Latest Posts

3 Key Protections for Anthem Breach Victims

Anthem Breach

What’s the Anthem breach?

  • More than 80 million patient records were stolen out of Anthem’s servers.
  • If you are an Anthem, Blue Cross or Blue Shield customer, now or in the past, you are probably affected by the breach.
  • The data stolen included at least Social Security numbers, birthdates, addresses, email addresses and employment information.
  • Not included in the breach (or at least disclosed as being part) were credit card numbers or medical data.

Why is the Anthem breach so serious?

  • When breach includes so much data on each victim, especially your Social Security number, it makes it fairly easy for cyber criminals and identity thieves to create new accounts in your name or takeover existing financial accounts. In other words, they can bank as you, borrow as you and pose as you in order to financially exploit you.

Posted in Cyber Data Security, Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , ,

Sony Cyber Attack: A Case Study in Cyber Leadership Failure

cyber leadership

Cyber Leadership Only Gets Attention AFTER THE ATTACK

I am the first to admit that protecting your company against cyber attacks and the resulting data breach is a daunting task. There are thousands of moving parts connecting your systems, people, customer/employee data and the Internet. Most companies that are breached (e.g., Target, Home Depot, Staples, Chase Bank) take more steps than the average business to protect their customer data. But just taking more steps isn’t always enough; you have to take the right steps.

The recent Sony “Interview” Cyber Attack, in contrast, shows a blatant disregard of basic cyber leadership principals, making it a perfect case study for what you should NOT do as an executive protecting the data on which your business runs. Let’s go back a step. Sony Corporation suffered a crippling cyber security attack (supposedly from North Korea at the hands of a group calling themselves the Guardians of Peace) because of the controversial nature of its movie, The Interview, which depicts the attempted assassination of it’s leader, Kim Jong-un. The consequences of the hack will number in the hundreds, the costs in the hundreds of millions.

Posted in Cyber Data Security, Online Privacy by Identity Theft Speaker .
Tags: , , ,

Cyber Security Expert Sileo on Check Fraud Scams

[youtube http://www.youtube.com/watch?v=mfrdP0tiyw0&rel=0]

A new check fraud scam has reached the Front Range.

It involves a sizable check that arrives in the mail that, once cashed, can make you an accomplice in a money laundering scheme.

I recently appeared on 9 News to address the concern of a suspicious viewer, Martha, who had received such a check in the mail for $2,240.00. It was drawn on the Brown-Forman Employees Credit Union of Louisville, Ky.

The check came with a set of instructions:

No. 1: Have the check cashed at your bank.

No. 2: Pay yourself $300 after cashing the check.

No. 3: Take the rest of the funds to the nearest Western Union and transfer that balance to an address in San Diego.

Posted in Fraud Detection & Prevention by Identity Theft Speaker .
Tags: , , ,

Beware Cyber Security Grinches & Holiday Scams

[youtube http://www.youtube.com/watch?v=gERBwp1o-yE&rel=0]

‘Tis the season to receive holiday scams in your email, on your Facebook page and via text. But you won’t be singing tra la la la la if you click on links that install malware on your computer! More and more of us seem to be conducting our holiday shopping online, and the cyber security Grinches are taking advantage of this new-found holiday convenience. There are several varieties of holiday scams that seem to come around each year.

The first red flag might be the Subject line of the email: “Order Confirmation”, “Acknowledgement of Order”, “Order Status”, “Thanks for Your Order”, “Problem With Your Order”, “Delivery Failure”, “Canceling Your Scheduled Delivery”, etc. It may tell you that an order is ready for you and you just need to click on the link to get the information about how to redeem it. Or, it may play on your fear of not getting a package out before Christmas and say you haven’t provided a correct address – this is a fear-based holiday scam.

