Posts tagged "John Sileo"

Facebook Privacy Settings Update

Picture 4 During a time when rules, laws and privacy settings are having trouble keeping up with technology, Facebook is having trouble keeping up with their ever growing population. Recently topping 350 million users, Facebook is scrambling to satisfy them all. Recently, Mark Zuckerberg, the CEO of Facebook, posted an open letter on the website discussing changes to the Facebook privacy setting that they are implementing to help make their users data less public. Take a minute to read the full article and protect your profile.

Order your copy of the Facebook Safety Survival Guide to make sure you and your children are protected online.

John Sileo became America’s leading Identity Theft Speaker & Expert after he lost his business and more than $300,000 to identity theft and data breach. His clients include the Department of Defense, Pfizer and the FDIC.  To learn more about having him speak at your next meeting or conference, contact him by email or on 800.258.8076.

Posted in Identity Theft Prevention, Online Privacy by Identity Theft Speaker .
Tags: , , , , , , ,

Protect Yourself Against Mail Fraud

Picture 5The reality is that unsecured, curbside mailboxes are prime targets for people who are intent on committing the crime of identity theft. Although I would suggest to stop using the mail to send and receive identity documents, this is not always possible. Therefore, here are alternative suggestions:

Posted in Fraud Detection & Prevention, Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , , , ,

Privacy, Social Media, Technology and the Law

Picture 6Can the Law keep up with technology?

CNN has a new article that addresses this growing issue. Cases are continuing to pop up based on an offense or crime committed in cyberspace. Five years ago suing someone for allegedly slamming you on Twitter would have been unimaginable.  But just recently an apartment tenant is being sued for $50,000 in damages after she took to her twitter to complain about her living situation to another user.
Many legal experts are watching these cases carefully because they will lay the groundwork for these unaddressed areas of the law. They said that in this growing age of technology it takes almost 5 years to play catch up with current American law. Lawmakers are unable to predict the next big wave in technology and the legal issues that will follow. With such a severe gray area when it comes to Social Media and your Privacy, society must be able to balance accountability with free speech.

Posted in Online Privacy by Identity Theft Speaker .
Tags: , , , , , ,

Google Dashboard Calms Privacy Critics

google-logoGoogle introduced the Google Dashboard on November 5th to help calm privacy critics. This provides a summary of the application data associated with your Google account.

Users are able to see what sites they visit, how many Docs they have created and share, how many iGoogle gadgets they are using, Google Reader info, Profile info, Tasks and YouTube history. This is great way for users to be able to see and control their data. It makes people more aware of what they put out there and allows them to set certain privacy settings. The Google Dashboard is currently available in 17 languages and you can Click Here to Read More.

John Sileo provides identity theft training to human resource departments and organizations around the country. His clients include the Department of Defense, Pfizer and the FDIC. To learn more about having him speak at your next meeting or conference, contact him by email or on 800.258.8076.

Posted in Identity Theft Prevention, Online Privacy by Identity Theft Speaker .
Tags: , , , , , ,

Identity Theft Statistics: Gallup Poll

According to a new Gallup poll of identity theft statistics, 66% of adults worry the most about their identities being stolen.

Gallup trends measuring Americans’ fear of being victims of specific crimes date back several decades, but for each of 10 crimes, the question has been updated annually on Gallup’s Crime survey since 2000. Terrorism was added to the list in 2001, and 2009 marks the first year identity theft has been included.  Gallup says the reason for big worries about identity theft might have to do with the high-profile attention lawmakers and identity-protection firms have been placing on it.

Frequent/Occasional Worry About Various Types of Crime

Posted in Identity Theft Prevention by Identity Theft Speaker .
Tags: , , ,

Fraud Report: SMiShing Identity Theft

smishing-text-messages-fraud

Identity Theft Expert John Sileo’s Latest Fraud Report

Just as you wouldn’t want to give any personal identity information to someone via email, you want to use the same practices via text message. There is a new wave of fraud that tries to trick you with text messages appearing to be from your bank.

According to Wikipedia, SMiShing uses cell phone text messages to deliver the “bait” which entices you to divulge your personal information. The “hook” (the method used to actually “capture” your information) in the text message may be a web site URL, like it is in phishing schemes. However, it has become more common to received a texted phone number that connects to an automated voice response system. One version of this SMiShing message will look like this:

Notice – this is an automated message from (a local credit union), your ATM card has been suspended. To reactivate call urgent at 866-###-####.

Posted in Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , , , , , ,

Uncovering Business Identity Theft

While the majority of identity theft schemes prey upon individuals, small-businesses and organizations are increasingly becoming targets. Business identity theft is a serious threat, but it mostly flies under the radar simply because companies are embarrassed to discuss.

Although most companies are protected by copyright, patent and trademark laws, smaller companies lack the higher IT security measures that large companies have. According to recent studies by Javelin Strategy & Research this makes them 25% more likely to be victims of business identity theft over larger businesses.  Not only do small businesses and business owners typically have larger lines of credit open than an individual, but they are unlikely to detect the fraud for six to eight months making them a prime target.

Posted in Fraud Detection & Prevention, Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , , ,

Wounded Warrior Gives Life Context

Walter Reed Medical Center
image-770
I had an amazing experience last week. I was lucky enough to share the stage with the very energetic Suze Orman (thus the self-promoting image to the left) at Walter Reed Army Medical Center in Washington, D.C. But Suze Orman wasn’t the amazing part, despite being a very dynamic woman. And I wasn’t the amazing part.

Our Warriors in Transition were the amazing part. They are in transition because they’ve sacrificed their limbs and eyesight and hearing and sanity and dignity defending our country in Afghanistan or Iraq. And it was the honor of a lifetime to meet some of them.

Posted in Business Life by Identity Theft Speaker .
Tags: , , , , , , ,

Biometric Identity Theft: Stolen Fingerprints

Identity Theft is a huge and growing problem. According to the recent 2009 Identity Theft Fraud report by Javelin Strategy & Research, victims increased 22% in 2008 to 9.9 million. When businesses are involved, the companies face billions of dollars in theft, millions of dollars in fines and, perhaps most important, the loss of customer trust.

The large impact that identity theft has on individuals lives and corporations’ bottom lines has made inexpensive biometrics look attractive for authenticating employees, customers, citizens, students and any other people we want to recognize. The most recent debate is on whether the pros outweigh the cons. (To see some of the materials that influenced this article, please visit George Tillmann’s excellent article in Computerworld).

fingerprintBiometrics uses physical characteristics, such as fingerprints, DNA, or retinal patterns to positively verify individuals. These biological identifiers are electronically converted to a string of ones and zeros and stored on file in the authenticator database.

Posted in Fraud Detection & Prevention, Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , , , , , , , ,