Identity Theft Blog

Welcome to the most progressive identity theft blog which includes original identity theft articles written by experts at Identity Management Institute discussing identity protection strategies and identity theft solutions for businesses and consumers. This identity theft protection website offers new articles and hundreds of archived original articles which are periodically updated and read by thousands of visitors from around the world. Companies are encouraged to refer their customers, employees and business partners to selected articles of this site for free education and training. Please scroll down for the latest identity management articles or check out the sections of your interest on the navigation bar for relevant identity theft articles.

In order to stay current with this ID theft blog, you can a) right-click on the RSS "orange button" below the Navigation Bar to subscribe to the identity protection blog, b) get the latest via any of the major search engines such as Yahoo, MSN or Google by making your selection below the Navigation Bar, c) subscribe to the no-cost Identity Management Journal.

Search for Articles

Recent Articles

Nov 30, 2017

Data Security Breach

As we continue to see more data security breach cases, their causes continue to remain almost the same such as un-encrypted devices.

Continue reading "Data Security Breach"

Nov 12, 2017

Trusted Cyberspace Identity Strategy

The trusted cyberspace identity initiative known as the National Strategy for Trusted Identities in Cyberspace (NSTIC) aims to improve online identification, authentication and privacy.

Continue reading "Trusted Cyberspace Identity Strategy"

Oct 29, 2017

Car License Plate Theft

How often car license plates are stolen? How serious is car license plate theft? Is this a crime and what are the penalties for license plate theft? This article answers these questions.

Continue reading "Car License Plate Theft"

Oct 21, 2017

Tampered Computer Security Products

We can't help but to ask ourselves "how secure are computer security products" when we learn about tampered computer security products that spy on people instead of protecting them.

Continue reading "Tampered Computer Security Products"

Oct 14, 2017

Student Identity Theft

According to past identity theft cases, 22% of students were notified that they were a victim of identity theft. Student identity theft is three times as likely as the average fraud victim.

Continue reading "Student Identity Theft"

Oct 12, 2017

Yahoo Mail Security

When Yahoo changed the way its users access email, Yahoo mail security moved away from passwords yet left a security hole in the access management process.

Continue reading "Yahoo Mail Security"

Oct 12, 2017

Young Identity Theft Victims

It is reported that young identity theft victims account for the majority of all identity theft victims and there might be good reasons why.

Continue reading "Young Identity Theft Victims"

Oct 10, 2017

NIST Security Compliance

National Institute of Standards and Technology or NIST security compliance is sometimes a requirement for earning government contracts. This article highlights the NIST 800 security areas.

Continue reading "NIST Security Compliance"

Oct 09, 2017

26 Identity Theft Red Flags

The Red Flags Rule specifically calls out 26 identity theft red flags that companies should consider as part of their identity theft prevention and training programs.

Continue reading "26 Identity Theft Red Flags"

Oct 07, 2017

All About Identity Theft Insurance

Identity theft insurance is a policy on its own or integrated with some other insurance which allows an identity theft victim to recover some of the recovery costs.

Continue reading "All About Identity Theft Insurance"

Sep 14, 2017

Equifax Data Breach

The Equifax data breach is believed to be the largest of its kind affecting more than half of the US population which lasted from mid-May through July 2017.

Continue reading "Equifax Data Breach"

Aug 27, 2017

Internal and External Certification

This article describes the basic difference between internal and external certification as it relates to professional development in a simple and concise language.

Continue reading "Internal and External Certification"

Aug 17, 2017

Account And Loan Consolidation Benefits

Identity fraud inflicted on existing loan accounts can be reduced with proper account and loan consolidation.

Continue reading "Account And Loan Consolidation Benefits"

Aug 09, 2017

Red Flag Compliance

Covered financial institutions and creditors must adhere to the Red Flag compliance rules and may be subject to regulatory audits and non-compliance penalties.

Continue reading "Red Flag Compliance"

Aug 06, 2017

Certified Red Flag Specialist

Identity Management Institute manages the Certified Red Flag Specialist (CRFS) program to train, test and certify professionals responsible for supporting their identity theft prevention program.

Continue reading "Certified Red Flag Specialist"

Jul 16, 2017

Managing Identity Theft Risks

Managing identity theft risks is a priority for may organizations because identity theft incidents can often have devastating consequences for companies and their customers.

Continue reading "Managing Identity Theft Risks"

Jul 08, 2017

General Data Protection Regulation

The General Data Protection Regulation (GDPR) which offers the most comprehensive data protection reform to date in the European Union will soon become effective. Get ready!

Continue reading "General Data Protection Regulation "

Jun 20, 2017

Laptop Disposal Tips

The need to dispose of one's laptop properly is critical because of the sensitive information that could exist on the hard drive. This article offers some laptop disposal tips.

Continue reading "Laptop Disposal Tips"

Jun 15, 2017

Educating Kids About Information Security

Educating kids about information security and privacy is one of the best things that parents can do for their children before it's too late.

Continue reading "Educating Kids About Information Security "

Jun 05, 2017

Credit Monitoring

Credit monitoring is a good practice for detecting identity theft and unauthorized credit accounts; however, it is not a total solution for identity theft.

Continue reading "Credit Monitoring"

May 20, 2017

Protect Yourself When Shopping Online

If you are a regular online shopper, there are a few steps that you can take to protect yourself when shopping online from identity theft, prevent online fraud, and avoid paying higher prices.

Continue reading "Protect Yourself When Shopping Online"

May 11, 2017

What is Cyber Security?

Internet security is a subset of cyber security, and, cyber-security is a subset of information security which is just the security of any system or digital data excluding all other forms of data.

Continue reading "What is Cyber Security?"

May 11, 2017

Social Media Identity Theft Dangers

The dangers of social media identity theft are increasing as more people continue to socialize online without understand the risks.

