Welcome to the most progressive identity theft blog which includes original identity theft articles written by experts at Identity Management Institute discussing identity protection strategies and identity theft solutions for businesses and consumers. This identity theft protection website offers new articles and hundreds of archived original articles which are periodically updated and read by thousands of visitors from around the world. Companies are encouraged to refer their customers, employees and business partners to selected articles of this site for free education and training. Please scroll down for the latest identity management articles or check out the sections of your interest on the navigation bar for relevant identity theft articles.
In order to stay current with this ID theft blog, you can a) right-click on the RSS "orange button" below the Navigation Bar to subscribe to the identity protection blog, b) get the latest via any of the major search engines such as Yahoo, MSN or Google by making your selection below the Navigation Bar, c) subscribe to the no-cost Identity Management Journal.
An account freeze is a great free tool to prevent the unauthorized use of your existing accounts and credit cards.
One way to prevent identity theft is to place a fraud alert or freeze on your credit reports. Learn the differences of both and pick the one that’s right for you.
As evidenced by this true story, leaving your personal items in the car even for a short period can expose you to some serious identity theft risks.
Identity theft certification has become a major defense against rising data breach incidents and identity fraud risks. Learn about the leading identity theft certifications in the marketplace.
Identity Access Management or IAM system brings together a set of enterprise processes to manage user identities and their access to systems and data in order to secure company assets.
Passwords are still widely used worldwide but password death is imminent as advanced authentication techniques such as digital badges and biometric authentication slowly replace passwords.
We have to discuss how we increase data security risks before we can discuss how we can reduce information security risks.
A "know your employee" process validates the employee identity and background before they are hired and monitors their activities for as long as they remain employed.
The Internet increasingly touches upon the privacy of consumers worldwide causing all countries to consider privacy law expansion for domestic and international businesses.
As privacy regulations and requirement evolve, privacy professionals must expand privacy skills to understand and assess the security controls within their organizations.
When you face unauthorized and erroneous credit card charges, you must also notify the institution in writing through a dispute letter.
Our efforts for preventing identity theft can be the most cost effective strategy for reducing the risks of identity theft.
Protect your personal items when you visit your health club and consider these gym security tips to protect yourself.
Consider security travel purse, bags, money belts, and money clips to limit your identity theft risks when you travel.
There are many types of identity theft which consumers must familiarize themselves with in order to better understand why it occurs.
When our credit cards are lost, there are certain steps that we need to take immediately to ensure our rights are protected and we recover any potential losses as soon as possible.
Identity KAOS is a set of identity protection principles which are embedded in the Certified Identity Protection Advisor (CIPA) training program.
There are two general credit card risks which include owning and using credit cards excessively. Educate yourself about these credit card fraud risks and avoid being a credit fraud victim.
Managing information security violations is an important part of a comprehensive information security program. Learn why some violate the security policies and how to manage the risk.
Customized identity theft training is a great way to increase consumer and employee knowledge about ways to protect their families and companies from identity theft.
Red Flags Rule training is one of the key components of an effective identity theft prevention program and a requirement of the Red Flags Rule. Identity Management Institute offers a variety of training options which take into consideration budget, space, and time constrains.
Many companies are required to provide employee Red Flags Rule training for compliance and identity theft prevention purposes. Learn about Red Flags Rule training.
We have to realize that not everyone cares about information security in any company and in fact some people may purposefully violate the established security policies and protocols for their personal gains.
Workplace identity obesity which is the excessive collection, retention and sharing of customer information is a real threat to consumer identity privacy and protection.
Regulated companies such as banks must abide by customer identification requirements and implement a written Customer Identification Program (CIP) appropriate for their size and type of business.
There are many risk management certification options in the marketplace. Some are general while others are more specific in nature which may be selectively combined for full risk management coverage.
The scams also known as “Nigerian Scams” may come in all forms and from any country. Know how to identify the conman scams and avoid becoming a victim.
This short article discusses the difference between the CIAM and CIPA certifications offered by Identity Management Institute (IMI).
Address change fraud committed through social engineering and pretexting is one of the non-technical and easy scams used to steal customer information and commit identity fraud.
My Yahoo email account and its information were illegally accessed and used to send unauthorized emails to the list of contacts in the email system.
There are a few signs which may warn you about the possibility that you are a victim of hacked email account . Read this article to prepare for such incidents when it occurs.
Although some legitimate companies provide free credit scores to their existing and potential customers, free credit score scam is on the rise. Read this article to learn more and watch a video.
We often receive credit offers in the mail and have to make decisions about rejecting or accepting credit card offers. However, we have to make these decisions very carefully for many reasons.
A mandatory minimum age limit and/or Internet security training for children is necessary before they use the Internet to protect them. Learn about the risks and proposed solutions.
As our children use the Internet to socialize, they also place themselves at risk. This story illustrates how dangerous the Internet can be for online child safety.
Learn to become data breach resilient by documenting response plans, identifying stakeholders, performing exercises, adjusting plans as needed, and training employees.
Access controls are designed to allow access, deny access, limit access, and revoke access. Access to resources occurs through identification, authentication, and authorization. learn more.
In order to properly address identity theft and compliance, the word "identity" has to be defined and understood for effective protection of its components and risk management.
In order to properly protect personal information, we must first define personal information according to the appropriate privacy laws that affect our businesses.
As security or privacy professionals, we’re often asked “what is the difference between privacy and security?” This article discusses their differences and interrelationship.
Are you a privacy or security professional? This article attempts to shed some light on the differences and similarities of security and privacy roles.
Human errors are the biggest contributors to data security breach incidents which can be addressed with a combination of technology, processes and training to reduce risks.
When we analyze information security incidents, there are many pieces of information that can be used to establish data breach trends and help us improve security to prevent future events.
The required skillset around regulatory knowledge, communication, audit, risk assessment, and cyber security makes it difficult to find qualified Data Protection Officer.
Internet security is a subset of cyber security, and, cyber-security is a subset of information security which is just the security of any system or digital data excluding all other forms of data.
Information security spending has been growing steadily and is an investment priority for many businesses which are fearful of data breach incidents. Learn how you can reduce security costs.
Educational institutions in the United States are struggling with student privacy and its legal requirements, student record protection and consequences of unauthorized privacy invasion.
Placing a credit or security freeze on your credit report provides a better protection against identity theft than typical fraud alerts. Learn about credit freeze benefits and disadvantages.
There are 3 categories of data protection safeguards that information security professionals must consider when planning their data protection and compliance efforts.