Home | Solutions Blog | Control
Posts tagged "Control"
Just for a minute, put yourself in the shoes of Anthony Weiner. You’ve done something exceptionally stupid, whether it’s sending sexually explicit photos of yourself to strangers you don’t even know, or another unrelated mistake. To compound the stupidity, you involve social networking – you Facebook or tweet or YouTube the act – or even simply email details of what you’ve done.
Everyone of us makes impulsively bad decisions (probably not as bad as Weiner, but bad nonetheless). Prior to the internet, you at least had a chance to recover from your past transgressions, as there wasn’t a readily accessible public record of the act unless you happened to be caught on tape (think Nixon, Rodney King, etc.). But now that pretty much every human carries either a camera or video recorder with them at all times (mobile phones), can communicate instantly with a massive audience (Facebook, Twitter, SMS, blogs), and have access to more information than exists in the Library of Congress just by pulling up Google, the equation of how you control sensitive information about yourself has changed radically. Every stranger (and even friend) is like a full service news station with video, distribution and commentary, just waiting to report on your missteps.
Posted in Digital Reputation & Trust, Fraud Detection & Prevention by Identity Theft Speaker John Sileo.
Tags: Anthony, Congressman, Control, Exposure, information, Information Leadership, John Sileo, Jon Stewart, Privacy, professional speaker, Reputation & Trust, Reputation Expert, twitter, Weiner, Weiner Gate, Weinergate
The Egyptian government has reportedly cut all access to the internet, extending their earlier restrictions on Twitter, Facebook, BlackBerry service and other forms of mass communication. The ban is likely to be in response to the use of social networking sites to organize pro-democracy, anit-Mubarak demonstrations in Egypt and other countries.
Internet access issues in Egypt have coincided with mounting demonstrations in the country, many of which were organized via social-networking sites like Facebook and Twitter. Thousands poured into the streets of Cairo starting Tuesday to protest failing economic policies, government corruption, and to call for an end of the nearly 30-year rule of President Hosni Mubarak. -PC Magazine
Pro-gun lobbyists worry about enforced gun registration because it could possibly give the government a way to confiscate all firearms. That’s child’s play compared to their ability to shut down access to the critical tools we use every day: the internet, email, Facebook, Google, text, cell phones – the information arsenal that we all tend to take for granted. Egypt understand the importance.
Posted in Fraud Detection & Prevention, Online Privacy by Identity Theft Speaker John Sileo.
Tags: Control, Egypt, information, Internet, Mubarak, Obama, Sileo
If you need a world class example of the adage that INFORMATION IS POWER, look at the recent kerfuffle WikiLeaks has caused. Since threatening to release more than 250,000 U.S. diplomatic cables, WikeLeaks has experience a rash of cyber problems (none attributable to the U.S. Government, but it does make you wonder…):
“The site’s efforts to publish 250,000 diplomatic cables has been hampered by denial-of-service attacks, ejection from its server host and cancellation of its name by its American domain name provider. Each time WikiLeaks has worked out other arrangements to bring the site back online.” – By Charley Keyes and Laurie Ure, CNN
Posted in Cyber Data Security, Fraud Detection & Prevention, Identity Theft Prevention by Identity Theft Speaker John Sileo.
Tags: American Diplomats, Cables, Clinton, Control, Diplomacy, information, Iraq War Logs, John Sileo, WikiLeaks
I became a professional identity theft speaker because my business partner used my identity (and my business’s impeccable 40-year reputation) to embezzle more than a quarter million dollars from our best, most trusting customers. Thanks to drawn-out criminal trials and a seriously impaired lack of attention to my business, I suddenly found myself without a profession.
So I wrote a book about my mistakes, and with a little luck, it led to a speaking career based in first-hand experiences with data theft. The formula works – sharing my failure to protect sensitive information and losing just about everything as a result – my wealth, my business, my job and nearly my family – is a powerful motivator for audiences, both as individuals and professionals. People only understand and act upon the corrosive nature of this crime when they can taste it’s bitterness for themselves. My goal has always been to provide a safe and effective appetizer of data theft that convinces audiences to feed on prevention rather than recovery.
Posted in Identity Theft Prevention, Online Privacy by Identity Theft Speaker John Sileo.
Tags: Control, data, Identity, information, Information Survival, John Sileo, Protection, Security, Speaker