Category Archives: Identity Protection

Protect Yourself from Check Fraud

In an increasingly digital world, you might expect check fraud to be a thing of the past. However, check fraud remains a prevalent form of financial crime that continues to pose a significant threat to individuals and businesses alike.

Continue reading

6 Ways to Budget Gift Giving this Holiday Season

Holiday gift-giving doesn’t need to drain your bank account. According to Deloitte, 37% of American households say their financial situation is worse than last year. Despite the economic pressures and rise of inflation, the holiday spirit remains intact. The American people are finding creative ways to give meaningful gifts and stay within their budget. Check out our top six tips to help you get started. 

Continue reading

How to Make to Secure Offline Payments

With recent global conflicts threatening cybersecurity, it’s more important than ever to keep yourself and your finances protected. In addition to overarching internet fraud, cyberattackers will frequently target online payment systems. Cryptocurrency in particular has been the talk of potential scams and overseas cybercrime.

Continue reading

Everything You Need to Know About Job Hunting Service Scams

Internet Theft - a man wearing a balaclava looking at computer screen using magnifying glass

By: Jurissa Ayala

What is a job hunting service scam — and how does it harm both employers and employees? Job hunting service scams operate like recruitment or staffing agencies, claiming to place job seekers with prospective employers. Occasionally job hunting services may actually be able to arrange interviews and even procure a job for a job hunter, but it will always come at a considerable and unnecessary cost.

Continue reading

Internet Security : Creating Secure Passwords

metal security lock with password on computer keyboard

By Jurissa Ayala

In our day and age, we have the amazing ability to be hooked up to the Internet and perform our business, our banking, schooling and communication from anywhere we want. However, our security online depends greatly on our ability to protect our personal accounts from unauthorized access, as malicious users try to break into other people’s accounts thousands of times every day. Passwords are the linchpin in our security, and it is vital that we create strong passwords to protect our accounts and our identities.

Continue reading

The First Thing We Do, Let’s Kill All the Hackers

Large group of people that are seeking security protection , internet , identity theft , home protection concept.

.

By MJ Plaster

You know the line from King Henry the Sixth even if you’ve never read a word of Shakespeare: “First thing we do, let’s kill all the lawyers.” Here we’re talking about black hat hackers, the ones that wreak havoc with computer networks and Internet sites around the world. I’m probably next on their list after that headline, but how else can I tempt you to read vital information that could save your business?

Continue reading

Is Facebook Making you more Vulnerable to a Grandparent Scam?

Checkworks-Grandparent scam- new img

The grandparent scam has been around a few years, according to the FBI, but numbers have increased dramatically as seniors become more active online and with social media. A typical grandparent scheme involves a phone or email; someone identifying themselves as one of your grandkids will claim to be in trouble and need immediate financial help. Continue reading

How Much Does The Internet Know About You?

Suspicious businesswoman siting on the desk with laptop computer

Our society relies heavily on the Internet for information, commerce, communication and entertainment. Increasingly, though, logging on comes with a distinct Big Brother-style unease. Many people are worried how much the Internet knows about them and would like to limit this information, but can’t find the right answers. Well, here they are. Below we’ve outlined some of the most salient questions Internet users have, as well as the best ways to protect yourself. Continue reading