Instigate change. Start a new collaborative Blog Group

Create group
Blogs
Dan Barnes

Defending the indefensible

An astonishing situation has arisen in UK courts, whereby fraud cases brought by the State are being dropped as the defendants claim to be unable to find defence lawyers, following budget cuts to publ...

07 May 2014
Future Finance
Robert Siciliano

Healthcare Data under Attack

Crooks want your health information. Why? It’s called medical identity theft, and it’s not going away too soon. In fact, the ACA (Affordable Care Act) has only fueled the situation, says the Ponemon...

06 May 2014
Robert Siciliano

15 Tips to Prepare for Big and Small Security Threats

Businesses that focus on the big security breach may very well be missing the smaller threats that can do serious damage. A human can easily kill a gnat. So how is it that just one gnat can drive yo...

06 May 2014
Robert Siciliano

Beware of the Green Dot scam

Scammers are at it again, this time with green dot cards: a pre-paid debit card available at stores. It can work like this: Let’s say you run a small business. You’re out and about, then return to f...

05 May 2014
Robert Siciliano

10 unbelievable Identity Theft Cases

Here’s a countdown to the most incredible identity theft cases recorded, compiled by guyism.com. Dr. Gerald Barnes Gerald Barnbaum lost his pharmacist license after committing Medicaid fraud. He sto...

30 Apr 2014
Robert Siciliano

Huge IE Attack: Will Microsoft fix It in Time

If you have IE 6 through 11, watch out. There’s a glitch that enables hackers to exploit flaws in these systems. Microsoft is racing to fix this vulnerability bug. Unfortunately, news is not so good f...

29 Apr 2014
Robert Siciliano

Phishing Alert: Tips To Protect Your Business From Attacks

It's becoming too easy for criminals to get their hands on your banking information, due to your employees' ignorance of phishing scams. Malware attacks have soared recently, targeting banks for the...

29 Apr 2014
Craig Ramsey

Sleeping with the enemy? Blog Series Week 6

Coming from an IT background, I am often overly critical of a bank’s IT department. I get frustrated when they appear to be more worried about technical standards than viable functionality. In truth,...

29 Apr 2014
Robert Siciliano

The Future of Identity Theft

Identity theft evolves as technology progresses. The Identity Theft Resource Center explains the future of this crime. Definition of Identity The definition will swell up to include biometrics and b...

27 Apr 2014
Robert Siciliano

This Earth Day Clean Your Device Before You Recycle It

One man’s trash is another man’s new identity? Yes, because that “junk mail” you toss in the garbage contains valuable data about yourself. A crook bent on identity theft can potentially have a field ...

16 Apr 2014
Robert Siciliano

Protecting Your Business's Data From Organized Crime

Organized crime rings are using brains, not brawn, to target small businesses and steal critical data. Protect your business by putting these 11 security measures into place. Organized crime has alw...

15 Apr 2014
Dan Barnes

Smartphones can unlock bank vaults

Apps are making the banking sector more vulnerable to cyber-attack, say European regulators, who recommend that firms hold capital as insurance against such an event. The ‘Joint Committee Report on ri...

15 Apr 2014
Future Finance News Analysis