It will take at least 5 years for Chip and PIN (or EMV) transactions to make up the majority of retail card processing in the U.S.
Most large retailers are likely to implement Chip and PIN technology over the next two years
Other technologies, like mobile or electronic wallets (e.g. Apple Pay), could become the preferred payment method over Chip and PIN card technology due to their ease and advanced security.
Although Phase 1 (Chip and Signature) will prevent credit card fraud by making credit cards harder to clone, it WILL NOT make them harder to use if they get into the wrong hands. Therefore, continuing to closely monitor our accounts and personal information will help you avoid becoming a victim of fraud.
Phase 2 (Chip and PIN) WILL make credit cards harder for thieves to use, which is even more reason to support the transition to the new technology.
John Sileo is an an award-winning author and keynote speaker on keeping your organization from becoming the next data breach headline. John specializes inmaking security entertaining, so that it works. John is CEO of The Sileo Group, whose clients include the Pentagon, Visa, Homeland Security & Pfizer. John’s body of work includes appearances on 60 Minutes, Rachael Ray, Anderson Cooper & Fox Business. Contact him directly on 800.258.8076.
https://sileo.com/wp-content/uploads/2015/03/chip-and-pin.jpg200300johnsileohttps://sileo.com/wp-content/uploads/2022/03/Sileo-Logo-2020-Horizontal-Color-Flat-web.pngjohnsileo2015-03-13 20:59:572022-05-04 15:25:32Chip and PIN Credit Cards Finally Explained
‘Tis the season to receive holiday scams in your email, on your Facebook page and via text. But you won’t be singing tra la la la la if you click on links that install malware on your computer! More and more of us seem to be conducting our holiday shopping online, and the cyber security Grinches are taking advantage of this new-found holiday convenience. There are several varieties of holiday scams that seem to come around each year.
The first red flag might be the Subject line of the email: “Order Confirmation”, “Acknowledgement of Order”, “Order Status”, “Thanks for Your Order”, “Problem With Your Order”, “Delivery Failure”, “Canceling Your Scheduled Delivery”, etc. It may tell you that an order is ready for you and you just need to click on the link to get the information about how to redeem it. Or, it may play on your fear of not getting a package out before Christmas and say you haven’t provided a correct address – this is a fear-based holiday scam.
Holiday scams usually appear to come from well-known companies, are VERY realistic looking and even use actual logos.
Once you click on the link, however, malware is installed on your computer that may gather email credentials, credit card data, logins and passwords in addition to making your computer a magnet for junk mail. It can also deploy a scanning technology that uses your computer to scan websites for vulnerabilities and then hack them!
Cyber Grinch or Real Deal? How to Tell the Difference…
If you do receive an email, scammy or otherwise, even if you did indeed order from that store, follow these steps:
DO NOT CLICK ON ANY LINKS IN THE EMAIL!
Instead, open your web browser and type in the merchant site and log in to your account (which you had to establish to order from them).
If it the email you received was about a legitimate order, they will provide you with an order or reference number which you can type into their website to verify activity.
In other words, verify that the email is legitimate by going directly to the site; don’t depend on the email. If for some reason you did click on a link that brought you to a website, make sure that you don’t click any more times on that site, and don’t fill out any information that they might be requesting.
(For more solutions to common scams related to the holidays, or really, all year long, check out our entire12 Days to a Safe Christmasblog series.)
When not protecting readers around the holidays, John Sileo is an an award-winning author and keynote speaker on identity theft, cyber security, internet privacy & technology defense. John specializes inmaking security entertaining, so that it works. John is CEO of The Sileo Group, whose clients include the Pentagon, Visa, Homeland Security & Pfizer. John’s body of work includes appearances on 60 Minutes, Rachael Ray, Anderson Cooper & Fox Business. Contact him directly on 800.258.8076.
[youtube https://www.youtube.com/watch?v=B1st4gzcdLs&rel=0]
The original notice on GameOver Zeus appeared on the US-CERT site. If you’d like to go directly to the tests for the GameOver Zeus virus, scroll down.
Overview of GameOver Zeus
GameOver Zeus (GOZ), a peer-to-peer (P2P) variant of the Zeus family of bank credential-stealing malware identified in September 2011, [1] uses a decentralized network infrastructure of compromised personal computers and web servers to execute command-and-control. The United States Department of Homeland Security (DHS), in collaboration with the Federal Bureau of Investigation (FBI) and the Department of Justice (DOJ), is releasing this Technical Alert to provide further information about the GameOver Zeus botnet.
