It’s all but impossible to do business today without computers and the Internet. Even if a computer is used for nothing more than accounting and keeping track of orders, a data loss or equipment failure could mean economic hardship for any company. Throw in the use of email, a website or social media and a company’s risk exposure could be greater than that posed by the more physical threats of fire or other disasters—especially where…
Read MoreIdentity Theft
Addressing Cyber Security
Cyber security insurance is designed to mitigate losses from a variety of cyber incidents, including data breaches, business interruption, and network damage.
Read MoreCentral Valley Scammers Targeting Seniors
Evidence obtained during the investigation revealed that Steen enticed his senior victims to make him the trustee on their trusts or executor of their wills, which gave him full access and control of their finances.
Read MoreVeteran Identity Protection
In light of recent events, the Department of Veterans Affairs (VA) has undergone substantial changes to better aid veterans and their beneficiaries.
Read MoreMilitary Consumer Protection Day is July 16th
Wednesday, July 16, 2014 is the second annual Military Consumer Protection Day, which is geared towards protecting military servicemembers and their families.
Read MoreScam artists are still on the rise
While fast-growing online commerce has benefited consumers with greater choice and convenience, the survey indicates that, as of 2011, the Internet was also the place where consumers most often learned about fraudulent offers. The Internet category, which included email, social media, auction sites and classified ads, was followed by print advertising, and TV and radio.
Read MoreHow to avoid identity theft
In an increasingly online and interconnected world, identity thieves have a lot of tools they can use to ply someone out of their crucial information and rob them blind in minutes. The old-school method of a thief digging through trash in search of records or snatching a purse or wallet still happens, but identity thieves increasingly turn to electronic methods to get what they want. Often thought of as a crime that targets the elderly,…
Read MoreHow to respond to an identity theft: a step-by-step approach
Whether it’s a quick run on a credit or debit card, a lost wallet or a full-scale identity theft, responding to such a crime requires a rapid response. Although an online world makes it easier to become a victim of identity theft, it also provides tools that can be used to stop the thieves and limit the damage. Step one—A fraud alert After closing any affected accounts, such as a credit card, the first thing…
Read MoreStupid criminals never seem to give up on insurance fraud
The allure of insurance fraud must seem like a quick and easy way to get some cash, so it’s understandable why it never goes away. What’s harder to figure out is why some criminals make it so easy for someone to bust them. When looking at some of their hairbrained schemes, it seems like an unfair battle between the fraudsters and those who catch them. “The fraud world has an endless supply of knuckleheads reprobates…
Read MoreIdentity theft rose in 2012
Cases of identity theft and fraud in the U.S. rose by 13 percent in 2012 as 11.6 million Americans became victims, even as the dollar amount stolen held steady, according to an annual report by Javelin Strategy & Research. Although fraud from existing credit cards enjoys the lowest mean fraud amount of the three major types of fraud, it was also a root source of the increase. Javelin has taken a deep look into emerging…
Read More