Posts tagged "Workplace ID Theft"
Have you experienced that clutch of fear that makes your heart skip a beat when you all of a sudden discover your wallet is missing? Your first reaction might be a cuss word for carrying all that critical information in the first place. Your second is to try to slow your mind as it frantically scans for solutions. Knowing what to do if you lose vital information and knowing your rights if you become a victim of identity theft will save you time, money and a ton of stress.
A consumer survey conducted by the Federal Trade Commission reveals, in a new report, that many identity theft victims do not understand their rights. Following is a summary of what you should know if you become the unfortunate victim of identity theft.
Carrying multiple personal devices is a pain and, yet, the fear of giving away critical company data is a nightmare.
For most of us, being connected equals being productive. However, this simple equation becomes complex when one has to juggle personal devices with those issued by our employers. Paramount in an employer’s mind is the protection of the company’s critical and confidential business data but they don’t want to alienate employees by being too restrictive on using their personal smartphones and tablets.
Recent research has found that nearly three out of four adults don’t protect their smartphones with security software and these same people often use their devices to access social media and websites that attract cybercrooks. Poorly-secured devices can be easily accessed by hackers who are becoming evermore sophisticated and ferocious.
Huzzah! The holiday party season has officially begun! It is my favorite time of year because I try to take a few weeks off of the professional speaking circuit to slow down to a normal pace. Over the coming weeks, all of the Whos in Whoville gather to celebrate the communities to which we all belong. Whether it is a neighborhood party, a work celebration or an association shindig (okay, I’m starting to use words that my parents use), it is a great time to honor our friendships, colleagues and causes.
Unfortunately, the abundance of the season attracts malcontents who try to take advantage of our happiness and busy-ness. I call this the Grinch Effect: stealing from others while they are lost in a brief moment of joy. Like the Grinch pilfering the last stocking from the fireplace, identity thieves use our distraction to pluck pieces of private data from our festive homes. Enough already! If you are hosting a holiday party (either at your home or in your office), here are some tips on protecting your identity to foster holiday serenity:
Latest Identity Theft Trend is Stealing Your Business’s Identity to Falsify Accounts
In the past two weeks, I have been contacted separately by two local business owners to share how their business identity has been stolen and used to set up accounts with various companies on which thousands of dollars are charged and they (the actual owners) are left to pay the bills. There are no identity theft statistics on this type of crime, but I am certain that it is just coming onto the trend radar. In further proof that this is becoming a major problem for corporations, the Denver Post ran an article this morning titled “Corporate ID Thieves Mining the Store“.
Here’s how this incredibly easy form of business identity theft works:
Mobile Data Theft
Technology is the focal point of data breach and workplace identity theft because corporations create, transmit, and store so many pieces of information digitally that it becomes a highly attractive target. This book is not intended to address the complex maze that larger organizations face in protecting their technological and digital assets. Rather, the purpose of this book is to begin to familiarize business employees, executives, and vendors with the various security issues facing them.
The task, then, is to develop a capable team (internal and external) to address these issues. In my experience, the following technology-related issues pose the greatest data-loss threats inside organizations:
- Laptop Theft: According to the Ponemon Institute, 36 percent of reported breaches are due to a lost or stolen laptop.
- Mobile Data Theft: Thumb drives, CDs, DVDs, tape backups, smart phones
- Malware: Software that infects corporate systems, allowing criminals inside these networks