Remove Consumer Protection Remove Identity Theft Remove Presentation
article thumbnail

Business ID Theft Soars Amid COVID Closures

Krebs on Security

This story is about the victims of a particularly aggressive business ID theft ring that’s spent years targeting small businesses across the country and is now pivoting toward using that access for pandemic assistance loans and unemployment benefits. For 2020, the company estimates an overall 258 percent spike in the crime.

article thumbnail

IdentityIQ Releases Report on Newest Scams to Target Your Identity

Identity IQ

This report explores key findings based on IdentityIQ member-reported data and found significant jumps in two major types of scams: peer-to-peer payment apps utilizing platforms such as Cash App, Zelle and Venmo, surging more than 58%, and scams stemming from the theft of personal documents, increasing by 44%.

Scams 95
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Common Holiday Scams and How to Avoid Them

Identity IQ

But it also presents an opportunity for scammers to exploit. IdentityIQ members reap the benefits of credit monitoring with real-time alerts, dark web and internet monitoring , VPN and antivirus software , identity theft insurance of up to $1 million underwritten by AIG, stolen identity restoration support, and more.

Scams 52
article thumbnail

It’s a Holiday Security Breach Blowout

SiteLock

We’ll also discuss how major data breaches occur, and what you can do to protect yourself in the Age of the Large Data Breach. It was the week before Christmas, the time when the Christmas feeling really kicks in, the weather cooled on cue, and presents began to populate the area beneath our Charlie Brown fake Christmas tree.

article thumbnail

What is Maryland’s Online Data Privacy Protection Act?

Centraleyes

Response to Consumer Requests and Data Protection Assessments Controllers must respond to consumer requests within 45 days and conduct data protection assessments for processing activities presenting a heightened risk of harm.