Identity Theft: Page 2

Social Media

'They Messed with the Wrong Gal': What to Do When Your Social Media Gets Hacked

Tamara Hunter, head of Chemo Buddies for Life, took her internet enemies head-on.

Business News

Cathay Pacific Records Passengers During Flights

Any use of the in-flight entertainment system is logged and CCTV cameras on board each flight record your activity for security purposes.

Social Media

Your Cyber-Enemy May Not Be the Person You Suspect

The less-obvious risk often is the most dangerous. Protecting your company and personal assets starts with understanding real versus perceived threats.

Personal Finance

8 Lame Ways to Fritter Away Your First Million Dollars

A million bucks is still a lot of money, but not more than can be blown foolishly.

Science & Technology

4 Ways to Protect Yourself From Identity Fraud

For starters, have you thought about using a password manager.? Well, why not?

Growth Strategies

Online Identity Theft: Curbing the Tragedy Beforehand

Our identities and reputation is what gives us social status. A name is a person's most fundamental attribute.

Data & Recovery

How to Know Your Employees Are Who They Say They Are

Protect your business -- and yourself -- from identity theft.

News and Trends

What You Need To Know About Small Business Identity Theft

Protect your business before it becomes a victim of identity theft.

Science & Technology

4 Strategies Small Businesses Can Use To Avoid a Data Breach

Hackers are getting more sophisticated. Make it a priority to protect your customers and employees by knowing your risks and taking the appropriate steps to safeguard your business.

Science & Technology

5 Fundamentals for Protecting Your Identity and Your Privacy

A few easy steps will make you much safer from online crooks.

Technology

Your Data Breach Doesn't Have to Produce Identity Theft

Encryption and security measures are essential for protecting your company's data,

Science & Technology

Don't Despair, ID Theft Is Not Inevitable

Can one person protect their data when governments and large corporations routinely report cyberthefts? Actually, you can.

Science & Technology

Coconut Water Empire to Bust: A Data-Breach Case Study

Think hackers are interested in attacking only large enterprises? Get with it.

Growing a Business

Make Your Businesses Invulnerable to Corporate Identity Theft

Failure to keep up-to-date with corporate compliance chores can put your business, and you personally, at the mercy of criminals.