Home | Solutions Blog | Information Security
Posts tagged "Information Security"
Statistics say 1 in 2 Americans will have a smart-phone by December 2011. Many people keep their address, bank account numbers, passwords, PIN numbers and more stored in their phone. The mounds of information kept in smart-phones is more than enough to steal one’s identity with ease.
What most people don’t consider are the applications that they are using on a daily basis. What information is stored there? According to a recent Wall Street Journal article, more than you think.
After examining over 100 popular apps, they found that 56 transmit the phone’s unique device ID to companies without the user’s knowledge. Forty-seven of the applications transmitted the phone’s actual location, while five sent other personal information such as age and gender. This shows how many times your privacy is potentially compromised without your knowledge, just by playing music on Pandora.
Here are a few of the culprits:
Posted in Cyber Data Security, Identity Theft Prevention by Identity Theft Speaker John Sileo.
Tags: Applications, cell phone, cell phone safety, identity theft expert, Identity Theft Speaker, Information Security, iphone Apps, John Sileo, Security, Smatphones
I am a huge fan and frequent user of Pandora, the internet radio station that plays songs based on learned music preferences (if you like the Avett Brothers, it knows you will probably also like Dave Matthews, etc.). Pandora is an overwhelmingly popular online radio network app for computers, smart phones and the iTouch. It provides listeners with an informed collection of songs and play-lists based on a comprehensive analysis of over 400 qualities of a song that make it specifically appealing to you. While the financial cost to users appears at first site to be nothing (if you don’t mind the occasional ad), the privacy cost can be exponentially high with Pandora selling your web-surfing habits to advertisers.
Pandora clearly states in its FAQ that they are sharing information such as your age and gender with advertisers.
Posted in Cyber Data Security, Identity Theft Prevention by Identity Theft Speaker John Sileo.
Tags: Identity Teft Expert, Identity Theft Speaker, Information Security, Information Sharing, John Sileo, Keynote Speaker, Pandora, Pandora Sharing
You and your business are worth a lot of money, whether your bank accounts show it or not. The goldmine lies in your data, and everyone wants it. Competitors want to hire the employee you just fired for the thumb drive full of confidential files they smuggled out. Data thieves salivate over your Facebook profile, which provides as a “how to” guide for exploiting your trust. Cyber criminals are digitally sniffing the wireless connection you use at Starbucks to make bank transfers and send “confidential” emails.
Every business is under assault by forces that want access to your valuable data: identity records, customer databases, employee files, intellectual property, and ultimately, your net worth. Research is screaming at us—more than 80% of businesses surveyed have already experienced at least one breach (average recovery cost: $6.75 million) and have no idea of how to stop a repeat performance. These are clear, profit-driven reasons to care about who controls your data.
Posted in Burning Questions (Video), Fraud Detection & Prevention, Identity Theft Prevention, Video Tips by Identity Theft Speaker John Sileo.
Tags: “business fraud”, data theft, Expert, Fraud, Hot Spots, Identity Theft Prevention, Information Hot Spots, Information Security, Inside Spies, mobile data, Prevention, Privacy, Protection, Sileo, social engineering, Speaker
John Sileo knows identity theft and data breach first hand – he became “America’s Leading Identity Theft Speaker and Expert” after losing his business and more than $300,000 to these costly crimes. He has provided these Identity Theft Resources to help you protect your organization from suffering from the losses that result from unprotected private information. Visit John’s Identity Theft Prevention Store to learn more.
Hire John to train your employees to prevent identity theft, data breach and corporate espionage
Safe data is profitable data, whether it’s a client’s credit card number, a patient’s medical file, an employee’s benefit plan or sensitive intellectual capital. By the time John finishes his hilarious closing story, your audience will be fully empowered to protect private information, at home and at work.
Posted in Fraud Detection & Prevention, Identity Theft Prevention by Identity Theft Speaker John Sileo.
Tags: Data Breach, Data Breach Training, Fraud Training, Identity Theft Prevention, Identity Theft Resources, identity theft training, Information Security, seminars, Speaking, Speech, Speeches, training, workshops