WHY IT MATTERS: Digital Transformation
214.9K views | +2 today
Follow
WHY IT MATTERS: Digital Transformation
Get weekly or monthly digest of all posts in your inbox: https://fmcs.digital/wim-subscribe
Curated by Farid Mheir
Your new post is loading...

Popular Tags for this blog

Current selected tags: 'Security', 'Privacy'. Clear
Scooped by Farid Mheir
Scoop.it!

Why #AdBlockers May be as Bad as the #Ads they are blocking: they need to make $$ using ads+tracking

Why #AdBlockers May be as Bad as the #Ads they are blocking: they need to make $$ using ads+tracking | WHY IT MATTERS: Digital Transformation | Scoop.it
For publishers and advertisers, Internet ad blockers are a scourge. But the blockers also have to pay the bills.
Farid Mheir's insight:

WHY THIS IS IMPORTANT

Surveillance is part of the web browsing experience mostly due to ads and social beacons. Trying to block them off not only degrades the user experience but may not provide the expected benefits as it may provide a different type of surveillance. Ad blocking does not appear to be the solution after all. So what can provide more privacy when surfing the web? The question remains open.

Jean-Marie Grange's comment, December 20, 2016 1:12 PM
Maybe one solution would be for content publishers to offer the choice of paying a fair amount for ad-free content... http://sco.lt/7CrAVl
Scooped by Farid Mheir
Scoop.it!

Priorities of a #Security Guru for the Next 4 Years - via @Schneierblog 

Priorities of a #Security Guru for the Next 4 Years - via @Schneierblog  | WHY IT MATTERS: Digital Transformation | Scoop.it

Like many, I was surprised and shocked by the election of Donald Trump as president. I believe his ideas, temperament, and inexperience represent a grave threat to our country and world. Suddenly, all the things I had planned to work on seemed trivial in comparison. Although Internet security and privacy are not the most important policy areas at risk, I believe he -- and, more importantly, his cabinet, administration, and Congress -- will have devastating effects in that area, both in the US and around the world.

I spent the last month both coming to terms with this reality, and thinking about the future. Here is my new agenda for the next four years.

 

Farid Mheir's insight:

WHY THIS IS IMPORTANT

Author is a leader in the security and privacy world, and it is always important to know what leading minds believe is happening or may happen in the future. He painted a fairly bleak picture of the security and privacy in his book - which I recommend strongly. Here he suggests that security and privacy will suffer in a Trump presidency. I would argue this would be the same under Clinton but agree that we must remain vigilant. The large number of comments also provide very interesting insight: anyone that raises concerns about large scale surveillance will get raided by many.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

President Obama on #AI, #NationalSecurity & fighting threats using medecine rather than walls via @WIRED

WIRED guest editor President Barack Obama, WIRED editor in chief Scott Dadich and MIT Media Lab director Joi to discuss the challenges of cyber security

Farid Mheir's insight:

WHY THIS IS IMPORTANT

Amazing short 12min video because of the level of understanding that the President of the USA has of the threats that come from AI and other digital means. He has been briefed of course but his discourse and examples shows that these are very important topics on top of mind for him and his administration. Moreover, it raises some concerns on our ability to fight against those threats and the impact they can have on countries and businesses alike. Must listen video IMHO.

Scooped by Farid Mheir
Scoop.it!

A #hacker event demonstrates how easy it is to obtain sensitive information using #socialEngineering

A #hacker event demonstrates how easy it is to obtain sensitive information using #socialEngineering | WHY IT MATTERS: Digital Transformation | Scoop.it

The Social Engineering Capture the Flag (SECTF) is an annual event held within the SocialEngineer Village at the DEF CON Hacking Conference in Las Vegas. The competition was formed to demonstrate how serious social engineering threats are to companies and how even novice individuals could use these skills to obtain important information. The contest is divided into two parts, the information-gathering phase that takes place prior to DEF CON, followed by the live call phase that occurs at the DEF CON conference.

