Latest "Identity Theft Prevention" Posts

Trust and Betrayal Online and Offline

image-3230
By Guest Blogger, Mike Spinney, Senior Privacy Analyst, Ponemon Institute

When site reliability engineer David Barksdale was fired from his job at Google for allegedly using his position to cyberstalk teens with Google Talk accounts, it sent a shiver across the Internet. The idea that a creepy geek working for one of the world’s biggest technology companies could use his combination of technical acumen and privileged access to spy on young citizens seemed to raise the worst kind of privacy fears. More than learning information carelessly or ignorantly posted online, Barksdale’s supposed deeds evoked darker images, the sort from which Chris Hansen has made a comfortable living capturing on video. As part of his job, Barksdale had the keys to the digital kingdom and could pry into the profiles and accounts of individuals who trusted Google and used the company’s services to communicate with others in what they believed to be security and confidentiality.

Posted in Fraud Detection & Prevention, Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , , ,

Sileo’s Fox & Friends Appearance

For media inquiries, please contact Liz on 800.258.8076.

image-3209

Posted in Identity Theft Prevention, Sileo In the News by Identity Theft Speaker .
Tags: , , , ,

Sileo Discusses Facebook Privacy on Fox & Friends Tomorrow

Don’t Miss John on Fox & Friends Tomorrow Morning!

September 15th, 2010   7:15 a.m. ET, 4:15 a.m. PT

Join Fox and Friends hosts Gretchen Carlson, Steve Doocy and Brian Kilmeade as they interview John Sileo about Facebook Privacy, Identity Theft and John’s latest book Privacy Means Profit on Fox’s morning show.

Posted in Identity Theft Prevention, Online Privacy by Identity Theft Speaker .
Tags: , , , , , , , , ,

College-Bound Students are Vulnerable as Identity Theft Targets

image-3081
Students heading to college and young adults living away from their parents’ home for the first time are particularly vulnerable to Identity Theft. In a 2010 survey, Javelin Strategy and Research found that young adults, aged 18-24, take the longest to detect identity theft – 132 days on average – when compared to other age groups.

College-bound students should take the following steps to fight identity theft:

1. School mailboxes can be easily tampered with and are not always safe. Instead of having sensitive (bank, legal, personal) documents sent to your apartment or dorm room, have them sent to a permanent address (your parents’ home or the post office) or sent requiring your signature.

2. Invest in a fire-proof lock box to store all your important documents. This can be vital when you are sharing a living space and can’t control everyone that comes and goes.  You should lock up your Social Security card, passport and bank and credit card statements. Shred any important financial documents that come in the mail and never leave any sensitive mail lying out.

Posted in Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , , , , , ,

Identity Theft Speaker Endorsed by Fort Bragg

I had the privilege of speaking at Fort Bragg this summer! Here is what they had to say:

image-3123

I saw John Sileo’s presentation at a conference recently and I was thoroughly impressed. He really interacted so well with the audience that I actually wanted to bring him to Ft Bragg to help us celebrate our Consumer Awareness Month. It took several months of coordination, but we finally all got it together and John came down and did an excellent presentation to help us out with teaching our community all about identity theft. His presentation was interactive, dynamic, the audience was really pleased and after the presentation they held him there for an hour asking great questions! We were thoroughly pleased with John and we really enjoyed his presentation.

image-3124

Posted in Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , , , , , , ,

Identity Theft for Businesses: Mobile Data Breach

image-3008

Mobile Data Theft

Technology is the focal point of data breach and workplace identity theft because corporations create, transmit, and store so many pieces of information digitally that it becomes a highly attractive target. This book is not intended to address the complex maze that larger organizations face in protecting their technological and digital assets. Rather, the purpose of this book is to begin to familiarize business employees, executives, and vendors with the various security issues facing them.
The task, then, is to develop a capable team (internal and external) to address these issues. In my experience, the following technology-related issues pose the greatest data-loss threats inside organizations:

  • Laptop Theft: According to the Ponemon Institute, 36 percent of reported breaches are due to a lost or stolen laptop.
  • Mobile Data Theft: Thumb drives, CDs, DVDs, tape backups, smart phones
  • Malware: Software that infects corporate systems, allowing criminals inside these networks

Posted in Fraud Detection & Prevention, Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , , , , , , , , , , , , ,

3 Steps To Take When Disposing Of Your Computer

image-3126
By Michael Berg, CreditCards.com

Most people wouldn’t throw out their Social Security card or toss a credit card in the trash. Yet careful souls worldwide have been dumping old computers by the millions, filling landfills with exactly that kind of sensitive information, where aggressive high-tech criminals can readily scoop it up.

According to the latest statistics from the EPA, 205 million computer products were disposed of in 2007, with a paltry 48 million of those recycled. That leaves plenty of identities in the garbage stream just waiting to be poached.

Indeed, many computers are being mined for Social Security numbers, credit card information, bank statements, investment records and various other tidbits that open the door for everything from credit card fraud to full-on identity theft. While exact numbers are difficult to come by, there’s no doubt it’s happening with ever more frequency.

Posted in Fraud Detection & Prevention, Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , , , , ,

Privacy Means Profit: Lock Your Business Docs

The following is an excerpt from John’s latest book Privacy Means Profit. To learn more and to purchase the book, visit our website www.ThinkLikeASpy.com.

Locking up sensitive documents is one of the most important and underutilized ways to protect company data. Of the individuals surveyed by the Ponemon Institute, 56 percent state that over 50 percent of their company’s sensitive or confidential information is contained within paper documents. Since 49 percent of all breaches involved paper, locking up what cannot be eliminated or destroyed is essential. To get you firmly into the business mind-set of thinking like a spy, start with this simple three-step classification process:

1. Classification: Set up a classification scheme. For example, you might have four levels of access: public, internal, classified, and top secret.

  • Public documents are the only documents meant to be seen by outsiders (the public). This might include sales and marketing materials, websites, public filings, and the like.

Posted in Fraud Detection & Prevention, Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , , , , ,

Juror Dismissed Because of Facebook Post

image-3108
From Yahoo.com

MOUNT CLEMENS, Mich. – A judge removed a juror from a trial in suburban Detroit after the young woman wrote on Facebook that the defendant was guilty. The problem? The trial wasn’t over. Hadley Jons, of Warren just north of Detroit, could be found in contempt when she returns to the Macomb County circuit court Thursday.

Jons, 20, was a juror in a case of resisting arrest. On Aug. 11, a day off from the trial and before the prosecution finished its case, she wrote on Facebook that it was “gonna be fun to tell the defendant they’re guilty.”

Read the Complete Post on Yahoo.com

This highlights an emerging issue in the world of information exposure and control. What you post on Facebook (words, videos, photos, status) can be used for other purposes (good and evil). Take a look at some of the ways law enforcement is using social networking profiles to keep tabs on you.

Posted in Identity Theft Prevention, Online Privacy by Identity Theft Speaker .
Tags: , , , ,