Whether your kids are going into second grade or their senior year, digital threats are out there. Maintaining a strong layer of digital protection for your kids can be greatly enhanced by taking a few simple precautions:
Online shopping has become a staple in peoples lives, in fact, its estimated that online shopping will account for $370 Billion by next year1. However, online shopping can pose risks to your digital and financial well being, between fake website, viruses and phishing scams, cyber criminals are actively trying to hack your information.
In early March 2016, the InfoArmor Threat Intelligence Team investigated several targeted cyber-attacks against select US-based healthcare institutions. The bad actors are claiming that they have exfiltrated more than 3TB of data that contain sensitive PII that clearly distinguish the patients along with other confidential medical data.
Social Media is a great way to connect with friends and family, but it also comes with its fair share of risks – from cyber-bullying to fraud, the social media landscape can expose you and your family to risk. InfoArmor is proud to offer a robust solution to help manage and monitor your family’s social presence and experience. SocialArmor® monitors social media profiles, providing you with key word alerts based on explicit content, violence or potentially damaging situations. Today, keeping tabs on your online reputation is just as important for adults and college-aged teens as it is for young children. In-fact, its reported that 1 in 10 job applicants were denied from a position because of something that the employer found on their Facebook page2. For younger people, bullying is a problem as over half of adolescents have been bullied online and 11% of adolescents and teens have reported having embarrassing or damaging photographs taken without their consent1.
Summer time travel is upon us. Traveling can lead to increased exposure of your information. In fact, 30% of travelers have experienced identity theft while traveling or know someone who has1.
Through targeted phishing scams criminals are obtaining W-2 forms by gaining trust from employees within organizations. They’re taking advantage of employees and executives within a company to obtain W-2 forms for their own financial gain. The imposter asks the lower-level staff member to share W-2 records or payroll information. Believing that they are fulfilling their bosses request, the employee shares the sensitive data with a criminal.
Phishing scams are becoming more complex and targeted. Some people can spot the more obvious phishing scams (e.g. Nigerian Prince asking for money) but not many can spot the more sophisticated phishing scams, also known as spearphishing attacks.
It seems like data breaches are happening every day and that is because they are. Breach Level Index tracks publically disclosed breaches every year. Their results for the year 2014 created a nickname, “The Year of the Data Breach” due to large-scale cyber-attacks that resulted in record-braking breaches of enterprises, customer and employee data.
A new threat to apple devices has surfaced. Researchers have discovered apple devices that are running anything lower than the newest software iOS 9.3.1 are vulnerable to becoming “bricks” (technological device becomes useless and dead) due to malicious Wi-Fi networks.