Farid Mheir's insight:

This year's DEFCON24 report is full of information about social engineering, the event and methods to protect your organization. This is IMHO a must read for every executive to see how easy it is to breach security of their organization which can potentially result in theft, both physical and digital.

http://www.social-engineer.org/wp-content/uploads/2016/11/Social-Engineer-Capture-The-Flag-DEFCON24-SECTF-2016.pdf 

 

WHY THIS IS IMPORTANT

Often we think that our digital lives or digital transformations must be protected with strong passwords, encryption and other digital security methods. However, time and again the "social engineers" have demonstrated that the weakest link in the chain often are the individuals, employees and partners that voluntarily divulge sensitive information. And this, no technology can prevent and companies must invest in training their employees to detect the social engineering methods and respond with appropriate actions when such techniques are being tested on them.

Xixi QU's curator insight, November 27, 2016 4:06 AM
This year's DEFCON24 report is full of information about social engineering, the event and methods to protect your organization. This is IMHO a must read for every executive to see how easy it is to breach security of their organization which can potentially result in theft, both physical and digital.http://www.social-engineer.org/wp-content/uploads/2016/11/Social-Engineer-Capture-The-Flag-DEFCON24-SECTF-2016.pdf WHY THIS IS IMPORTANTOften we think that our digital lives or digital transformations must be protected with strong passwords, encryption and other digital security methods. However, time and again the "social engineers" have demonstrated that the weakest link in the chain often are the individuals, employees and partners that voluntarily divulge sensitive information. And this, no technology can prevent and companies must invest in training their employees to detect the social engineering methods and respond with appropriate actions when such techniques are being tested on them.
Scooped by Farid Mheir
Scoop.it!

Google warns journalists and professors: Your account is under attack

Google warns journalists and professors: Your account is under attack | WHY IT MATTERS: Digital Transformation | Scoop.it
A flurry of social media reports suggests a major hacking campaign has been uncovered.
Farid Mheir's insight:

Google is warning individuals that their Google accounts are being hacked - even if they turned on 2-factor authentication.

 

WHY THIS IS IMPORTANT

This news stories highlights some very important security and privacy elements:

1- Google is actively protecting security and privacy of high profile individuals which is reassuring because only they have the size and scope to fight state-funded hacking

2- I always believed 2-factor authentication was a good way to protect your digital self: looks like I was wrong. More on this later...

3- Google has been doing this since 2012, so the whole thing is not new but recent DDoS attacks using Internet of Things devices (cameras, etc.) demonstrates that hackers now have new, very effective hacking tools and they are using it.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Great. Now Even Your #Headphones Can #Spy on You: turning speakers into microphones via @gnat

Great. Now Even Your #Headphones Can #Spy on You: turning speakers into microphones via @gnat | WHY IT MATTERS: Digital Transformation | Scoop.it
Israeli researchers show that even if you're paranoid enough to remove your computer's microphone, malware can convert your headphones into spy bugs.
Farid Mheir's insight:

A vulnerability in always on devices that listen to our every words can be turned into a spy tool.

 

WHY THIS IS IMPORTANT

We are surrounded by "always on" devices - from Apple Siri and Airpods to Google NOW to Amazon echo. They listen to your every word looking for keywords such as "siri" or "OK google". Using those features one should assume the device is listening all the time and potentially recording to the cloud our conversations, which has a number of people quite scared including this Guardian article named "Goodbye privacy".

https://www.theguardian.com/technology/2015/nov/21/amazon-echo-alexa-home-robot-privacy-cloud 

 

Here we are faced with an exploit that enables speakers - which everyone thinks of as an output device - to become listening devices. Any engineer knows that speakers and microphones work based on the same electromagnetic principle. However this exploit is special because it transforms the output port on the computer into an input port, allowing speakers to become microphones. And then record everything, compress it and send it to the cloud where it can be used for spying or other purpose.

 

The end of privacy is closer than it has ever been...

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Akamai on the Record KrebsOnSecurity #DDoS Attack via @BrianKrebs @Akamai

Akamai on the Record KrebsOnSecurity #DDoS Attack via @BrianKrebs @Akamai | WHY IT MATTERS: Digital Transformation | Scoop.it

Internet infrastructure giant Akamai last week released a special State of the Internet report. Normally, the quarterly accounting of noteworthy changes in distributed denial-of-service (DDoS) attacks doesn’t delve into attacks on specific customers. But this latest Akamai report makes an exception in describing in great detail the record-sized attack against KrebsOnSecurity.com in September, the largest such assault it has ever mitigated.

