Posts tagged "information"

Dumb Kids Equal Easy Targets

Your national security depends on the job you do educating your children. 

Here’s an alarming wakeup call: a task force led by former Secretary of State Condoleezza Rice and Joel Klein, former chancellor of New York’s school system has issued a stunning report. They warn that the nation’s security and economic prosperity are at risk if America’s schools don’t improve. The task force consists of 30 members with backgrounds in education and foreign affairs and was organized by the Council on Foreign Relations. As reported by the Associated Press, the report cautions that far too many schools fail to adequately prepare students and that “The dominant power of the 21st century will depend on human capital. The failure to produce that capital will undermine American security.” A shortage of skilled workers is expected to get worse as the current work force retires. The task force said the State Department and U.S. Intelligence agencies face critical shortfalls in the fields of foreign language, science, defense and aerospace. And so, it’s not a stretch to realize that no matter how diligent we are about educating people and businesses to protect their identities and information and to develop safe habits, the problem is ever so much more complex.

Posted in Fraud Detection & Prevention, Identity Theft Prevention by John Sileo, Identity Theft Speaker.
Tags: , , , , , ,

7 Steps to Secure Profitable Business Data (Part II)

In the first part of this article series, we discussed why it is so important to protect your business data, including the first two steps in the protection process. Once you have resolved the underlying human issues behind data theft, the remaining five steps will help you begin protecting the technological weaknesses common to many businesses.

  1. Start with the humans.
  2. Immunize against social engineering.

Posted in Cyber Data Security, Fraud Detection & Prevention, Identity Theft Prevention, Video Tips by John Sileo, Identity Theft Speaker.
Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , ,

7 Steps to Secure Profitable Business Data (Part I)

Everybody wants your data. Why? Because it’s profitable, it’s relatively easy to access and the resulting crime is almost impossible to trace. Take, for example, Sony PlayStation Network, Citigroup, Epsilon, RSA, Lockheed and several other businesses that have watched helplessly in the past months as more than 100 million customer records have been breached, ringing up billions in recovery costs and reputation damage. You have so much to lose.

To scammers, your employees’ Facebook profiles are like a user’s manual about how to manipulate their trust and steal your intellectual property. To competitors, your business is one poorly secured smartphone from handing over the recipe to your secret sauce. And to the data spies sitting near you at Starbucks, you are one unencrypted wireless connection away from wishing you had taken the steps in this two-part article.

Posted in Cyber Data Security, Fraud Detection & Prevention, Identity Theft Prevention, Online Privacy, Video Tips by John Sileo, Identity Theft Speaker.
Tags: , , , , , , , , , , , , , ,

3 Exposure Lessons Learned Via Anthony Weiner

Just for a minute, put yourself in the shoes of Anthony Weiner. You’ve done something exceptionally stupid, whether it’s sending sexually explicit photos of yourself to strangers you don’t even know, or another unrelated mistake. To compound the stupidity, you involve social networking – you Facebook or tweet or YouTube the act – or even simply email details of what you’ve done.

Everyone of us makes impulsively bad decisions (probably not as bad as Weiner, but bad nonetheless). Prior to the internet, you at least had a chance to recover from your past transgressions, as there wasn’t a readily accessible public record of the act unless you happened to be caught on tape (think Nixon, Rodney King, etc.). But now that pretty much every human carries either a camera or video recorder with them at all times (mobile phones), can communicate instantly with a massive audience (Facebook, Twitter, SMS, blogs), and have access to more information than exists in the Library of Congress just by pulling up Google, the equation of how you control sensitive information about yourself has changed radically. Every stranger (and even friend) is like a full service news station with video, distribution and commentary, just waiting to report on your missteps.

Posted in Digital Reputation & Trust, Fraud Detection & Prevention by John Sileo, Identity Theft Speaker.
Tags: , , , , , , , , , , , , , , ,

Are You Begging to Get Fired?

We’ve all done it before – left the table to get a coffee refill or go to the bathroom and left our laptop, iPad, smartphone or purse sitting on the table. We justify it by telling ourselves that we are in a friendly place and will only be gone a second. Our tendency is to blame technology for information theft, but the heart of the problem is almost always a human error, like leaving our devices unattended. Realizing that carelessness is the source of most laptop theft makes it a fairly easy problem to solve.

My office is directly above a Starbucks, so I spend way too much time there. And EVERY time I’m there, I watch someone head off to the restroom (see video) or refill their coffee and leave their laptop, iPad, iPhone, briefcase, purse, client files and just about everything else lying around on their table like a self-service gadget buffet for criminals and opportunists alike.

Posted in Cyber Data Security, Fraud Detection & Prevention, Identity Theft Prevention, Video Tips by John Sileo, Identity Theft Speaker.
Tags: , , , , , , , , , , , , , , , ,