Author Archives: Catherine Lennon

About Catherine Lennon

I am a Writer, Editor and Marketer with a BBA from University of Cincinnati's Carl H. Lindner College of Business Administration. I have spent the majority of my 25+ year career freelancing in a variety of B2B, B2C, start-up and non-profit industries: accounting and financial services; commercial lighting and design; cybersecurity; film and production; law; market research; human resources and organizational behavior; as well as manufacturing and technology. I write content for a variety of clients and enjoy helping businesses brand consistently. I also love to help authors perfect their manuscripts so they are ready to be published.
Alert Fatigue Got You Hitting Snooze?

Alert Fatigue Got You Hitting Snooze?

Bzzzzzzz. Bzzzzzzzzzz. Bzzzzzzzzzzzzz. Before you even open your eyes in the morning, your phone is vibrating nonstop. Is it your mom asking you if you made it home okay from your trip? Your car reminding you that you forgot to lock her doors before making your way to bed? Your building manager telling you they’re spraying for insects this morning?

Another buzz. And then another. Geezles! You feel guilty, but not enough to feel bad turning your phone off completely. You took work off this morning to actually sleep in. Jet lag stinks!

Ends up that all of those buzzes weren’t from family, your landlord or co-workers needing a lift. (Your car was legitimate though making sure you both were safe and sound … she’s so sweet).

While you snoozed, you continued to receive a series of urgent security alerts. A breach notification. A password reset request. A text from your bank. Unreal! The coffee hasn’t even had a chance to start brewing yet! Fatigue sets in.

In 2025 data breaches and scams are at record highs:

– IT Pro reported that credential theft has surged 160% this year.

– Identity-related breaches now make up 1 in 5 incidents.

– Each case of suspected identity fraud can take hours (most of which during business hours) and sometimes days and weeks to properly investigate and resolve. Federal Trade Commission survey data estimates that victims of identity theft spent on average 30 hours resolving related problems with more severe cases jumping to around 60 hours or more.

That means more alerts than ever are landing in your inbox or on your phone. Some are indeed legitimate. Your bank warning asking about the legitimacy of a transaction…legitimate. A credit card alert asking if you are in Jamaica buying lottery tickets … certainly a questionable transaction. Another website breach alert for a company you don’t recall doing business with … who knows? After a while, all of the buzzes, dings, alerts start to blur together. Which alerts are real? Which ones are scams? And what happens if you miss something important?

With so much noise going on it’s no surprise that many people are feeling overwhelmed and unsure of what to do next and that’s why scammers have started to take advantage of this new phenomenon known as Alert Fatigue.

Why Alert Fatigue is Dangerous:

– It causes stress and creates opportunities for criminals when consumers potentially ignore real alerts because they just sound like another false alarm.

– It causes clicks on fake alerts that look legitimate, opening the door to old-fashioned fraud.

– It causes a feeling of “there’s no way I can keep up with all of this monitoring.”

Those feelings and actions are exactly what scammers want. The more confused and exhausted you are by alerts, the easier it is for them to sneak through the phishing attacks, fake jury duty scams, or fraudulent credit applications.

The Good News:

Moving from chaos to confidence is easy. You don’t have to face the fatigue alone. At Guard Well Identity Theft Solutions, our mission is to bring clarity, confidence and resolution when all of these identity theft threats strike.

– We help you understand which alerts require action with personalized guidance.

– If your identity is compromised, we don’t just notify you. Our team in Member Services works on your behalf to resolve the fraud completely and restore your identity.

– Instead of drowning in alerts, you gain a trusted partner who knows how to navigate the system and get results. With Guard Well you’re never left guessing.

Here are a few practical tips to stay safer:

Pause before reacting. Never click a link or call a number from an unexpected alert. Verify first through your bank or provider’s official website.

Enable two-factor authentication. Even if your password is stolen, this adds another layer of protection.

Use a password manager system. Strong, unique passwords across accounts reduce the chance that one stolen password will lead to multiple breaches.

