Welcome to the most progressive identity theft blog which includes original identity theft articles written by experts at Identity Management Institute discussing identity protection strategies and identity theft solutions for businesses and consumers. This identity theft protection website offers new articles and hundreds of archived original articles which are periodically updated and read by thousands of visitors from around the world. Companies are encouraged to refer their customers, employees and business partners to selected articles of this site for free education and training. Please scroll down for the latest identity management articles or check out the sections of your interest on the navigation bar for relevant identity theft articles.
In order to stay current with this ID theft blog, you can a) right-click on the RSS "orange button" below the Navigation Bar to subscribe to the identity protection blog, b) get the latest via any of the major search engines such as Yahoo, MSN or Google by making your selection below the Navigation Bar, c) subscribe to the no-cost Identity Management Journal.
When organizations place their trust in third party service providers to serve them and their customers, they must have adequate vendor risk management practices.
Using a store card has many benefits; however, other related options such as automatic card reload of funds may introduce many risks which may not be worth the benefits.
There are serious consequences for revealing your personal information through social media sites. Recent studies have revealed that identity theft is a major problem affecting millions of people across the world.
Identity theft and related issues are caused by identity obesity which occurs when people over-share, over-collect, and mismanage personal information.
We all get spam e-mails and it seems that we keep getting more every day. Learn why it's hard to fight spam and what your options are.
We are flooded with fake e-mails, phone calls and mails phishing for our personal information to commit fraud. Learn to detect phishing scams and prevent identity theft.
Many people who file their taxes and expect a tax refund usually ask themselves “where is my tax refund?” while they impatiently wait for it. Learn how to check your refund status.
With the massive growth of cyber business comes the equally massive complexity of securing business transactions which can be supported with blockchain identity management.
To improve security, many modern businesses are beginning to implement biometric authentication to prevent identity theft.
Policies and procedures are major tools to reduce an organization's risks and as such must be carefully developed for high risk areas of any organization.
It has been reported in a few places that ATM fraud is on the rise and that bank ATMs are the most affected or rather the main contributors of all cash dispenser fraud. This is true, yet misleading.
Our top annual resolutions should be inclusive of critical goals to address risks in our lives including identity theft risks which require behavioral changes.
As we continue to see more data security breach cases, their causes continue to remain almost the same such as un-encrypted devices.
The trusted cyberspace identity initiative known as the National Strategy for Trusted Identities in Cyberspace (NSTIC) aims to improve online identification, authentication and privacy.
How often car license plates are stolen? How serious is car license plate theft? Is this a crime and what are the penalties for license plate theft? This article answers these questions.
We can't help but to ask ourselves "how secure are computer security products" when we learn about tampered computer security products that spy on people instead of protecting them.
According to past identity theft cases, 22% of students were notified that they were a victim of identity theft. Student identity theft is three times as likely as the average fraud victim.
When Yahoo changed the way its users access email, Yahoo mail security moved away from passwords yet left a security hole in the access management process.
It is reported that young identity theft victims account for the majority of all identity theft victims and there might be good reasons why.
National Institute of Standards and Technology or NIST security compliance is sometimes a requirement for earning government contracts. This article highlights the NIST 800 security areas.
The Red Flags Rule specifically calls out 26 identity theft red flags that companies should consider as part of their identity theft prevention and training programs.
Identity theft insurance is a policy on its own or integrated with some other insurance which allows an identity theft victim to recover some of the recovery costs.
The Equifax data breach is believed to be the largest of its kind affecting more than half of the US population which lasted from mid-May through July 2017.
This article describes the basic difference between internal and external certification as it relates to professional development in a simple and concise language.
Identity fraud inflicted on existing loan accounts can be reduced with proper account and loan consolidation.
Covered financial institutions and creditors must adhere to the Red Flag compliance rules and may be subject to regulatory audits and non-compliance penalties.
Identity Management Institute manages the Certified Red Flag Specialist (CRFS) program to train, test and certify professionals responsible for supporting their identity theft prevention program.
Managing identity theft risks is a priority for may organizations because identity theft incidents can often have devastating consequences for companies and their customers.
The General Data Protection Regulation (GDPR) which offers the most comprehensive data protection reform to date in the European Union will soon become effective. Get ready!
The need to dispose of one's laptop properly is critical because of the sensitive information that could exist on the hard drive. This article offers some laptop disposal tips.
Educating kids about information security and privacy is one of the best things that parents can do for their children before it's too late.
Credit monitoring is a good practice for detecting identity theft and unauthorized credit accounts; however, it is not a total solution for identity theft.
If you are a regular online shopper, there are a few steps that you can take to protect yourself when shopping online from identity theft, prevent online fraud, and avoid paying higher prices.
Internet security is a subset of cyber security, and, cyber-security is a subset of information security which is just the security of any system or digital data excluding all other forms of data.
The dangers of social media identity theft are increasing as more people continue to socialize online without understand the risks.
Online threats are many as we will discuss in this article and exercising due diligence online is highly advised. Read this article for details.
There are many offshore outsourcing security risks that create real challenges for companies, especially in the areas of privacy management and regulatory compliance.
As smartphones are small portable devices, it is important to be aware of cell phone security tips in order to prevent cell phone theft or loss.
The AAA identity and access management model is a framework which is embedded into the digital identity and access management world to manage access to assets and maintain system security.
Cyber criminals are increasingly presenting us with creative cybercrime cases and scenarios as our digital universe continues to be connected.
The future of identity and access management will include technological innovation to address the security and interoperability of increasing connected devices.
According to a few research studies, stolen employee access password is by far the leading cause of system hacking cases and data breach incidents.
The internet security initiative announced by the Department of Homeland Security (DHS) aimed to improve cyberspace and secure online identification.
Preventing emails that contain personal information from being sent to employees or outside of an organization is a step that many organizations take to manage risks.
This article discusses how spoofed email spams occur and what we can do about them although our options as email users are limited as you will soon find out in this article.
Clicking email links without first validating the source of emails can be devastating and poses great security and privacy risks.
There are some immediate debit card fraud management steps that you must take if you discover that one of your accounts has been hit with fraudulent transactions.
Information security is not exempt from outsourcing when the decision is made to reduce overall costs. However, information security outsourcing risks must be identified, acknowledge, and mitigated.
Identity and access management challenges facing organizations and their staff are many and evolving which are partly introduced by changes in our technology and way of life.