Identity Theft Blog

Welcome to the most progressive identity theft blog which includes original identity theft articles written by experts at Identity Management Institute discussing identity protection strategies and identity theft solutions for businesses and consumers. This identity theft protection website offers new articles and hundreds of archived original articles which are periodically updated and read by thousands of visitors from around the world. Companies are encouraged to refer their customers, employees and business partners to selected articles of this site for free education and training. Please scroll down for the latest identity management articles or check out the sections of your interest on the navigation bar for relevant identity theft articles.

In order to stay current with this ID theft blog, you can a) right-click on the RSS "orange button" below the Navigation Bar to subscribe to the identity protection blog, b) get the latest via any of the major search engines such as Yahoo, MSN or Google by making your selection below the Navigation Bar, c) subscribe to the no-cost Identity Management Journal.

Search for Articles

Recent Articles

Jan 12, 2019

Federated Identity Management Challenges

By creating one central identity to access all network applications, companies simplify workflows and remove barriers to productivity. However, a unique set of security challenges must be met when using federated identity technologies.

Continue reading "Federated Identity Management Challenges"

Jan 12, 2019

Access Creep

Privilege or access creep is a system security risk which occurs when employees accumulate more access rights than are required to perform their job tasks.

Continue reading "Access Creep"

Jan 03, 2019

The Deep Trouble with Deepfakes

Imagine arriving at work one morning to discover all of your employees have received an important video announcement from you and are scrambling to comply with the instructions it contains. Their responsiveness would be impressive if not for one thing: You never recorded or sent the video, and now you somehow have to undo the resulting damage.

Continue reading "The Deep Trouble with Deepfakes"

Jan 03, 2019

Hackers Love Poor IAM Strategies

Identity and Access Management (IAM) strategies are designed to protect systems from malicious activities, but new technologies are allowing hackers to launch more sophisticated attacks.

Continue reading "Hackers Love Poor IAM Strategies"

Jan 03, 2019

Managing Vendor Onboarding Challenges

Taking on new suppliers as you grow your business is associated with a unique set of challenges and risks. Partnerships increase the number of people with access to your systems, and managing this access requires diligence when assessing potential security issues.

Continue reading "Managing Vendor Onboarding Challenges"

Dec 14, 2018

Identity and Access Management in Cloud Platforms

As more businesses invest in the tools offered by popular cloud platforms, it will be increasingly necessary for businesses and their IT departments to work together on the development of appropriate identity and access management (IAM) policies designed to address the emerging concerns.

Continue reading "Identity and Access Management in Cloud Platforms"

Dec 13, 2018

Malware Remains Most Popular Attack Method

Malware is still the most popular form of cyberattack and can be used to steal credentials for use in more sophisticated or extensive breaches.

Continue reading "Malware Remains Most Popular Attack Method"

Dec 13, 2018

Sarbanes Oxley Access Management Requirements

Sarbanes Oxley (SOX) may necessitate changes in identity and access management (IAM) policies to ensure your company is meeting the requirements related to financial records integrity and reporting.

Continue reading "Sarbanes Oxley Access Management Requirements"

Dec 04, 2018

26 Identity Theft Red Flags

The Red Flags Rule specifically calls out 26 identity theft red flags that companies should consider as part of their identity theft prevention and training programs.

Continue reading "26 Identity Theft Red Flags"

Nov 30, 2018

Call Center Fraud Risks

Incidents of call center fraud are on the rise according to various call center fraud reports. This is partly due to the migration of scammers from online channels, where breaches are becoming more difficult to commit, to the largely unprotected and vulnerable environment of call centers.

Continue reading "Call Center Fraud Risks"

Nov 30, 2018

Mitigating Business Identity Theft Risks

Business owners must recognize the growing identity theft threat to their companies, employees and customers and take steps to mitigate the risks and ensure personal data stays out of the hands of malicious third parties.

Continue reading "Mitigating Business Identity Theft Risks"

Sep 22, 2018

Fraud Alert Benefits

With the continued abuse of consumer laws, fraud alert benefits start to diminish and lose their desired purpose and effectiveness.