Systems Affected by GameOver Zeus Virus
Microsoft Windows 95, 98, Me, 2000, XP, Vista, 7, and 8
Microsoft Server 2003, Server 2008, Server 2008 R2, and Server 2012
Impact of GameOver Zeus
A system infected with GOZ may be employed to send spam, participate in DDoS attacks, and harvest users’ credentials for online services, including banking services.
Solutions to GameOver Zeus
Users are recommended to take the following actions to remediate GOZ infections:
Use and maintain anti-virus software – Anti-virus software recognizes and protects your computer against most known viruses. It is important to keep your anti-virus software up-to-date.
Change your passwords – Your original passwords may have been compromised during the infection, so you should change them
Keep your operating system and application software up-to-date – Install software patches so that attackers can’t take advantage of known problems or vulnerabilities. Many operating systems offer automatic updates. If this option is available, you should enable it
Use anti-malware tools – Using a legitimate program that identifies and removes malware can help eliminate an infection. Users can consider employing a remediation tool (examples below) that will help with the removal of GOZ from your system.
www.decryptcryptolocker.com(link is external) FireEye and Fox-IT have created a web portal claiming to restore/decrypt files of CryptoLocker victims. US-CERT has performed no evaluation of this claim, but is providing a link to enable individuals to make their own determination of suitability for their needs. At present, US-CERT is not aware of any other product that claims similar functionality.
The above are examples only and do not constitute an exhaustive list. The U.S. Government does not endorse or support any particular product or vendor.
GOZ has been associated with the CryptoLocker malware. For more information on this malware, please visit the CryptoLocker Ransomware Infections page.
Added FireEye and Fox-IT web portal to Solutions section – August 15, 2014
John Sileo is an an award-winning author and keynote speaker on cyber security and data breach. He specializes inmaking security entertaining, so that it works. John is CEO of The Sileo Group, whose clients include the Pentagon, Visa, Homeland Security & Pfizer. John’s body of work includes appearances on 60 Minutes, Rachael Ray, Anderson Cooper & Fox Business. Contact him directly on 800.258.8076.
https://sileo.com/wp-content/uploads/2014/10/gameover.jpg500500johnsileohttps://sileo.com/wp-content/uploads/2022/03/Sileo-Logo-2020-Horizontal-Color-Flat-web.pngjohnsileo2014-10-07 15:34:102022-10-10 15:58:51GameOver Zeus Virus Test
Apple has us ooing and ahhing about the iPhone 6, it’s big brother the 6+ and finally the Apple Watch. But the biggest announcement of all didn’t even have to do with gadgets. The most significant announcement was about a new service that will be built into those devices…
It is Apple Pay, Apple’s own version of a “mobile wallet” that will allow Apple users to pay for items with just a tap or wave of their device. That is if those items happen to be in stores that have agreed to install the technology necessary to allow near-field communication (NFC – no not the football conference, the radio-wave technology) to work. Of course, Apple has done the background work to ensure a lot of big names (MC, Visa, AMEX and retailers such as Target, Macy’s and McDonald’s to name a few) are already on board, which is a significant mark in their favor. And with the upcoming mandatory implementation of EMV technology, Apple may have just timed this perfectly.
I’ve always been a bit freaked about digital wallets because the Internet giants offering them (Google, Amazon) are the same companies that collect reams of personal data, from search behaviors to my product preferences, and I don’t want any one company having all of that.
Many companies have tried to get mobile payments off the ground in the past without much success. So why might Apple be different (security implications in red)?
Apple is a master at integrating hardware and software. This doesn’t just mean that their payment system will be more user friendly than previous offerings (which it will), it also means that Apple has more control over the security and the privacy of each transaction. For example…
No cardholder data will be stored on the iPhone itself, OR on Apple’s servers. This is a significant divergence from previous offerings (Google Wallet) and is an extremely smart play on Apple’s part. Why? Because…
Apple has basically chosen to stay out of the information collection business to focus on what they do best, which is produce innovative digital devices and the corresponding behind-the-scenes software that make their devices so practical and useful. Consequently, they will continue to be a more trusted brand than their direct competitors. Unlike Microsoft, Facebook, and Google, Apple doesn’t appear to want to become a data-mining company. Apple executives have stated that they have no desire to collect or share user data. This could change when Apple realizes the profit they are passing up for the sake of privacy, but in the meantime…
The same companies that have always collected your purchasing data (Visa, MC, Amex and the retailers you buy from) will be responsible for the same sensitive cardholder information they’ve always had access to, and Apple will simply be passing the transaction through, using a unique series of numbers that will reveal nothing of value should the phone be hacked.