Report suspicious alerts. Forward phishing emails or texts to the proper authorities instead of ignoring them. Phishing emails came be forwarded to the Federal Trade Commission at [email protected], the Anti-phishing Working Group at [email protected], and directly to your email provider by utilizing the ‘report phishing’ option. Remember to not click on any links or download attachments before forwarding. Take a screenshot if you need to document it for your records and delete the phishing email or text after reporting.

Guard Well Identity Theft Solutions exists to protect you, your family and your employees from the damages of identity theft. Please don’t hesitate to reach out if you need help or have any questions or concerns. We are available to you 24/7/365 at 888.966.4827 (GUARD) and [email protected].

Guilty of Fraud: The Rise of Jury Duty Scams

Guilty of Fraud: The Rise of Jury Duty Scams

It’s Sunday night after grilling out, a perfect ending to a long, relaxing weekend. You’re listening to the opening of 60 Minutes while prepping for your Monday morning calls. As if right on cue, your phone starts to ring as the leading story sparks your interest. With one eye on the tv and the other on your phone, you don’t give it a second thought to answer the call from a number with your area code.

“I’m sorry to inform you but did you know that you missed jury duty?” the caller apologetically says.

Wait, what?

“There’s a warrant out for your arrest but here’s the good news, I can make it all go away if you pay a fine … immediately.”

Really?

“This happens all the time,” they say. “But you have choices, you can pay the fine via gift card, wire transfer or through our secure website.”

They can’t do that, can they?

Unfortunately, they’re right. It is possible to be in trouble for missing jury duty. A judge can issue a fine, contempt of court charge or even a bench warrant. The penalties vary by state and county but they are always handled formally through mailed notices or in-person proceedings.

Jury duty scams are happening all the time and they’re rising in sophistication. The Federal Trade Commission reported that “some scammers are now telling you to visit a website to enter your personal information — all so they can steal it and your money. They send you to a site that looks legitimate, with an official-sounding URL and government-looking seals (all fake). It’ll ask you to enter your birthdate and Social Security number to ‘look up how much you owe.’ It might ask you to pay up to $10,000 in fines on the site, or send you to a ‘government kiosk’ (no such thing) to pay by cryptocurrency. But every bit of this is a scam.”

Here is how the scammers are getting away with it:

Scammers make it look real by using caller ID spoofing technology so the call that comes in on your cell will have your local area code so you’re more likely to pick it up. In some cases, with a particularly sleuth-y scammer, the number calling says something ominous like ‘County Courthouse’ and it’s the actual phone number of your local court … so, even if you Google it while on the phone with them, it looks legit.

Important to know:

– Your court will never call or text people demanding money for jury duty.

– If the court needs to contact you, they will use the U.S. postal service for that.

Protect yourself:

– If someone contacts you and you do not know them or were expecting a call to verify or receive personal or financial information from you, perk up, wise up and hang up immediately.

Guard Well Identity Theft Solutions exists to protect you, your family and your employees from the damages of identity theft. Please don’t hesitate to reach out if you need help or have any questions or concerns. We are available to you 24/7/365 at 888.966.4827 (GUARD) and [email protected].

 

16 Billion Logins Leaked

16 Billion Logins Leaked

This is by far the biggest leak this year. Late last month, Cybernews uncovered a massive compilation of 30 exposed datasets containing approximately 16 billion login credentials stolen via infostealer malware from individual devices with accounts with companies like Apple, Google and Facebook (along with various US government services). Yes, that was a lot to swallow. Long story short, your logins may be compromised.

This wasn’t just one massive breach though. No, no. This treasure trove is the result of years of corporate leaks, phishing scams and a particularly shady type of malware called “infostealers.” These programs hang out on your devices like digital bedbugs quietly snatching up usernames, passwords, cookies, session tokens and probably your last ounce of sanity.

