Posts tagged "Expert"

Will Facebook Make Privacy Policy Understandable?

image-4410
Partial Reprint from CNET.com

Facebook announced this week that it’s seeking user comment on a proposed redesign of its privacy policy that’s meant to make the policy easier to understand while bringing the world of legalese-smothered documents into the widget-filled realm of the 21st century.

In a post to Facebook’s site governance section, the company’s privacy team offers a look at its “first attempt” to re-organize, rewrite, and add interactivity to the current policy, which is essentially your standard mass of small black text.

Among other potentially interesting re-imaginings, the proposed redesign features an interactive tool intended to demonstrate how profile data is put to use in serving advertisements (click “Personalized ads” and scroll down to “Try this tool”). The tool puts Facebook members into the shoes of someone creating and targeting an ad. It’s not clear if users would deem it an educational aid or a nuisance in practice, but that seems to be part of why the potential redesign is being put to public scrutiny in this way.

Posted in Cyber Data Security, Identity Theft Prevention, Online Privacy by Identity Theft Speaker .
Tags: , , , , , ,

Reputation Gets You What You Want

Reputation Gets You What You WantFor six years I have done almost nothing professionally but study and speak on phenomenons that drive companies out of business or otherwise destroy their reputation. In the process, I have discovered what I consider to be an under-recognized and highly powerful maxim that remains relatively untapped both by people (especially leaders), and by businesses. We talk about it, but we rarely take an active role in improving it.

Reputation gets you what you want.

I know this because I have seen countless people’s reputation destroyed by identity theft (including mine when I was thought to be a criminal) and hundreds of businesses’ reputations wrecked because of data breach, social networking over-exposure or reputation hijacking. I know this because I’ve worked as a reputation management partner to companies that aggressively manage what the world thinks of them from an offensive perspective – they cultivate it long in advance of any attack.

Posted in Digital Reputation & Trust, Fraud Detection & Prevention by Identity Theft Speaker .
Tags: , , , , , , ,

Online Privacy Needs A Federal Office

image-3919
According to a recent New York Times article, the government may be creating a department solely dedicated to strenghthening privacy policies within the United States and other countries. A recent report details why such a force is necessary. Although this new office would lack enforcement authority, they would work directly with the administration and necessary agencies to attack and solve privacy issues.

“America needs a robust privacy framework that preserves consumer trust in the evolving Internet economy while ensuring the Web remains a platform for innovation, jobs and economic growth,” the Secretary of the Commerce, Gary F. Locke, said in a statement. “Self-regulation without stronger enforcement is not enough. Consumers must trust the Internet in order for businesses to succeed online.”

The policy task force already suggested we make visible exactly what information is collected online through a “Privacy Bill of Rights.” Companies that collect this information will then have increased accountability and limits on what they can do with information collected.

Posted in Cyber Data Security, Fraud Detection & Prevention, Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , , , , , , , , , ,

Information Security Speaker: 5 Information Espionage Hotspots Threatening Businesses

You and your business are worth a lot of money, whether your bank accounts show it or not. The goldmine lies in your data, and everyone wants it. Competitors want to hire the employee you just fired for the thumb drive full of confidential files they smuggled out. Data thieves salivate over your Facebook profile, which provides as a “how to” guide for exploiting your trust. Cyber criminals are digitally sniffing the wireless connection you use at Starbucks to make bank transfers and send “confidential” emails.

Every business is under assault by forces that want access to your valuable data: identity records, customer databases, employee files, intellectual property, and ultimately, your net worth. Research is screaming at us—more than 80% of businesses surveyed have already experienced at least one breach (average recovery cost: $6.75 million) and have no idea of how to stop a repeat performance. These are clear, profit-driven reasons to care about who controls your data.

Posted in Burning Questions (Video), Fraud Detection & Prevention, Identity Theft Prevention, Video Tips by Identity Theft Speaker .
Tags: , , , , , , , , , , , , , , ,

Fraud Training: Bored to Tears Yet?

Businesses often make fraud training boring! And that’s bad for their bottom line, because no one ends up remembering anything about the subject.

Too often, fraud and social engineering workshops cover just the concepts that define fraud rather than the feelings that signal it’s happening. The key to training your executives, employees and even customers on fraud is to let them experience what it feels like to be conned. In other words, they need to actually be socially engineered (manipulated into giving away their own private information) several times throughout the training so that they begin to reflexively sense fraud as it is happening. Like learning to throw a ball, there is no substitute for doing it for yourself. Fraud detection is similar; it takes actually doing it (or having it done to you) to fully understand the warning signs. Anything less will leave your audience yawning and uneducated.

Posted in Fraud Detection & Prevention, Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , , , , ,

Is Sarah Palin Safe? No. Identity Theft and Government Officals

Sarah PalinYou’ve probably seen in the news that a hacker gained access into Sarah Palin’s Yahoo.com email account. The hacker used a simple scheme and basic social engineering tools (research on Google and Wikipedia, common-sense guessing) to reset the password on the account and assume ownership of her email. [For a full account of how a professor, Herbert H. Thompson, used these tools to steal a friends identity (with their permission), visit his recent and extremely interesting article, How I Stole Someone’s Identity and the companion radio interview.]

In addition to denying Governor Palin access to her own account, the hacker had full control to:

  • Read every saved and current email in her account (hopefully she never sent her Social Security Number, passwords or account numbers via email, not to mention correspondence pertaining to her role as candidate for Vice President of the U.S.)
  • Steal the email addresses and any other sensitive information stored in her contacts (John McCain might want to change his email address)
  • Send out emails as if the hacker were Sarah Palin, or worse yet, send out official emails as Alaskan Governor, Sarah Palin

The potential for abuse is mind boggling. Sarah Palin should take immediate steps to protect her stolen identity and to secure her future privacy.  Here are a sampling of the steps I would recommend:

Posted in Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , , , , , ,

Identity Theft Expert?

Golf Expert

Are you an expert at something?

In the world of professional speaking, you are expected to be an expert in your topic (to be taken seriously and to make a living). So speakers begin calling themselves experts, sometimes before they deserve the title. It’s like giving yourself a nickname – it feels a bit self-congratulatory.

I’m no exception.

Posted in Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , ,