Posts tagged "meeting planners"

7 Data Theft Hotspots for Meeting Professionals

Everybody wants your data, especially when you are in the business of meetings. Your data doesn’t just have a high face value (e.g., the attendee data, including credit card numbers that you collect and store in your online registration system), it also has a high resale value .

Here is how the theft is most often committed in your industry:

  • Competitors hire one of your employees and they leave with a thumb drive full of confidential files, including client lists, personally identifying information on talent and employees, financial performance data, etc.
  • Social engineers (con artists) mine your employee’s Facebook profiles to gain a heightened level of trust which allows them to manipulate your human assets
  • Cyber criminals hack your lax computer network or sniff the unprotected wireless connections you and your employees use while traveling (Starbucks, hotels, airports).

Posted in Cyber Data Security, Fraud Detection & Prevention, Identity Theft Prevention, Online Privacy by Identity Theft Speaker .
Tags: , , , , , , , , , , , , , , , , ,

13 Data Security Tips for Meeting Professionals – SGMP

image-4813
I just finished delivering a keynote speech for the Society of Government Meeting Professionals (SGMP) at their annual convention on identity theft and protecting data in the meetings industry. Data security is a top concern in this industry because it is probably one of the most highly-targeted groups for identity theft, social media fraud, data breach and social engineering. Here’s why:

  1. Meeting professionals collect, store and transmit massive amounts of private data on attendees
  2. Data theft risk skyrockets when travel is involved, which is a frequent occurrence for meeting planners and professionals
  3. Meeting professionals are busy nearly 24 hours a day once they are onsite for the conference or meeting, meaning that they are highly distracted
  4. A single data breach of attendee data can put the organization responsible for the event out of business due to excessive costs and tight compliance regulations

Posted in Cyber Data Security, Fraud Detection & Prevention, Identity Theft Prevention, Online Privacy by Identity Theft Speaker .
Tags: , , , , , , , , , , , , , , , , ,

How to Hide Yourself on Facebook (Hide on Facebook)

How to hide on Facebook

While delivering an internet privacy keynote presentation for a large organization that was very interested in best practices for business, I was asked a very interesting question:

Can I use Facebook to log in to other sites and to keep track of friends without allowing the social network to share my information the other direction?

In reality, it’s difficult to just up and quit Facebook completely, but it’s not that difficult to hide on Facebook. Many users want to mine the social network like the proverbial fly on the wall. They want to watch what is going on in other people’s lives without them seeing or commenting on what is going on in yours. You might use your Facebook login credentials to centralize access to other sites (e.g., log in to Twitter with your Facebook credentials). Or you may want to keep it open so that your username isn’t made available to someone else. So how do you drop off of the Facebook radar without completely closing your account? The steps below are the closest approximation we’ve come up with to going underground.

Posted in Online Privacy, Social Media Privacy by Identity Theft Speaker .
Tags: , , , , , ,

Meeting Planners: On Site Protection

pic1-492.jpg

By Mickey Murphy

Information security. Identity theft. Black hat hackers. This all sounds like three-alarm lingo from some old DC comic book: “Immediately sign over all of your wealth, or I will hack you and steal your identity!” What do these oblique, non-intuitive terms mean? Here is how Wikipedia defines them: Information security — “Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification or destruction.” Identity theft — Fraud that involves someone pretending to be someone else in order to steal money or get other benefits.” Black hat hackers (also known as crackers) — “Hackers who specialize in unauthorized penetration” of computer systems, as opposed to white hat hackers who test computer systems for companies to determine their penetrability.

However we characterize them, information security, identity theft and so on represent major challenges today.

Posted in Fraud Detection & Prevention, Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , , , , , ,

Meeting Planning Guide – 5 Ways to Create an Extraordinary Experience

meeting-planning-guideHaving a great meeting planning guide can be a great time saver when attempting to plan any sort of meeting/conference.

Meeting planners have more on their plates at one time than just about any profession I’ve experienced. Who else spends months anticipating every minute detail leading up to an event only to find out that their work has just begun? And to discover that many of the rules have changed mid-course?

Putting together a successful meeting can be a stressful endeavor, which is why I have put together a “best practices” meeting planning guide, with 5 important tips for planning an “out of this world” meeting. These tips are strategic in nature – how to move from organizing speakers to hiring speakers that rock.

This guide will help you find new and creative ways to engage your audience, and provide you tips for creating a conference/meeting participants will never forget.

Posted in Fraud Detection & Prevention by Identity Theft Speaker .
Tags: ,