Blog

April 11, 2018
Comments [0]

By Denise Szott

Brokers, now more than ever, need a proactive strategy to help employer clients meet a growing demand for enhanced employee benefits.

To do so, brokers must be ready to leverage their resources. An expanded employee benefits voluntary products portfolio, which may include identity theft protection, financial counseling or casualty coverage, among others, will help them meet their clients’ demands and desire to boost worker...

Read More
April 2, 2018
Comments [0]

Net Neutrality is dead and the Internet is increasingly a playground for data mining schemes, social networks, and identity thieves. The possibility of true online privacy has never seemed more remote.

The use of a VPN (Virtual Private Network) has long been viewed as a silver bullet. Historically, VPNs have been used by dissidents trying to avoid persecution from governments, hackers wishing to cover their tracks, and mainstream consumers looking for ways to...

Read More
March 30, 2018
Comments [0]

A recent Reuters article by Tom Bergin takes a look at what data mining companies may or may not know about particular individuals in the wake of the Cambridge Analytica story. Bergin uses his own data in an intensely un-scientific, yet interesting investigation.

First of all, Bergin is not from the U.S. As a citizen of the European Union, he enjoys certain...

Read More
March 20, 2018
Comments [0]
Cyberscout Chairman and Founder Adam Levin appeared on the PBS program “White House Chronicle” in a wide-ranging interview touching on everything from his work as Director of Consumer Affairs for the State of Jersey and co-founder of Credit.com to his present work helping consumers... Read More
March 16, 2018
Comments [0]

The New York Times reported this week on a hacking attempt at a petrochemical plant in Saudi Arabia last August that sought to physically sabotage the facilities and trigger an explosion. This represents a potentially alarming new trend in cyber attacks where the goal isn’t to steal information or gain control of a system, but rather to cause actual damage to people and property.

Utilizing hacking as a means of industrial sabotage isn’t necessarily new; the...

Read More
March 12, 2018
Comments [0]

For many people, knowing a tax refund is on the way can be a big relief, an exciting treat, or both. And the sooner the refund arrives the better.

For victims of tax identity theft, however, the wait can drag on for almost a year. Not to mention they may have to deal with a lot of red tape to get what’s rightfully theirs. That’s why it’s critical to understand:

How tax-related identity theft works How to reduce chances of becoming a victim What to do, if you do become a victim

...

Read More
March 1, 2018
Comments [0]

The data breach archive site HaveIBeenPwned.com just added records from 2,844 data breaches, providing users with one of the most up-to-date resources to check the security of their accounts. The site, operated and updated by Troy Hunt, allows visitors to enter either an email address or a login name check if there information has been compromised in any of the breaches in the site’s database.

As Hunt stated on his personal...

Read More
December 18, 2017
Comments [0]

The year is nearly over. It’s time to sing Auld Lang Syne, do self-reflection and declare your New Year’s resolutions.

Many attempts to become a better you, however, can jeopardize your identity. Follow these tips to protect your information:

Get in shape. Ready to hit the gym and search for your elusive six-pack abs? When you apply for membership, be cautious about how much personal information you give. If you are required to provide a social security number...

Read More
December 12, 2017
Comments [0]

You open your monthly credit card statement and receive a shock: Someone is enjoying a big screen TV purchased with your card, and it’s not you.

You've just been hit with credit card fraud, a rampant form of theft responsible for nearly one-third of all identity theft complaints filed with the Federal Trade Commission (FTC). When criminals use stolen credit card information online or by phone—instead of in person at a store—it’s called card-not-present...

Read More
December 11, 2017
Comments [0]

As consumers step up their online shopping leading up to the holidays, it’s a prime time of the year for identity theft. While you are busy snagging hot deals on Black Friday and Cyber Monday, thieves are phishing for your information.

Don’t let an identity thief take the jingle out of your holiday. Follow these 12 tips to keep your financial information secure during the holiday season.

...

Read More

Offer Industry Leading CyberScout Protection

CyberScout's partnership options help you safeguard the identity and privacy of your policyholders, customers, members and employees. Discover how a customised program can help build brand loyalty, member retention, and quickly generate long-term recurring revenue.

Let's Get Started