Posted in Cyber Data Security, Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , , ,

12 Days to a Safe Christmas!

As part of Checks Unlimited?s Fraud Prevention Education series we are privileged to provide important information to help reduce your risk of RFID and Identity Fraud. For a Limited Time, SAVE 30% OFF RFID Products! Use code: RFID

Checks Unlimited • PO Box 19000 • Colorado Springs, CO 80935-9000

Checks Unlimited values and respects your privacy. Visit www.ChecksUnlimited.com/Privacy.aspx to view our privacy policy. This is an automated message; replies will not be read. To contact Checks Unlimited Customer Service Department, please send an email to general@support.checksunlimited.com

CU5FRAUD14
Sileo.com Checks Unlimited Home Sileo.com Checks Unlimited Home Page Prevent Holiday Identity Theft It?s Beginning to Look a Lot Like Christmas- at the Mall! Stopping Hackers When You?re Shopping on Wi-Fi Holiday Shopping Quiz ? Is Credit or Debit Smarter? Don?t Tell Facebook You Won?t Be Home for the Holidays Don?t Let the Grinch Steal Your Party! It?s a Wonderful Life?Let?s Keep it That Way What to Give the Person Who has Everything (& Wants to Keep it!) I?m getting Nuttin? (But Scams) for Christmas Beware the Phony Santa Claus Comin? to Town  Is that Holiday Email Really a Lump of Coal? Holiday Security Tips All Wrapped up Together

 

Posted in Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , , , ,

10th Day: Beware the Phony Santa Claus Comin’ to Town

Holiday Security Tips: On the tenth day of Christmas, the experts gave to me, 10 trusted charities

Because you tend to be more giving throughout the holidays, scammers target you during this time of year. Whether they are asking for a donation to a charity, promising free iPads, claiming to be a friend in need, or are asking you to click on something outrageous or out of character, don’t fall for it.

Solution: Keep your eyes open for these common holiday scams

  • Phishing. Thieves, or hackers as they are more commonly known, will send emails that look like they are legitimately sent from a charitable organization when in real-life these are fake web sites that are designed to steal credit card information, donations and your identity. To donate, call or visit the website of a reputable charitable organization.

Posted in Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , , , , , , , , , , ,

12th Day: Holiday Security Tips All Wrapped up Together

Would you like to give the people you care about some peace on earth during this holiday season? Take a few minutes to pass on our 12 privacy tips that will help them protect their identities, social media, shopping and celebrating over the coming weeks. The more people that take the steps we’ve outlined in the 12 Days of Christmas, the safer we all become, collectively.

Have a wonderful holiday season, regardless of which tradition you celebrate. Now sing (and click) along with us one more time.  

On the 12th Day of Christmas, the experts gave to me: 12 Happy Holidays,

11 Private Emails,

10 Trusted Charities

9 Protected Packages

8 Scam Detectors

7 Fraud Alerts

6 Safe Celebrations

Fiiiiiiiiiiive Facebook Fixes

4 Pay Solutions

3 Stymied Hackers

2 Shopping Tips

And the Keys to Protect My Privacy

Posted in Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , , , , , , , , , , , , , , , , , , , , , , , ,

11th Day: Is that Holiday Email Really a Lump of Coal?

 

Holiday Security Tips: On the eleventh day of Christmas, the experts gave to me, 11 private emails

During the holidays, we tend to spend more time online, searching for the perfect gift, swapping emails with friends, viewing festive holiday pictures, jokes and so on.  Cybercriminals know this and guess what?  They’re online more, too—looking for ways to lure you into scams to ruin your holidays and steal valuable information.   Here are just a few email scams to watch for:

Holiday e-card scams: Each year, more and more people are going the environmentally friendly and cost-effective route by sending holiday e-cards.  Cybercriminals, looking to install malicious software on your computer, may join in the fun and send you an e-card with an attachment to open.

Solution:  Resist your curiosity to see that adorable elf dance; only open attachments from trusted friends and family. If you don’t recognize the sender, don’t open the e-card.

Posted in Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , , , , , , , , , ,

9th Day: I’m getting Nuttin’ (But Scams) for Christmas

9th day of ChristmasHoliday Security Tips: On the ninth day of Christmas, the experts gave to me, 9 protected packages

Thieves are on the lookout for the delivery of packages, especially around the holidays.  FedEx and UPS packages might sit outside for hours, often in plain view from the street, making a mighty tempting target.  Not only can thieves grab the precious contents inside, but also the shipping labels often contain personal information the thieves love to get their hands on.

 Solution: Ship packages to your work address, or a PO Box or require a signature

If your employer doesn’t mind your receiving packages at work,fed es truck snowman have them shipped there since someone is generally available during the day (when shipments arrive).  If that doesn’t work, consider getting a PO Box at the post office during the holidays.  When all else fails, ask to have your packages shipped with signature required so that they aren’t dropped off unless someone is there to sign.

Posted in Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , , , , , , , ,