Posts tagged "John Sileo"

3.8 Million South Carolina Taxpayers at Risk for ID Theft

South Carolina Governor Nikki Haley blamed an outdated Internal Revenue Service standard (see below) as a source of a massive data breach that exposed the SSNs of 3.8 million South Carolina taxpayers plus credit card and bank account data. The identity information, nearly 75 GB worth, was stolen from computers that belonged to the SC Department of Revenue.

The breach reveals some shocking realizations for the people of South Carolina, and the rest of us:

  • South Carolina is compliant with IRS rules, but the IRS DOES NOT REQUIRE THAT SSNs BE ENCRYPTED. In other words, the keys to your financial buying power (your credit profile via SSN) is protected in no material way by the IRS, and therefore by your state government.
  • Technology isn’t the only source of blame. As is the case in nearly every data breach I’m brought in to help clean up, a HUMAN DECISION is at the heart of the breach.

Posted in Cyber Data Security, Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , , , , , , ,

Corporate Espionage at Dyson: Looking Inside an Inside Job

Is there a chance that someone could be stealing your most profitable business secrets? Competitive intelligence isn’t new, but it certainly has gotten easier with the introduction of ubiquitous high resolution cameras (smartphones), miniature storage devices that hold massive amounts of data (USB drives) and advanced tools of human manipulation (social networking).

Dyson, the British engineering firm behind the popular bagless vacuum cleaners and Airblade hand dryers, accused their German counterpart, Bosch, of planting a mole, or corporate spy, inside their headquarters for two years to steal vital research and development information. Bosch has denied any wrongdoing and refuses to return the technology or intellectual property. In an odd twist, Bosch hasn’t publicly denied planting an inside spy to siphon competitive intelligence from their rival.

In a world of highly competitive and rapid technological advancements, this sort of news brings to mind three crucial questions for businesses wanting to protect their intellectual property:

Posted in Digital Reputation & Trust, Fraud Detection & Prevention by Identity Theft Speaker .
Tags: , , , , , , , , , , , ,

5 Disastrous Decisions that Destroy Small Business – and How to Avoid Them

Interactive Webinar, Sponsored by Deluxe Corporation, Featuring Privacy Expert John Sileo

ST. PAUL, Minn., Oct 04, 2012 (BUSINESS WIRE) — Cyber criminals sabotaged John Sileo’s business – and nearly landed him in jail. Now he’s determined to help small business owners prevent the disastrous mistakes that loom ever-larger in the age of identity theft, mobile computing and social media.

Sileo will share his story – and the lessons he learned – in an hour-long interactive webinar on Tuesday, Oct. 9 at 2 p.m. EST. Titled “5 Disastrous Decisions that Destroy Small Business,” the webinar is sponsored by Deluxe Corporation and designed to provide business owners with simple, actionable tools to help protect their operations and enhance their efficiencies.

RenderImage.jpg

Posted in Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , , , , , ,

What Do Mitt Romney and Duchess Kate Have in Common?

Privacy. Or lack of it, to be specific. This past week, nude photos of Duchess Catherine (formerly Kate Middleton) were published in several French tabloids. The photos were taken from hundreds of meters away using sophisticated photographic equipment to capture a moment meant to be highly private.

Also this week, Mitt Romney was secretly videotaped at a small fundraising event dismissing 47% of the electorate as victims who take advantage of government and the taxation system.

Put aside for a minute what you think of Kate or Mitt, and ask yourself what you BELIEVE about our right to privacy.

Some people say that in the digital surveillance age, you are naive to think that anything is private. Everything outside of your own walls is fair game. But Romney and the Duchess thought that they were operating inside of their own walls. Others argue that we are entering a dangerous age of constant surveillance, and that the government and corporations are gaining too much access to our images, words and thoughts.

Posted in Digital Reputation & Trust, Identity Theft Prevention, Online Privacy by Identity Theft Speaker .
Tags: , , , , , , , , , , , , , , , , , , , ,

Identity Thieves Score Billions from the IRS and Taxpayers

Every dollar counts, now more than ever, as the government searches for ways to wisely spend our money. It’s dismaying to learn that an audit report from the Treasury Inspector General for Tax Administration (TIGTA) has found that the impact of identity theft on tax administration is significantly greater than the amount the IRS detects and prevents. Even worse, the “IRS uses little of the data from identity theft cases…to detect and prevent future tax refund fraud” according to Mike Godfrey, Tax-News.