Farid Mheir's insight:

Describes recent DDoS attacks and provides links to Akamai State of the Internet report, a very useful reference.

 

WHY THIS IS IMPORTANT

Going digital often means relying on the Internet for critical business operations. This article is a stark reminder of the need to put security on the top of priority list.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Security and efficiency in a world beyond passwords

Security and efficiency in a world beyond passwords | WHY IT MATTERS: Digital Transformation | Scoop.it
A world beyond passwords is possible--technology is on the verge of rendering passwords obsolete, bolstering security as well as making users and customers happier.
Farid Mheir's insight:

A very good review of the limitations of passwords and the multiple new methods we will have to enhance our digital security.

 

WHY THIS IS IMPORTANT

To go digital, being secure is very high on the list of priorities. Maslow had put security as the second layer in the pyramid of needs - and I believe this is also true in the new pyramid of digital needs!

No comment yet.
Scooped by Farid Mheir
Scoop.it!

The Democratization of Censorship: in depth analysis of a DDoS attack via @briankrebs

The Democratization of Censorship: in depth analysis of a DDoS attack via @briankrebs | WHY IT MATTERS: Digital Transformation | Scoop.it

As many of you know, my site was taken offline for the better part of this week. The outage came in the wake of ahistorically large distributed denial-of-service (DDoS) attack which hurled so much junk traffic at Krebsonsecurity.com that my DDoS protection provider Akamai chose to unmoor my site from its protective harbor.

 

(...)

Today, I am happy to report that the site is back up — this time under Project Shield, a free program run by Google to help protect journalists from online censorship. And make no mistake, DDoS attacks — particularly those the size of the assault that hit my site this week — are uniquely effective weapons for stomping on free speech, for reasons I’ll explore in this post.

Farid Mheir's insight:

Brian Krebs exposes the attack his security blog has recently suffered, along with clear explanation of the attack and ways to prevent it.

 

WHY THIS IS IMPORTANT

It is by sharing stories like this one that we can all learn of potential danger that any website faces when a properly motivated opponent targets you.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Phishing Field Guide: How to Keep Your Users Off the Hook

Phishing Field Guide: How to Keep Your Users Off the Hook | WHY IT MATTERS: Digital Transformation | Scoop.it
Learn phishers’ most dangerous tricks and see how you can teach your users to avoid them.
What's inside?
  • An overview of who in your organization is most likely to get phished.
  • Easy-to-follow tips for employees at every level of your company.
  • Sample phishing emails that break down just what to look for in a phishing attack.
Bonus!

A printable checklist of tips and best practices to share with your users to help them recognize and avoid phishing emails.

Farid Mheir's insight:

A very good introduction to the dangers of phishing email attacks, with good examples and humour that make it a good guide to share with employees as part of an information session of staying vigilant about those attacks.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Ransomware Getting More Targeted, Expensive — Krebs on Security

Ransomware Getting More Targeted, Expensive — Krebs on Security | WHY IT MATTERS: Digital Transformation | Scoop.it
Farid Mheir's insight:

Essential reading to understand the sophistication that ransomware has become today.

 

WHY THIS IS IMPORTANT

Malicious programs that encrypt computer files in exchange for money have become popular and they mark a new threat where end users are the weakest link. Companies should make sure that their users, employees and partners are train to detect and react appropriately when such an attack is detected. Noone is protected and we are all vulnerable. You have been warned!

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Have I been pwned? Check if your email has been compromised in a data breach

Have I been pwned? Check if your email has been compromised in a data breach | WHY IT MATTERS: Digital Transformation | Scoop.it
Have I been pwned? allows you to search across multiple data breaches to see if your email addresses has been compromised.
Farid Mheir's insight:

Brilliant idea: a website that gathers all the stolen emails and private information, then warns you if your email shows up on one of these lists. Essential tool. Use it now.

clapnotice's comment, September 26, 2016 5:10 AM
Its tremendous :)
Scooped by Farid Mheir
Scoop.it!

Five Best Password Managers @lifehacker

Five Best Password Managers @lifehacker | WHY IT MATTERS: Digital Transformation | Scoop.it

A while ago, all it took to be a great password manager was to keep your passwords in an encrypted vault. Now the best password managers give you the option to sync or keep them local only, change web passwords with a click, log in to sites for you, and more. This week, we're looking at five of the best options.

