Explore the latest trends, research and best practices with industry experts.

Survey: Small Business Security

May 2016

To better understand how small businesses are approaching the threat of cyber crime, CSID surveyed 150 small business owners (businesses with 1 to 10 employees) across the United States on their concerns about cyber security and their approach to risk mitigation and response.

ID Secured: Volume 1

September 2015

CSID’s first-edition ID Secured report offers an inside look at a group that CSID is uniquely positioned to understand – the global population of individuals who are active subscribers of identity theft protection products. The report includes data from a study conducted over a three month period, and provides an in-depth look at this group.

Case Study: Hacking the Hackers

April 2015

To demonstrate just how effortlessly cyber criminals are targeting and exploiting SMBs, CSID reinforced the need for data breach mitigation by executing an experiment. The idea? Develop a mock business, build its presence online and watch as it becomes a target for real cyber criminals to hack.

Finding a Cure for Medical Identity Theft

October 2014

Many consumers are unaware of medical identity theft and the harm it can cause – both to their wallet and their health. Yet medical identity theft is the fastest growing segment of identity theft in the United States. Ponemon Research reported that 90 percent of healthcare organizations have exposed their patients’ data or had it stolen in 2012 and 2013, and the industry has seen more than 200 breach incidents in 2014 alone.

Survey: Small Business Security

June 2014

Many small to medium-sized businesses (SMBs) are not taking measures to protect against security risks, and cyber criminals are starting to take notice. In fact, the number of attacks against SMBs nearly doubled from 18 percent in 2011 to 31 percent in 2013. Why the increased attention on smaller sized businesses? According to CSID’s 2014 SMB survey, 31 percent of small businesses are not taking any active measures to protect against security threats.

Identity Management in a Digital World

May 2014

Prior to the Internet and the relocation of much of our personal data to the cloud, identity management was a simple matter of shredding papers with sensitive information, not sharing personal data with strangers in day-to-day life and not making a spectacle of oneself at work or in public. Today, identity management is a much more complex topic that includes relying on businesses to guard personal information, relying on those same businesses to not violate privacy by selling that information, and exercising a modicum of common sense when sharing personal information online.

The Low Cost and High Reward of POS Malware

May 2014

Last year, Target and Neiman Marcus both experienced major breaches due to Point of Sale (POS) malware, bringing this type of security breach under intense scrutiny in 2014. Target’s breach resulted in the loss of more than 40 million card numbers, including expiration dates, CVV codes and PIN numbers. Personal information for more than 70 million customers was also stolen including names, mailing addresses, email addresses and phone numbers.

When Good Technology Goes Bad: Evolution of Mobile Technology

March 2014

Mobile hardware is evolving at an unbelievable rate. Think about it: the cell phone you are using right now has more computing power than the computers that sent Neil Armstrong into space a few decades ago. And not only has mobile technology been advancing so impressively, but the costs associated with the technology have been decreasing, making it more widely available and adopted.

The Target Breach: An In-Depth Look at What Happened and How to Prepare for a POS System Attack

February 2014

The security breach at Target has been the subject of intense scrutiny and speculation throughout 2014.  From November 27 to December 15, 2013, cyber criminals stole millions of customer records after installing malware on Target’s Point of Sale (POS) system. The underlying cause of this enormous breach – an employee from one of Target’s third-party vendors clicked on a malware-ridden link in a phishing scam.

Managing Online Reputation in a Digital World

September 2013

Consumers are sharing more information online than ever before, with 27% of time online spent on forums and social networks. In an effort to engage with friends and family and enjoy the benefits of social media, people are also exposing themselves in ways that could lead to unwanted consequences, like reputation damage, identity theft and unemployment. But, there are are solutions and common sense practices one can adopt to help manage his or her online reputation.

Risk Mitigation for Small Businesses: A Study of Small Businesses’ Concern and Response to the Cyber Security Risks They Face

June 2013

When it comes to small business cyber security, it is a different world today than in years past when a company only had to worry about protecting their desktop computers and locally stored files. Small businesses often practice unique operation trends like BYOD and cloud storage, and are responsible for a lot of PII but less prepared to manage it securely. The result — cyber security for small businesses has become incredibly complex causing small businesses to be increasingly targeted for cyber attacks.

Your Data Is Showing: What’s Next in Identity Protection

May 2013

When it comes to stealing identities, criminals will follow the money. Ten years ago, this meant stealing credit and debit card information to make unauthorized purchases and using stolen Social Security numbers to create new identities and open lines of credit. Today, the information that is valuable to an identity thief is shifting to seemingly harmless details like email addresses and passwords, mothers’ maiden names and dates of birth, even high school mascots and pet names.

Child Identity Theft: A Parenting Blind Spot

April 2, 2013

One in 10 children will become victim to child identity theft and the thieves can go unnoticed for years as children’s credit reports may not be checked until they turn 18. Many times families discover the crime when the child applies for his or her first credit card, loan or apartment and are met with the shocking reality that their credit has been fraudulently used.

Mitigating the Risk of Poor Password Practices

September 28, 2012

When it comes to securing passwords, companies can encrypt, hash, and salt to their hearts’ content — but they will still be at risk. Why? Because people can be careless when it comes to password creation and management. If one consumer uses the same password on multiple sites, and one of those sites is compromised, the others are compromised too.