Finally, like it or not, Apple will make mobile payments sexy (did I just say that – I think maybe I’ve drunk too much of the Apple CoolAid). That sounds shallow, but their similar effort (iTunes + iPods, iPhone + App Store) revolutionized the music and smartphone industries. Apple has had a knack for getting consumers to warm up to ideas that have been tried before but never really took off (think iTunes, music players, smart phones, and tablets) Also, they have done what others who have tried mobile wallet concepts in the past have not: they’ve made it sexy.
Instead of a credit card that reveals all of its secrets on a magnetic stripe (no security there), Apple Pay will require a thumbprint scan (which never leaves the device) in order to make a charge. In other words, it utilizes CHIP & PIN technology, which every retailer is required to implement before 2015 ends anyway. Apple’s timing is impeccable – let’s just hope the technology is up to the task.
I’m not in any way saying that Apple doesn’t face huge challenges in terms of security, privacy and adoption of Apple Pay. Of course they do. I’m simply saying that they have the best shot yet at bringing together the hardware, software, industry connections and marketing chops to finally make mobile secure payments, well… pay.
John Sileo is an an award-winning author andkeynote speakerwho specializes inmaking security entertaining, so that it works. John is CEO of The Sileo Group, whose clients include the Pentagon, Visa, Homeland Security & Pfizer. John’s body of work includesfrequent media appearanceson shows like 60 Minutes, Rachael Ray, Anderson Cooper & Fox Business. Contact him directly on 800.258.8076.
00johnsileohttps://sileo.com/wp-content/uploads/2022/03/Sileo-Logo-2020-Horizontal-Color-Flat-web.pngjohnsileo2014-09-12 19:27:132022-10-10 15:36:21Apple Pay Makes Mobile Payments Sexy; But Secure?
Unless you’ve been living under a rock (or haven’t been on the internet in the past 24 hours), you most likely know that intimate photos of celebrities like Jennifer Lawrence and Kate Upton have been exposed (pardon the pun) to the public.
While it is not yet verified, Apple has said it is “actively investigating” the possibility that iCloud accounts have been hacked. The photos surfaced immediately after an Apple “Find My iPhone” exploit was revealed, so Apple’s own security is being questioned. As of now, Apple is saying that iCloud has not been systematically hacked, but that the breach of celebrity photos was a limited, targeted attack. Whether or not iCloud was exploited in any way for these pointed attacks hasn’t been determined.
The sad truth is that this most likely boils down to user error (weak passwords by celebrities) rather than a sophisticated hacking attempt. A brand new exploit, called “iBrute”, allows hackers to try one common password after another until they find one that works and then they can access the iCloud account if they know the email address for the Apple ID (which is probably your regular address).
This is but the tip of the iceberg of cloud-based security hacks. So, to keep yourself safe on iCloud, change your password and turn on 2-step verification:
Login to My Apple ID.
Click “Manage your Apple ID” and sign in
Select “Password and Security” and answer your security questions (if requested)
For starters, reset your Apple ID password and make it a long, strong, alpha-numeric phrase like Th3 h!ll$ @r3 @l!v3 (The hills are alive)
Under “Two-Step Verification,” click “Get Started,” and follow the instructions. Two-step verification does take an extra step to login to your account, but it also gives you a layer of security that makes it exceptionally difficult to hack.
John Sileo is an an award-winning author and keynote speaker on identity theft, internet privacy, fraud training & technology defense. John specializes inmaking security entertaining, so that it works. John is CEO of The Sileo Group, whose clients include the Pentagon, Visa, Homeland Security & Pfizer. John’s body of work includes appearances on 60 Minutes, Rachael Ray, Anderson Cooper & Fox Business. Contact him directly on 800.258.8076.
https://sileo.com/wp-content/uploads/2014/09/icloud-hacked.jpg194260johnsileohttps://sileo.com/wp-content/uploads/2022/03/Sileo-Logo-2020-Horizontal-Color-Flat-web.pngjohnsileo2014-09-02 23:11:392022-05-04 15:25:33iCloud Hacked for Nude Jennifer Lawrence Photos? How to Keep from Being Next
Biometrics are like passwords that you leave everywhere (fingerprints, facial recognition, voice patterns), except that unlike passwords, you can’t change them when they’re lost or stolen. It’s easy to change your password, a bit harder to get a new retina. Like passwords, risk goes up as they are stored globally (in the cloud) versus locally (on a physical device).
