identity theft and scams
Welcome to
Your best source for presentations, workshops, consultation, news, videos, and information about identity theft, scams, data breaches, and other information security threats. For more information about our services, please click HERE.
Resources and Expertise to Combat Identity Theft, Scams, and Social Engineering
There Have Been 
 Identity Theft Victims Year-To-Date
Thousands of Taxpayers Affected by W-2 Phishing Attacks This Year
Thousands of taxpayers have been impacted by a wave of Phishing attacks targeting W-2 records, with more than sixty organizations reporting such incidents in the first half of the year. By taking advantage of the trust relationships that exist within a given company; these attacks have resulted in at least $2.3 billion in losses over the last three years.
Calling the Swat Team on Your Neighbor Could Soon Carry a 20-Year Prison Sentence
A potentially lethal form of prank-calling could soon be banned with stiffer penalties, under a piece of legislation that just passed a crucial vote in Congress. The bill takes aim at a tactic known as "swatting" — where a prankster calls the police and alerts them to a bomb threat or other criminal activity going down at the target's house. Unable to tell the difference between a fake threat and a real one, the authorities send a SWAT team to storm the victim's abode, guns drawn. And the victim has no choice but to endure the abuse.
Feds Have Found ‘Unbelievable’ Amounts of Child Porn on National Security Computers. Is This the Solution?
A top National Security Agency official wants to keep tabs on national security personnel off-the-clock, in part by tracking their online habits at home. The aim is to spot behavior that might not be in America's best interests. Historically, some illicit activity, like downloading child pornography, has occurred on government computers and been prosecuted. But today, the digital lives of employees cleared to access classified information extend beyond the office.
identity theft breaches
Rob Douglas identity theft expert

Does your organization need a consultant who can deliver information security awareness training that contains the truth about what works and what doesn’t in the fight against the fastest growing crimes in the world? 

Does your conference need an experienced speaker who will captivate the audience with dramatic real life cases of identity theft, cybercrime and scams ranging from stolen personal information, to theft of corporate trade secrets, to stalking and murder? 

Are you a member of the media seeking a comment about ID theft, scams, data breaches, cybercrime, information security, or fraud? 

If so, we invite you to learn more about identity theft and scam expert Rob Douglas.

The Government Wants Your Fingerprint to Unlock Your Phone. Should That Be Allowed?
Wednesday, May 04, 2016
Authorities obtained a search warrant compelling the girlfriend of an alleged Armenian gang member to press her finger against an iPhone that had been seized from a Glendale home. The phone contained Apple's fingerprint identification system for unlocking, and prosecutors wanted access to the data inside it.
Banking and Cybersecurity: Can They Help Prevent the Next Terrorist Attack?
Wednesday, May 04, 2016
Banks are subject to plethora of privacy rules on information sharing even with a government agency. Criminals can use those privacy rules to their advantage if there is not a fine balance between protecting customer’s privacy and identifying risks from terrorists.
FTC Obtains $13.4 Million Judgment Against Former BlueHippo Defendant
Wednesday, May 04, 2016
“This scheme preyed on cash-strapped consumers looking for computers to improve their lives and the lives of their children,” said Jessica Rich, the Director of the Federal Trade Commission’s Bureau of Consumer Protection.
Verizon's Latest Breach Report: Same Attacks, More Damage
Wednesday, May 04, 2016
Phishing attacks became more successful. Malware continued to be the dominant way that organizations got hacked. The number of ransomware infections increased. And organizations continued to get exploited via vulnerabilities in their IT infrastructure that were months or sometimes even years old.
Medicare's New Physician Payment Plan: Impact on Security
Wednesday, May 04, 2016
The proposed Medicare payment revamp for physicians would not significantly enhance the requirements related to privacy and security of patient information under the HITECH Act meaningful use program. The proposal, however, does include provisions designed to discourage the blocking of secure patient records exchange.