Continue reading "Fraud Alert Benefits"

Sep 22, 2018

Changes to the Credit Report Laws

Recent changes to the credit report laws allow consumers to place freeze their credit reports for FREE and extend the initial fraud alert from 90 days to 1 year.

Continue reading "Changes to the Credit Report Laws"

Aug 13, 2018

Vendor Risk Management

When organizations place their trust in third party service providers to serve them and their customers, they must have adequate vendor risk management practices.

Continue reading "Vendor Risk Management"

Aug 12, 2018

Automatic Card Reload

Using a store card has many benefits; however, other related options such as automatic card reload of funds may introduce many risks which may not be worth the benefits.

Continue reading "Automatic Card Reload"

Jul 07, 2018

Social Media Post Dangers

There are serious consequences for revealing your personal information through social media sites. Recent studies have revealed that identity theft is a major problem affecting millions of people across the world.

Continue reading "Social Media Post Dangers"

Jun 05, 2018

Identity Obesity

Identity theft and related issues are caused by identity obesity which occurs when people over-share, over-collect, and mismanage personal information.

Continue reading "Identity Obesity"

May 25, 2018

What is Spam?

We all get spam e-mails and it seems that we keep getting more every day. Learn why it's hard to fight spam and what your options are.

Continue reading "What is Spam?"

May 25, 2018

Phishing Scams

We are flooded with fake e-mails, phone calls and mails phishing for our personal information to commit fraud. Learn to detect phishing scams and prevent identity theft.

Continue reading "Phishing Scams"

Apr 18, 2018

Where is My Tax Refund?

Many people who file their taxes and expect a tax refund usually ask themselves “where is my tax refund?” while they impatiently wait for it. Learn how to check your refund status.

Continue reading "Where is My Tax Refund?"

Mar 14, 2018

Blockchain Identity Management

With the massive growth of cyber business comes the equally massive complexity of securing business transactions which can be supported with blockchain identity management.

Continue reading "Blockchain Identity Management"

Feb 11, 2018

Biometric Authentication

To improve security, many modern businesses are beginning to implement biometric authentication to prevent identity theft.

Continue reading "Biometric Authentication"

Feb 09, 2018

Policies and Procedures

Policies and procedures are major tools to reduce an organization's risks and as such must be carefully developed for high risk areas of any organization.

Continue reading "Policies and Procedures"

Jan 18, 2018

ATM Fraud

It has been reported in a few places that ATM fraud is on the rise and that bank ATMs are the most affected or rather the main contributors of all cash dispenser fraud. This is true, yet misleading.

Continue reading "ATM Fraud"

Jan 01, 2018

Top Annual Resolutions

Our top annual resolutions should be inclusive of critical goals to address risks in our lives including identity theft risks which require behavioral changes.

Continue reading "Top Annual Resolutions"

Nov 30, 2017

Data Security Breach

As we continue to see more data security breach cases, their causes continue to remain almost the same such as un-encrypted devices.

Continue reading "Data Security Breach"

Nov 12, 2017

Trusted Cyberspace Identity Strategy

The trusted cyberspace identity initiative known as the National Strategy for Trusted Identities in Cyberspace (NSTIC) aims to improve online identification, authentication and privacy.

Continue reading "Trusted Cyberspace Identity Strategy"

Oct 29, 2017

Car License Plate Theft

How often car license plates are stolen? How serious is car license plate theft? Is this a crime and what are the penalties for license plate theft? This article answers these questions.

Continue reading "Car License Plate Theft"

Oct 21, 2017

Tampered Computer Security Products

We can't help but to ask ourselves "how secure are computer security products" when we learn about tampered computer security products that spy on people instead of protecting them.

Continue reading "Tampered Computer Security Products"

Oct 14, 2017

Student Identity Theft

According to past identity theft cases, 22% of students were notified that they were a victim of identity theft. Student identity theft is three times as likely as the average fraud victim.

Continue reading "Student Identity Theft"

Oct 12, 2017

Yahoo Mail Security

When Yahoo changed the way its users access email, Yahoo mail security moved away from passwords yet left a security hole in the access management process.

