Posts tagged "Identity Theft Speaker"

Dishonest Employees: How to Avoid Hiring Them

Dishonest Employees are a serious issue and common cause for corporate data breach. In this video, identity theft speaker and data theft expert John Sileo discusses several tools that will help you reduce the chances that you are hiring a data thief into your business. The Top 3 Tips for preventing the hire of dishonest employees are:

1. Insure that reference verification procedures are not just in place, but are actually taking place. The difference between a good policy and actual application is what separates best-in-class privacy cultures from those corporations that end up on the front page of the Wall Street Journal as the poster child for data breach.

2. Perform comprehensive background screening in both the hiring process and after the candidate has become an employee. Believe it or not, employees do commit crimes after they have already taken a job with you. If necessary, utilize a strong background screening service to help you flag dishonest candidates.

Posted in Burning Questions (Video), Fraud Detection & Prevention, Identity Theft Prevention, Video Tips by Identity Theft Speaker .
Tags: , , , ,

Identity Theft of H&R Block Customers | Sileo Group

H&R Block identity theft

The number of identity theft victims rose 22% last year! Although it’s important to always protect your identity, tax season makes people more vulnerable to this crime and you should be especially cautious.

H&R Block identity Theft

A recent article in the New York Times uncovers an H&R Block office in the Bronx that was infiltrated by identity thieves (apparently it was not the only office affected).

Last year, Kevin Johns, a construction worker in the Bronx, did his taxes at the H&R Block store on Riverdale Avenue that he had used for the past 20 years or so. The next day, though, he got a call from the tax preparer: his return was rejected because he had already filed. Or at least, someone had filed in his name. That someone helped himself or herself to a $8,499 refund.

Posted in Fraud Detection & Prevention, Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , , , ,

Identity Theft Speaker Ed Helms

Just in case you’ve been spending a lot of time with the less comical sides of identity theft (I know I have), here is a video to lighten it up. Thanks to everyone at The Daily Show with Jon Stewart!

Posted in Identity Theft Prevention by Identity Theft Speaker .
Tags: , , ,

Top 5 Reasons Corporations Educate Employees on Identity Theft

image-8352
Why do corporations care (and spend money) to educate employees about protecting personal identity?

After all,  most businesses are profit-driven and only have time and resources to concentrate on initiatives that affect their bottom line. In effect, that is the answer to the question…

Posted in Fraud Detection & Prevention, Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , ,

Identity Theft Speaker on The Bill Handel Radio Show Today!

John Sileo

Don’t Miss John  as he discusses

Identity Theft and Identity Theft

Prevention on The Bill Handel Show!


Today, February 4, 2010 at 1PM Pacific Time.

Click HERE to Listen Live!

John Sileo became America’s leading Identity Theft Speaker & Expert after he lost his business and more than $300,000 to identity theft and data breach. His clients include the Department of Defense, Pfizer and the FDIC. To learn more about having him speak at your next meeting or conference, contact him by email or on 800.258.8076

Posted in Identity Theft Prevention by Identity Theft Speaker .
Tags: , , ,

Practice the Privacy Reflex

Picture 8

The Privacy Reflex
When I am training corporate executives, managers and employees to detect fraud and social engineering (manipulative information-gathering techniques), I take them through what it feels like to be conned. In other words, I actually socially engineer them several times throughout the presentation so that they begin to reflexively sense when more fraud is coming. There is no substitute for experiencing this first hand.

The Trigger—Requests for Identity
Spies are trained to instantly react when anyone asks for information of any kind, whether it is theirs or someone else’s. The trigger, or what causes you to be on high alert, is actually very simple—it is the appearance of your identity in any form (wallet, credit card, tax form, passport, driver’s license, etc.). Anytime someone requests or has access to any of the names, numbers or attributes that make up your identity, or to the paper, plastic, digital or human data where your identity lives, the trigger should trip and sound an alarm in your head.

Posted in Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , , , , ,

Facebook Exposes White House Party Crashers

Picture 6Tareq and Michaele Salahi — Washington socialites are not just known for their possible roles in the upcoming “The Real Housewives of Washington,” but for being seen arriving at the White House State Dinner. The problem was that they weren’t on the guest list, but managed to work their way inside what is supposed to be the most secure party.

The couple took to Facebook to document their party-crashing, and on Wednesday, Michaele Salahi’s Facebook page included photos of the couple at the dinner. The Salahis weren’t exposed until journalists caught sight of pictures showing the Salahis posing with President Barack Obama, Vice President Joe Biden and others. In the aftermath, the security breach looked more like a publicity stunt than a security threat.  The Secret Service admitted that they did not verify at each checkpoint that this couple was on the invitation list. In other words, they missed the second cardinal rule of security, Verify.

Posted in Online Privacy by Identity Theft Speaker .
Tags: , , , , , , , ,

Protect Yourself Against Mail Fraud

Picture 5The reality is that unsecured, curbside mailboxes are prime targets for people who are intent on committing the crime of identity theft. Although I would suggest to stop using the mail to send and receive identity documents, this is not always possible. Therefore, here are alternative suggestions:

Posted in Fraud Detection & Prevention, Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , , , ,

Privacy, Social Media, Technology and the Law

Picture 6Can the Law keep up with technology?

CNN has a new article that addresses this growing issue. Cases are continuing to pop up based on an offense or crime committed in cyberspace. Five years ago suing someone for allegedly slamming you on Twitter would have been unimaginable.  But just recently an apartment tenant is being sued for $50,000 in damages after she took to her twitter to complain about her living situation to another user.
Many legal experts are watching these cases carefully because they will lay the groundwork for these unaddressed areas of the law. They said that in this growing age of technology it takes almost 5 years to play catch up with current American law. Lawmakers are unable to predict the next big wave in technology and the legal issues that will follow. With such a severe gray area when it comes to Social Media and your Privacy, society must be able to balance accountability with free speech.

Posted in Online Privacy by Identity Theft Speaker .
Tags: , , , , , ,