Farid Mheir's insight:

Whichever you select, use a password manager. Do it now.

Scooped by Farid Mheir
Scoop.it!

The Limits of SMS for 2-Factor Authentication @briankrebs

The Limits of SMS for 2-Factor Authentication @briankrebs | WHY IT MATTERS: Digital Transformation | Scoop.it

A recent ping from a reader reminded me that I’ve been meaning to blog about the security limitations of using cell phone text messages for two-factor authentication online. The reader’s daughter had received a text message claiming to be from Google, warning that her Gmail account had been locked because someone in India had tried to access her account. The young woman was advised to expect a 6-digit verification code to be sent to her and to reply to the scammer’s message with that code.Click here to edit the content

Farid Mheir's insight:

Brian Krebs describes limitation of 2 factor authentication but also provides very important insights into how to make you more secure.

 

WHY THIS IS IMPORTANT

2 factor authentication usage at dropbox is at 1% and we need to increase use of 2fa wherever possible and papers like this should help in reaching that goal.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Applied Hacking: #youTube hacking channel

Applied Hacking: #youTube hacking channel | WHY IT MATTERS: Digital Transformation | Scoop.it
How the creator of the Samy worm became the friendly face of technological insecurity.
Farid Mheir's insight:

Describes how a hacker youTube channel with 90K subscribers and 5M views describes how to hack everything from credit card readers to garage door openers.

 

WHY THIS IS IMPORTANT

Hacking has become a past time for many and there is an industry forming around this new trend to help users with their hacking projects and solutions. Any digital expert would be well informed to follow such hacking gurus to understand what is possible, how it is done and - possibly - how to prevent it in their strategies and roadmaps.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

The Value of a Hacked Company via @Krebs

The Value of a Hacked Company via @Krebs | WHY IT MATTERS: Digital Transformation | Scoop.it
Today’s more clueful cybercrooks understand that if they can identify compromised systems inside organizations that may be sought-after targets of organized cybercrime groups, those groups might be willing to pay handsomely for such ready-made access.
Farid Mheir's insight:

Krebs explains how cybercrime organizations profit from the sale of companies they hack and gain access to usernames and systems. It also provides guidance on how to improve security in large organizations.

 

WHY THIS IS IMPORTANT

I find that too often we focus on individual hacks or threats but rarely consider security at a strategic level - assigning real cost to security breaches and thus looking for funding to address the biggest risks. Moreover, as is stated here, awareness training of resources may actually be a very effective - and relatively low cost? - way to improve security and protect an organization.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

3 tips for defending patient information from hacker attacks

3 tips for defending patient information from hacker attacks | WHY IT MATTERS: Digital Transformation | Scoop.it
Physicians typically have access to sensitive personal information on large numbers of patients, which makes their devices prime targets for hackers looking to steal that information.

 

  1. Encrypt laptops and other devices 
  2. Don’t let convenience trump good security
  3. Practice safe surfing
Farid Mheir's insight:

3 simple steps that doctors - and everyone else - should use to secure their information and keep them private.

 

WHY THIS IS IMPORTANT

Is there anything more personal than your medical information? I assume not and thus would expect my medical professional to be aware of these 3 basic security principles and respect them strictly. However, it may not be the case and I would recommend this sort of information to be built into the standard medical practice curriculum because I would not want my doctor's laptop to be the weak link in my medical record transmission chain.

 

For other articles on this field: http://www.fiercehealthcare.com/topic/cybersecurity

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Your smartphone is leaking your information

This talk was given at a local TEDx event, produced independently of the TED Conferences. Bram is a PhD student in computer science at the Expertise Centr
Farid Mheir's insight:

An 8 minute video that will make you rethink your hunt for free wifi in public spaces...

No comment yet.
Scooped by Farid Mheir
Scoop.it!

OpenBR : Open Source Biometric Recognition paves the way for wide adoption

OpenBR : Open Source Biometric Recognition paves the way for wide adoption | WHY IT MATTERS: Digital Transformation | Scoop.it

Open Source Biometric Recognition

A communal biometrics framework supporting the development of open algorithms and reproducible evaluations.

