Posts tagged "“Data Privacy”"

Data privacy not really a big part of Big Data

Data privacy Big Data

Big Data is an economic juggernaut as well as a ripe opportunity to forfeit your profitable data privacy. Businesses and consumers should consider the potential costs – and what they hope to get in return. 

Not so long ago, the internet was a very different place. Users were advised never to give out their names or addresses, to avoid talking to people they don’t know and to keep all personal identifiers secret. Data privacy was something we were thinking about constantly, especially when it came to sensitive information. Cyberspace was thought first and foremost to be a place filled with strangers where we must tread with caution.

Today, we’ve swung too far in the other direction. We all but depend upon the internet to connect, to make ourselves public, to be seen by as many people as possible all over the world. Entire sites exist to promote us, and the sort of things we used to carefully consider before disclosing, we now sign away without a second thought, completely unaware of what we are putting on display.

Posted in Online Privacy by Identity Theft Speaker .
Tags: , , ,

Google drove by your house and took down your information without you knowing…

It's not just hackers that make a habit of scooping your information. Google has had a notoriously dodgy record when it comes to user internet privacy – and some think it might have finally gone too far. 

At this point, most of us accept that the marketplace is watching us all the time, or else we remain blissfully ignorant. Ads that respond to your browsing history are one thing, though: a company driving through your neighborhood and stealing your data is another. Thirty-eight states brought a case against the internet search giant recently for violating data privacy. Google has been charged a $7 million fine and will supposedly take efforts to stay further from user information. In the meantime, this action should serve as a reminder of how available your passwords, email conversations, and messages are.

Posted in Online Privacy by Identity Theft Speaker .
Tags: , ,

Geolocation Data Lets Thieves Know When To Rob You

Take a moment to think about the last time you “checked in” somewhere on a social media site or were tagged in someone else’s status update. People often do this to share the cool things they see or do on vacation or their day off work.

In that moment you just took, did the term “geolocation data” spring to mind? If not, it should have – along with data security. Geolocation data includes all these tags and check-ins, where you are announcing to the world where you are and what you’re doing. Companies use this information to tailor advertisements and other marketing materials to target specific audiences.

Now, we can debate the ethical practices used by these organizations to gather our personal information until the chickens come home to roost, but there are others out there who clearly have nefarious machinations in mind. That check-in at a concert you’re having a blast at tells the online world that you are not home and now might be a good time to break into your house and steal everything you own.

Posted in Online Privacy by Identity Theft Speaker .
Tags: , ,

7 Steps to Secure Profitable Business Data (Part II)

In the first part of this article series, we discussed why it is so important to protect your business data, including the first two steps in the protection process. Once you have resolved the underlying human issues behind data theft, the remaining five steps will help you begin protecting the technological weaknesses common to many businesses.

  1. Start with the humans.
  2. Immunize against social engineering.

Posted in Burning Questions (Video), Cyber Data Security, Fraud Detection & Prevention, Identity Theft Prevention, Video Tips by Identity Theft Speaker .
Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , ,

7 Steps to Secure Profitable Business Data (Part I)

Everybody wants your data. Why? Because it’s profitable, it’s relatively easy to access and the resulting crime is almost impossible to trace. Take, for example, Sony PlayStation Network, Citigroup, Epsilon, RSA, Lockheed and several other businesses that have watched helplessly in the past months as more than 100 million customer records have been breached, ringing up billions in recovery costs and reputation damage. You have so much to lose.

To scammers, your employees’ Facebook profiles are like a user’s manual about how to manipulate their trust and steal your intellectual property. To competitors, your business is one poorly secured smartphone from handing over the recipe to your secret sauce. And to the data spies sitting near you at Starbucks, you are one unencrypted wireless connection away from wishing you had taken the steps in this two-part article.

Posted in Burning Questions (Video), Cyber Data Security, Fraud Detection & Prevention, Identity Theft Prevention, Online Privacy, Video Tips by Identity Theft Speaker .
Tags: , , , , , , , , , , , , , ,