Here’s how to save yourself from becoming a cautionary tale:

Change. Your. Passwords. If you’re still using ilovecats123! or Password!, let’s take a few minutes and use a unique and strong password for every account. Write this information down and keep it locked in a safe place. I use color-coded post-its in a plastic container kept in my fire-proof safe … I know it’s not the best system but, it’s something.

Turn on two-factor authentication. It is one of the best things you can do to protect your accounts. But, let’s be honest… it’s not without its little quirks. There is the stress of the six-digit code expiring because you had a sneezing fit, paused two seconds too long and didn’t type the code in before it vanished into the digital abyss. Blink and it’s “code expired, try again.” And then there’s the waiting game if the verification code was ONLY sent to your phone and it is lost in the couch, dead or charging in another room. Classic. It happens to the best of us.

– Use an authenticator app or better yet, try passkeys. A passkey is a newer, password-free way to sign in to websites and apps. Instead of remembering passwords or entering a code, you use your face, fingerprint or device PIN to log in securely. Passkeys are practically phishing-proof since they can’t be reused or tricked into logging in somewhere fake and they work across all of the devices you’re signed into.

Update your software. Regularly. That “update now” pop-up is your friend. It’s patching security flaws that hackers love.

Do not click! If an email or text asks you to log in, call them or download anything, run and don’t look back. Phishing is the number one way credentials get stolen. Block the number, report the message and delete it from all of your devices.

Avoid public Wi-Fi like the plague unless you’re using a Virtual Private Network (VPN). Although VPNs hide your IP address (your location and identity online), they don’t make you invisible … just harder to track.

The bottom line is, if you have reused login credentials, you’re at risk. Updating your digital hygiene today is urgent and essential. Guard Well Identity Theft Solutions exists to protect you, your family and your employees from the damages of identity theft. Please don’t hesitate to reach out if you need help or have any questions or concerns. We are available to you 24/7/365 at 888.966.4827 (GUARD) and [email protected].

 

 

Scam Alert: That Apple Care Text is Not Legit

Were you one of the unlucky people who received a text at 11:39 am on Monday, June 26th that said “Apple Care: You were charged $136.77 via Apple Pay at App Store. If this wasn’t done by you, Contact Support immediately at +1(833)-770-3833 to abort.”? …..I was. Definitely not something I needed to see on a busy Monday right before lunch.

Legit or not? This is how to tell. Look at the formatting in the text closely. The phone number format was the first thing that stood out to me. The English also sounded a bit broken with ‘via App Store’ instead of ‘via the App Store.’ Also, I wondered why ‘Contact’ and ‘Support’ both be capitalized not to mention why they would need me to do anything for them.

After doing a quick copy and paste, I asked ChatGPT who quickly told me it was a scam and referenced a link from Apple. It was suggested that I block the number, report it to Apple and delete the message. If ChatGPT isn’t one of your new besties, you could just type “Apple Care Text” in the search bar and the same type of information would pop up.

If you receive a suspicious email or SMS text message that looks like it’s supposed to be from Apple, the company is requesting that you email a picture of it to [email protected]. Apple reiterated that they will not ask for personal information in an e-mail or text. If you ever have a doubt about a text from them, call the legitimate Apple support number (1-800-MY-APPLE).

Guard Well Identity Theft Solutions exists to protect you, your family and your employees from the damages of identity theft. Please don’t hesitate to reach out if you need help or have any questions or concerns. We are available to you 24/7/365 at 888.966.4827 (GUARD) and [email protected].

Guard Well Identity Theft Solutions Receives 2025 Cincinnati Award

Guard Well Identity Theft Solutions Receives 2025 Cincinnati Award

Earlier this month, Guard Well Identity Theft Solutions was selected for the 2025 Cincinnati Award in the Business Services category by the Cincinnati Awards Program.

Established to recognize the best of local businesses in the community, the Cincinnati Awards Program organization works exclusively with local business owners, trade groups, professional associations and other business advertising and marketing groups. The organization’s mission is to recognize the small business community’s contributions to the U.S. economy. Each year, recognition is given to those companies that have shown the ability to use best practices and implemented programs to generate competitive advantages and long-term value.

