Latest "Identity Theft Prevention" Posts

Online Safety: The Truth About Social Media Identity Theft

image-2458
A New Study from the Ponemon Institute Reveals How Online Safety Behavior Leaves Consumers Vulnerable to Identity Theft.

Although more than 80% of study respondents expressed concern about their security while using social media, more than half of these same individuals admitted they do not take any steps to actively protect themselves. This data clearly demonstrates that while people may acknowledge that security is important, many do nothing to protect their information online.

Other key findings from the survey include the following:

  • Approximately 65% of users do not set high privacy or security settings in their social media sites.
  • More than 90% of users do not review a given Website’s privacy policy before engaging in use.
  • Approximately 40% of all respondents share their physical home address through social media applications.

Posted in Identity Theft Prevention, Online Privacy by Identity Theft Speaker .
Tags: , , , , , , , , ,

Facebook Safety Survival Guide

Introducing the Newest Guide to Protect you & your family’s identity:

Facebook Safety
Survival Guide

Includes the

Parents’ Guide to Online Safety

Order your copy Today to get our special introductory pricing of $12.95 or order the Ebook below for only $9.95 !

There is no final word on how to use Facebook safely. Here’s why: social networking and the web change too quickly. The social network you use today is not the same one you will use tomorrow or next month. The privacy settings, functionality, connectability and features are constantly evolving, which means that almost no one has a handle on every aspect of this topic. Those who tell you that they have the final answer are probably selling you something you shouldn’t buy.

Posted in Identity Theft Prevention, Online Privacy by Identity Theft Speaker .
Tags: , , , , , , , , , , , , , , , , ,

5 Business Survival Lessons from Google’s Spying

image-2350
A few months ago, Google got caught sniffing unencrypted wireless transmissions as its Street View photography vehicles drove around neighborhoods and businesses. It had been “accidentally” listening in on transmissions for more than 3 years – potentially viewing what websites you visit, reading your emails, and browsing the documents you edit and save in the cloud.

Public opinion blames Google, because Google is big and rich and and scarily omnipotent in the world of information domination. It’s fashionable to blame Google. What Google did was, to me, unethical, and they should eliminate both the collection practice and their archive of sniffed data.

Posted in Fraud Detection & Prevention, Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , , , , ,

Cyber War on 60 Minutes

60 Minutes’ episode on Cyber War last night was a prime time admission that it’s time for America to start investing in robust information control. I just finished reading an excellent book on this topic by Richard Clarke appropriately labeled Cyber War. If you want further details, I strongly recommend you watch the video to the left and read Mr. Clarke’s eye-opening book on the subject. He speaks from deep experience. Here’s what we already know:

  • Cyber attacks have already happened on American military targets, including the Department of Defense.
  • Cyber thieves, in a single instance, stole enough top secret information from government sources (D.O.D., State Department) to fill the Library of Congress.
  • Cyber forces (military or otherwise) have already taken down power grids (Brazil), radar systems (Middle East) and military functionality (the Republic of Georgia).

image-2363
What happens against military targets today will be happening against corporate targets tomorrow. There should be no excuses left.

Posted in Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , ,

Using the iPhone 4 to Spy on Competitors

image-2334
Steve Jobs unveiled Apple’s new iPhone 4 on June 7 in San Francisco. While the new features keep the iPhone at the forefront of technology, they also cause some privacy concerns.

One concern that carries over from previous iPhone models is the Always-on iPhone Apps that track your every move through the GPS navigation system. Back in April, Apple began allowing location-tracking applications to run in the background.  So, for example, companies like FourSquare, Yelp, and Facebook can continuously track your location, providing automatic notifications  to your friends when you are less than 1/2 mile away from them, if you allow them.

Posted in Fraud Detection & Prevention, Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , , , , , ,

Facebook Announces New Privacy Settings

Last week we announced that Facebook was changing their privacy settings – again! Well the new changes have arrived and should be active on your Facebook the next time you log in. The Instructions that will lead you through the new settings will be posted at the top of your mini-feed:

image-2204

By clicking on the Learn More button you will be directed to the Controlling How You Share Page:

image-2205

This page will contain a long list of descriptions of your privacy settings, what you can control and what is made public and out of your control.  Click Edit your privacy settings to make the appropriate changes to protect your information and what you want to share on Facebook.

image-2206

Posted in Identity Theft Prevention, Online Privacy by Identity Theft Speaker .
Tags: , , , , , ,

Medical Identity Theft Increasing

image-2014
Medical records are one-stop shopping for identity thieves. There is no need to slowly gather bits and pieces of someone’s personal information – it’s all packaged together: Social Security number, name, address, phone number, even payment accounts. Crooks have received everything from medication to a liver transplant using a stolen identity. And that’s only the tip of the iceberg! More than just medical treatment is at stake. Once a thief’s medical information is entered into your records, it’s extremely difficult to get rid of that information. It’s conceivable, for example, that at a later date, you’ll need a Type A blood transfusion but be given the thief’s Type B with dire consequences.

Posted in Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , , , ,

Social Engineering Expert Quoted in CSO Article

Quoted from the original CSO Online story:

Social engineering stories: The sequel

Two more social engineering scenarios demonstrate how hackers still use basic techniques to gain unauthorized access, and what you can do to stop them

By Joan Goodchild, Senior Editor
May 27, 2010 —

John Sileo, an identity theft expert who trains on repelling social engineering, knows from first-hand experience what it’s like to be a victim. Sileo has had his identity stolen—twice. And both instances resulted in catastrophic consequences.

The first crime took place when Sileo’s information was obtained from someone who had gained access to it out of the trash (yes, dumpster diving still works). She bought a house using his financial information and eventually declared bankruptcy.

“That was mild,” said Sileo, who then got hit again when his business partner used his information to embezzle money from clients. Sileo spent several years, and was bankrupt, fighting criminal charges.

Posted in Fraud Detection & Prevention, Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , , , , , ,

FTC Red Flags Rule: Is Your Business Ready?

FTC Red Flags Rule Goes into Effect June 1st, 2010

The FTC  will begin enforcing the Red Flag Rule on June 1st, which states that certain businesses and creditors must help fight identity theft as well as create an identity theft prevention plan. This applies to a very broad class of businesses: those defined as “financial institutions” and those that extend any type of credit to their customers.

In other words, if you don’t receive cash the moment you deliver your product or service to your customer, your business most likely falls under the umbrella of the Red Flags Rule. If you do any billing after the fact (i.e., accounts receivable), you are considered a creditor, and therefore in the group of companies governed by Red Flags.

image-930

This includes:

  • Any Business that Extends Credit
  • All Banks
  • Most Brokerage Firms
  • Credit Card Companies

Posted in Fraud Detection & Prevention, Identity Theft Prevention, Video Tips by Identity Theft Speaker .
Tags: , , , , , , , , , ,