A Guide to Network Security
In this webinar, our teen tech mentor inspects the various security and privacy features on both Windows and Mac.
In this webinar, our teen tech mentor inspects the various security and privacy features on both Windows and Mac.
In this webinar, our tech mentor goes over how to organize your computer files on both MAC and PC computer systems!
In this webinar, our teen tech mentor provides an overview and comparison of search engines. We discuss their strengths, weaknesses, how each of their algorithms works, and their plug-in features.
Cyber-Seniors Cybersecurity Playlist
In 2022, over 21 million people’s data was exposed in just 11 large healthcare data breaches. Criminals hiding behind screens make a living from stealing – and selling – our personal identifiable information (PII) like names, birthdays, phone numbers, social security and insurance numbers.
Protected health information (PHI) is worth more than 200x the value of stolen credit card information and 1000x the value of a stolen Social Security number (SSN) on the Dark Web. Given the high value and digitized nature of health data storage, medical identity theft is on the rise. It can involve the following:
The cost of medical identity theft can be astronomical, with almost two thirds of victims reporting losses greater than $13,500. But the risk isn’t only financial. In some cases, the legitimate policy holder may receive a misdiagnosis or incorrect treatment plan, as a result of a fraudulent and incorrect medical history being created by a criminal. In the most serious cases, unexpected bills, incorrect diagnosis and loss of benefits could cost victims their lives.
Just last year, a U.S. Centers for Medicare and Medicaid Services subcontractor experienced a data breach involving 254,000 Medicare beneficiaries’ PII. Those potentially impacted were notified and received updated Medicare cards and Beneficiary Identifiers.
Canada’s largest provider of medical diagnostics and testing services, LifeLabs, was also recently breached. Hackers stole 15 million patients’ names, addresses, email, passwords, date of birth, health card numbers and even test results.
In many cases, it can take years for victims of medical identity theft to realize they’ve been targeted, only realizing when visiting the doctor’s office or the hospital. By then, benefit limits may have been reached, with thousands of dollars in fraudulent claims filed.
While all of this can feel overwhelming, the best way to tackle medical identity theft is to be proactive about securing your sensitive information.
Pro tip: Sign up for a family identity theft monitoring plan. Aura can monitor and alert you if someone is trying to scam you online or your family’s sensitive information is being used for suspicious activity. If you are interested in learning more about identity monitoring and protection, visit: aura.com/janblog
For more information about Medicare scams and medical identity theft, visit: https://www.aura.com/learn/what-can-someone-do-with-my-medicare-number
In this webinar, our tech mentor examines some of the ways you can improve the performance of your computer. Whether it’s through upgrading the hardware, or by using cleaning software to optimize storage and reduce wasted memory space.
In this webinar, our teen tech mentor discusses some of the many ways you can backup digital information.
In this webinar, our teen tech mentor goes over some useful keyboard shortcuts. These shortcuts can help make certain functions on a computer much easier to perform.
In this webinar, our teen tech mentor discusses Reddit and how it can provide the opportunity to connect with like-minded individuals or a community of hobbyists!
In this webinar, our teen tech mentor goes over the Amazon Kindle App, how to set it up and how to use it.
In this webinar, our teen tech mentor takes a look at music streaming platforms, Spotify and Apple Music. We discuss the pros and cons of each and which one might be best for you!