Read More

CSID Bolsters Social Media Monitoring Product to Help Keep Children Safe Online

September 20, 2016 — CSID, a leading provider of white-labeled solutions that help enterprises, small businesses and consumer subscribers monitor their personal information, business information and more, today announced that their Social Media Monitoring product now includes child monitoring services.
Read More
Read More

This Is Why Securing Your Business Is More Important Than Ever

September 14, 2016 — When juggling company finances, recruitment and the other inevitable day-to-day demands of the business, cyber security often gets put on the back burner. At our identity protection and fraud detection company CSID, we’ve noticed this trend and for the past few years have conducted an annual survey to take the temperature on small business security in the United States.
Read More
Read More

5 Tips To Stay Secure While Traveling

August 3, 2016 — Summer has always been one of the most popular seasons for travel, and this year is no different. With more people on the move than ever, it’s important to acknowledge an unfortunate but important reality: traveling puts individuals at greater risk for identity theft and fraud.
Read More
Read More

Protect your identity in ways chip cards can't (Video)

June 28, 2016 — While chip cards can help prevent some fraud, identity thieves are looking for other ways to find your personal info and you might just be helping them. CSID weighs in.
Read More
Read More

Keep Your Business Secure During National Internet Safety Month - And Beyond

June 14, 2016 — June is National Internet Safety Month, an initiative introduced back in 2005 to raise awareness around the need for online safety. While cyber security should be top-of-mind for businesses year-round, now is the perfect time to remind employees of their role in protecting company data.
Read More
Read More

The State of Small Business Security: A 2016 Survey

May 12, 2016 — To better understand how small businesses are approaching risk mitigation and response, we recently conducted a survey of small business owners in the United States. The key finding: Small businesses are more at risk than they think, and are not taking proactive steps or allocating budget to defend against attacks.
Read More
Read More

How small businesses approach risk mitigation and response

May 9, 2016 — CSID released the findings of a survey recently conducted for small businesses (under 10 employees) to determine sentiment and concerns from small business owners around cyber security and how this population is approaching risk mitigation and response.
Read More
Read More

5 Questions SMBs Should Ask About Cloud Security

May 5, 2016 — And a recent survey released by identity protection provider CSID found that while 58 percent of small businesses are worried about cyber attacks, a full 51 percent are not allocating any budget to risk mitigation.
Read More
Read More

CSID Launches Small Business Monitoring Product to Enable This Population to Mitigate Risk of Cyber Attack

May 5, 2016 — CSID today launched Small Business Monitoring, a new white-labeled service that will include full scale protection and restoration for small businesses in the United States and throughout the globe.
Read More
Read More

Austin-based CSIdentity sold to Experian in $360 million deal

April 19, 2016 — Austin-based CSIdentity has agreed to be acquired by credit reporting agency Experian in a deal valued at $360 million, the company announced on Tuesday.
Read More
Read More

Forget about antivirus - cybercrime has industrialised and we need a new approach to combat it

March 30, 2016 — In the last decade, cybercrime has industrialized. It’s no longer the preserve of a small number of skilled hackers. Tools for carrying out sophisticated cyber-attacks are now cheap, mass-produced, and easily accessible.
Read More
Read More

A Five-Minute Guide to Better Security

March 22, 2016 — Despite the rapidly evolving state of cybercrime, it is still true that the average consumer can take small yet high-impact steps to keep their digital identities secure. Here are some tried and true security measures, which won’t take more than five minutes, and can help you up your security.
Read More
Read More

Why you need more than money to get top security talent

March 1, 2016 — David Darrow from CSID explains how to attract and retain security talent in highly competitive markets with something other than money.
Read More
Read More

CTOs you should know: Kent Bloomstrand, CSID

February 18, 2016 — Kent Bloomstrand started his tech career the old fashioned way: With a computer science degree and a programming job at IBM in 1983. Now, he’s working on cutting edge identity protection software, mining the dark web for the latest criminal techniques and leading teams of engineers to get in and stop them. We talked with Bloomstrand about the technology behind CSID’s fraud protection products and more.
Read More
Read More

