Posts tagged "Workplace ID Theft"

Uncovering Business Identity Theft

While the majority of identity theft schemes prey upon individuals, small-businesses and organizations are increasingly becoming targets. Business identity theft is a serious threat, but it mostly flies under the radar simply because companies are embarrassed to discuss.

Although most companies are protected by copyright, patent and trademark laws, smaller companies lack the higher IT security measures that large companies have. According to recent studies by Javelin Strategy & Research this makes them 25% more likely to be victims of business identity theft over larger businesses.  Not only do small businesses and business owners typically have larger lines of credit open than an individual, but they are unlikely to detect the fraud for six to eight months making them a prime target.

Posted in Fraud Detection & Prevention, Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , , ,

Data Breach Protection: Laptop Theft Best Practices

laptop-theft
image-810
Laptop theft and mobile data theft (tape backups, iPhones, BlackBerries, USB drives) account for nearly half of the cases of serious corporate data breach and workplace identity theft. Your corporation’s data breach protection will be significantly improved by educating your staff on the following mobile data best practices:

Before you save sensitive data to any mobile device, it is your responsibility to:

  • Determine if your organization allows you to remove the data in question from the office in the first place. Are you allowed to save that database, Excel file, Word document, customer list, employee record, intellectual capital, etc. on your laptop, thumb drive or other mobile device?
  • Decide if it is absolutely necessary to remove it from the more highly-controlled and secure environment of the office. In many of the major cases of reported data breach, the data stored on the mobile device did not actually need to be there in the first place.

Posted in Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , , , , ,

Workplace Identity Theft Economies of Scale

Identity theft speaker John Sileo on why identity theft is moving into the workplace.

It feels as if there has been a directional shift in the past year regarding the source of data theft. From the stories I hear after every identity theft speech I deliver, the crime of data theft, identity theft and intellectual property theft are becoming more organized and moving much more into the realm of workplace identity theft and corporate data theft (i.e., it’s happening at work even more than out of our homes). The information being stolen is still often times consumer-based, but it is being compromised more often at the business level.

I think one factor contributing to this shift into the working environment has been the decline in the value of identity information. The average social security number or bank account number is worth far less on the black data market than it was even a year ago. This means that in order to make large sums of money, the thieves need to increase volume.

Posted in Identity Theft Prevention by Identity Theft Speaker .
Tags: ,

Loyalty Discount Cards + Sileo Identity Theft Seminar at Andrews AFB

Thanks to everyone who attended my identity theft seminar this morning hosted by the Department of Defense at Andrews Air Force Base. For the list of identity theft prevention tips I referred to during the speech, please proceed to the bottom of this post. But before you do that… During the workshop, an audience member asked me  a simple question:

Do Loyalty Cards (like the ones you sign up for in the supermarket to get store discounts) make me nervous?

They don’t, but that is because I take precautions to protect my privacy. Here’s how loyalty cards work:

Posted in Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , ,

Vehicle Document Storage

sentry auto safe
image-8336
SentrySafe AutoSafe

The Privacy Problem: Thanks to laptops, smart phones, DVDs and a deluge of other data-holding mobile devices, we carry as much sensitive data with us as we keep in our homes and offices. These devices are at a much higher risk of theft when they are in transit.

The Privacy Project: To help you better protect identity-bearing devices while they are being transported and stored in your car (RV, boat, etc.). The solution…

Posted in Product Reviews by Identity Theft Speaker .
Tags: , , , , , , , , , , ,

Stolen Lives Book Updates – Identity Theft Resources

Stolen Lives CoverSince the publication of my identity theft prevention book, Stolen Lives – Identity Theft Prevention Made Simple, several resource links listed in the book have changed. Since the book is not a dynamic document, but this blog is, I’d like to provide updated links here. If you find other links in Stolen Lives that have become outdated since publication, please use the Contact form above to let me know. If you have good sources of identity theft prevention, please include them with a response below. Click through for the update links that I know about so far…

Posted in Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , , , ,

Identity Theft Expert?

Golf Expert

Are you an expert at something?

In the world of professional speaking, you are expected to be an expert in your topic (to be taken seriously and to make a living). So speakers begin calling themselves experts, sometimes before they deserve the title. It’s like giving yourself a nickname – it feels a bit self-congratulatory.

I’m no exception.

Posted in Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , ,