Posts tagged "Identity Theft Speaker"

Employee Background Checks

CSIdentity Safe

CSIdentity SAFE

Great employees are hard to find, but without the right employee background screening process, deceitful candidates are even harder to spot. Hiring dishonest employees puts your sensitive and confidential business information at risk and could cost you millions if stolen or damaged.

According to The Ponemon Institute, an independent research foundation, the average cost of data breach to a victim corporation is $6.75 million. In 2008, the lowest reported cost of data breach was $613,000, while the highest was just under $32 million. Given that the average cost per stolen record is $202, one missing laptop with 2,500 customer or employee records on it would come with a data breach recovery bill for a half a million dollars. And that doesn’t factor in loss of stock value, brand damage or customer defection that results from having your breach in the news.

Posted in Product Reviews by Identity Theft Speaker .
Tags: , , , , , , , , , ,

Social Networking Sites Banned by Marines

According to the Christian Science Monitor and other reputable media sources, the marines have banned social networking sites, including Facebook and Twitter. Currently, the Pentagon is reviewing its entire policy on the use of social networking sites. Can you imagine the enemy discovering troop locations or military tactical data via social networking? Ironic timing, as just a few weeks ago I was delivering an identity theft speech at the Pentagon and recorded a short video about this problem.

Facebook Privacy & The Pentagon

The Christian Science Monitor ran the following quote from a memo distributed Tuesday to all Marines:

The very nature of [social networking sites] creates a larger attack and exploitation window, exposes unnecessary information to adversaries and provides an easy conduit for information leakage that puts [operational and communication security] personnel and the [Marine Corps network] at an elevated risk of compromise.

Posted in Identity Theft Prevention, Online Privacy, Video Tips by Identity Theft Speaker .
Tags: , , , , ,

Traveling Safety: Identity Theft Takes a Trip

traveling-safetyIdentity Theft Speaker John Sileo on Traveling Safety.

Traveling Safety has become a study of its own ever since the advent of identity theft. Your biggest concern may no longer be physical in nature (pickpockets, hotel theft, muggings); the value of the personal identity you carry as you travel is worth far more than the cash in your wallet.

Posted in Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , ,

Identity Theft Speaker: Red Flags Rule How-To Guide

Are you one of the 9 million Americans who will have their credit damaged or their bank account emptied this year? Or perhaps your medical treatment will be affected. The cost of identity theft to individuals and businesses is staggering; hence, the Red Flag Rule, enforced by the FTC, federal bank regulatory agencies and the National Credit Union Administration.

There are always “red flags” that pop into our heads but too often we ignore them.  Call it “intuition” or whatever you want; the vital thing is to pay attention.  To that end, many businesses and organizations are now required to implement the “Red Flags” Rule to implement a written Identity Theft Prevention Program.  The goal is to detect warning signs in day-to-day operations, take steps to prevent the crime and limit any damage.

Are you covered by the Red Flags Rule? Read Fighting Fraud with the Red Flags Rule: A How-To Guide for Business to:

Posted in Identity Theft Prevention by Identity Theft Speaker .
Tags: , ,

Loyalty Discount Cards + Sileo Identity Theft Seminar at Andrews AFB

Thanks to everyone who attended my identity theft seminar this morning hosted by the Department of Defense at Andrews Air Force Base. For the list of identity theft prevention tips I referred to during the speech, please proceed to the bottom of this post. But before you do that… During the workshop, an audience member asked me  a simple question:

Do Loyalty Cards (like the ones you sign up for in the supermarket to get store discounts) make me nervous?

They don’t, but that is because I take precautions to protect my privacy. Here’s how loyalty cards work:

Posted in Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , ,

The 7 Deadly Sins of Privacy Leadership: How CEOs Enable Data Breach

Technology is not the root cause of identity theft, data breach or cyber crime.

We are.

Too often, technology is our scapegoat, providing a convenient excuse to sit apathetically in our corner offices, unwilling to put our money where our profits are. Unwilling, in this case, to even gaze over at the enormous profit-sucking sound that is mass data theft. The deeper cause of this crisis festers in the boardrooms of corporate America. Like an overflowing river, poor privacy leadership flows inexorably downhill from the CEO, until at last, it undermines the very banks that contain it.

The identity theft and data breach bottom line?

Posted in Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , , , , , , , ,

Thanks to Grand Forks AFB and the Department of Defense

Grand Forks AFBI’d like to thank the Department of Defense and Grand Forks Air Force Base for bringing me in as the identity theft financial speaker for their Financial Readiness Challenge Campaign today in North Dakota.

During my speech, I promised to give you easy-to-complete action steps to protect your identity against theft, as well as that of your loved ones. I’d like to deliver on that promise by directing you to a full page article I’ve written specifically for you: John Sileo’s Military Identity Theft Protection Kit. If you have additional suggestions for protecting military IDs that I haven’t covered in this article, please include your comments at the bottom of the post. With your input, this conversation should contribute to the financial stability of our armed forces – which is vital, because, as you are aware, financial readiness is mission readiness.

For those of you who asked to purchase a copy of my book, Stolen Lives, you can do so at www.ThinkLikeASpy.com. Be sure you choose the Speaking Engagement Shipping option in your shopping cart as it will give you free shipping.

Here are answers to several additional questions that were asked after my speech:

Posted in Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , , , ,

Eglin AFB Stumps the Identity Theft Expert

Military ImagesI just finished delivering an identity theft speech for the Department of Defense to the Airmen and Women of Eglin Air Force Base in Ft. Walton, Florida. It is the highest honor for me to be able to serve the United States military, who so valiantly and humbly serve every American. Thank you Eglin AFB, and a special thanks to the person who asked me to clarify this question after the speech:

Is LifeLock identity theft monitoring service truly free to military personnel, or is it just for certain personnel?

Posted in Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , , , , , , , ,

Vehicle Document Storage

sentry auto safe
image-8336
SentrySafe AutoSafe

The Privacy Problem: Thanks to laptops, smart phones, DVDs and a deluge of other data-holding mobile devices, we carry as much sensitive data with us as we keep in our homes and offices. These devices are at a much higher risk of theft when they are in transit.

The Privacy Project: To help you better protect identity-bearing devices while they are being transported and stored in your car (RV, boat, etc.). The solution…

Posted in Product Reviews by Identity Theft Speaker .
Tags: , , , , , , , , , , ,