Avatar feed
Responses: 3
SGT Unit Supply Specialist
1
1
0
PO1 William "Chip" Nagel
..."We practice fire drills, tornado drills, robbery drills. We need to think more about practicing cybersecurity incidence response,” commented UC’s cyber security expert Richard Winger, associate professor of political science in the School of Public and International affairs.

Winger says that Cincinnati State did the right thing by reporting the breach to the FBI; whereas other institutions could be reluctant to report for varying reasons.

The University of Cincinnati is among an elite group of universities designated as a Centers of Academic Excellence in Cyber Operations. As such, UC is a partner with U.S. Cyber Command, one of the 11 unified combatant commands of the U.S. Department of Defense."
(1)
Comment
(0)
Avatar small
COL Randall C.
1
1
0
Agree. Simple question to ask yourself - when's the last time a credit report for your teenager was run and when was the last time one for yourself was run?

The hard truth is that adults use their identity in an 'official' way much more often than children do. Between financial, governmental, medical, etc. most will easily do something with their identity at LEAST a dozen or so times a month. Each time it's used is a chance that something untoward with your identity will be detected.

Children on the other hand could go a long time before it's even noticed. For most, they are only used a few times a year (adding the SSN onto your taxes as a dependent, adding them onto your medical insurance, etc), so to an identity thief, the possibility that they can use an identity for a much longer time has great appeal.
(1)
Comment
(0)
Avatar small
SFC David Reid, M.S, PHR, SHRM-CP, DTM
1
1
0
The Devil always works overtime! Educating those children is important, so they know what to do when these interactions occur!
(1)
Comment
(0)
Avatar small

Join nearly 2 million former and current members of the US military, just like you.

close