Home | Solutions Blog | Cyber Data Security
Latest "Cyber Data Security" Posts
None of us wants to be part of a scam that allows links to be forwarded as if from a friend, invading their privacy and endangering their sensitive information. It’s not always easy to avoid bad sites but by just being aware of the problem, you can become more adept. The following article is a summary of an original post By Rob Spiegel, E-Commerce Times.
In its on-going effort to mitigate spam activity, Facebook filed a lawsuit against a company that allegedly ran a “likejacking” operation. “We’re hopeful that this kind of pressure will deter large scale spammers and scammers,” said Facebook spokesperson Andrew Noyes. The state of Washington is also applying pressure, having mounted a similar lawsuit against the same company. Both suits were filed citing violation of the CAN-SPAM Act, which prohibits the sending of misleading electronic communications. Facebook and Washington state filed federal lawsuits on Thursday against Adscend Media for “clickjacking,” a form of spamming that fools users into visiting advertising sites and divulging personal information.
Posted in Cyber Data Security, Fraud Detection & Prevention, Identity Theft Prevention, Online Privacy by Identity Theft Speaker John Sileo.
Tags: Clickjacking, data security, Facebook Safety, identity theft expert, Identity Theft Speaker, Information Privacy, John Sileo, Likejacking, Privacy, Social Media Privacy
Carrying multiple personal devices is a pain and, yet, the fear of giving away critical company data is a nightmare.
For most of us, being connected equals being productive. However, this simple equation becomes complex when one has to juggle personal devices with those issued by our employers. Paramount in an employer’s mind is the protection of the company’s critical and confidential business data but they don’t want to alienate employees by being too restrictive on using their personal smartphones and tablets.
Recent research has found that nearly three out of four adults don’t protect their smartphones with security software and these same people often use their devices to access social media and websites that attract cybercrooks. Poorly-secured devices can be easily accessed by hackers who are becoming evermore sophisticated and ferocious.
Posted in Cyber Data Security, Fraud Detection & Prevention, Identity Theft Prevention, Online Privacy by Identity Theft Speaker John Sileo.
Tags: "Identity Theft, Data Breach, data security, identity theft expert, John Sileo, Privacy, Smart Phone Safety, Smartphone Privacy, Smartphone Security, Workplace ID Theft, Workplace Privacy
Holiday travel brings various levels of challenge and stress. Don’t let identity theft risk add to your anxiety.
Here are five tips to help you to avoid becoming a victim while on vacation:
1. Stop your mail and newspaper. Avoid letting un-invited credit invitations sit in your mail box. You can stop your mail by phone or online at usps.com. Also, ask a trusted neighbor to watch for package & parcel deliveries and to hang on to them until you return. If you receive a daily newspaper, put your subscription on hold. A pile of un-retrieved newspapers in your driveway is a “Welcome” sign to thieves.
2. Don’t advertise that you’re on vacation. Make sure if you are going to post vacation updates on your e-mail, on social networking websites, or on your voice mail greeting, that you post generically, no specifics. Put a few lights on timers so that your home doesn’t look unoccupied for the entire time you’re gone. Replace the front porch light bulb.
Posted in Cyber Data Security, Fraud Detection & Prevention, Identity Theft Prevention by Identity Theft Speaker John Sileo.
Tags: data security, Expert, Fraud, Identity, John Sileo, Mobile, Mobile Security, Office, safety, Security, Sileo, Theft, travel, Vacation
The IRS admittedly has little control over protecting your tax returns against identity theft. The problem is too big, the data too widely available, prevention too rarely attended to until it’s already too late.
Your tax returns are the Holy Grail of identity theft because they contain virtually every piece of information a fraudster needs to BECOME you. But you don’t have to be a victim; you simply need to take responsibility for what is rightfully yours – your tax return information and your identity. The changes aren’t difficult, they simply require you read through this document so that you recognize the risks. Once that’s done, you simply avoid the highest-risk behaviors.
Here is a comprehensive list of frauds, scams and high risk tax-time practices.
Top Tips for Tax Time Identity Theft Protection
Posted in Cyber Data Security, Fraud Detection & Prevention, Identity Theft Prevention by Identity Theft Speaker John Sileo.
Tags: "Identity Theft, breach, Data Breach, Fraud, identity theft expert, Identity Theft Prevention, Identity Theft Speaker, John Sileo, Privacy, Tax, tax fraud, Tax Identity Theft, Tax Preparation, Tax Return Theft, taxes, Theft
It’s nerve racking to realize that the IRS increasingly struggles to control taxpayer identity theft. Since 2008, the IRS has identified 470,000 incidents of identity theft affecting more than 390,000 taxpayers. “Victims of tax-related identity theft are the casualties of a system ill-equipped to deal with the growing proficiency and sophistication of today’s tax scam artists” said Sen. Bill Nelson, who chairs the newly formed Subcommittee on Fiscal Responsibility and Economic Growth.