In addition to the biometrics mentioned above that most of us have come to accept as commonplace, there are many other methods in use or under exploration:
signature geometry (not just the look of the signature, but the pen pressure, signature speed, etc.)
gait analysis
heartbeat signatures
At the 2014 Annual International Consumer Electronics Show, inventors displayed dozens of devices using biometrics, some of which will become just as commonplace as fingerprints in the near future, some of which will not catch on and be replaced by something even more amazing. Some of the hot biometrics items this year:
Tablets that measure pupil dilation to determine whether you’re in the mood to watch a horror movie or a comedy.
Headbands, socks and bras that analyze brain waves, heart rates and sweat levels to help detect early signs of disease or gauge a wearer’s level of concentration.
Cars that recognize their owner’s voice to start engines and direct turns and stops, all hands-free.
(Do a search for “current biometric uses” if you want to be entertained for a while!)
Some less outlandish examples that are currently in place:
Barclays Bank in Britain utilizes a voice recognition system when customers call in.
Some A.T.M.s in Japan scan the vein pattern in a person’s palm before issuing money
World Disney World in Orlando, Fla., uses biometric identification technology to prevent ticket fraud or illegitimate resale as well as to avoid the time-consuming process of photo ID check.
Biometric passports contain a microchip with all the biometric information of holders as well as a digital photograph
Law enforcement agencies, from local police departments, to national agencies (e.g., the FBI) and international organizations (including Europol and Interpol) use biometrics for the identification of suspects. Evidence on crime scenes, such as fingerprints or closed-circuit camera footage, are compared against the organization’s database in search of a match.
Child care centers are increasingly requiring parents to use biometric identification when entering the facility to pick up their child.
And, of course, the most popular example has to be the use of fingerprint sensors on the iPhone to unlock the devices. It will also increasingly be linked to mobile payment services.
So, the million-dollar question is: Are Biometrics a Better Way to Protect Your Personal Identification?
The answer is yes…and no.
Biometrics are hard to forge: it’s hard to put a false fingerprint on your finger, or make your iris look like someone else’s.
BUT…
some biometrics are easy to steal. Biometrics are unique identifiers, but they are not secrets. You leave your fingerprints on everything you touch, and your iris patterns can be observed anywhere you look. If a biometric identifier is stolen, it can be very difficult to restore. It’s not as if someone can issue you a new thumbprint as easily as resetting a new password or replacing a passport. Remember, even the most complex biometric is still stored as ones and zeros in a database (and is therefore imminently hackable).
A biometric identifier creates an extra level of security above and beyond a password
BUT…
if they are used across many different systems (medical records, starting your car, getting into your child’s day care center), it actually decreases your level of security.
Biometrics are unique to you
BUT…
they are not fool-proof. Imagine the frustration of being barred by a fingerprint mismatch from access to your smartphone or bank account. Anil K. Jain, a professor and expert in biometrics at Michigan State University says (emphasis mine), “Consumers shouldn’t expect that biometric technologies will work flawlessly… There could and will be situations where a person may be rejected or confused with someone else and there may be occasions when the device doesn’t recognize people and won’t let them in.”
The scariest part of the biometrics trend is how and where the data is stored. If it is device specific (i.e. your fingerprint data is only on your iPhone), it’s not so bad. But if the information is stored on a central server and unauthorized parties gain access to it, that’s where the risk increases. A 2010 report from the National Research Council concluded that such systems are “inherently fallible” because they identify people within certain degrees of certainty and because biological markers are relatively easy to copy.
I also feel compelled to mention the inherently intrusive nature of biometrics. While it’s true that using facial-recognition software can help law enforcement agencies spot and track dangerous criminals, we must remember that the same technology can just as easily be misused to target those who protest against the government or participate in controversial groups. Facebook already uses facial recognition software to determine whether photos that users upload to the site contain the images of their friends. Retailers could use such systems to snoop on their customers’ shopping behavior (much like they do when we shop online already) so that they could later target specific ads and offers to those customers.
