Latest Posts

Using an iPad to Your Competitive (and Secure) Advantage

image-5188

If you received an iPad for the holidays (or already have one), you own the most powerful productivity tool invented in the last 20 years – it’s like command central for your life and work. I use the iPad as a step-by-step, centralized way to keep tabs on everything related to my business. Over a cup of coffee, I consume highly-relevant information (no Angry Birds at this point in the day) in a low-stress way simply by clicking through my iPad apps in a consciously prioritized order. I’m not actually taking action on anything at this point, just getting an overview of the appointments, current events, and communications that will make me more effective. That way, when I get down to work,  I know exactly what should get my attention. The routine is always the same, so I never have to remember what I need to do except to open my iPad before I officially start the day. The process takes me about 20 minutes, and by the time I get to work, my brain has sorted most of the information and knows where to start. Here’s how I consciously prioritize my apps (see screen shot):

Posted in Cyber Data Security by Identity Theft Speaker .
Tags: , , , , , , , , , ,

Top Tips to Stop Travel Identity Theft – Sileo on Fox Business

Identity theft increases a great deal when you are on the road. Start protecting yourself with these Top 5 Identity Theft Tips while traveling:
  1. Travel Data Light. If you don’t have to take it with you, increase your safety and leave it at home. This includes checkbooks, debit cards, excess credit cards, Social Security cards and any excess digital gadgets. Simplicity is Security!
  2. Guard Your Devices. Smartphones and tablets are as powerful as laptops. Turn on the auto-lock passcode to keep others out of your information.
  3. Surf Protected. Stop using the free WiFi hotspots in cafes, airports and hotels, as they are constantly sniffed by cyber criminals. Instead, setup tethering between your mobile phone and tablet or laptop so that you are surfing safely.
  4. Privacy Please! Instead of leaving loads of data unprotected in your hotel room (a major source of theft), hang your privacy sign on the door and let house cleaning know that you do not want to be disturbed. Lowering traffic lowers risk.

Posted in Cyber Data Security, Fraud Detection & Prevention, Identity Theft Prevention, Sileo In the News by Identity Theft Speaker .
Tags: , , , , , , , , ,

Cyber Security Expert Sileo in USA Today

image-5131

Cyber security expert John Sileo made the front page of the USA Today digital version, and the Money section of the print edition.

Excerpts from the full USA Today Article, Travelers at High Risk of Identity Theft, Experts Say:

“Data theft goes through the roof on the road,” says Sileo . . .  Two key challenges for travelers involve the use of unsecured wireless networks at hotels, airports and other public venues and the infiltration of smartphones through Bluetooth technology . . .

When booking airline tickets, hotels or other arrangements, use a credit card rather than a debit card, because it decreases your liability. And never announce on social networks that you’re leaving town, if only to keep someone from breaking into your home . . .

Posted in Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , , , ,

Are You Over-Committed?

Yes, you are an over-committed over-achiever.

How do I know with such certainty?

  1. The chances are very high that you are reading this on New Year’s Eve or New Year’s weekend instead of spending time doing all of the life-balance things you constantly promise yourself you will do (maybe in last year’s New Year’s resolution).
  2. You wouldn’t have continued past the title of this article if you weren’t at least a little bit over-committed, trending toward an over-achiever.
  3. Pretty much all of us are over-committed in this 24/7, hype-connected, information-addicted country we inhabit (having lived in other countries, I know that to a large degree, this is an American phenomenon).

Posted in Business Life, Fraud Detection & Prevention by Identity Theft Speaker .
Tags: , , , , , , , , , , ,

Why Facebook is Losing Face (Trust)

Do you have a nagging sense that Facebook isn’t always straight with you about how they share your personal information, photos, posts, friend lists, networks, likes and surfing habits? That they are selling your data in ways that you have never even imagined?

Your instincts are dead on. Facebook has been saying one thing to our faces and doing another behind our backs. Facebook is in pre-IPO mode and has the propaganda machine running overtime like Big Brother at an Animal Farm.

