Contact Us

Continuity Insights Management Conference

Identity Theft Via Weaponized Data

Weaponized data can be used against any of us in many ways, from applying for credit in your name to malware getting onto our devices via phishing. Pre-approved credit card applications, loan re-finance offers, bank statements, and the like are all valuable to would-be cybercriminals.

This recent post from the SoS Daily News – Weaponized Data Can Lead to Identity Theft – discusses a number of way to protect your data, including credit protections, avoiding phishing scams, and something as simple as changing your passwords.

Read Weaponized Data Can Lead to Identity Theft here.

Continuity Insights

Similar Articles

Governance in the Resilient Organization

Rothstein Publishing is offering Business Continuity professionals a free chapter – Governance in the Resilient Organization – from Jim Burtles’s landmark book Principles and Practice of Business Continuity: Tools and …

Business Contingency Group Launches App to Help Businesses Across America Manage COVID-19 Risk at the Workplace

While businesses and clinics across the U.S. are scrambling to reopen and keep their employees and customers/patients safe, Business Contingency Group (BCG) has announced the launch of its new app …

Who Are the Cyber Criminals?

Cyber criminals committing cyber crimes. It’s the fasting growing crime in today’s technology-driven era. But who are these criminals? Are they lone individuals or teams of clandestine hackers performing malicious …

Leave a Comment

Share to...