Founded in June, 2012, Guard Well Identity Theft Solutions provides trusted identity protection and full resolution services with unmatched support and care. “We’re honored to be recognized for the work we do every day to protect what matters most,” said Allan Hilsinger, Founder & CEO. “We also appreciate being spotlighted as a company that enhances the positive image of small business through our service to our Members and community at large,” Hilsinger elaborated.

“We have grown due to our incredibly talented and dedicated team of privacy experts, creators of patented identity theft recovery software, Fortune 500 identity theft specialists, credit experts, marketing, financial and legal professionals, attorneys, employee benefit pros, licensed insurance professionals, business foundation specialists and active law enforcement. This award truly reflects our team’s passion and integrity.”

Various sources of information were gathered and analyzed to choose the winners in each category. The 2025 Cincinnati Award Program focuses on quality, not quantity. Winners are determined based on the information gathered both internally by the committee and data provided by third parties. Read the full news release HERE.

Guard Well Identity Theft Solutions exists to provide you, your family and your employees from the damages of identity theft. If you have any questions or concerns, please contact our Member Services team immediately. We are always available for you 24/7/365 at 888.966.4827 (GUARD).

Your Face – The Truth About Biometric Data Theft

Your Face – The Truth About Biometric Data Theft

It all started with a smile. Byron’s new fitness app promised to tell him his new “biological age” but required a selfie to validate his account. So guess what he did? Snapped it for the app and went about his day. Although he didn’t quite agree with their age calculation later that night, he totally brushed it off and slathered on more skin care product.

A few weeks later, he saw a delivery app charge him for food several states away. Then his bank app asked him to confirm a new device. The kicker was when his pharmacy required him to update his new insurance card before picking up a prescription. He didn’t even have a prescription to pick up. “I better change my passwords,” he told his wife. That didn’t work. Stranger things kept happening. And she kept asking him about it. Annoying.

Even though he was proactive about updating his accounts, the problem was that he couldn’t change his face (well, technically he could have but extreme plastic surgery wasn’t in his five-year plan).

Hackers know you can’t just change the features that make you uniquely you. That data is one-of-a-kind and as permanent as it gets … which is why it is so powerful for authentication and totally devastating when compromised.

Remember that fun little fitness app that quietly stored his facial data? Well, their security wasn’t so great. They got hacked. Unlike that password you can’t quite remember, you can’t swap out your face or your fingerprints for new ones. So, what can you do?

– Make multi-factor authentication your new best friend. It might add an extra 15 seconds to your day, but your bank account’s balance is worth it in the long run.

– When your device tells you, “Software Update Available: Install Now?” don’t blink!

– Don’t automatically opt in. Get your readers out and check the fine print before handing over your face, fingerprints or your eyeballs to an app.

Guard Well Identity Theft Solutions exists to provide you, your family and your employees from the damages of identity theft. If you have any questions or concerns, please contact our Member Services team immediately. We are always available for you 24/7/365 at 888.966.4827 (GUARD).

Smart Home, Dumb Security? The Truth About IoT Devices

Smart Home, Dumb Security? The Truth About IoT Devices

Somewhere between switching your coffee to half-caf and trying to figure out TikTok, you may have dipped a toe or entire foot into the smart home world. Think Ring doorbell, Nest thermostat, Google Home and your smart TV for a start. Apartment or house, size doesn’t really matter. Hackers don’t discriminate against your 850 sq ft new digs or 12,000 sq ft whopping investment money pit … they just want in!

Welcome to the future. Today we can tell your house to turn on the lights, lower the thermostat, play smooth jazz and spy on your pets all without lifting a finger. Yes, these wonderful Internet of Things (IoT) devices are super convenient, but IoTs aren’t always built with strong security in mind. If a device doesn’t have good protection, it can be hacked. Some guy halfway across the globe could use your Wi-Fi to check out your emails and get details on your bank accounts. They could peek in through your security camera, listen (and talk …creepy!) through your baby monitor or just keep it mildly annoying and slow down your internet with junk traffic or turn your home into a sauna.