Enter the Federal Trade Commission (FTC). The FTC just released a formal complaint identifying eight counts against Facebook for violating the Federal Trade Commission Act. The FTC confirmed what we’ve always known: Facebook tells us what they think we want to hear, not necessarily the truth. Here are the details of Facebook’s dishonesty:

  • Under the guise of increasing user privacy, Facebook has consistently provided their advertisers with ever-expanding access to sensitive user information, not less.

Posted in Digital Reputation & Trust, Fraud Detection & Prevention, Online Privacy by Identity Theft Speaker .
Tags: , , , , , ,

Don’t Get Cyber-Scrooged on Cyber Monday!

image-5108
Why fight parking-lot-road-rage, UFC-sanctioned-psycho-shoppers and 12 a.m.-midnight-start-times on Black Friday
when you can shop from the comfort of your laptop or iPad while sipping eggnog on the couch (or more likely, from your office desk)? I’m talking about Cyber Monday, of course – the day that online merchants heavily discount their products and generally give free shipping as well. By shopping online, you get most of the same deals and discounts (some of them better) without the breakneck competition common in stores the day after Thanksgiving.

Online shopping during the holidays is a convenient, green, inexpensive way to celebrate the season with less stress. In fact, it’s such an efficient way to buy gifts that cyber shoppers will spend close to $2 Billion this coming Monday. If you are one of them, take a few steps to add peace-of-mind to your peaceful holidays.

Posted in Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , , , , , , , ,

Commonly Overlooked Sources of Identity Theft

You’ve heard it all before – conduct online business through secure Wi-Fi only, watch your incoming mail for erroneous credit invitations, check your statements and your credit reports, and set up strong passwords and alerts, yada yada! But here are a few additional times you’ll want to be vigilant, especially this holiday season!

  1. Car Loans. According to the Financial Crimes Enforcement Network, auto loan identity theft is twice as high as any other form. Most dealerships have you complete paperwork with identifying personal data (name, address, date of birth, phone number) up to and including a loan application, which likely includes your Social Security Number. How is this data handled? Unless you actually purchase the vehicle, and your paperwork becomes part of a permanent file, refuse to complete it. Most dealerships simply toss your paperwork after 30 days if you don’t make a purchase. Their trash receptacle then becomes a pre-qualified source for identity thieves.

Posted in Fraud Detection & Prevention, Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , , , , ,

Facebook Gets Slapped on Wrist by FTC for Lack of Privacy

Can social media and privacy mix? The short answer is no. Social media is social by nature (meaning others are involved) and is media based (meaning that the materials are designed to be easily communicated and shared). When something is essentially named Share with Others, privacy is an afterthought. But that doesn’t mean it should be completely non-existant, or at least transparent – so that we know what we are sharing with others.

The FTC (Federal Trade Commission) is about to hold Facebook to stronger safeguards regarding user privacy, but in the end, it won’t matter very much because they are leaving Facebook with lots of wiggle room.

Rumor has it that Facebook will soon have to acquire users’ consent before making changes to privacy policies that affect current user data. That is a total contrast to what they’ve done in the past, which is to rewrite their privacy policies to be less protective without so much as giving users a whiff of the changes to their privacy.

Posted in Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , , ,

Business Killers: Identity Theft and Data Breach Protection FREE WEBINAR

image-5086
Business Killers: Identity Theft and Data Breach Protection Webinar on November 10

 

On November 10, I will host an interactive webinar sponsored by Deluxe that will explore how small businesses can protect themselves from identity theft. As someone who lost more than $300,000 and my small business to identity theft, this is a topic I care about deeply. In addition to delivering keynote speeches at conferences, I also provide consulting and guidance to organizations like the Federal Trade Commission, Pfizer and the Department of Defense on how to best protect the sensitive data inside of their organizations.

Register now for tomorrow’s webinar.

During this multi-part webinar, I will provide simple, actionable tools and advice to help small businesses protect their data and retain information privacy. I’ll also explain how the information economy has shifted the competitive landscape and increased our data exposure. Attendees will learn the following:

Posted in Cyber Data Security, Digital Reputation & Trust, Fraud Detection & Prevention, Identity Theft Prevention, Online Privacy by Identity Theft Speaker .
Tags: , , , , , , , , , , , , ,