In 2016, Think Twice About What You Share On Social Media

February 9, 2016 — Just about everyone today uses some form of social media. U.S. adults alone share nearly 2 trillion gigabytes of data online per year. As we enter the new year, it's a good time to reexamine your social media sharing habits, make sure you or your family members are not falling victim to some of the most common risks, and learn how to take action quickly.
Read More
Read More

CSID Launches New Parental Leave Policy to Lure Austin Tech Talent

January 26, 2016 — The United States isn't exactly known for accommodating new parents with paid leave policies that give them time to bond with their newborns. In fact, the U.S. is the only advanced economy that doesn't mandate that companies offer paid leave for parent workers.
Read More
Read More

CSID Raises Bar for Parental Leave in Austin

January 26, 2016 — CSID today announced the company is implementing a new parental leave policy for 2016 for its male and female employees that includes 12 weeks of 100% paid time off (PTO) with the flexibility to distribute the leave over a six-month time period as best suits their families and careers.
Read More
Read More

How the Internet of Things will supercharge the cloud

January 25, 2016 — By 2020 at least 25 billion devices will be connected, according to Gartner. Welcome to the Internet of Things, the next major wave of computing that will supercharge businesses by taking small data from remote devices and collectively making it big data on the cloud.
Read More
Read More

Mobile and IoT to Dominate Cybersecurity Threats for 2016

January 8, 2016 — 2015 brought with it a heightened global focus on cybersecurity, with record-breaking data breaches and concern around national security increasingly seen across the headlines. As we head into 2016, issues in cybersecurity will only continue to gain momentum. Let's hone in on the trends we anticipate to dominate this year.
Read More
Read More

Understanding the convenience of IoT and the security trade off

November 28, 2015 — The Internet of Things isn’t a new concept, but it has gained momentum within the last year, as more and more connected devices have come to market. While connecting everything brings convenience to our everyday lives, it’s crucial to understand what we may be compromising from a security perspective.
Read More
Read More

What to Do About the Amazon Password Scare

November 25, 2015 — Let’s be real, you’ve probably done this: 61% of people say they’ve reused passwords across multiple web sites, according to identity protection firm CSID. The other 39% just have a hard time admitting they do this too.
Read More
Read More

CSID Launches Social Media Monitoring to Combat Identity Theft, Safeguard Digital Reputations

November 11, 2015 — CSID today launched Social Media Monitoring, a new service that alerts social media users of privacy and reputational risks on any of the four major social media networks: Facebook, Twitter, LinkedIn and Instagram.
Read More
Read More

How to stay safe from the new bank heists

November 7, 2015 — Adam Tyler, of CSID, says: Rather than trying to hack large corporate entities with multibillion-pound security budgets, the bad guys target the customer.
Read More
Read More

Generation Z: how to stop younger employees being a data fraud liability

November 5, 2015 — The supposedly flippant attitude towards cyber security by 'the youth of today' entering the workplace is causing a lot of alarm - but is it justified?
Read More
Read More

Hackers use malware disguised as Word doc to steal data from Android users

October 28, 2015 — Hackers have created Android malware that hides itself as a Microsoft Word document in order to trick users into opening it and steal data. CSID's Adam Tyler weighs in.
Read More
Read More

Coconut Water Empire to Bust: A Data-Breach Case Study

October 28, 2015 — CSID, recently conducted an experiment to see how quickly a cyber criminal could take down a small business. That's how we came to create Jomoco, a fake coconut water start-up.
Read More
Read More

Millennials Less Likely to be Enrolled in ID Theft Protection Services, CSID Research Reveals

October 21, 2015 — CSID releases first-ever ID Secured Report, an ongoing study providing insight into consumer and business identity protection habits and trends.
Read More
Read More