Farid Mheir's insight:

Face recognition, gender detection, and age estimation are all now possible with this open source suite of software code. This should pave the way for wide adoption in all kind of applications, from retail store security cameras to hand held camera devices such as the narrative camera or others. I can think of so many use cases - both good and bad - where this technology can be deployed. Just a question of time...

 

http://getnarrative.com/

https://www.indiegogo.com/projects/parashoot-smart-wearable-video-mini-hd-camera 

http://www.getperfectmemory.com/ 

 

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Google Transparency Report gives insights into hacking & government requests for content

Google Transparency Report gives insights into hacking & government requests for content | WHY IT MATTERS: Digital Transformation | Scoop.it

Data that sheds light on how laws and policies affect Internet users
and the flow of information online.

Farid Mheir's insight:

Some data from Google that sheds light onto steps they use to protect our privacy and make us secure.

No comment yet.
Rescooped by Farid Mheir from WHY IT MATTERS: Digital Transformation
Scoop.it!

Kill the Password: A String of Characters Won't Protect You

Kill the Password: A String of Characters Won't Protect You | WHY IT MATTERS: Digital Transformation | Scoop.it
You have a secret that can ruin your life. It’s not a well-kept secret, either. Just a simple string of characters that can reveal everything about you.

 

DON’T

  • Reuse passwords. If you do, a hacker who gets just one of your accounts will own them all.
  • Use a dictionary word as your password. If you must, then string several together into a pass phrase.
  • Use standard number substitutions. Think “P455w0rd” is a good password? N0p3! Cracking tools now have those built in.
  • Use a short password—no matter how weird. Today’s processing speeds mean that even passwords like “h6!r$q” are quickly crackable. Your best defense is the longest possible password.

DO

  • Enable two-factor authentication when offered. When you log in from a strange location, a system like this will send you a text message with a code to confirm. Yes, that can be cracked, but it’s better than nothing.
  • Give bogus answers to security questions. Think of them as a secondary password. Just keep your answers memorable. My first car? Why, it was a “Camper Van Beethoven Freaking Rules.”
  • Scrub your online presence. One of the easiest ways to hack into an account is through your email and billing address information. Sites like Spokeo and WhitePages.com offer opt-out mechanisms to get your information removed from their databases.
  • Use a unique, secure email address for password recoveries. If a hacker knows where your password reset goes, that’s a line of attack. So create a special account you never use for communications. And make sure to choose a username that isn’t tied to your name—like m****n@wired.com—so it can’t be easily guessed.
Farid Mheir's insight:
You have a secret that can ruin your life. It’s not a well-kept secret, either. Just a simple string of characters that can reveal everything about you.

 

DON’T

  • Reuse passwords. If you do, a hacker who gets just one of your accounts will own them all.
  • Use a dictionary word as your password. If you must, then string several together into a pass phrase.
  • Use standard number substitutions. Think “P455w0rd” is a good password? N0p3! Cracking tools now have those built in.
  • Use a short password—no matter how weird. Today’s processing speeds mean that even passwords like “h6!r$q” are quickly crackable. Your best defense is the longest possible password.

DO

  • Enable two-factor authentication when offered.When you log in from a strange location, a system like this will send you a text message with a code to confirm. Yes, that can be cracked, but it’s better than nothing.
  • Give bogus answers to security questions. Think of them as a secondary password. Just keep your answers memorable. My first car? Why, it was a “Camper Van Beethoven Freaking Rules.”
  • Scrub your online presence. One of the easiest ways to hack into an account is through your email and billing address information. Sites like Spokeo and WhitePages.com offer opt-out mechanisms to get your information removed from their databases.
  • Use a unique, secure email address for password recoveries. If a hacker knows where your password reset goes, that’s a line of attack. So create a special account you never use for communications. And make sure to choose a username that isn’t tied to your name—like m****n@wired.com—so it can’t be easily guessed.
Farid Mheir's insight:

An old Wired magazine article from 2012 that is still as current today as it was then. Unfortunately.

 

If you don't read the whole thing, just skip to the DOs and DONTs.