Posted in Cyber Data Security, Fraud Detection & Prevention, Identity Theft Prevention by Identity Theft Speaker John Sileo.
Tags: "Identity Theft, breach, Data Breach, Fraud, id theft, identity theft expert, Identity Theft Prevention, Identity Theft Speaker, John Sileo, Privacy, Tax, tax fraud, Tax Identity Theft, Tax Preparation, Tax Return Theft, taxes, Theft
The post appears like it’s coming from a known friend. It’s enticing (“check out what our old high school friend does for a living now!”), feeds on your curiosity and good nature, begs you to click. A quick peek at the video, a chance to win a FREE iPad or to download a coupon, and presto, you’ve just infected your computer with malware (all the bad stuff that sends your private information to criminals and marketers). Sound like the spam email of days gone by? You’re right – spam has officially moved into the world of social media, and it’s like winning the lottery for cyber thugs.
What is Social Spam?
Nothing more than junk posts on your social media sites luring you to click on links that download malicious software onto your computer or mobile device.
Posted in Cyber Data Security, Identity Theft Prevention, Online Privacy by Identity Theft Speaker John Sileo.
Tags: Cyber, Cyber Expert, data security, Facebook, identity theft expert, John Sileo, Like Jacking, Link Jacking, Online/Social Media Privacy, Privacy, Security, Sileo, social networking, Social Spam, Spam, Speaker, twitter
Is your favorite gadget burning your bottom line?
No, I’m not referring to the unproductive hours you spend on Angry Birds. I’m talking about mobile security.
Why is Mobile Security So Vital?
Think about the most indispensible gadget you use for work – the one without which you cannot survive. I’m taking a calculated guess here, but I bet your list doesn’t include a photocopier, fax or even a desktop computer. Business people have become highly dependent on digital devices that keep them connected, efficient, flexible and independent no matter where they are. In other words, we are addicted to our mobile gadgets: iPhones, Droids, BlackBerrys, iPads, tablets, laptops and the corresponding Wi-Fi connections that link us to the business world.
Posted in Cyber Data Security, Fraud Detection & Prevention, Identity Theft Prevention by Identity Theft Speaker John Sileo.
Tags: Android, cell phone, Cyber Security, Deluxe, Droid, Free Webinar, iPhone, Mobile Office, Mobile Phone, Mobile Safety, Mobile Security, protect, Protect BlackBerry, Protect Droid, Protect iPhone, Secure Android, Secure BlackBerry, Secure Cell, Secure iPad, Secure iPhone, Secure Mobile, tablet, Webinar
- Are iPhones, Droids and BlackBerry mobile phones secure enough to be used for sensitive business?
- What is App Hijacking and how do I keep it from stealing all of my GPS coordinates, contacts, logins and emails?
- Given that laptops account for almost 50% of workplace data theft, how do I protect myself and my company?
- Are Wi-Fi Hot Spots a recipie for data hijacking disaster and what is the alternative?
- How do I protect my personal and professional files that live in the cloud (Gmail, DropBox)?
Free Webinar – Cyber Attack: Data Defense for Your Mobile Office
In the information economy, tools like the iPad, WiFi and smartphones have shifted the competitive landscape in favor of mobile-savvy businesses. But are you in control of your information, or are you being controlled? Learn how to be in control of your critical information while protecting your business’ mobile-digital assets.
Posted in Cyber Data Security, Identity Theft Prevention by Identity Theft Speaker John Sileo.
Tags: Android, cell phone, Deluxe, Droid, Free Webinar, iPhone, Mobile Office, Mobile Phone, Mobile Safety, Mobile Security, protect, Protect BlackBerry, Protect Droid, Protect iPhone, Secure Android, Secure BlackBerry, Secure Cell, Secure iPad, Secure iPhone, Secure Mobile, tablet, Webinar
Let’s say you ordered winter boots for your spouse on Zappos.com (now part of Amazon), which has world-class customer service. You don’t really even shop the competition because someplace in your brain you already trust Zappos to deliver as they always have. Your unquestioned confidence in Zappos is worth a fortune.
And then hackers break in to a server in Kentucky this past weekend and steal private information on 24 million Zappos customers, including (if you are a customer) your name, email address, physical address, phone number, the last four digits of your credit card number and an encrypted version (thank goodness) of your password. Consequently, your junk email folder is overflowing (your email has been illicitly sold to marketing companies), you receive the doom-and-gloom breach notification from Zappos (just like I did), and suddenly, you don’t have quite the same confidence in this best-in-practice business any more. Your shaken confidence in Zappos costs them a fortune. For the foreseeable future, you will pause before using their website again.
Posted in Cyber Data Security, Fraud Detection & Prevention, Identity Theft Prevention by Identity Theft Speaker John Sileo.
Tags: Amazon, breach, data, Expert, Hack, hackers, John Sileo, Privacy, Security, Sileo, Theft, Trust, Zapos, Zappos, Zappos Breach