Maybe your teen gave you an Alexa because they were tired of you yelling, “Hey Google, turn up the volume” at your bluetooth speaker. However you got to the land of smartness, your gadgets might be clever but your security settings may be stuck in 2005. So how do we prevent the midlife crisis your Wi-Fi didn’t ask for?

“Admin” is not a password … it’s an invitation. If your smart speaker, router or security cam is still set to the factory default, you’re officially easier to hack. Choose a password that you need to write down. And I’m not talking about ones that are easy to remember like “ILoveMyCat123.”

Educate yourself on all aspects of smart home technology. Your smart plug doesn’t need your location and microphone access.

– Different devices on a shared network all need different passwords. Huge tip: use your guest Wi-Fi for all of your smart devices.

Don’t buy off-brands with three reviews. Just because ElectroZing sounds like something fun out of The Jetsons, that new toaster oven can wreak havoc on your life.

– If your fridge has Wi-Fi, a touchscreen and your social security number, it might be time to re-evaluate. That almond milk that is getting low may cost you the depletion of your bank account. Just because your new condo comes with one that can connect to the internet doesn’t mean that it has to!

Keep your devices updated. They have trust issues, too.

– If you ever see a message like “Unknown device connected to your network” … immediately take action!

Yeah, smart tech is awesome but if it’s not protected, it can cause more problems than it solves. Be smart about your smart stuff! Guard Well Identity Theft Solutions exists to provide you, your family and your employees from the damages of identity theft. If you have any questions or concerns, please contact our Member Services team immediately. We are always available for you 24/7/365 at 888.966.4827 (GUARD).

 

QR Code Scam Alert: A New Twist on Brushing

QR Code Scam Alert: A New Twist on Brushing

A new scam is making its way into mailboxes, combining brushing scams with QR code fraud. A brushing scam is a deceptive scheme where online sellers send unsolicited packages to random people to boost their rankings and post fake reviews. These packages often contain cheap items such as socks or phone cases. The goal is to make it look like a real purchase was made and reviewed, tricking online marketplaces into improving the seller’s visibility.

Scammers prey on curiousity. If you receive a mysterious gift on your front porch, naturally you’re going to want to know who sent it, right? That gift may look like a free gift, but it oddly doesn’t include any details on who sent it. What it does have is a note inside instructing you to scan a QR code to “find out who sent this gift” or to “scan here to get return instructions.”

Scanning that QR code can lead to serious risks:

– Phishing websites that steal your login credentials, credit card details or other sensitive data.

– Malware downloads that infect your phone, allowing hackers access to your device.

– Identity theft if scammers collect enough of your personal information to do massive damage.

Cybercriminals are constantly finding new ways to exploit technology. If you receive an unsolicited package with a QR code, think before you scan! Avoid interacting with it, and always verify sources before providing any personal information.

Guard Well Identity Theft Solutions exists to provide you, your family and your employees from the damages of identity theft. If you have any questions or concerns, please contact our Member Services team immediately. We are always available for you 24/7/365 at 888.966.4827 (GUARD).

Identity Theft Trends to Watch in 2025

Identity Theft Trends to Watch in 2025

As technology advances at lightening speed, cybercriminals are developing increasingly sophisticated methods to commit identity theft. We are seeing several emerging trends this year posing significant challenges to individuals and organizations. Here are the top five to be aware of:

AI-Driven Cyberattacks – Artificial intelligence (AI) is being used to create synthetic identities by combining real and fabricated information from social media platforms to create fake profiles, open fraudulent accounts and apply for loans. This type of fraud, known as synthetic identity fraud, is projected to generate at least $23 billion in losses in the U.S. alone by 2030. Watch out for fake friend requests or messages that seem a bit ‘off’ or ‘not quite right.’ You can protect yourself by setting your social media accounts to private and limit public personal details. Regularly check for fake accounts impersonating you and make sure to enable account settings with up-to-date contact information so you can regain access if your account is hacked.

