Posts tagged "Expert"

Talking Surveillance Once Again–Know Your Phone Carrier More Precisely

phone money
image-15539
When you log onto the Verizon Precision Market Insights website, the giant catch phrase that jumps out at you in bold red letters is:

“Know your audience more precisely.

Drive your business more effectively.”

Verizon is pulling no punches when it comes to letting advertisers know that they have valuable data- OUR data- and they’re willing to share it.  For a price of course.  Phone carriers, who see a continued decline in contract subscriber growth and voice calls, are hoping to generate new sources of revenue by selling the data they collect about us.  They already collect information about user location and Web surfing and application use (which informs them about such things as travels, interests and demographics) to adjust their networks to handle traffic better.  Now they have begun to sell this data.

Posted in Cyber Data Security, Identity Theft Prevention, Online Privacy, Uncategorized by Identity Theft Speaker .
Tags: , , , , , , , , , , ,

Snowden chills in Hong Kong as we boil like frogs in a stew of NSA surveillance

snowden-hk-papers,jpg
image-15522
Do you value national security?
Do you want to live free of fear from random terrorist acts like the Boston Marathon bombing? Do you value your privacy? Should you be allowed to act in legal ways without others (namely, the government) digitally eavesdropping on your secrets?

A former data spy is asking us to decide where we stand on the spectrum separating security and privacy. Edward Snowden, 29, a former contractor to the National Security Agency (the guys and gals in charge of wire-tapping phones and internet traffic) and an employee of the CIA, leaked classified documents to reporters about two far-reaching U.S. surveillance programs. Fearing government reprisal, Snowden is hiding in Hong Kong, a country he believes has “a spirited commitment to free speech and the right of political dissent”.

Posted in Cyber Data Security, Online Privacy by Identity Theft Speaker .
Tags: , , , , ,

WWBD? (What Would Bond Do?) Five Steps to Secure Your Business Data

image-6229
I finally got around to watching the latest 007 installment, Skyfall, and it appears even James Bond has entered into the world of Cyber Crime as he tries to protect a computer drive with a list of British agents from falling into the wrong hands.  And like the proverbial victims in a James Bond flick, you and your business data are under assault, even though it may not always be as obvious as getting thrown off a train.  Why?  Because your business data is profitable to would-be thieves. And for many of those thieves, that data is easy to get and the theft can be next to impossible to trace.

Sony PlayStation Network, Citigroup, Lockheed and several others have seen more than 100 million customer records breached, costing billions in recovery costs and reputation damage.  If it can happen to the big boys, it can happen to you.  If you don’t have Bond on your side fighting off the villains, take these steps to take to secure your business data:

Posted in Cyber Data Security, Digital Reputation & Trust, Fraud Detection & Prevention, Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , , , , , , , , , , , , , , , , , , ,

Top Tips for Tax-time Identity Theft Prevention: Part 2

image-11751

Tax Time Identity Theft: Part 1 – Tax Preparers | Part 2 – Protecting Computers | Part 3 – IRS & Tax Scams

Secure your computers and copy machines from hackers.

Last year, more than 80 million Americans filed their tax returns electronically and even more stored tax-related information insecurely on their computers. To prevent electronic identity theft, implement the following security measures:

  • Install anti-virus, anti-spam and anti-spyware software (generally referred to as a Security Suite) configured to download and install automatic updates. Failure to take this most basic and time-tested of steps allows malware attached to malicious emails, social media platforms and rogue websites to penetrate your entire system, giving thieves access to every computer on your network, not just one.
  • Create strong alphanumeric passwords or utilize password protection software to protect the digital keys to your information.
  • Encrypt hard drives or data-sensitive folders to keep out unwanted visitors.

Posted in Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , , , , , , , , ,

Stop Online Tracking Ep. 5: Flush Your Cookies

[youtube http://www.youtube.com/watch?v=rV4RrF0Gc1g?rel=0]

Watch the entire Browser Spies Online Privacy series. To view the entire series, wait until the end of each video and click on the Next Video button in the lower right-hand corner of your screen. As you watch each short video in your browser, make the necessary changes based on each simple video tip on protecting your online identity and privacy.

Browser privacy expert John Sileo and Fox & Friends have teamed up to educate consumers on how your surfing habits are being intercepted, collected and sold as you browse the Web. These tips give you more control over your Internet Privacy in short, easy to implement tips. Privacy exposure, browser tracking and constant data surveillance are a reality of the digital economy. It’s important to defend your data privacy before it’s too late.

Posted in Burning Questions (Video), Online Privacy, Video Tips by Identity Theft Speaker .
Tags: , , , , , , , , ,

How to Stop Email Account Hackers (Fox & Friends)

Posted in Burning Questions (Video), Cyber Data Security, Identity Theft Prevention, Online Privacy, Video Tips by Identity Theft Speaker .
Tags: , , , , , , , , , , ,

Stop Online Tracking Ep. 4: Enable Do Not Track

[youtube http://www.youtube.com/watch?v=NnTQZFPDhH4?rel=0]

Watch the entire Browser Spies Online Privacy series. To view the entire series, wait until the end of each video and click on the Next Video button in the lower right-hand corner of your screen. As you watch each short video in your browser, make the necessary changes based on each simple video tip on protecting your online identity and privacy.

Browser privacy expert John Sileo and Fox & Friends have teamed up to educate consumers on how your browsing patterns are being monitored, shared and sold as you surf the Internet. These tips give you more control over your online security in short, easy to implement phases. Data exposure, surf-tracking and constant browser surveillance are a reality of the digital age. It’s important to defend your information privacy before it’s too late.

Posted in Burning Questions (Video), Online Privacy, Video Tips by Identity Theft Speaker .
Tags: , , , , , , , , ,

Stop Online Tracking Ep. 3: Turn on Private Browsing

[youtube http://www.youtube.com/watch?v=rv4SHrjT77M?rel=0]

Watch the entire Browser Spies Online Privacy series. To view the entire series, wait until the end of each video and click on the Next Video button in the lower right-hand corner of your screen. As you watch each short video in your browser, make the necessary changes based on each simple video tip on protecting your online identity and privacy.

Online surveillance expert John Sileo and Fox & Friends have teamed up to educate viewers on how your data is being tracked, stored and sold as you surf the World Wide Web. These tips give you more control over your online privacy in short, easy to implement steps. Internet privacy, cookie tracking and constant web surveillance are a reality of the information economy. It’s important to defend your privacy before it’s too late.

Posted in Burning Questions (Video), Online Privacy, Video Tips by Identity Theft Speaker .
Tags: , , , , , , , , ,

Fighting Friendly Fraud (Webinar): 5 Insider Theft Secrets to Protect You

image-9083
Do you know what’s behind the masks your employees may wear? A staggering number of businesses falter and even fail because someone on the inside – an employee, vendor or even a partner – steals money, goods, data or intellectual property from the organization. Will yours be one of them? Not if you learn about the warning signs of fraudsters and the weaknesses in your current hiring procedures.

The strongest indicator that your business is at risk? Denial. If you have ever said to yourself, “My people would never do that,” or “were too small to be worth a fraudster’s time”, you are caught in a cycle of self-delusional naiveté. Most inside theft happens at the hands of a “trusted” team member. In fact, insider theft and fraud aren’t generally committed by experienced criminals.

Posted in Fraud Detection & Prevention by Identity Theft Speaker .
Tags: , , , , , , ,