Continue reading "Social Media Identity Theft Dangers"

May 06, 2017

Exercising Due Diligence Online

Online threats are many as we will discuss in this article and exercising due diligence online is highly advised. Read this article for details.

Continue reading "Exercising Due Diligence Online"

Apr 29, 2017

Offshore Outsourcing Security Risks

There are many offshore outsourcing security risks that create real challenges for companies, especially in the areas of privacy management and regulatory compliance.

Continue reading "Offshore Outsourcing Security Risks"

Apr 20, 2017

Cell Phone Security Tips

As smartphones are small portable devices, it is important to be aware of cell phone security tips in order to prevent cell phone theft or loss.

Continue reading "Cell Phone Security Tips"

Apr 01, 2017

Identity and Access Management Model

The AAA identity and access management model is a framework which is embedded into the digital identity and access management world to manage access to assets and maintain system security.

Continue reading "Identity and Access Management Model"

Mar 22, 2017

Cybercrime Cases and Scenarios

Cyber criminals are increasingly presenting us with creative cybercrime cases and scenarios as our digital universe continues to be connected.

Continue reading "Cybercrime Cases and Scenarios"

Mar 20, 2017

The Future of Identity and Access Management

The future of identity and access management will include technological innovation to address the security and interoperability of increasing connected devices.

Continue reading "The Future of Identity and Access Management"

Mar 10, 2017

Stolen Employee Access Risks

According to a few research studies, stolen employee access password is by far the leading cause of system hacking cases and data breach incidents.

Continue reading "Stolen Employee Access Risks"

Feb 21, 2017

Internet Security Initiative

The internet security initiative announced by the Department of Homeland Security (DHS) aimed to improve cyberspace and secure online identification.

Continue reading "Internet Security Initiative"

Feb 13, 2017

Emails That Contain Personal Information

Preventing emails that contain personal information from being sent to employees or outside of an organization is a step that many organizations take to manage risks.

Continue reading "Emails That Contain Personal Information"

Feb 02, 2017

Spoofed Email Spams

This article discusses how spoofed email spams occur and what we can do about them although our options as email users are limited as you will soon find out in this article.

Continue reading "Spoofed Email Spams "

Feb 02, 2017

Clicking Email Links

Clicking email links without first validating the source of emails can be devastating and poses great security and privacy risks.

Continue reading "Clicking Email Links"

Jan 22, 2017

Debit Card Fraud Management Steps

There are some immediate debit card fraud management steps that you must take if you discover that one of your accounts has been hit with fraudulent transactions.

Continue reading "Debit Card Fraud Management Steps "

Jan 11, 2017

Information Security Outsourcing Risks

Information security is not exempt from outsourcing when the decision is made to reduce overall costs. However, information security outsourcing risks must be identified, acknowledge, and mitigated.

Continue reading "Information Security Outsourcing Risks "

Jan 07, 2017

Identity and Access Management Challenges

Identity and access management challenges facing organizations and their staff are many and evolving which are partly introduced by changes in our technology and way of life.

Continue reading "Identity and Access Management Challenges"

Jan 02, 2017

PlayStation Fraud Risks

PlayStation fraud risks for customers of Sony Entertainment Network can be very high and costly which we cover in this article.

Continue reading "PlayStation Fraud Risks"

Dec 24, 2016

WordPress Plugin Security Risks

The WordPress plugin security risks are many and can negatively affect millions of websites that use the WorPress program if plugins are not managed properly.

Continue reading "WordPress Plugin Security Risks"

Dec 18, 2016

Emails Are Not Private

There are many reasons why emails are not private and must always be saved or sent with the understanding that emails are public and can be disclosed to anyone other than the intended recipients.

Continue reading "Emails Are Not Private"

Dec 18, 2016

Signs of Identity Theft

There are many signs of identity theft some of which are obvious or not so obvious. This is a quick list of identity theft signs.

Continue reading "Signs of Identity Theft"

Dec 13, 2016

Personal Document Photo Backup

Personal document photo backup is one of the best strategies for loss recovery when personal items are lost, stolen, or misplaced, and forgotten.

Continue reading "Personal Document Photo Backup"

Nov 29, 2016

Dead Boy Identity

The reported news of a stolen dead boy identity illustrates how dead persons’ identities can also be stolen and misused in a variety of ways even years after the persons are passed on.

Continue reading "Dead Boy Identity"

Nov 15, 2016

Identity and Access Management Objectives

The high level identity and access management objectives include cyber security, access management, fraud prevention, and compliance.

Continue reading "Identity and Access Management Objectives "

Nov 06, 2016

Why Identity and Access Management Matters

There are five main reasons why identity and access management matters most in cyber security and data protection.

Continue reading "Why Identity and Access Management Matters"

Oct 26, 2016

Website Access Risks

When using public computers for website access, you need to completely sign out and prevent the computer to remember you in order to prevent others from accessing your accounts.

Continue reading "Website Access Risks"

Oct 11, 2016

Employee Error Causes Most Data Breaches

Employee error to unwittingly give away system access information to hackers facilitate data breaches in over 90% of cyber attacks according to leading industry and government reports.

Continue reading "Employee Error Causes Most Data Breaches"

Oct 08, 2016

Global Cybersecurity Expert Shortages

It is estimated that the global cybersecurity expert shortages will be around 1.5 million by 2020. Learn about how to become a cybersecurity expert and fill the gap in a growing job market.

Continue reading "Global Cybersecurity Expert Shortages "

Oct 01, 2016

Bad Business Reputation

Identity theft and fraud can create a bad business reputation for companies which fail to protect their customers against identity theft fraud and privacy violations.

Continue reading "Bad Business Reputation"

Identity Theft Courses