Deepfake and Voice Cloning Scams – Advancements in AI have also led to the creation of fake videos and voice cloning enabling scammers to impersonate individuals in very convincing ways. The use of this biometric technology is used in phishing attacks, fraudulent communications and social engineering schemes. Be on the lookout for urgent video or voice calls from anyone pretending to be a close relative or friend or even your local bank teller asking you for a money transfer or to confirm confidential information. Don’t fall for it and make sure that voice authentication is disabled at your financial institutions.

Medical Identity Theft and AI-Driven Insurance Fraud – Healthcare remains one of the most targeted industries for cyberattacks. According to the U.S. Department of Health & Human Services, over 133 million healthcare records were exposed in breaches in 2024. This year we will continue to see the creation of fake patient profiles, which mimic real individuals. We are expecting an increase in deepfake telehealth scams where fraudsters use AI-generated voices and videos to impersonate real patients during telemedicine appointments. And, AI-powered fraud rings are using AI to automate medical fraud, reducing the time and effort needed to process fake claims. AI can do everything from altering medical records to submitting fraudulent claims on a grand scale. Specifically, be on the lookout for incorrect diagnoses or treatments in your records and check bills and insurance claims for services you never received.

QR Code Phishing Attacks – QR codes are everywhere these days: in the grocery store, on the products we buy, in our museums, on posters … anywhere that taking a second to scan will reveal additional content for the viewer. In typical fashion, criminals are taking advantage of the widespread use of QR codes to conduct phishing attacks, malware downloads and unauthorized transactions linked to stolen payment credentials. Watch out for unsolicited packages with QR codes asking you to “verify the sender.” Scammers prey on curiousity and the convenience of QR codes is making it easy for people to scan without thinking twice. If you do receive a suspicious package asking you to scan a QR code, report it immediately to the retailer it came from, the postal service or the Federal Trade Commission.

Quantum Computing Threats – Quantum computing, a revolutionary approach to computation that harnesses the principles of quantum mechanics, isn’t exactly an everyday term in the household yet, but it will be. How is it different from computing we know of today? Your regular computer, like your laptop, desktop or phone, uses tiny switches called bits that can either be on (1) or off (0). These bits are how computers process information, one step at a time, like flipping light switches on and off. A quantum computer is like a super-powered version of that. Instead of bits, it uses qubits (pronounced ‘cue-bits’) which can be on, off or both at the same time. Basically quantum computers can solve problems much faster than regular computers and they pose a significant risk to current encryption methods. The threat is that cybercriminals might steal encrypted sensitive data today planning to decrypt it in the future when quantum computers become powerful enough to do so, which puts the idea of secure transactions, digital wallets and identities as things of the past. Industries at specific risk are expected to be healthcare and finance.

The concepts of not trusting and always verifying will continue to gain traction this year to help prevent losses from these scams. Maintaining good cyber hygiene practices such as updating your security settings, changing your passwords regularly, enabling multi-factor authentication and keeping up with software updates will all be helpful in mitigating these cyber threats. The best defense is think before you scan, click or share! But, with this being Identity Theft Awareness Week, the only thing we do suggest you sharing is this blog to help spread the word.

Guard Well Identity Theft Solutions exists to provide you, your family and your employees from the damages of identity theft. If you have any questions or concerns, please contact our Member Services team immediately. We are always available for you 24/7/365 at 888.966.4827 (GUARD).

 

Cyber Shocks of 2024: Unpacking the Year’s Biggest Security Breaches

Cyber Shocks of 2024: Unpacking the Year’s Biggest Security Breaches

The catastrophic surge in data breaches in 2024 has left virtually no industry untouched. You name it, this year has witnessed it: high-profile corporate hacks, billions of daily phishing emails, ransomware attacks targeting industry giants, endless supply chain compromises, the largest healthcare data breach in history impacting a third of the population of the United States, national election breaches compromising our democracy and the enormous role that Artificial Intelligence (AI) has had by empowering cybercriminals even more.

