Identity Theft Blog

Welcome to the most progressive identity theft blog which includes original identity theft articles written by experts at Identity Management Institute discussing identity protection strategies and identity theft solutions for businesses and consumers. This identity theft protection website offers new articles and hundreds of archived original articles which are periodically updated and read by thousands of visitors from around the world. Companies are encouraged to refer their customers, employees and business partners to selected articles of this site for free education and training. Please scroll down for the latest identity management articles or check out the sections of your interest on the navigation bar for relevant identity theft articles.

In order to stay current with this ID theft blog, you can a) right-click on the RSS "orange button" below the Navigation Bar to subscribe to the identity protection blog, b) get the latest via any of the major search engines such as Yahoo, MSN or Google by making your selection below the Navigation Bar, c) subscribe to the no-cost Identity Management Journal.

Search for Articles

Recent Articles

May 26, 2016

Identity Theft Dispute Letter

When you face unauthorized and erroneous credit card charges, you must also notify the institution in writing through a dispute letter.

Continue reading "Identity Theft Dispute Letter"

May 24, 2016

Preventing Identity Theft

Our efforts for preventing identity theft can be the most cost effective strategy for reducing the risks of identity theft.

Continue reading "Preventing Identity Theft"

May 20, 2016

Gym Security and Identity Theft

Protect your personal items when you visit your health club and consider these gym security tips to protect yourself.

Continue reading "Gym Security and Identity Theft"

May 20, 2016

Security Travel Purse and Identity Theft

Consider security travel purse, bags, money belts, and money clips to limit your identity theft risks when you travel.

Continue reading "Security Travel Purse and Identity Theft"

May 16, 2016

Types Of Identity Theft

There are many types of identity theft which consumers must familiarize themselves with in order to better understand why it occurs.

Continue reading "Types Of Identity Theft"

May 13, 2016

Lost Credit Card

When our credit cards are lost, there are certain steps that we need to take immediately to ensure our rights are protected and we recover any potential losses as soon as possible.

Continue reading "Lost Credit Card"

May 11, 2016

Identity KAOS

Identity KAOS is a set of identity protection principles which are embedded in the Certified Identity Protection Advisor (CIPA) training program.

Continue reading "Identity KAOS"

May 11, 2016

Credit Card Risks

There are two general credit card risks which include owning and using credit cards excessively. Educate yourself about these credit card fraud risks and avoid being a credit fraud victim.

Continue reading "Credit Card Risks"

May 08, 2016

Managing Information Security Violations

Managing information security violations is an important part of a comprehensive information security program. Learn why some violate the security policies and how to manage the risk.

Continue reading "Managing Information Security Violations"

May 05, 2016

Identity Theft Training

Customized identity theft training is a great way to increase consumer and employee knowledge about ways to protect their families and companies from identity theft.

Continue reading "Identity Theft Training"

May 01, 2016

5 Ways to Increase Data Security Risks and Costs

We often discuss how we can reduce information security risks but not how we increase the information security risks. Learn about 5 ways that increase info security risks and costs.

Continue reading "5 Ways to Increase Data Security Risks and Costs"

Apr 29, 2016

Red Flags Rule Training

Red Flags Rule training is one of the key components of an effective identity theft prevention program and a requirement of the Red Flags Rule. Identity Management Institute offers a variety of training options which take into consideration budget, space, and time constrains.

Continue reading "Red Flags Rule Training"

Apr 28, 2016

Employee Red Flags Rule Training

Many companies are required to provide employee Red Flags Rule training for compliance and identity theft prevention purposes. Learn about Red Flags Rule training.

Continue reading "Employee Red Flags Rule Training"

Apr 24, 2016

Not Everyone Cares About Information Security

We have to realize that not everyone cares about information security in any company and in fact some people may purposefully violate the established security policies and protocols for their personal gains.

Continue reading "Not Everyone Cares About Information Security"

Apr 23, 2016

Workplace Identity Obesity

Workplace identity obesity which is the excessive collection, retention and sharing of customer information is a real threat to consumer identity privacy and protection.

Continue reading "Workplace Identity Obesity"

Apr 20, 2016

Customer Identification Requirements

Regulated companies such as banks must abide by customer identification requirements and implement a written Customer Identification Program (CIP) appropriate for their size and type of business.

Continue reading "Customer Identification Requirements"

Apr 12, 2016

Risk Management Certification

There are many risk management certification options in the marketplace. Some are general while others are more specific in nature which may be selectively combined for full risk management coverage.

Continue reading "Risk Management Certification"

Apr 11, 2016

Conman Scams - Be Diligent

The scams also known as “Nigerian Scams” may come in all forms and from any country. Know how to identify the conman scams and avoid becoming a victim.

Continue reading "Conman Scams - Be Diligent "

Apr 10, 2016

CIAM and CIPA

This short article discusses the difference between the CIAM and CIPA certifications offered by Identity Management Institute (IMI).

Continue reading "CIAM and CIPA"

Apr 09, 2016

Address Change Fraud

Address change fraud committed through social engineering and pretexting is one of the non-technical and easy scams used to steal customer information and commit identity fraud.

Continue reading "Address Change Fraud "

Apr 05, 2016

Yahoo Email Account

My Yahoo email account and its information were illegally accessed and used to send unauthorized emails to the list of contacts in the email system.

Continue reading "Yahoo Email Account"

Apr 05, 2016

Dealing with Hacked Email Account

There are a few signs which may warn you about the possibility that you are a victim of hacked email account . Read this article to prepare for such incidents when it occurs.

Continue reading "Dealing with Hacked Email Account"

Mar 29, 2016

Free Credit Score Scam

Although some legitimate companies provide free credit scores to their existing and potential customers, free credit score scam is on the rise. Read this article to learn more and watch a video.

