IBM Study Shows Consumers Don’t Trust Social Networks With Identity Data

IBM Security’s “Future of Identity Study” found that consumers don’t trust social media networks to securely collect their identity data, such as biometrics and other PII.

The post IBM Study Shows Consumers Don’t Trust Social Networks With Identity Data appeared first on Security Intelligence.

Continue reading IBM Study Shows Consumers Don’t Trust Social Networks With Identity Data

Revisiting the Top Security Threats of 2017

Many of the security threats we noted at the start of 2017 gripped the public’s attention during the past year, foreshadowing major shifts to come in 2018.

The post Revisiting the Top Security Threats of 2017 appeared first on Security Intelligence.

Continue reading Revisiting the Top Security Threats of 2017

Don’t Be Catfished: Protecting Yourself From New Account Fraud

While consumers can’t change their personal information, they can take preventative measures to protect their data from new account fraud.

The post Don’t Be Catfished: Protecting Yourself From New Account Fraud appeared first on Security Intelligence.

Continue reading Don’t Be Catfished: Protecting Yourself From New Account Fraud

Five Tips to Stay Safe on Social Media While Traveling

Posting vacation pictures or specific travel information online can expose social media users to identity theft, social engineering schemes and more.

The post Five Tips to Stay Safe on Social Media While Traveling appeared first on Security Intelligence.

Continue reading Five Tips to Stay Safe on Social Media While Traveling

Information Security in the Age of Disinformation

With so much disinformation being reported in the news and spread through social media, it’s hard for security professionals to know what to believe.

The post Information Security in the Age of Disinformation appeared first on Security Intelligence.

Continue reading Information Security in the Age of Disinformation

Protect Your Twitter Account or Face Serious Security Consequences

It’s crucial to protect your Twitter account to avoid exposing yourself or your business to financial, reputational and legal consequences.

The post Protect Your Twitter Account or Face Serious Security Consequences appeared first on Security Intelligence.

Continue reading Protect Your Twitter Account or Face Serious Security Consequences

10 IT Security Best Practices to Protect Your Social Media Reputation — and Your Birthday Party

It was a birthday I’ll never forget. I know what you’re thinking: close friends, colorful streamers, a big birthday cake and Katy Perry’s “Birthday” softly playing the background. Nothing could be further from the truth. My quiet birthday dinner at a casual restaurant was interrupted by the rapid buzz of numerous emails being sent to […]

The post 10 IT Security Best Practices to Protect Your Social Media Reputation — and Your Birthday Party appeared first on Security Intelligence.

Continue reading 10 IT Security Best Practices to Protect Your Social Media Reputation — and Your Birthday Party

Identity Theft and Social Media: How Are They Related?

Social media has created many new ways for people to interact. While this can be viewed as exciting, it also leaves users vulnerable to identity theft.

The post Identity Theft and Social Media: How Are They Related? appeared first on Security Intelligence.

Continue reading Identity Theft and Social Media: How Are They Related?

Social Engineering and the Stranded Olympic Traveler

Visitors to the 2016 Summer Olympic Games in Rio de Janeiro should be on high alert for the stranded traveler social engineering scam.

The post Social Engineering and the Stranded Olympic Traveler appeared first on Security Intelligence.

Continue reading Social Engineering and the Stranded Olympic Traveler