobile devices are the prime reason for an  increase in vulnerabilities in an organization that raises severe  security concerns such as data privacy, identity theft, and security  breaches. So, assessment of such devices is an essential component of  vulnerability management by both the team.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
                      
    
    
      • Continuous monitoring 
    
  
  
                    
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Continuous monitoring is a proactive approach to manage  vulnerabilities and risk. As vulnerabilities can be introduced at any  time, organizations should be vigilant and stay ahead of attackers to  secure assets. In this effort, organizations should
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    • visualize critical assets and all path that lead to the assets,
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    • conduct threat hunting and identify threats,
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    • conduct a vulnerability assessment to identify and mitigate business-critical vulnerabilities
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Organizations can utilize a wide range of assessment tools readily  available from S4E to hunt for vulnerabilities and fix them before  attackers can do any harm.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
                      
    
    
      • Create a security attitude and security culture 
    
  
  
                    
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Security is everyone’s responsibility.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    If an organization is built up in a culture where employees think  security is the IT department’s issue, then there is a problem. The  organization cannot thrive and create sustainable security in such an  environment. Because humans are the weakest link to security, and an  organization can only be as secure as its weakest link. Thus, it is  vital to change the attitude towards cybersecurity, and when it comes to  security, everyone should be held accountable.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    For this, cybersecurity awareness training is critical. S4E is  equally committed to providing training and education needed towards  building organization-wide security. With quizzes and social engineering  attack scenarios, employees will be able to understand real-world  issues and apply such learning in everyday duty.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Finally, all businesses need to enforce vulnerability management  policy to avoid the possible repercussion of cyberattacks and reduce  potential financial, reputational, and compliance damage. We are aware  that managing all these risks is difficult, and that's why we are here.  Days in secure.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/275cfcce/file.png" alt="A man and a woman are standing in front of a store with an open sign." title=""/&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/275cfcce/dms3rep/multi/cyber-security-concept-20190409125014-81688100.jpg" length="145876" type="image/jpeg" />
      <pubDate>Wed, 19 May 2021 14:43:00 GMT</pubDate>
      <author>office@egs-solutions.com (Stephani McGirr)</author>
      <guid>https://www.identitytheftsolutionstx.com/post/vulnerabilty-management-the-front-line-protection-for-small-businessesf024de14</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/275cfcce/dms3rep/multi/cyber-security-concept-20190409125014-81688100.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>What Is The Cost Of A Data Breach?</title>
      <link>https://www.identitytheftsolutionstx.com/post/what-is-the-cost-of-a-data-breach6a852a09</link>
      <description>Data breaches are big news in the modern digital workplace; the  impact and detriment upon the targeted victim are of growing concern. ...</description>
      <content:encoded>&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/275cfcce/file.png" alt="A man and a woman are standing in front of a store with an open sign." title=""/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Data breaches are big news in the modern digital workplace; the  impact and detriment upon the targeted victim are of growing concern.  Privacy breaches are a consequence of a cyberattack directed against a  specific organization or government entity. Globally, data breaches  adversely affect millions of people every single year.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    The Department of Homeland Security 
    
  
  
                    
                    &#xD;
    &lt;a href="https://niccs.us-cert.gov/about-niccs/glossary#D" target="_blank"&gt;&#xD;
      
                      
                      
    
    
      defines
    
  
  
                    
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
                    
  
  
      a data breach as "the unauthorized movement or disclosure of sensitive  information to a party, usually outside the organization, that is not  authorized to have or see the information."
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Our researchers have investigated what the real-world cost of a data  breach is in terms of fiscal implications, business impact and the  ongoing harm faced by a company as a consequence of a data breach.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
                      
    
    
      Is the cost of data breaches on the rise?
    
  
  
                    
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Information collected by the Privacy Rights Clearinghouse suggests  that, surprisingly, the number of records breached in cyberattacks is  actually declining. PRC reported over 
    
  
  
                    
                    &#xD;
    &lt;a href="https://privacyrights.org/data-breaches?title=&amp;amp;taxonomy_vocabulary_11_tid%5B0%5D=2434&amp;amp;f%5B0%5D=years%3A2016" target="_blank"&gt;&#xD;
      
                      
                      
    
    
      4.8 billion
    
  
  
                    
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
                    
  
  
     in 2016, 
    
  
  
                    
                    &#xD;
    &lt;a href="https://privacyrights.org/data-breaches?title=&amp;amp;taxonomy_vocabulary_11_tid%5B0%5D=2434&amp;amp;f%5B0%5D=years%3A2017" target="_blank"&gt;&#xD;
      
                      
                      
    
    
      2 billion
    
  
  
                    
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
                    
  
  
     in 2017 and nearly 
    
  
  
                    
                    &#xD;
    &lt;a href="https://privacyrights.org/data-breaches?title=&amp;amp;taxonomy_vocabulary_11_tid%5B0%5D=2436&amp;amp;f%5B0%5D=years%3A2018" target="_blank"&gt;&#xD;
      
                      
                      
    
    
      1.4 billion
    
  
  
                    
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
                    
  
  
     in 2018.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    These results are debatable, as we may never fully understand the  true figures. It is still unknown how many data breaches go unreported  or undetected. However, high-profile cyberattacks are 
    
  
  
                    
                    &#xD;
    &lt;a href="https://www.usatoday.com/story/money/2018/12/28/data-breaches-2018-billions-hit-growing-number-cyberattacks/2413411002/" target="_blank"&gt;&#xD;
      
                      
                      
    
    
      on the increase
    
  
  
                    
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
                    
  
  
    , and the associated financial costs are skyrocketing.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    PROMOTED
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    According to research conducted by the Ponemon Institute, for the past 14 years, the U.S. has endured the 
    
