Home | Solutions Blog | Data Breach
Posts tagged "Data Breach"
A few months ago, Google got caught sniffing unencrypted wireless transmissions as its Street View photography vehicles drove around neighborhoods and businesses. It had been “accidentally” listening in on transmissions for more than 3 years – potentially viewing what websites you visit, reading your emails, and browsing the documents you edit and save in the cloud.
Public opinion blames Google, because Google is big and rich and and scarily omnipotent in the world of information domination. It’s fashionable to blame Google. What Google did was, to me, unethical, and they should eliminate both the collection practice and their archive of sniffed data.
Posted in Fraud Detection & Prevention, Identity Theft Prevention by Identity Theft Speaker John Sileo.
Tags: Data Breach, Financial Speaker, Google, John Sileo, Privacy Means Profit, Sniffing, Unencrypted, Wireless
Steve Jobs unveiled Apple’s new iPhone 4 on June 7 in San Francisco. While the new features keep the iPhone at the forefront of technology, they also cause some privacy concerns.
One concern that carries over from previous iPhone models is the Always-on iPhone Apps that track your every move through the GPS navigation system. Back in April, Apple began allowing location-tracking applications to run in the background. So, for example, companies like FourSquare, Yelp, and Facebook can continuously track your location, providing automatic notifications to your friends when you are less than 1/2 mile away from them, if you allow them.
Posted in Fraud Detection & Prevention, Identity Theft Prevention by Identity Theft Speaker John Sileo.
Tags: Apple, Data Breach, identity theft expert, Information Privacy, iphone 4, John Sileo, Privacy, Social Networking Speaker, Steve Jobs
During your fraud training exercises, fostering an attitude of curiosity (or in the corporate world, a culture of curiosity) is the most powerful critical thinking skill in your arsenal of tools to protect sensitive information. Employees who can think critically and ask the right questions regarding data privacy make up the fabric that supports a Culture of Privacy. Interrogation is the art of questioning someone thoroughly and assertively to verify intentions, identities and facts.
Questions: Who’s in Control? Can I Verify? What are my Options? What are the Benefits?
When spies need information, they ask for it. They “socially engineer” or con their victims with a variety of tools.
The primary tool for evaluating risk once your reflexes have been triggered (Hogwash) is to interrogate the person or institution asking for your information. Interrogation is not meant to be about forceful or physical questioning. I define interrogation as clear, aggressive questioning used to establish whom you can trust, how far you can trust them, and with what information.
Posted in Fraud Detection & Prevention, Identity Theft Prevention by Identity Theft Speaker John Sileo.
Tags: Data Breach, Engineering Social, Fraud Training, John Sileo, Privacy Means Profit, social engineering, Training Fraud
The Privacy Reflex
When I am training corporate executives, managers and employees to detect fraud and social engineering (manipulative information-gathering techniques), I take them through what it feels like to be conned. In other words, I actually socially engineer them several times throughout the presentation so that they begin to reflexively sense when more fraud is coming. There is no substitute for experiencing this first hand.
The Trigger—Requests for Identity
Spies are trained to instantly react when anyone asks for information of any kind, whether it is theirs or someone else’s. The trigger, or what causes you to be on high alert, is actually very simple—it is the appearance of your identity in any form (wallet, credit card, tax form, passport, driver’s license, etc.). Anytime someone requests or has access to any of the names, numbers or attributes that make up your identity, or to the paper, plastic, digital or human data where your identity lives, the trigger should trip and sound an alarm in your head.
Posted in Identity Theft Prevention by Identity Theft Speaker John Sileo.
Tags: Data Breach, Hogwash, identity theft expert, Identity Theft Prevention, Identity Theft Speaker, John Sileo, Privacy, social engineering
CSIdentity SAFE
Great employees are hard to find, but without the right employee background screening process, deceitful candidates are even harder to spot. Hiring dishonest employees puts your sensitive and confidential business information at risk and could cost you millions if stolen or damaged.
According to The Ponemon Institute, an independent research foundation, the average cost of data breach to a victim corporation is $6.75 million. In 2008, the lowest reported cost of data breach was $613,000, while the highest was just under $32 million. Given that the average cost per stolen record is $202, one missing laptop with 2,500 customer or employee records on it would come with a data breach recovery bill for a half a million dollars. And that doesn’t factor in loss of stock value, brand damage or customer defection that results from having your breach in the news.
Posted in Product Reviews by Identity Theft Speaker John Sileo.
Tags: background check, background checks, background screening, CSIdentity SAFE, Data Breach, employee background check, employee background checks, human resources, Identity Theft Speaker, identity theft training, SAFE
Laptop theft and mobile data theft (tape backups, iPhones, BlackBerries, USB drives) account for nearly half of the cases of serious corporate data breach and workplace identity theft. Your corporation’s data breach protection will be significantly improved by educating your staff on the following mobile data best practices:
Before you save sensitive data to any mobile device, it is your responsibility to:
- Determine if your organization allows you to remove the data in question from the office in the first place. Are you allowed to save that database, Excel file, Word document, customer list, employee record, intellectual capital, etc. on your laptop, thumb drive or other mobile device?
- Decide if it is absolutely necessary to remove it from the more highly-controlled and secure environment of the office. In many of the major cases of reported data breach, the data stored on the mobile device did not actually need to be there in the first place.
Posted in Identity Theft Prevention by Identity Theft Speaker John Sileo.
Tags: Best Practices, Data Breach, Data Breach Protection, Identity Theft Prevention, Identity Theft Video, Laptop Protection, laptop theft, Workplace ID Theft
Here’s a statistic that’ll get your attention! 285 million records were compromised in 2008 according to a new data breach study from Verizon Business. The report claims that organized crime is responsible for a large increase in the number of breached corporate electronic records.
The report of industries affected by data breach shows that Financial Services was the major gainer in 2008. That industry doubled its percentage of data breach to 30% while Retail is still the most affected industry (barely) at 31%. The shift to data breach in Financial Services will affect all of us more drastically.
Posted in Identity Theft Prevention by Identity Theft Speaker John Sileo.
Tags: Data Breach, Data Breach Speaker, verizon business
Identity theft speaker John Sileo on why identity theft is moving into the workplace.
It feels as if there has been a directional shift in the past year regarding the source of data theft. From the stories I hear after every identity theft speech I deliver, the crime of data theft, identity theft and intellectual property theft are becoming more organized and moving much more into the realm of workplace identity theft and corporate data theft (i.e., it’s happening at work even more than out of our homes). The information being stolen is still often times consumer-based, but it is being compromised more often at the business level.
I think one factor contributing to this shift into the working environment has been the decline in the value of identity information. The average social security number or bank account number is worth far less on the black data market than it was even a year ago. This means that in order to make large sums of money, the thieves need to increase volume.
Posted in Identity Theft Prevention by Identity Theft Speaker John Sileo.
Tags: Data Breach, Workplace ID Theft
Are you one of the 200,000,000+ Americans (almost 66% of the US population) who had their identity stolen from TJ Maxx, Marshalls, BJ’s Wholesale Club, OfficeMax, Boston Market, Barnes & Noble, Sports Authority, Forever 21 or DSW?
If so, you need to know that 11 people, including a Secret Service informant,
Posted in Identity Theft Prevention by Identity Theft Speaker John Sileo.
Tags: breach, Data Breach, Data Breach Speaker, Identity Theft Prevention, Privacy, Sileo, TJMaxx, TJX