Dishonest Employees are a serious issue and common cause for corporate data breach. In this video, identity theft speaker and data theft expert John Sileo discusses several tools that will help you reduce the chances that you are hiring a data thief into your business. The Top 3 Tips for preventing the hire of dishonest employees are:
1. Insure that reference verification procedures are not just in place, but are actually taking place. The difference between a good policy and actual application is what separates best-in-class privacy cultures from those corporations that end up on the front page of the Wall Street Journal as the poster child for data breach.
2. Perform comprehensive background screening in both the hiring process and after the candidate has become an employee. Believe it or not, employees do commit crimes after they have already taken a job with you. If necessary, utilize a strong background screening service to help you flag dishonest candidates.
Identity theft and social networking speaker John Sileo discusses what you should and should not reveal through Facebook, Twitter, Flickr and other social networking sites while traveling. When you are away from home, identity creeps and other thieves can use this knowledge to take advantage of your home or office.
Be conscious of what you share on social networking sites and always remember that what you post is public, permanent and exploitable!
John Sileo became one of America’s leading Social Networking Speakers & sought after Identity Theft Expert after he lost his business and more than $300,000 to identity theft and data breach. His clients include the Department of Defense, Pfizer and the FDIC. To learn more about having him speak at your next meeting or conference, contact him by email or on 800.258.8076.
According to the Christian Science Monitor and other reputable media sources, the marines have banned social networking sites, including Facebook and Twitter. Currently, the Pentagon is reviewing its entire policy on the use of social networking sites. Can you imagine the enemy discovering troop locations or military tactical data via social networking? Ironic timing, as just a few weeks ago I was delivering an identity theft speech at the Pentagon and recorded a short video about this problem.
The Christian Science Monitor ran the following quote from a memo distributed Tuesday to all Marines:
The very nature of [social networking sites] creates a larger attack and exploitation window, exposes unnecessary information to adversaries and provides an easy conduit for information leakage that puts [operational and communication security] personnel and the [Marine Corps network] at an elevated risk of compromise.
Laptop anti-theft, or protecting your mobile data, is a MUST for corporations and consumers. Almost half of workplace identity theft takes place because of mobile data. And the average value of the data on your laptop can be worth hundreds of thousands of dollars to a corporate spy or experienced identity thief. At the higher end of the scale, the value of the 26 million Veteran identities on a laptop lost over a year ago was estimated to be worth more than $100 million. Those are the types of computer security risks that can make your business unprofitable. But there are solutions.
Broken Window Theory: By removing graffiti and repairing broken windows in crime hot-spots throughout New York City, the NYPD was able to drastically reduce the entire city’s overall crime rate (not just the quantity of graffiti and broken windows), including thefts, burglaries, muggings and murders. In other words, certain actions that we take (e.g., focusing on crime hot-spots rather than on every type of crime) can have a disproportionately positive effect on achieving our goal (e.g., lower crime rates). Business translation: you get a far higher return on investment for certain well-planned tactical strikes than you do for far more expensive strategic initiatives.
My point? In the world of workplace identity theft and corporate data breach, laptop computers are the biggest broken window. Not only do laptops account for a disproportionate amount of data theft, but training the organization to properly protect mobile computers has a radiant effect on all other types of identity protection. Good habits in one area breed good habits in others.
Stop the theft of corporate laptops (or personal laptops with corporate data on them) and you have eliminated approximately 50% of the entire data breach problem at a fraction of the security cost.
Laptop theft generally occurs in transit: airports, hotels, cars, commuter trains, conferences, off-site meetings, vacations, coffee shops, etc. Build laptop anti-theft training into your organizational culture of privacy:
If I’ve learned one thing as an identity theft expert these past few years, it’s this: As bloggers with something to gain (monetarily) from our daily posts, we do everything we can to veil our advertisements deep within the text. Nearly every blog post has some financial gain tied to it: Google AdWords down the right side of the column, gentle product sales, magazine subscriptions, you name it.
That’s the trade-off: bloggers give you content and in return, you agree to watch our commercials. With a few exceptions (truly altruistic and non-commercial blogs, which do exist), anytime someone tells you that they gain nothing financially from their blog, tell them HOGWASH! They are simply hiding behind their content. When you get something of value, you are paying with something of value. When you read the Wall Street Journal, you agree to at least browse their advertising (however passively). When you read my blog about identity theft prevention, you learn that I speak to corporations and organizations around the world about data breach and identity theft.
I am starting to reconsider my opinion that online banking is safer than traditional banking. Primarily because I have been hearing horror stories during some of my identity theft seminars. But now I am seeing it in the mainstream media. Case in point: read this short article in this morning’s USA Today about Hackers Swarming Bank Accounts. I’m open to your opinions, but I feel like the thieves are starting to win. In a YouTube video post I did some time ago about online banking, I suggested that if your computer is well-protected, you are better to bank online.
But lately, it seems like the thieves are a step ahead. What are your thoughts? Have you had any troubles with identity being compromised because of the types of threats discussed in the article?
I just finished giving an identity theft prevention and data privacy speech for Pfizer and one of the questions I received was how to protect your laptop, passports, client files, etc. when you leave them behind in your hotel room. I’ve blogged on this before, but thought that I would post a quick video reminder on protecting your identity in a hotel room. We are at such a greater risk of identity theft when we are traveling that it is worth taking a second look at your habits.
For more tips of this type, please visit my YouTube Identity Theft Expert Video Channel at www.YouTube.com/JohnSileo. It is relatively new, but my office is working diligently to add content every week. Some people like to read, some like to watch, so I will continue to add blogs of both types. Travel wisely this summer.
Get monthly strategies and tips for protecting yourself and your business delivered right to your Inbox. Signup now and you'll immediately receive John's 7 Survival Strategies for Starving Data Spies!