  
  
                    
                    &#xD;
    &lt;a href="https://www.all-about-security.de/fileadmin/micropages/Fachartikel_28/2019_Cost_of_a_Data_Breach_Report_final.pdf" target="_blank"&gt;&#xD;
      
                      
                      
    
    
      most expensive
    
  
  
                    
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
                    
  
  
     data breaches on record. The average total cost per breach has increased from $3.54 million in 2006 to $8.19 million in 2019.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Healthcare organizations are reported as a major contributing factor. The PRC has identified 
    
  
  
                    
                    &#xD;
    &lt;a href="https://privacyrights.org/data-breaches?f%5B0%5D=org_type%3AMED&amp;amp;f%5B1%5D=years%3A2019" target="_blank"&gt;&#xD;
      
                      
                      
    
    
      58 reported data breaches
    
  
  
                    
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
                    
  
  
      thus far in 2019 and nearly 1.4 million records breached. This resulted  in 60% higher costs to healthcare than the global average of all other  industries, according to the Ponemon Institute.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
                      
    
    
      The type of costs.
    
  
  
                    
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    A 
    
  
  
                    
                    &#xD;
    &lt;a href="http://www.iacis.org/iis/2019/2_iis_2019_162-171.pdf" target="_blank"&gt;&#xD;
      
                      
                      
    
    
      recent study
    
  
  
                    
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
                    
  
  
      conducted by IACIS titled "Economic Costs and Impacts of Business Data  Breaches" shows great insight into the financial burden threatening  targeted institutions. The research identified three types of costs  associated with a data breach: direct costs, indirect costs, and hidden  costs.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
                      
    
    
      • Direct costs. 
    
  
  
                    
                    &#xD;
    &lt;/b&gt;&#xD;
    
                    
                    
  
  
    These relate to the detection and  notification processes of a data breach. The immediate monetary impact  is usually on sales revenue, resulting in a significant reduction of  income. This will affect operational activities and business  productivity.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    The company share price will likely drop. Large payments to legal  services may be required to control the fallout of litigation, and costs  may surge if investigative consultancy firms are needed to find the  root cause of the data breach.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Costs are incurred when implementing a post-breach response, such as  setting up an emergency call center for affected customers. Public  relations activities, which may include the financial reimbursement or  settlement costs to impacted customers, will also surge.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
                      
    
    
      • Indirect costs. 
    
  
  
                    
                    &#xD;
    &lt;/b&gt;&#xD;
    
                    
                    
  
  
    Indirect loss is attributed to a  damaged reputation, a loss of consumer trust and missed business  opportunities. Profits typically decline as customers abandon ship in  favor of direct competitors.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Investors may be less likely to buy the company stock, resulting in a  reduced market share and restricted growth. Talented employees may also  choose to leave the organization as the business reputation declines.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Third-party costs will likely increase, as business insurance hikes  and associated cost charges from cloud service providers may increase to  bolster cybersecurity.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
                      
    
    
      • Hidden costs. 
    
  
  
                    
                    &#xD;
    &lt;/b&gt;&#xD;
    
                    
                    
  
  
    The hidden cost of losing business  is very difficult to measure, the impact may be felt for years after the  data breach. Extensive costs are incurred from lost business hours as  employees divert efforts to resolve the breach.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Future technology investments will likely increase substantially as  the future technology strategy of the business is likely to change to  counteract the impact of the breach.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
                      
    
    
      How can you minimize costs?
    
  
  
                    
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    The key is to invest in robustly secure information technology that  focuses on cloud computing, with digital transformation initiatives and  the establishment of DevSecOps work practices. Implementing encryption  safeguards on sensitive or valuable data is a necessity to minimize  costs.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    The Ponemon Institute discovered that implementing an incident  response team and having an incident response plan reduced costs up to  $360,000 per breach. Security testing and a DevSecOps security model  saved up to $10.55 per compromised record.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Enforcing a data encryption policy at a technical and administrator  level is a great way to minimize the risk of a data breach that, in  turn, minimizes costs. Your policy should enforce encryption at every  applicable layer of the IT system, including notably email services,  cellphones, mobile devices, storage platforms and cloud services.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    This should include a strict policy on portable storage, such as USB  sticks, pen drives, mobile phones and digital media. You can enforce  this is by denying access to all portable storage devices. Using  endpoint security software on all company assets should help you achieve  this.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Having a tried and tested business continuity plan (BCP) is another  necessity for organizations that heavily rely on information systems. A  BCP includes every step that must be followed if a disaster such as a  total system outage or ransomware breakout strikes your business.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    The ability to stand up business services and information systems in a  geographically disparate location will create disaster recovery  capabilities that enable business-as-usual agility. Having minimal  downtime will naturally minimize expenditure.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Investing in automation technology that provides failover disaster  recovery technology, AI-powered automated threat detection software or  enhanced auditing can also provide security operations capabilities that  could ultimately minimize expenditure.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Coupled with regular training initiatives, this approach to technical  data encryption safeguards will automatically apply to all employees,  reducing the burden on individual staff to achieve compliance.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/275cfcce/dms3rep/multi/cyber-security-concept-20190409125014-81688100.jpg" length="145876" type="image/jpeg" />
      <pubDate>Mon, 10 May 2021 18:06:00 GMT</pubDate>
      <author>office@egs-solutions.com (Stephani McGirr)</author>
      <guid>https://www.identitytheftsolutionstx.com/post/what-is-the-cost-of-a-data-breach6a852a09</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/275cfcce/dms3rep/multi/cyber-security-concept-20190409125014-81688100.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
  </channel>
</rss>
