If the Home Depot breach turns out to be as bad or worse than the Target breach, certain things will be unavoidable for the home improvement giant. But there are some things the company can do to help reduce the short and long term impact and cost.
Enough with the data breach excuses already. Not only are they as jaded as the breaches themselves, they're often just not true. In the aftermath of almost every data breach, chances are you're only going to get a boilerplate public statement.
Many technology executives don't have a favorable outlook on their ability to sideswipe cybercriminals, according to research conducted by McKinsey and World Economic Forum.
It's easy, for instance, for a parent to access their child's name and Social Security number, then open up a phony account--even if the victim is literally a child. Most companies don't check the ages, so that's why this crime can go undetected for years.
Last year the Federal Trade Commission found that one in four consumers had errors on their credit reports that could affect their scores.
You can outwit cybercriminals. You just have to be a little smarter than they are and never think, "It can't happen to MY computer." There's nothing special about your computer that makes it intrinsically immune to cyber threats.
Most commonly, thieves will harvest kids' dormant Social Security numbers and use them to illegally obtain jobs or open fraudulent bank and credit accounts. Many victims don't realize there's a problem until years later, when they are turned down because of the poor credit history someone else racked up in their name.
OpenSSL vulnerabilities are sticking around for a while. In fact, recently two new ones were announced.
Most of us use our smartphones and computers on a daily basis and keep important information on them like passwords, user names, and credit card numbers. But there are other devices that hold sensitive data that we don't really talk about. For example, printers.
There's one born every minute. Many scammers use the names of valid lottery organizations, but this doesn't mean the legit entities are involved. The latest con is to tell someone they won a Powerball jackpot while planning on stealing their identity.
The fact is, most everyone will experience some form of identity-related compromise during their lifetime. Yes, you most likely will become a victim.
Did you know that there are dozens of specialty consumer reporting agencies that track your history for activities that may not appear on your regular credit reports -- things like bounced checks, late utility payments, insurance claims and prescription orders?
There are ways to keep the hackers at bay--for the most part, anyways, since no protection is 100 percent efficient.
You’ve surely heard of “B2B” or business-to-business marketing. The new game plan is “B2C” – business to consumer ...
The ripple effect continues to haunt Target: It's expected that seven of its board of directors members may be replaced because they failed to provide effective oversight into the corporation's data-protection risks. Boards simply need to be more proactive in safeguarding their companies against data breaches
The things your child carries in his or her rucksack can become weapons of your financial destruction if they fall into the wrong hands.