1. Money
Send to a Friend via Email
Jake Stroup

Updated Articles and Resources

By Jake Stroup

    Updated Articles and Resources
    • Identity Theft and Your Tax ID Number Created: Wednesday, July 14, 2010 Updated: Wednesday, April 16, 2014
      Corporate identity theft is a very real concern, whether you are a mega corporation, a mom-and-pop shop, or just run a home-based business." itemprop="description" Thursday, July 14, 2011 Updated: Wednesday, April 16, 2014
      Cloud computing, or “the Cloud”, is now being marketed to companies as an inexpensive online data storage solution. But with data breaches in the news on a daily bases, data security is...
    • Your Risky Mailbox: Identity Theft 101 Created: Sunday, May 18, 2008 Updated: Thursday, April 10, 2014
      The most commonly used means of identity theft in the real world is mail theft and redirection. This article explains the crime and provides tips for protecting your mail and your identity.
    • My Wallet/Purse Was Stolen! Now What? Created: Thursday, February 25, 2010 Updated: Thursday, April 10, 2014
      Many cases of identity theft start with a lost wallet or purse. Taking the right actions (and taking them quickly) can help protect you from that. Find out what you can do now."
    • Gone Phishing! Created: Tuesday, April 08, 2014 Updated: Wednesday, April 09, 2014
      Avoiding phishing scams through internal training. This is a clients' "due diligence" to be proactive against data breech risks.
    • ITAC Sentinel Created: Thursday, August 05, 2010 Updated: Monday, March 31, 2014
      Product Review: ITAC Sentinel. Identity Theft.
    • How to Prevent Identity Theft Created: Monday, March 09, 2009 Updated: Monday, March 31, 2014
      Identity theft is a common crime that affects everyone. Learn how to protect yourself from mortgage scams, mail fraud, credit fraud, and other identity crimes.
    • How Social Networking Puts Your Identity at Risk Created: Thursday, November 06, 2008 Updated: Monday, March 31, 2014
      The phenomenon of social networks took the business world by surprise. But people are social by nature, so it's natural for them to want to participate in a social network. It's also natural for id...
    • 5 Things to Watch While Traveling for the Holidays Created: Monday, September 30, 2013 Updated: Monday, March 31, 2014
      Holiday time seems to be one of the busiest times of year - probably because we are traveling so much to see friends and family. Keep these 5 tips in mind when you are traveling to help protect you...
    • 5 Ways to Protect Your Identity at Home Created: Monday, September 30, 2013 Updated: Monday, March 31, 2014
      By making privacy protection a habit, you'll find yourself having less information around that would make you a target for identity theft. These 5 ways to protect your identity at home are patterne...
    • Schools and Biometric Tracking Created: Monday, November 26, 2012 Updated: Monday, March 31, 2014
      Biometrics have been presented as the answer to identity theft, but the technology brings with it certain privacy issues that have many up-in-arms." itemprop="description"< --> itemprop="descriptio...
    • 5 Things to Not Have in Your Wallet Created: Monday, September 30, 2013 Updated: Monday, March 31, 2014
      Although it's not possible to completely prevent identity theft, there are a a few simple things you can do to make yourself far less likely to become a victim." itemprop="r="$zTP='t3'" --> itempro...
    • Identity Theft in 2011 Created: Thursday, December 02, 2010 Updated: Monday, March 31, 2014
      Looking forward to the next year, Proofpoint fingers mobile GPS location information and social media sites such as Facebook to be bigger concerns." itemprop="description"< --> itemprop="descriptio...
    • Who Has Your Information? Created: Friday, June 28, 2013 Updated: Monday, March 31, 2014
      Guest author Mac McMillan brings us some valuable insight into data security as it relates to medical identity theft, and highlights the idea of "Minimal Necessary" as a guideline for helping organ...
    • Passwords Created: Wednesday, August 04, 2010 Updated: Monday, March 31, 2014
      We use the internet for everything - online shopping, email, even managing our bank account - and we use passwords for everything. One key to protecting yourself form identity theft is to have goo...
    • Identity Theft and Your Customers Created: Wednesday, July 07, 2010 Updated: Monday, March 31, 2014
      Having customers creates special problems, from customer service, loss prevention. If your business is working with some sort of product or service, then it's a good idea to take a look at the diff...
    • Your Biometric Identity Created: Monday, May 24, 2010 Updated: Monday, March 31, 2014
      Some experts are calling "biometrics" the answer to identity theft. Since things like fingerprints and voice patterns are unique to each of us, it would seem to make sense. But there's more here th...
    • How Do You Know Someone Stole Your Identity? Created: Monday, March 31, 2014 Updated: Monday, March 31, 2014
      Identity thief, stolen identity, someone stole my identity, steals your identity
    • How to Report Identity Theft to the FTC Created: Monday, March 31, 2014 Updated: Monday, March 31, 2014
      Federal Trade Commission, FTC, reporting identity theft, Fraud Affidavit
    • How Do You Know Someone is Using Your Social Security Number? Created: Monday, March 31, 2014 Updated: Monday, March 31, 2014
      Social security identity theft, employment fraud, tax fraud, social security number
    • How to Report Identity Theft to the IRS Created: Monday, March 31, 2014 Updated: Monday, March 31, 2014
      IRS, reporting identity theft, Form 14039, tax returns, filing taxes, report identity theft to IRS
    • How to Avoid Tax Fraud Created: Monday, March 31, 2014 Updated: Monday, March 31, 2014
      Tax fraud, social security identity theft, IRS, income taxes
    • What is Privacy? Created: Monday, March 31, 2014 Updated: Monday, March 31, 2014
      Privacy, privacy law, personal information
    • What is Identity Theft? Created: Monday, March 31, 2014 Updated: Monday, March 31, 2014
      What is identity theft, id theft, stolen identity, credit card fraud
    • How Data Breach Notifications "Grow" Created: Monday, March 31, 2014 Updated: Monday, March 31, 2014
      Data breaches, Data breach notifications, Sally Beauty, stolen Credit Card information
    • Tax Time and Identity Theft Created: Friday, February 28, 2014 Updated: Tuesday, March 18, 2014
      Tax time is possibly the most dangerous time of year when it comes to identity theft.
    • The Consumer Privacy Bill of Rights Created: Friday, February 28, 2014 Updated: Monday, March 03, 2014
      EPIC's Consumer Privacy Bill of Rights
    • A Quick Note on Sources Created: Friday, February 28, 2014 Updated: Monday, March 03, 2014
      When selecting sources to put in articles, there are a lot of considerations that must be taken into account.
    • Education, Data Breach and You Created: Friday, February 28, 2014 Updated: Friday, February 28, 2014
      Colleges, universities, even grade schools are a ready source of private information for identity thieves.
    • NSA: Metadata Collection to Expand, Not Stop Created: Friday, February 28, 2014 Updated: Friday, February 28, 2014
      While President Obama tells us he will curb NSA data collection practices, all evidence points to a different expectation.
    • Data Encryption - Not as Secure as You Thought Created: Friday, February 28, 2014 Updated: Friday, February 28, 2014
      Data encryption is the best way to keep your information private online. The NSA has seriously undermined trust in data encryption, though.
    • Privacy for Security? Not so Much Created: Friday, February 28, 2014 Updated: Friday, February 28, 2014
      Terrorists entering the US as illegal immigrants has become one of the most pressing concerns of the day.

    ©2014 About.com. All rights reserved.