Continue reading "Free Credit Score Scam"

Mar 27, 2016

Accepting Credit Card Offers

We often receive credit offers in the mail and have to make decisions about rejecting or accepting credit card offers. However, we have to make these decisions very carefully for many reasons.

Continue reading "Accepting Credit Card Offers"

Mar 19, 2016

Mandatory Internet Security for Children

A mandatory minimum age limit and/or Internet security training for children is necessary before they use the Internet to protect them. Learn about the risks and proposed solutions.

Continue reading "Mandatory Internet Security for Children"

Mar 19, 2016

Online Child Safety

As our children use the Internet to socialize, they also place themselves at risk. This story illustrates how dangerous the Internet can be for online child safety.

Continue reading "Online Child Safety"

Mar 06, 2016

Become Data Breach Resilient

Learn to become data breach resilient by documenting response plans, identifying stakeholders, performing exercises, adjusting plans as needed, and training employees.

Continue reading "Become Data Breach Resilient"

Mar 04, 2016

Access Controls

Access controls are designed to allow access, deny access, limit access, and revoke access. Access to resources occurs through identification, authentication, and authorization. learn more.

Continue reading "Access Controls "

Mar 02, 2016

Identity Definition and Components

In order to properly address identity theft and compliance, the word "identity" has to be defined and understood for effective protection of its components and risk management.

Continue reading "Identity Definition and Components"

Mar 02, 2016

Define Personal Information

In order to properly protect personal information, we must first define personal information according to the appropriate privacy laws that affect our businesses.

Continue reading "Define Personal Information "

Feb 18, 2016

Difference Between Privacy and Security

As security or privacy professionals, we’re often asked “what is the difference between privacy and security?” This article discusses their differences and interrelationship.

Continue reading "Difference Between Privacy and Security"

Feb 17, 2016

Privacy or Security

Are you a privacy or security professional? This article attempts to shed some light on the differences and similarities of security and privacy roles.

Continue reading "Privacy or Security"

Feb 09, 2016

Security Risk of Human Errors

Human errors are the biggest contributors to data security breach incidents which can be addressed with a combination of technology, processes and training to reduce risks.

Continue reading "Security Risk of Human Errors"

Jan 26, 2016

Data Breach Trends

When we analyze information security incidents, there are many pieces of information that can be used to establish data breach trends and help us improve security to prevent future events.

Continue reading "Data Breach Trends"

Jan 16, 2016

Data Protection Officer

The required skillset around regulatory knowledge, communication, audit, risk assessment, and cyber security makes it difficult to find qualified Data Protection Officer.

Continue reading "Data Protection Officer"

Jan 12, 2016

What is Cyber Security?

Internet security is a subset of cyber security, and, cyber-security is a subset of information security which is just the security of any system or digital data excluding all other forms of data.

Continue reading "What is Cyber Security?"

Dec 27, 2015

Information Security Spending

Information security spending has been growing steadily and is an investment priority for many businesses which are fearful of data breach incidents. Learn how you can reduce security costs.

Continue reading "Information Security Spending"

Dec 24, 2015

Student Privacy

Educational institutions in the United States are struggling with student privacy and its legal requirements, student record protection and consequences of unauthorized privacy invasion.

Continue reading "Student Privacy"

Dec 17, 2015

Credit Freeze Protection

Placing a credit or security freeze on your credit report provides a better protection against identity theft than typical fraud alerts. Learn about credit freeze benefits and disadvantages.

Continue reading "Credit Freeze Protection"

Dec 11, 2015

Data Protection Safeguards

There are 3 categories of data protection safeguards that information security professionals must consider when planning their data protection and compliance efforts.

Continue reading "Data Protection Safeguards"

Nov 29, 2015

Identity Protection Principles

The KAOS™ identity protection principles should be an integral part of your daily activities and thought process to effectively protect your personal information from identity theft.

Continue reading "Identity Protection Principles"

Nov 29, 2015

Check Your Wallet

You must check your wallet periodically to review its contents, decide which ones need to remain in your wallet, and ultimately reduce your identity theft risk by removing some of its contents.

Continue reading "Check Your Wallet"

Nov 20, 2015

Identity Theft Seminar

Identity Diet is an identity protection course designed to be an integral part for an identity theft seminar to teach individuals on how to develop a personalized identity protection plan.

Continue reading "Identity Theft Seminar"

Nov 12, 2015

Is an Employee Just a Fist In A Bucket Of Water?

Some may think that any employee is just a fist in a bucket of water, but without key performer employees, long term business success may not be assured.

Continue reading "Is an Employee Just a Fist In A Bucket Of Water?"

Nov 08, 2015

Managing Identity Theft Fear

Most of us have some kind of fear including identity theft fear that we have to deal with. If we ignore our fears and real threats, we will emotionally break down and face real dangers.

Continue reading "Managing Identity Theft Fear"

Oct 28, 2015

Business Associate Contract

A business associate contract or Business Associate Agreement - BAA is a required contract between an entity and its subcontracts which may access its consumer information.

Continue reading "Business Associate Contract"

Oct 23, 2015

Influential Information Security Leader

The top three characteristics of an influential information security leader are identified as trust, credibility and reporting level within the organization.

Continue reading "Influential Information Security Leader"

Oct 19, 2015

Disgruntled Employee

A disgruntled employee is a potential threat and risk to business that should be taken seriously, especially during massive business changes such as layoff.

Continue reading "Disgruntled Employee"

Oct 16, 2015

Protected Health Information (PHI)

Under Health Information Portability and Accountability Act or HIPAA, these 18 Protected Health Information or PHI data fields must be protected.

Continue reading "Protected Health Information (PHI)"

Training and Certifications