  • The IRS is detecting far fewer fake tax returns than are actually falsely filed. 938,700 were detected in 2011. On the other hand, TIGTA identified 1.5M additional undetected tax returns in 2011 with potentially fraudulent tax refunds totaling in excess of $5.2B.
  • The study predicted that the IRS stands to lose $21B in revenue over the next 5 years with new fraud controls, or $26B without the new controls.

Posted in Cyber Data Security, Identity Theft Prevention, Sileo In the News by Identity Theft Speaker .
Tags: , , , , , , , , , , , , , ,

$10 Buys Thieves Access To A Dead Person’s Identity

You may think your deceased loved ones are safe from having their identities stolen. Not true! The Death Master File contains data about millions of deceased people including the full name, Social Security number and other personal information. Though you’d think this would be carefully guarded, the Social Security Administration provides the file to the Department of Commerce’s National Technical Information Service (NTIS). NTIS, in turn, distributes it to more than 450 entities including state and local governments, hospitals, universities, financial institutions, insurance companies and genealogy services. Even worse, anyone can access the information through the NTIS website. The cost? $10 for one person or an annual subscription with unlimited access to all of the files of deceased individuals costs $995.

Posted in Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , , , , , , , , , , , , , , ,

User Distrust at Heart of Facebook Troubles

Satisfaction with social-networking powerhouse Facebook has slumped, according to the latest survey from the American Customer Satisfaction Index — hitting a new record-low score in the social media category that placed it in the five lowest-scoring companies out of more than 230 surveyed. There are several immediate factors that undermine user trust:

  • Inconsistency. Facebook’s user interface changes constantly (think Timeline) and this inconsistency leaves users feeling like they don’t know what to expect next from the social media site. Consistency builds trust, but Mark Zuckerberg doesn’t seem to have much vision for consistency.
  • Lack of Transparency. The average user has very little comfort with or knowledge about how Facebook is collecting, analyzing, using and selling their personal data. While Facebook has a range of privacy and security settings, most users still don’t comprehend the enormity of the information that Facebook collects on them. This lack of transparency leaves users with a bad taste in their mouth, like they are being cleverly deceived for the sake of profit.

Posted in Digital Reputation & Trust, Fraud Detection & Prevention, Online Privacy by Identity Theft Speaker .
Tags: , , , , , , , , , , , , , , , , , , , ,

Yahoo Hacker Wake-up Call WILL FAIL (Data Breach)

Yahoo BreachA hacking group known as D33Ds Company leaked about 453,000 hacked email addresses and passwords of Yahoo Voices users in order to send a “wake up call” about poor data security practices at Yahoo. The information posted online was NOT restricted to YahooMail login credentials, but included Gmail, Hotmail, Aol and Yahoo user information. In the past few weeks, there have been similar breaches at LinkedIn, eHarmony, Formspring, Nvidia, and AndroidForum. Whazzzup?

Corporations are clearly ignoring warnings that are now commonplace from privacy and security experts: protect your customer data or lose stock value, subscribers and ultimately, your brand reputation.

The average business will NOT take responsibility for preventing a similar breach of their data until AFTER THEY GET HIT. Which is why 95% of companies will hit the snooze button on the wake-up call.

Posted in Cyber Data Security, Fraud Detection & Prevention, Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , , , , , , , , , , , ,

How to Prevent Child Identity Theft

Fraud Expert John Sileo discusses why your child is 51X more likely to become a victim of ID Theft on Fox Business.

Why are our kids, the very people we most want to protect, so vulnerable to identity theft? Because they have unused, unblemished credit profiles. According to Carnegie Mellon University’s CyLab 10.2% of the children in a recent report had someone else using their Social Security numbers. That figure is 51 times higher than the rate for adults of the same population.

Thieves steal a child’s identity early on, nurture it until they have a solid credit score, and then abuse and discard it. If it’s not discovered in time, fraudulent use of your child’s identity could mean the loss of educational and job opportunities and starting off adulthood at a serious disadvantage with someone else’s bad credit in her name.

Posted in Identity Theft Prevention, Online Privacy, Sileo In the News by Identity Theft Speaker .
Tags: , , , , , , , , , , , , , , , , , , , ,