Exploring Android insecurities

October 15, 2015 — Nearly 88 percent of Android devices have been exposed to at least one critical vulnerability, according to research from the University of Cambridge. CSID's CIO Adam Tyler weighs in.
Read More
Read More

Why We Need to Care About Malware

October 6, 2015 — Cyber criminals are taking notice as we increasingly store more and more personal information in our mobile devices. More than ever, they're eyeing mobile phones as a target to hack into a user's most sensitive information.
Read More
Read More

Thwarting Crime Online

September 16, 2015 — CSID's CFO discusses fraud detection, e-commerce tax law and why she chose tech with Middle Market Growth.
Read More
Read More

50 of Austin's fastest-growing companies unveiled

August 31, 2015 — The results of Austin Business Journal's annual Fast 50 contest — which aims to identify the fastest-growing companies in America's strongest economy — have been calculated.
Read More
Read More

Winners of Austin Chamber's business awards revealed

August 28, 2015 — Innovative, responsible and uniquely Austin companies were honored Thursday by the Austin Chamber of Commerce during its 15th Annual Greater Austin Business Awards.
Read More
Read More

Profiles in Power winners: Meet Amanda Nevins of CSID (Video)

August 14, 2015 — Amanda Nevins, CFO at CSID, was recently name one of Austin's Women of Influence at the Austin Business Journal's Profiles in Power event. Learn more about what makes Nevins one of the Austin-area's top women in business.
Read More
Read More

How feds can protect themselves post OPM breach

August 14, 2015 — Joe Ross, Co-Founder and President of CSID, discusses the implications of the hack on the federal workforce.
Read More
Read More

30 women taking Austin's business scene by storm

August 7, 2015 — Six women walked away winners from the Austin Business Journal's 21st annual Profiles in Power event Aug. 7, which recognizes women of influence in Central Texas.
Read More
Read More

Way More Feds Signed Up for Post-Hack Protections Than Anyone Anticipated

July 28, 2015 — The contractor chosen by the Office of Personnel Management to provide protection services to victims of the initial breach of personnel files maintained by the agency took a lot of heat for its perceived customer service, though it may have actually altered the industry standard for performance.
Read More
Read More

Facing uproar over its handling of federal employee hack, contractor responds, ‘We took a beating … for doing what … was the right thing to do’

July 20, 2015 — After a bruising initiation into Washington politics with his company’s sluggish response to the massive Chinese hack of federal employee data, Joe Ross seems unfazed.
Read More
Read More

Over Half of UK Small Firms Open to Cyber-Attack – Report

July 8, 2015 — The majority of small UK businesses are failing to take steps to protect themselves from data breaches, despite more than half registering concerns that their reputation could be damaged by an attack, according to new research from CSID.
Read More
Read More

Is Your Small Business Still in the Dark About Cyber Security?

July 5, 2015 — Around 52 percent of small businesses in the UK aren't taking preventative measures when it comes to protecting themselves against cyber crime, according to research from CSID.
Read More
Read More

No Evidence Hackers Are Selling Stolen Government Data, Contractor Says

June 30, 2015 — The contractor responsible for protecting the credit of some of the 4.2 million current and former government employees whose records were believed seized by Chinese hackers said there is no evidence stolen Social Security numbers or other records are being sold online.
Read More
Read More

OPM Announces a Recent Cybersecurity Incident

June 4, 2015 — The U.S. Office of Personnel Management (OPM) recently became aware of a cybersecurity incident affecting its systems and data that may have compromised the personal information of current and former Federal employees.
Read More
Read More

Episode 141: Hacking the hackers

June 3, 2015 — CSID created a fake company, complete with employees who had social media accounts and credit cards, and exposed some of the company’s sensitive information online. What happened next was surprising – not because of what the hackers did, but because of how fast they did it. CSID’s Joel Lang spoke with Regarding ID’s Gina Jordan about the case study.
Read More
Read More

