Home | Identity Theft Prevention | Page 32
Latest "Identity Theft Prevention" Posts
A New Study from the Ponemon Institute Reveals How Online Safety Behavior Leaves Consumers Vulnerable to Identity Theft.
Although more than 80% of study respondents expressed concern about their security while using social media, more than half of these same individuals admitted they do not take any steps to actively protect themselves. This data clearly demonstrates that while people may acknowledge that security is important, many do nothing to protect their information online.
Other key findings from the survey include the following:
- Approximately 65% of users do not set high privacy or security settings in their social media sites.
- More than 90% of users do not review a given Website’s privacy policy before engaging in use.
- Approximately 40% of all respondents share their physical home address through social media applications.
Posted in Identity Theft Prevention, Online Privacy by Identity Theft Speaker John Sileo.
Tags: Facebook, Facebook Safety, Identity Theft Prevention, Identity Theft Speaker, John Sileo, Online Safety, online victims, Online/Social Media Privacy, parents help, Social Networking Expert
Introducing the Newest Guide to Protect you & your family’s identity:
Facebook Safety
Survival Guide
Includes the
Parents’ Guide to Online Safety
Order your copy Today to get our special introductory pricing of $12.95 or order the Ebook below for only $9.95 !

There is no final word on how to use Facebook safely. Here’s why: social networking and the web change too quickly. The social network you use today is not the same one you will use tomorrow or next month. The privacy settings, functionality, connectability and features are constantly evolving, which means that almost no one has a handle on every aspect of this topic. Those who tell you that they have the final answer are probably selling you something you shouldn’t buy.
Posted in Identity Theft Prevention, Online Privacy by Identity Theft Speaker John Sileo.
Tags: "Identity Theft, facbook, Facebook, facebook privacy, Facebook Safety, Financial Speaker, identity theft expert, Information Privacy, John Sileo, online privacy, Online Safety, parents, parents help, Privacy, social networking, Social Networking Speaker, Speaker, teens
A few months ago, Google got caught sniffing unencrypted wireless transmissions as its Street View photography vehicles drove around neighborhoods and businesses. It had been “accidentally” listening in on transmissions for more than 3 years – potentially viewing what websites you visit, reading your emails, and browsing the documents you edit and save in the cloud.
Public opinion blames Google, because Google is big and rich and and scarily omnipotent in the world of information domination. It’s fashionable to blame Google. What Google did was, to me, unethical, and they should eliminate both the collection practice and their archive of sniffed data.
Posted in Fraud Detection & Prevention, Identity Theft Prevention by Identity Theft Speaker John Sileo.
Tags: Data Breach, Financial Speaker, Google, John Sileo, Privacy Means Profit, Sniffing, Unencrypted, Wireless
60 Minutes’ episode on Cyber War last night was a prime time admission that it’s time for America to start investing in robust information control. I just finished reading an excellent book on this topic by Richard Clarke appropriately labeled Cyber War. If you want further details, I strongly recommend you watch the video to the left and read Mr. Clarke’s eye-opening book on the subject. He speaks from deep experience. Here’s what we already know:
- Cyber attacks have already happened on American military targets, including the Department of Defense.
- Cyber thieves, in a single instance, stole enough top secret information from government sources (D.O.D., State Department) to fill the Library of Congress.
- Cyber forces (military or otherwise) have already taken down power grids (Brazil), radar systems (Middle East) and military functionality (the Republic of Georgia).
What happens against military targets today will be happening against corporate targets tomorrow. There should be no excuses left.
Posted in Identity Theft Prevention by Identity Theft Speaker John Sileo.
Tags: 60 Minutes, Cyber War, Cyber War Expert, Data War, Speaker
Steve Jobs unveiled Apple’s new iPhone 4 on June 7 in San Francisco. While the new features keep the iPhone at the forefront of technology, they also cause some privacy concerns.
