7 Steps to Secure Profitable Business Data (Part I)

Everybody wants your data. Why? Because it’s profitable, it’s relatively easy to access and the resulting crime is almost impossible to trace. Take, for example, Sony PlayStation Network, Citigroup, Epsilon, RSA, Lockheed and several other businesses that have watched [...]

Continue Reading

Fun Fraud Detection Training

Businesses often make social engineering (or fraud) training boring! And that’s bad for your bottom line, because no one ends up remembering how to protect your organization against threats like data theft, corporate espionage or social networking exposure. Too often, [...]

Continue Reading

Are You Begging to Get Fired?

We've all done it before - left the table to get a coffee refill or go to the bathroom and left our laptop, iPad, smartphone or purse sitting on the table. We justify it by telling ourselves that we are in a friendly place and will only be gone a second. Our tendency [...]

Continue Reading



Facebook Can Use Your Photos in Their Ads Without Permission

Did you know that Facebook can use photos you post on the site in advertisements targeted on the right (advertising) side of your contact's profile? Unless you customize your privacy settings, Facebook can share just about anything you post with just about everyon [...]

Continue Reading

Identity Theft of Social Security Numbers Using Facebook

[...]

Continue Reading

Google Maps Street View: Removing Your House

According to Google CEO Eric Schmidt, if you are looking for more privacy, then you should move. His callous remark came during a discussion on Google Maps Street View cars, which were found to be illegally collecting e-mails, passwords and surfing habits while photograph [...]

Continue Reading



Information Security Speaker: 5 Information Espionage Hotspots Threatening Businesses

You and your business are worth a lot of money, whether your bank accounts show it or not. The goldmine lies in your data, and everyone wants it. Competitors want to hire the employee you just fired for the thumb drive full of confidential files they smuggled out. Data thi [...]

Continue Reading

Identity Theft Threat from Copiers

Your business-class photocopier is essentially a computer that can be hacked. It has a hard drive and saves an image of everything you copy. Customer data, invoices, employee records, intellectual capital, personal identity. This is not new information - we've been writing [...]

Continue Reading

Dishonest Employees: How to Avoid Hiring Them

Dishonest Employees are a serious issue and common cause for corporate data breach. In this video, identity theft speaker and data theft expert John Sileo discusses several tools that will help you reduce the chances that you are hiring a data thief into your business. The [...]

Continue Reading