Are you guilty of digital oversharing? It could cost you

May 28, 2015 — Consumers frequently surrender their critical passwords to almost every site they visit, a terrible habit. (A report by fraud-detection vendor CSID, released in the fall of 2012, found that 6 in 10 consumers reused passwords at multiple sites.) That means your online bank account is only as safe as the security at any other site you've accessed with the same password.
Read More
Read More

Identity management and the new frontier: IoT and ID must learn to get along

May 21, 2015 — In today’s digital age, identity management is a complex task that requires not just a hefty dose of common sense when sharing information on the Internet, but also a reliance on third-party businesses to safeguard that information and respect consumer privacy.
Read More
Read More

Why you should avoid hotel Wi-Fi like the plague

May 19, 2015 — Public and hotel Wi-Fi doesn't use WPA. Adam Tyler, Chief Innovation Officer of CSID, says that any device that is connected to hotel Wi-Fi is effectively sending all data in clear-text, allowing a remote attacker to identify and extract information.
Read More
Read More

Global black markets and the underground economy

May 18, 2015 — Adam Tyler is the Chief Innovative Officer at CSID. In this interview he discusses global black markets, what type of information is most valuable for cybercriminals, modern malware, and much more.
Read More
Read More

2015: The Plague of Point-of-Sale Breaches Continues

April 27, 2015 — Today our financial and personal information is everywhere. With so much personal information—quite literally—floating around various access points, it has never been more lucrative or easy for cyber-criminals to access and mine private information to sell on the black market.
Read More
Read More

Four Ways UK SMBs Can Mitigate Data Breach Risk

April 27, 2015 — When you mention cyber-crime, data breach or identity theft to a small business (SMB) owner what reaction would you expect to get? Disturbing results from a recent survey by the government’s Cyber Streetwise campaign found that two thirds (66 percent) of SMB owners do not consider their businesses to be vulnerable.
Read More
Read More

Password Breaches: Why Legislation is the Way Forward

April 22, 2015 — In June of 2012, LinkedIn, the largest business-oriented social network, found itself in hot water. Due to allegedly weak security practices on the part of the company, a file containing the encoded passwords of roughly 6.5 million LinkedIn users was posted on a Russian hacker site.
Read More
Read More

Data-scraping Chrome extension steals more than a million users’ data

April 8, 2015 — Adam Tyler, chief innovation officer at fraud detection firm CSID told SCMagazineUK.com that a research project was released last year during the Usenix Security Symposium which highlighted the extent of the problem. He said analysis conducted by various university-based researchers highlighted that on the Chrome Browser ‘store' alone there were 130 specifically malicious extensions, and more than 4700 ‘suspicious' extensions.
Read More
Read More

SMB Content Security Spend Still Up For Grabs

March 26, 2015 — In spite of continued growth in security spend amongst SMBs, it's still very much a Greenfield opportunity for managed service providers (MSPs) that can break through perception barriers.
Read More
Read More

Crooks’ new target: your rewards points

March 25, 2015 — Love loyalty rewards programs? So do black hat hackers, and they're becoming increasingly interested in stealing them from consumers, imperiling not only your rewards points but your identity.
Read More
Read More

Malware on the move: Mobile malware

March 9, 2015 — Mobile malware has indeed become a grave concern for security pros. Last year, we saw multiple new attacks on both Android and iOS devices, namely WireLurker which attacked (supposedly more secure) non-jailbroken iOS devices.
Read More
Read More

Hackers are stealing your tax refund

February 10, 2015 — The recent slew of massive hacks are costing you money — your U.S. government tax refund. Last year alone, hackers stole more than 6.5 million Social Security numbers. The number of SSNs stolen this year might be significantly higher, given the recent Anthem hack of 80 million customers.
Read More
Read More

POS Breaches in 2015: The Good, the Bad and the Ugly

January 14, 2015 — Retailers had a tough year. With Target's massive point-of-sale breach at the end of 2013 to a steady stream of retail breaches throughout 2014, it seems like cyber criminals continue to win the battle over consumer data. If 2014 was the year of the POS breach, then what will 2015 bring?
Read More