One concern that carries over from previous iPhone models is the Always-on iPhone Apps that track your every move through the GPS navigation system. Back in April, Apple began allowing location-tracking applications to run in the background. So, for example, companies like FourSquare, Yelp, and Facebook can continuously track your location, providing automatic notifications to your friends when you are less than 1/2 mile away from them, if you allow them.
Posted in Fraud Detection & Prevention, Identity Theft Prevention by Identity Theft Speaker John Sileo.
Tags: Apple, Data Breach, identity theft expert, Information Privacy, iphone 4, John Sileo, Privacy, Social Networking Speaker, Steve Jobs
Last week we announced that Facebook was changing their privacy settings – again! Well the new changes have arrived and should be active on your Facebook the next time you log in. The Instructions that will lead you through the new settings will be posted at the top of your mini-feed:
By clicking on the Learn More button you will be directed to the Controlling How You Share Page:
This page will contain a long list of descriptions of your privacy settings, what you can control and what is made public and out of your control. Click Edit your privacy settings to make the appropriate changes to protect your information and what you want to share on Facebook.
Posted in Identity Theft Prevention, Online Privacy by Identity Theft Speaker John Sileo.
Tags: Facebook, Facebook Privacy Settings, identity theft expert, John Sileo, Privacy, Social Networking Expert, Speaker
Medical records are one-stop shopping for identity thieves. There is no need to slowly gather bits and pieces of someone’s personal information – it’s all packaged together: Social Security number, name, address, phone number, even payment accounts. Crooks have received everything from medication to a liver transplant using a stolen identity. And that’s only the tip of the iceberg! More than just medical treatment is at stake. Once a thief’s medical information is entered into your records, it’s extremely difficult to get rid of that information. It’s conceivable, for example, that at a later date, you’ll need a Type A blood transfusion but be given the thief’s Type B with dire consequences.
Posted in Identity Theft Prevention by Identity Theft Speaker John Sileo.
Tags: Fraud, identity theft expert, John Sileo, Larry Ponemon, medical identity theft, Privacy, Social Engineering Speaker
Quoted from the original CSO Online story:
Social engineering stories: The sequel
Two more social engineering scenarios demonstrate how hackers still use basic techniques to gain unauthorized access, and what you can do to stop them
By Joan Goodchild, Senior Editor
May 27, 2010 —
John Sileo, an identity theft expert who trains on repelling social engineering, knows from first-hand experience what it’s like to be a victim. Sileo has had his identity stolen—twice. And both instances resulted in catastrophic consequences.
The first crime took place when Sileo’s information was obtained from someone who had gained access to it out of the trash (yes, dumpster diving still works). She bought a house using his financial information and eventually declared bankruptcy.
“That was mild,” said Sileo, who then got hit again when his business partner used his information to embezzle money from clients. Sileo spent several years, and was bankrupt, fighting criminal charges.
Posted in Fraud Detection & Prevention, Identity Theft Prevention by Identity Theft Speaker John Sileo.
Tags: CSO Online, Fraud, Fraud Training, Fraud Training Expert, Fraud Workshops, John Sileo, Scams, social engineering, social engineering expert
FTC Red Flags Rule Goes into Effect June 1st, 2010
The FTC will begin enforcing the Red Flag Rule on June 1st, which states that certain businesses and creditors must help fight identity theft as well as create an identity theft prevention plan. This applies to a very broad class of businesses: those defined as “financial institutions” and those that extend any type of credit to their customers.
In other words, if you don’t receive cash the moment you deliver your product or service to your customer, your business most likely falls under the umbrella of the Red Flags Rule. If you do any billing after the fact (i.e., accounts receivable), you are considered a creditor, and therefore in the group of companies governed by Red Flags.
This includes:
- Any Business that Extends Credit
- All Banks
- Most Brokerage Firms
- Credit Card Companies
Posted in Fraud Detection & Prevention, Identity Theft Prevention, Video Tips by Identity Theft Speaker John Sileo.
Tags: Boot Camp, Business Identity Theft, Business Survival, Compliance, FTC, Identity Theft Prevention, John Sileo, Privacy Survival, Red Flag, Red Flags, Red Flags Rule