And read these other articles: http://www.scoop.it/t/digital-transformation-of-businesses/?tag=Security

Farid Mheir's curator insight, March 15, 2016 8:33 AM

An old Wired magazine article from 2012 that is still as current today as it was then. Unfortunately.

 

If you don't read the whole thing, just skip to the DOs and DONTs.

And read these other articles: http://www.scoop.it/t/digital-transformation-of-businesses/?tag=Security

jasmine moriah gabrielle hummel's curator insight, March 21, 2016 11:44 AM

An old Wired magazine article from 2012 that is still as current today as it was then. Unfortunately.

 

If you don't read the whole thing, just skip to the DOs and DONTs.

And read these other articles: http://www.scoop.it/t/digital-transformation-of-businesses/?tag=Security

jasmine moriah gabrielle hummel's curator insight, April 6, 2016 7:40 PM
DON’T •Reuse passwords. . •Use a dictionary word as your password. •Use standard number substitutions. •Use a short password DO •Enable two-factor authentication when offered. •Give bogus answers to security questions. •Scrub your online presence. •Use a unique, secure email address for password recoveries
Scooped by Farid Mheir
Scoop.it!

Google security check-up: do it now, do it often, it is a good thing

Google security check-up: do it now, do it often, it is a good thing | WHY IT MATTERS: Digital Transformation | Scoop.it

Manage your account access and security settings.


Your Google Account is protected by the most advanced online security. Keeping these settings up-to-date safeguards your account even more.
Farid Mheir's insight:

Google - Apple, Yahoo, Facebook, and others - all have security checks and solutions that are free to use. They help protect individual accounts and related data. 


Visit those sites today and then make a note to visit them on a regular basis, say on a monthly or quarterly basis, just to make sure.


Here is a list of security links for common solutions and services for your reference:


No comment yet.
Scooped by Farid Mheir
Scoop.it!

A Look Inside Cybercriminal Call Centers via @BrianKrebs

A Look Inside Cybercriminal Call Centers via @BrianKrebs | WHY IT MATTERS: Digital Transformation | Scoop.it

Crooks who make a living via identity theft schemes, dating scams and other con games often run into trouble when presented with a phone-based challenge that requires them to demonstrate mastery of a language they don’t speak fluently. Enter the criminal call center, which allows scammers to outsource those calls to multi-lingual men and women who can be hired to close the deal.

Farid Mheir's insight:

More evidence that digital security and privacy issues often resort to "Traditional methods" to perform crimes - what is called social engineering. Here is a description of call centers to impersonate people in multiple languages when companies try to verify your identity byphone during a digital transaction.


Krebs also offers a solution which would requires us all to have a voice "fingerprint" available to validate our true identity.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Social Engineering allows hackers access to paypal account via @briankrebs

Social Engineering allows hackers access to paypal account via @briankrebs | WHY IT MATTERS: Digital Transformation | Scoop.it

My PayPal account was hacked on Christmas Eve. The perpetrator tried to further stir up trouble by sending my PayPal funds to a hacker gang tied to the jihadist militant group ISIS. Although the intruder failed to siphon any funds, the successful takeover of the account speaks volumes about why most organizations — including many financial institutions — remain woefully behind the times in authenticating their customers and staying ahead of identity thieves.

Farid Mheir's insight:

A detailed explanation of method by which hackers can access paypal user accounts using easily obtainable personal information.


Reminds me of a similar incident where a teenager was able to fool Verizon and AOL employees into giving him access to CIA director email account: http://sco.lt/6qhN5t

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Don’t Be a Victim of Tax Refund Fraud in ’16 via @Krebs #mustRead

Don’t Be a Victim of Tax Refund Fraud in ’16 via @Krebs #mustRead | WHY IT MATTERS: Digital Transformation | Scoop.it

With little more than a month to go before the start of the 2016 tax filing season, the IRS and the states are hunkering down for an expected slugfest with identity thieves who make a living requesting fraudulent tax refunds on behalf of victims. Here’s what you need to know going into January to protect you and your family.

Farid Mheir's insight:

A very detailed post about potential identity theft and how to prevent it. Must read for any american. Not sure what to do in Canada or in Quebec though?

No comment yet.
Curated by Farid Mheir
Get every post weekly in your inbox by registering here: http://fmcs.digital/newsletter-signup/