Browsing monthly archive

October 2015

Insurance Fraud: What It Is?

A Basic Overview The insurance industry consists of more than 7,000 companies that collect over $1 trillion in premiums each year. The massive size of the industry contributes significantly to the cost of insurance fraud by providing more opportunities and bigger incentives for committing illegal activities. Costs of Fraud The total cost of insurance fraud […]

Insurance Fraud: Broker Sentenced for Stealing

Hundreds of Companies Victimized in Multi-State Scheme FBI announcement about a broker who defrauded trucking companies, has been sentenced to four years in federal prison for insurance fraud. More than 800 commercial trucking companies in nearly a dozen states paid Atlanta-area insurance broker John Paul Kill approximately $3.7 million in premiums from 2013 to mid-2014 to purchase […]

2015 BUSINESS EMAIL: No Longer Safe

This is an announcement with features on how to produce business for fraud based emails made by FBI. This Public Service Announcement (PSA) is an update for the Business E-mail Compromise (BEC) PSA I-012215-PSA posted on www.IC3.gov and includes new information and updated statistical data as of August 2015. DEFINITION Business Email Compromise (BEC) is […]

Cyber Crime: Any of the Internet Are Opportunities

The Internet of Things (IoT) refers to any object or device which connects to the Internet to automatically send and/or receive data. As more businesses and homeowners use web-connected devices to enhance company efficiency or lifestyle conveniences, their connection to the Internet also increases the target space for malicious cyber actors. Similar to other computing […]

National Cyber Security Awareness Month Reviews

October is National Cyber Security Awareness Month, administered by the Department of Homeland Security. This is the perfect time of year for individuals, businesses, and other organizations to reflect on the universe of cyber threats and to do their part to protect their networks, their devices, and their data from those threats. Consider this: Recent […]