Continue reading "Yahoo Mail Security"

Oct 12, 2017

Young Identity Theft Victims

It is reported that young identity theft victims account for the majority of all identity theft victims and there might be good reasons why.

Continue reading "Young Identity Theft Victims"

Oct 10, 2017

NIST Security Compliance

National Institute of Standards and Technology or NIST security compliance is sometimes a requirement for earning government contracts. This article highlights the NIST 800 security areas.

Continue reading "NIST Security Compliance"

Oct 07, 2017

All About Identity Theft Insurance

Identity theft insurance is a policy on its own or integrated with some other insurance which allows an identity theft victim to recover some of the recovery costs.

Continue reading "All About Identity Theft Insurance"

Sep 14, 2017

Equifax Data Breach

The Equifax data breach is believed to be the largest of its kind affecting more than half of the US population which lasted from mid-May through July 2017.

Continue reading "Equifax Data Breach"

Aug 27, 2017

Internal and External Certification

This article describes the basic difference between internal and external certification as it relates to professional development in a simple and concise language.

Continue reading "Internal and External Certification"

Aug 17, 2017

Account And Loan Consolidation Benefits

Identity fraud inflicted on existing loan accounts can be reduced with proper account and loan consolidation.

Continue reading "Account And Loan Consolidation Benefits"

Aug 09, 2017

Red Flag Compliance

Covered financial institutions and creditors must adhere to the Red Flag compliance rules and may be subject to regulatory audits and non-compliance penalties.

Continue reading "Red Flag Compliance"

Aug 06, 2017

Certified Red Flag Specialist

Identity Management Institute manages the Certified Red Flag Specialist (CRFS) program to train, test and certify professionals responsible for supporting their identity theft prevention program.

Continue reading "Certified Red Flag Specialist"

Jul 16, 2017

Managing Identity Theft Risks

Managing identity theft risks is a priority for may organizations because identity theft incidents can often have devastating consequences for companies and their customers.

Continue reading "Managing Identity Theft Risks"

Jul 08, 2017

General Data Protection Regulation

The General Data Protection Regulation (GDPR) which offers the most comprehensive data protection reform to date in the European Union will soon become effective. Get ready!

Continue reading "General Data Protection Regulation "

Jun 20, 2017

Laptop Disposal Tips

The need to dispose of one's laptop properly is critical because of the sensitive information that could exist on the hard drive. This article offers some laptop disposal tips.

Continue reading "Laptop Disposal Tips"

Jun 15, 2017

Educating Kids About Information Security

Educating kids about information security and privacy is one of the best things that parents can do for their children before it's too late.

Continue reading "Educating Kids About Information Security "

Jun 05, 2017

Credit Monitoring

Credit monitoring is a good practice for detecting identity theft and unauthorized credit accounts; however, it is not a total solution for identity theft.

Continue reading "Credit Monitoring"

May 20, 2017

Protect Yourself When Shopping Online

If you are a regular online shopper, there are a few steps that you can take to protect yourself when shopping online from identity theft, prevent online fraud, and avoid paying higher prices.

Continue reading "Protect Yourself When Shopping Online"

May 11, 2017

What is Cyber Security?

Internet security is a subset of cyber security, and, cyber-security is a subset of information security which is just the security of any system or digital data excluding all other forms of data.

Continue reading "What is Cyber Security?"

May 11, 2017

Social Media Identity Theft Dangers

The dangers of social media identity theft are increasing as more people continue to socialize online without understand the risks.

Continue reading "Social Media Identity Theft Dangers"

May 06, 2017

Exercising Due Diligence Online

Online threats are many as we will discuss in this article and exercising due diligence online is highly advised. Read this article for details.

Continue reading "Exercising Due Diligence Online"

Apr 29, 2017

Offshore Outsourcing Security Risks

There are many offshore outsourcing security risks that create real challenges for companies, especially in the areas of privacy management and regulatory compliance.

Continue reading "Offshore Outsourcing Security Risks"

Identity Theft Courses