Welcome to the most progressive identity theft blog which includes original identity theft articles written by experts at Identity Management Institute discussing identity protection strategies and identity theft solutions for businesses and consumers. This identity theft protection website offers new articles and hundreds of archived original articles which are periodically updated and read by thousands of visitors from around the world. Companies are encouraged to refer their customers, employees and business partners to selected articles of this site for free education and training. Please scroll down for the latest identity management articles or check out the sections of your interest on the navigation bar for relevant identity theft articles.
In order to stay current with this ID theft blog, you can a) right-click on the RSS "orange button" below the Navigation Bar to subscribe to the identity protection blog, b) get the latest via any of the major search engines such as Yahoo, MSN or Google by making your selection below the Navigation Bar, c) subscribe to the no-cost Identity Management Journal.
Identity fraud inflicted on existing loan accounts can be reduced with proper account and loan consolidation.
Covered financial institutions and creditors must adhere to the Red Flag compliance rules and may be subject to regulatory audits and non-compliance penalties.
Identity Management Institute manages the Certified Red Flag Specialist (CRFS) program to train, test and certify professionals responsible for supporting their identity theft prevention program.
Managing identity theft risks is a priority for may organizations because identity theft incidents can often have devastating consequences for companies and their customers.
The General Data Protection Regulation (GDPR) which offers the most comprehensive data protection reform to date in the European Union will soon become effective. Get ready!
The need to dispose of one's laptop properly is critical because of the sensitive information that could exist on the hard drive. This article offers some laptop disposal tips.
Educating kids about information security and privacy is one of the best things that parents can do for their children before it's too late.
Credit monitoring is a good practice for detecting identity theft and unauthorized credit accounts; however, it is not a total solution for identity theft.
If you are a regular online shopper, there are a few steps that you can take to protect yourself when shopping online from identity theft, prevent online fraud, and avoid paying higher prices.
Internet security is a subset of cyber security, and, cyber-security is a subset of information security which is just the security of any system or digital data excluding all other forms of data.
The dangers of social media identity theft are increasing as more people continue to socialize online without understand the risks.
Online threats are many as we will discuss in this article and exercising due diligence online is highly advised. Read this article for details.
There are many offshore outsourcing security risks that create real challenges for companies, especially in the areas of privacy management and regulatory compliance.
As smartphones are small portable devices, it is important to be aware of cell phone security tips in order to prevent cell phone theft or loss.
The AAA identity and access management model is a framework which is embedded into the digital identity and access management world to manage access to assets and maintain system security.
Cyber criminals are increasingly presenting us with creative cybercrime cases and scenarios as our digital universe continues to be connected.
The future of identity and access management will include technological innovation to address the security and interoperability of increasing connected devices.
According to a few research studies, stolen employee access password is by far the leading cause of system hacking cases and data breach incidents.
The internet security initiative announced by the Department of Homeland Security (DHS) aimed to improve cyberspace and secure online identification.
Preventing emails that contain personal information from being sent to employees or outside of an organization is a step that many organizations take to manage risks.
This article discusses how spoofed email spams occur and what we can do about them although our options as email users are limited as you will soon find out in this article.
Clicking email links without first validating the source of emails can be devastating and poses great security and privacy risks.
There are some immediate debit card fraud management steps that you must take if you discover that one of your accounts has been hit with fraudulent transactions.
Information security is not exempt from outsourcing when the decision is made to reduce overall costs. However, information security outsourcing risks must be identified, acknowledge, and mitigated.
Identity and access management challenges facing organizations and their staff are many and evolving which are partly introduced by changes in our technology and way of life.
PlayStation fraud risks for customers of Sony Entertainment Network can be very high and costly which we cover in this article.
The WordPress plugin security risks are many and can negatively affect millions of websites that use the WorPress program if plugins are not managed properly.
There are many reasons why emails are not private and must always be saved or sent with the understanding that emails are public and can be disclosed to anyone other than the intended recipients.
There are many signs of identity theft some of which are obvious or not so obvious. This is a quick list of identity theft signs.
Personal document photo backup is one of the best strategies for loss recovery when personal items are lost, stolen, or misplaced, and forgotten.
The reported news of a stolen dead boy identity illustrates how dead persons’ identities can also be stolen and misused in a variety of ways even years after the persons are passed on.
The high level identity and access management objectives include cyber security, access management, fraud prevention, and compliance.
There are five main reasons why identity and access management matters most in cyber security and data protection.
When using public computers for website access, you need to completely sign out and prevent the computer to remember you in order to prevent others from accessing your accounts.
Employee error to unwittingly give away system access information to hackers facilitate data breaches in over 90% of cyber attacks according to leading industry and government reports.
It is estimated that the global cybersecurity expert shortages will be around 1.5 million by 2020. Learn about how to become a cybersecurity expert and fill the gap in a growing job market.
Identity theft and fraud can create a bad business reputation for companies which fail to protect their customers against identity theft fraud and privacy violations.
A comprehensive, well documented and fully executed identity theft prevention program is necessary to properly address all identity theft risks and comply with the Red Flags Rule.
Due to the global Internet connectivity of many devices and networks, the computer security risk landscape has expanded and includes many new cybersecurity challenges.
This cybersecurity career guide intends to encourage and educate IT professionals and students for becoming a cybersecurity expert in a growing field. Download a copy of the ebook.
In response to a massive birth certificate fraud, Puerto Rico invalidated all existing birth certificates for a massive birth certificate reset and replacement for its people.
Top information security certification among most in demand information security certifications is the Certified Identity and Access Manager (CIAM) designation which we will cover in this article.
As we embrace the Internet of Things (IoT) which refers to all smart and Internet enabled devices, we have to collaborate to address the growing the risks of Identity of Things (IDoT).
Smart device security risks will increase as we embrace an increasing number of Internet connected devices also called Internet of Things or IoT.
Access certification is a regulatory compliance requirement and chances are that your information security policies require managers to review and validate access for their employees.
The identity and access management market will grow from $7.2 Billion USD in 2015 to $12.78 billion USD in 2020, forecasting an expected annual growth rate of 12.2%.
This article discusses the millennial identity theft risks and proposes a few actions to help the Gen Y which includes students to protect themselves against identity theft.
Before responding to a request for information, a careful reverse lookup on your part will allow you to share your personal information with confidence.
When companies place their trust in others to serve them and ultimately their customers, they must have some assurance that the vendors are managing the risks.