Home | Solutions Blog | John Sileo
Posts tagged "John Sileo"
I’ve got a neighbor who’s going back to college this week and reminds me that this is by far the highest risk group for identify theft and it’s for a couple of reasons. When these kids are going off to college, it’s the first time they are getting true financial independence, which might never have been trained to handle. They have access to credit cards, to new bank accounts, and they’re managing it themselves. That’s a huge red flag that there’s going to be trouble. Number two, they’re going into an environment where their stuff is not particularly protected. They’re in a dorm room, they’ve got roommates that may need extra cash; they know they can take advantage of them. So it’s kind of a high risk environment. The third reason is because they do so much online. There’s so much social media interaction and that’s where ton of information is stolen. So you need to take some of these steps that are in this blog post. Help your students take them. It will help them out not just this year in college but helping them build their financial future going forward. Your identity is pretty much everything in terms of your net worth. You got to take care of it now.
Posted in Identity Theft Prevention, Online Privacy, Video Tips by Identity Theft Speaker John Sileo.
Tags: "Identity Theft, College, Facebook, Fraud, Identity Theft Speaker, John Sileo, Privacy, Social Media Privacy, social networking, Student, Students, University
College is the perfect period of life to begin sound financial practices including protecting privacy. Not only are college students vulnerable, but they are impressionable and well positioned to learn strong habits that will last them a lifetime. As students launch into independence, we, as parents, hope to give them the best tools possible to insure a bright future. One of the most vital tools is to establish healthy habits that will guard their financial and personal identities for the rest of their lives. People ages 18 -24 are the least able to spot identity theft according to the BBB. That age group needed more than four months to realize someone had damaged their credit history or used their identity. By taking a few precautions, a young adult can avoid the crushing job of trying to recover from having given away the keys to their financial future, which is especially overwhelming while navigating life away from home for the first time.
Posted in Burning Questions (Video), Identity Theft Prevention, Video Tips by Identity Theft Speaker John Sileo.
Tags: children, College, Expert, Fraud, Identity Theft Keynote, Identity Theft Prevention, John Sileo, kids, Prevention, Protection, Speaker, Students, University
Why You Should Share Facebook Privacy Settings with Friends
A true friend does more than just post updates about their conquests on your wall. They share information with you that makes your life better, even if it isn’t exactly what you want to hear. And you do the same for them. But are your friends unwittingly sharing too much information about you with others (strangers, advertisers, app developers, scammers)? Probably. For example, if they (or you) haven’t customized your privacy settings lately, you are giving Facebook permission to:
- Publish your name, photo, birth date, hometown and friend list to everyone?
- Indirectly share your restricted data with outsiders through your friends?
- Let your friends check you in to embarrassing locations where you aren’t?
- Post your Likes as advertisements on friends’ walls using your name?
- Authorize Google to index, access and share your information on the web?
Posted in Cyber Data Security, Fraud Detection & Prevention, Identity Theft Prevention, Online Privacy by Identity Theft Speaker John Sileo.
Tags: Customizing Facebook, facebook privacy, Facebook Safety, Facebook Security, Facebook Settings, Identity Theft Speaker, John Sileo, Keynote Speaker, Online/Social Media Privacy, Sileo, Social Media Speaker, social networking, Social Networking Speaker
If you hacked into Rupert Murdoch’s voicemail, you would hear the message I just left him:
Thank you , Mr. Murdoch, I owe you one. I’ve spent the past five years trying to convince the world of something you managed to do with one simple scandal. I’m sorry that you will probably lose your reputation and much of your company and wealth because of it (not to mention your self-respect), but the world will be a better place for it. Why? Not just because our phone is ringing non-stop with companies and individuals that want to protect their private information.
Posted in Fraud Detection & Prevention, Identity Theft Prevention by Identity Theft Speaker John Sileo.
Tags: Email, Expert, Hacking, James Murdoch, John Sileo, news, News of the World, Phone, Privacy, Rupert Murdoch, Security, Voicemail
I just finished an interview with Esquire magazine about the security of webmail applications like Gmail, Windows Live Hotmail and YahooMail. Rebecca Joy, who interviewed me on behalf of Esquire, wanted to know in the wake of the Rupert Murdoch phone-hacking scandal, how secure our photos and messages are when we choose to use free webmail programs.
The simple answer? Not very secure. Just ask Vanessa Hudgens (nude photos), Sarah Palin (complete takeover of her email account) and the scores of celebrities and power figures who have been victimized by email hacking.
