Identity Theft Blog

Welcome to the most progressive identity theft blog which includes original identity theft articles written by experts at Identity Management Institute discussing identity protection strategies and identity theft solutions for businesses and consumers. This identity theft protection website offers new articles and hundreds of archived original articles which are periodically updated and read by thousands of visitors from around the world. Companies are encouraged to refer their customers, employees and business partners to selected articles of this site for free education and training. Please scroll down for the latest identity management articles or check out the sections of your interest on the navigation bar for relevant identity theft articles.

In order to stay current with this ID theft blog, you can a) right-click on the RSS "orange button" below the Navigation Bar to subscribe to the identity protection blog, b) get the latest via any of the major search engines such as Yahoo, MSN or Google by making your selection below the Navigation Bar, c) subscribe to the no-cost Identity Management Journal.

Search for Articles

Recent Articles

May 20, 2017

Protect Yourself When Shopping Online

If you are a regular online shopper, there are a few steps that you can take to protect yourself when shopping online from identity theft, prevent online fraud, and avoid paying higher prices.

Continue reading "Protect Yourself When Shopping Online"

May 11, 2017

What is Cyber Security?

Internet security is a subset of cyber security, and, cyber-security is a subset of information security which is just the security of any system or digital data excluding all other forms of data.

Continue reading "What is Cyber Security?"

May 11, 2017

Social Media Identity Theft Dangers

The dangers of social media identity theft are increasing as more people continue to socialize online without understand the risks.

Continue reading "Social Media Identity Theft Dangers"

May 06, 2017

Exercising Due Diligence Online

Online threats are many as we will discuss in this article and exercising due diligence online is highly advised. Read this article for details.

Continue reading "Exercising Due Diligence Online"

Apr 29, 2017

Offshore Outsourcing Security Risks

There are many offshore outsourcing security risks that create real challenges for companies, especially in the areas of privacy management and regulatory compliance.

Continue reading "Offshore Outsourcing Security Risks"

Apr 20, 2017

Cell Phone Security Tips

As smartphones are small portable devices, it is important to be aware of cell phone security tips in order to prevent cell phone theft or loss.

Continue reading "Cell Phone Security Tips"

Apr 01, 2017

Identity and Access Management Model

The AAA identity and access management model is a framework which is embedded into the digital identity and access management world to manage access to assets and maintain system security.

Continue reading "Identity and Access Management Model"

Mar 22, 2017

Cybercrime Cases and Scenarios

Cyber criminals are increasingly presenting us with creative cybercrime cases and scenarios as our digital universe continues to be connected.

Continue reading "Cybercrime Cases and Scenarios"

Mar 20, 2017

The Future of Identity and Access Management

The future of identity and access management will include technological innovation to address the security and interoperability of increasing connected devices.

Continue reading "The Future of Identity and Access Management"

Mar 10, 2017

Stolen Employee Access Risks

According to a few research studies, stolen employee access password is by far the leading cause of system hacking cases and data breach incidents.

Continue reading "Stolen Employee Access Risks"

Feb 21, 2017

Internet Security Initiative

The internet security initiative announced by the Department of Homeland Security (DHS) aimed to improve cyberspace and secure online identification.

Continue reading "Internet Security Initiative"

Feb 13, 2017

Emails That Contain Personal Information

Preventing emails that contain personal information from being sent to employees or outside of an organization is a step that many organizations take to manage risks.

Continue reading "Emails That Contain Personal Information"

Feb 02, 2017

Spoofed Email Spams

This article discusses how spoofed email spams occur and what we can do about them although our options as email users are limited as you will soon find out in this article.

Continue reading "Spoofed Email Spams "

Feb 02, 2017

Clicking Email Links

Clicking email links without first validating the source of emails can be devastating and poses great security and privacy risks.

Continue reading "Clicking Email Links"

Jan 22, 2017

Debit Card Fraud Management Steps

There are some immediate debit card fraud management steps that you must take if you discover that one of your accounts has been hit with fraudulent transactions.