Here is a breakdown of the top data breaches that rocked the world this year:

National Public Data Breach: In early 2024, National Public Data (NPD), an online background check and fraud prevention service, reported that a malicious actor gained access to their systems in December 2023 and leaked sensitive data starting in April 2024. Bloomberg Law stated that “the breach allegedly exposed 2.9 billion records containing highly sensitive personal data of up to 170 million people in the US, UK, and Canada.” This breach has been described as potentially one of the largest in history, with personal information, including Social Security numbers, full names, mailing addresses, email addresses, phone numbers and family member details, being sold on the Dark Web. For a review of our recommendations and details of the breach, review our blog on the subject HERE.

Snowflake Data Breach: This prominent cloud data platform with 9,800+ global customers, suffered a breach where hackers used stolen passwords to access data from companies like Adobe, AT&T, Honeywell, Mastercard, Pfizer and Ticketmaster. Campaigns have targeted at least 165 organizations associated with Snowflake cloud storage systems. This particular type of crime highlights vulnerabilities in cloud data storage and the critical importance of securing access credentials to prevent unauthorized data access. To read how millions were potentially exposed by a Snowflake breach, click HERE for our blog about Neiman Marcus.

CDK Global Breach: If you tried to buy a car this summer, you might have hit a snag or two. In June 2024, CDK Global, a leading provider of dealer management solutions to the automotive industry, experienced a significant ransomware attack affecting approximately 15,000 auto dealerships. The attack paralyzed dealerships leaving them to go back to pen and paper to complete deals. Read More

Salt Typhoon Attack: A Chinese hacking group known as Salt Typhoon infiltrated U.S. telecommunications networks, enabling them to geolocate millions of Americans and record their phone calls. Politico.com reported that high-profile victims included President-elect Donald Trump and senior Biden administration officials. Details of this breach that targeted AT&T and Verizon are still coming to light. It raises significant national security concerns and highlights vulnerabilities in critical infrastructure, prompting calls for enhanced cybersecurity measures in the telecommunications sector. Read More

Change Healthcare Ransomware Attack: Change Healthcare is a major healthcare technology company that suffered a massive ransomware attack by the ALPHV/BlackCat group, impacting over 100 million people. Hackers broke into one of its subsidiaries and disrupted healthcare providers across the United States for months. The Verge reported that UnitedHealth paid a $22 million ransom to regain access to their systems. Read More

“Mother of All Data Breaches” (MOAB) is an extraordinary aggregation of over 4,000 breaches that took place over several years with data amassed from thousands of companies and platforms. This collection of data breaches involved the exposure of 26 billion records making it the largest consolidated data breach in history affecting millions of individuals across multiple countries. The breach included records from major platforms and services such as Adobe, Canva, Dropbox, LinkedIn, X (formerly Twitter) and Venmo. The records contained usernames, email addresses, passwords and, in some cases, financial information leaving those impacted facing increased risks of identity theft, phishing attacks and financial fraud. The data was sold on the Dark Web and widely distributed among cybercriminal communities. Read More

The breaches of 2024 taught many things:

1) The dangers of reusing passwords across multiple accounts. We suggest that you use strong, unique passwords and change them regularly. Also consider enabling two-factor authentication where possible.

2) The importance of persistent, regular credit and threat monitoring. Keep a close eye on your bank accounts, credit cards and other financial records for any suspicious or unauthorized transactions. We also suggest that you consider setting up alerts to notify you of any unusual activity.

3) The need for companies to continue to reduce the collection and storage of unnecessary data to limit exposure in the event of a breach.

Guard Well Identity Theft Solutions exists to provide you, your family and your employees from the damages of identity theft. Please don’t hesitate to reach out if you need help or have any questions or concerns. We are available for you 24/7/365 at 888.966.4827 (GUARD) and [email protected].

Image courtesy credit: Chris Ried via unsplash.com.