Think of using webmail (or any web-based software, including Facebook, Twitter, Google Docs, etc.) as checking into a hotel room. Unlike a house, where you have tighter control over your possessions, the same is not true of a hotel. While you definitely own the items you bring into a hotel room (laptop, smartphone, wallet, passport, client files), you don’t have nearly as much control as to how they are accessed (maids, managers, social engineers who know how to gain access to your room). In short, by using webmail to communicate, you are exchanging convenience for control.
Posted in Identity Theft Prevention by Identity Theft Speaker John Sileo.
Tags: Email, Gmail, Hacking, Hotmail, John Sileo, safety, Security, Sileo, Webmail, Windows Live, Yahoo!
In the first part of this article series, we discussed why it is so important to protect your business data, including the first two steps in the protection process. Once you have resolved the underlying human issues behind data theft, the remaining five steps will help you begin protecting the technological weaknesses common to many businesses.
- Start with the humans.
- Immunize against social engineering.
Posted in Burning Questions (Video), Cyber Data Security, Fraud Detection & Prevention, Identity Theft Prevention, Video Tips by Identity Theft Speaker John Sileo.
Tags: "Data Privacy", Business Security, data security, Detection Fraud, Engineering Social, Fraud, Fraud Detection, Fraud Expert, Fraud Speaker, Fraud Training, identity theft expert, Identity Theft Prevention, information, John Sileo, Keynote, Keynote Speaker, Part 2, Part II, Prevention, Privacy, professional speaker, Protection, Security, social engineering, social engineering expert, Speaker, Technology, Training Fraud
Everybody wants your data. Why? Because it’s profitable, it’s relatively easy to access and the resulting crime is almost impossible to trace. Take, for example, Sony PlayStation Network, Citigroup, Epsilon, RSA, Lockheed and several other businesses that have watched helplessly in the past months as more than 100 million customer records have been breached, ringing up billions in recovery costs and reputation damage. You have so much to lose.
To scammers, your employees’ Facebook profiles are like a user’s manual about how to manipulate their trust and steal your intellectual property. To competitors, your business is one poorly secured smartphone from handing over the recipe to your secret sauce. And to the data spies sitting near you at Starbucks, you are one unencrypted wireless connection away from wishing you had taken the steps in this two-part article.
Posted in Burning Questions (Video), Cyber Data Security, Fraud Detection & Prevention, Identity Theft Prevention, Online Privacy, Video Tips by Identity Theft Speaker John Sileo.
Tags: "Data Privacy", "Identity Theft, Business Security, data security, Fraud, information, John Sileo, Keynote, Prevention, Privacy, Protection, Security, social engineering, Speaker, Technology
Businesses often make social engineering (or fraud) training boring! And that’s bad for your bottom line, because no one ends up remembering how to protect your organization against threats like data theft, corporate espionage or social networking exposure.
Too often, fraud and social engineering workshops cover just the concepts that define fraud rather than the feelings that signal it’s actually in process at the moment. The key to training your executives, employees and even customers on fraud is to let them experience what it feels like to be conned. In other words, they need to actually be socially engineered (manipulated into giving away their own private information) several times throughout the training so that they begin to reflexively sense fraud as it is happening. Like learning to throw a ball, there is no substitute for doing it for yourself. Fraud detection is similar; it takes actually doing it (or having it done to you) to fully understand the warning signs. Anything less will leave your audience yawning and uneducated.
Posted in Burning Questions (Video), Cyber Data Security, Fraud Detection & Prevention, Identity Theft Prevention, Video Tips by Identity Theft Speaker John Sileo.
Tags: Detection Fraud, Engineering Social, Fraud Detection, Fraud Expert, Fraud Speaker, Fraud Training, identity theft expert, John Sileo, Keynote Speaker, professional speaker, social engineering, social engineering expert, Training Fraud
Everybody wants your data, especially when you are in the business of meetings. Your data doesn’t just have a high face value (e.g., the attendee data, including credit card numbers that you collect and store in your online registration system), it also has a high resale value .
Here is how the theft is most often committed in your industry:
- Competitors hire one of your employees and they leave with a thumb drive full of confidential files, including client lists, personally identifying information on talent and employees, financial performance data, etc.
- Social engineers (con artists) mine your employee’s Facebook profiles to gain a heightened level of trust which allows them to manipulate your human assets
- Cyber criminals hack your lax computer network or sniff the unprotected wireless connections you and your employees use while traveling (Starbucks, hotels, airports).
Posted in Cyber Data Security, Fraud Detection & Prevention, Identity Theft Prevention, Online Privacy by Identity Theft Speaker John Sileo.
Tags: Conference Speaker, Conferences, CSAE, data security, Data Security Expert, Identity Theft Speaker, John Sileo, Keynote Speaker, meeting planners, Meeting Professionals, Meeting Security, Meetings, Meetings Industry, MPI, Privacy, Security, SGMP, Society of Government Meeting Professionals