Continue reading "Debit Card Fraud Management Steps "

Jan 11, 2017

Information Security Outsourcing Risks

Information security is not exempt from outsourcing when the decision is made to reduce overall costs. However, information security outsourcing risks must be identified, acknowledge, and mitigated.

Continue reading "Information Security Outsourcing Risks "

Jan 07, 2017

Identity and Access Management Challenges

Identity and access management challenges facing organizations and their staff are many and evolving which are partly introduced by changes in our technology and way of life.

Continue reading "Identity and Access Management Challenges"

Jan 02, 2017

PlayStation Fraud Risks

PlayStation fraud risks for customers of Sony Entertainment Network can be very high and costly which we cover in this article.

Continue reading "PlayStation Fraud Risks"

Dec 24, 2016

WordPress Plugin Security Risks

The WordPress plugin security risks are many and can negatively affect millions of websites that use the WorPress program if plugins are not managed properly.

Continue reading "WordPress Plugin Security Risks"

Dec 18, 2016

Emails Are Not Private

There are many reasons why emails are not private and must always be saved or sent with the understanding that emails are public and can be disclosed to anyone other than the intended recipients.

Continue reading "Emails Are Not Private"

Dec 18, 2016

Signs of Identity Theft

There are many signs of identity theft some of which are obvious or not so obvious. This is a quick list of identity theft signs.

Continue reading "Signs of Identity Theft"

Dec 13, 2016

Personal Document Photo Backup

Personal document photo backup is one of the best strategies for loss recovery when personal items are lost, stolen, or misplaced, and forgotten.

Continue reading "Personal Document Photo Backup"

Nov 29, 2016

Dead Boy Identity

The reported news of a stolen dead boy identity illustrates how dead persons’ identities can also be stolen and misused in a variety of ways even years after the persons are passed on.

Continue reading "Dead Boy Identity"

Nov 15, 2016

Identity and Access Management Objectives

The high level identity and access management objectives include cyber security, access management, fraud prevention, and compliance.

Continue reading "Identity and Access Management Objectives "

Nov 06, 2016

Why Identity and Access Management Matters

There are five main reasons why identity and access management matters most in cyber security and data protection.

Continue reading "Why Identity and Access Management Matters"

Oct 26, 2016

Website Access Risks

When using public computers for website access, you need to completely sign out and prevent the computer to remember you in order to prevent others from accessing your accounts.

Continue reading "Website Access Risks"

Oct 11, 2016

Employee Error Causes Most Data Breaches

Employee error to unwittingly give away system access information to hackers facilitate data breaches in over 90% of cyber attacks according to leading industry and government reports.

Continue reading "Employee Error Causes Most Data Breaches"

Oct 08, 2016

Global Cybersecurity Expert Shortages

It is estimated that the global cybersecurity expert shortages will be around 1.5 million by 2020. Learn about how to become a cybersecurity expert and fill the gap in a growing job market.

Continue reading "Global Cybersecurity Expert Shortages "

Oct 01, 2016

Bad Business Reputation

Identity theft and fraud can create a bad business reputation for companies which fail to protect their customers against identity theft fraud and privacy violations.

Continue reading "Bad Business Reputation"

Oct 01, 2016

Identity Theft Prevention Program (ITPP)

A comprehensive, well documented and fully executed identity theft prevention program is necessary to properly address all identity theft risks and comply with the Red Flags Rule.

Continue reading "Identity Theft Prevention Program (ITPP)"

Sep 29, 2016

New Cybersecurity Challenges

Due to the global Internet connectivity of many devices and networks, the computer security risk landscape has expanded and includes many new cybersecurity challenges.

Continue reading "New Cybersecurity Challenges"

Sep 26, 2016

Becoming a Cybersecurity Expert

This cybersecurity career guide intends to encourage and educate IT professionals and students for becoming a cybersecurity expert in a growing field. Download a copy of the ebook.

Continue reading "Becoming a Cybersecurity Expert"

Sep 20, 2016

Birth Certificate Reset

In response to a massive birth certificate fraud, Puerto Rico invalidated all existing birth certificates for a massive birth certificate reset and replacement for its people.

Continue reading "Birth Certificate Reset"

Sep 12, 2016

Top Information Security Certification

Top information security certification among most in demand information security certifications is the Certified Identity and Access Manager (CIAM) designation which we will cover in this article.

Continue reading "Top Information Security Certification"

Sep 08, 2016

Identity of Things (IDoT)

As we embrace the Internet of Things (IoT) which refers to all smart and Internet enabled devices, we have to collaborate to address the growing the risks of Identity of Things (IDoT).

Continue reading "Identity of Things (IDoT)"

Sep 01, 2016

Smart Device Security Risks

Smart device security risks will increase as we embrace an increasing number of Internet connected devices also called Internet of Things or IoT.

Continue reading "Smart Device Security Risks"

Aug 24, 2016

Access Certification

Access certification is a regulatory compliance requirement and chances are that your information security policies require managers to review and validate access for their employees.

Continue reading "Access Certification"

Aug 16, 2016

Identity and Access Management Market Growth

The identity and access management market will grow from $7.2 Billion USD in 2015 to $12.78 billion USD in 2020, forecasting an expected annual growth rate of 12.2%.

Continue reading "Identity and Access Management Market Growth"

Aug 12, 2016

Millennial Identity Theft Risks

This article discusses the millennial identity theft risks and proposes a few actions to help the Gen Y which includes students to protect themselves against identity theft.

Continue reading "Millennial Identity Theft Risks"

Jul 31, 2016

Reverse Lookup Techniques and Options

Before responding to a request for information, a careful reverse lookup on your part will allow you to share your personal information with confidence.

Continue reading "Reverse Lookup Techniques and Options"

Jul 28, 2016

Vendor Risk Management

When companies place their trust in others to serve them and ultimately their customers, they must have some assurance that the vendors are managing the risks.

Continue reading "Vendor Risk Management"

Jul 25, 2016

Identity and Access Management Benefits

Identity and access management benefits are many and include the verification of user and device identities and management of their access to enterprise resources.

Continue reading "Identity and Access Management Benefits "

Jul 19, 2016

Use Account Freeze To Protect Existing Accounts

An account freeze is a great free tool to prevent the unauthorized use of your existing accounts and credit cards.

Continue reading "Use Account Freeze To Protect Existing Accounts"

Jul 12, 2016

Fraud Alert Or Freeze?

One way to prevent identity theft is to place a fraud alert or freeze on your credit reports. Learn the differences of both and pick the one that’s right for you.

Continue reading "Fraud Alert Or Freeze?"

Jul 01, 2016

Car Robbery and Identity Theft

As evidenced by this true story, leaving your personal items in the car even for a short period can expose you to some serious identity theft risks.

Continue reading "Car Robbery and Identity Theft"

Jun 30, 2016

Identity Theft Certification

Identity theft certification has become a major defense against rising data breach incidents and identity fraud risks. Learn about the leading identity theft certifications in the marketplace.

Continue reading "Identity Theft Certification"

Jun 25, 2016

IAM System

Identity Access Management or IAM system brings together a set of enterprise processes to manage user identities and their access to systems and data in order to secure company assets.

Continue reading "IAM System"

Jun 14, 2016

Password Death

Passwords are still widely used worldwide but password death is imminent as advanced authentication techniques such as digital badges and biometric authentication slowly replace passwords.

Continue reading "Password Death"

Jun 12, 2016

How We Increase Data Security Risks

We have to discuss how we increase data security risks before we can discuss how we can reduce information security risks.

Continue reading "How We Increase Data Security Risks"

Identity Management Certifications

Identity Theft Courses