How long before we have truly entered into Tom Cruises’s Minority Report world where we are recognized everywhere we go? “Hello Mr. Yakamoto and welcome back to the GAP…”
John Sileo is an an award-winning author and keynote speaker on identity theft, internet privacy, fraud training & technology defense. John specializes inmaking security entertaining, so that it works. John is CEO of The Sileo Group, whose clients include the Pentagon, Visa, Homeland Security & Pfizer. John’s body of work includes appearances on 60 Minutes, Rachael Ray, Anderson Cooper & Fox Business. Contact him directly on 800.258.8076.
00johnsileohttps://sileo.com/wp-content/uploads/2022/03/Sileo-Logo-2020-Horizontal-Color-Flat-web.pngjohnsileo2014-02-03 04:11:432022-10-10 15:55:03Biometrics are Like Passwords You Leave EVERYWHERE
John Sileo appeared on CBS’s The Rachael Ray Show on January 29, 2014 to talk about the latest identity theft trends and threats.
Rachael asked John to go into one of their audience members homes and pick it apart from a privacy standpoint. John took a look at everything, from items hidden under the mattress to filing cabinets, trash cans, computers, mobile devices and more. Take a look to learn how to bulletproof your home and self against identity theft.
John Sileo is an an award-winning author and keynote speaker on identity theft, internet privacy, fraud training & technology defense. John specializes inmaking security entertaining, so that it works. John is CEO of The Sileo Group, whose clients include the Pentagon, Visa, Homeland Security & Pfizer. John’s body of work includes appearances on 60 Minutes, Rachael Ray, Anderson Cooper & Fox Business. Contact him directly on 800.258.8076.
00johnsileohttps://sileo.com/wp-content/uploads/2022/03/Sileo-Logo-2020-Horizontal-Color-Flat-web.pngjohnsileo2014-01-28 15:50:582022-05-04 15:25:35Identity Theft Expert John Sileo on The Rachael Ray Show
Data Security Expert John Sileo talks with Fox Business about the recent Target data breach.
https://sileo.com/wp-content/uploads/2022/03/Sileo-Logo-2020-Horizontal-Color-Flat-web.png00johnsileohttps://sileo.com/wp-content/uploads/2022/03/Sileo-Logo-2020-Horizontal-Color-Flat-web.pngjohnsileo2014-01-21 18:14:142022-05-04 15:25:35Data Security Expert John Sileo on Fox Business (Target Data Breach)
The story about the Texas parents who were terrified when their child’s video baby monitor was hacked struck me at first as a minor incident when viewed in the whole scheme of the world of hackers. After all, it is a rare event, no one was hurt, no threats were overtly made, and the child herself even slept through the event. But when I read more about it, I became increasingly bothered by the fact that I was not initially bothered by it! I mean, is that the creepiest of all feelings, to know that a stranger is watching your kids?
Here’s the summary for those who missed the story. Marc and Lauren Gilbert were in another room when they heard strange sounds coming from their daughter’s monitor. When they went into her room to investigate, they realized it was a strange man’s voice coming through the monitor and saying disturbing things, even using the child’s name, which could be seen above her bed. The child, who was born deaf and had her cochlear implants turned off, slept through the entire incident. Gilbert immediately disconnected the device, which was hooked up to the home’s wireless Internet system.
It is believed the webcam system, Foscam wireless camera, was compromised. In April, a study was released revealing potential vulnerabilities; in it the researchers said the camera would be susceptible to “remote Internet monitoring from anywhere in the world” and that thousands of Foscam cameras in the U.S. were vulnerable. A glaring flaw (which has since been “fixed” by a firmware update in June) is that users were not encouraged to have strong passwords and were not prompted to change from the default admin password. Gilbert said he did take basic security precautions, including passwords for his router and the IP cam, as well as having a firewall enabled.
For an interview with Fox and Friends, they asked me to consider the following questions. I’d like to share my answers with you in case you missed it.
How easy is it to hack a baby monitor?
It’s probably an apt cliché to say it’s as easy as taking candy from a baby. Just like with any device, an iPhone, laptop, home Wi-Fi, it’s only as secure as you make it. If you’ve taken no steps, it’s relatively easy to hack. You don’t make the problem go away by ignoring it.
Why would someone do this?
Some do it for the challenge, some for the thrill of controlling other people’s lives, and unfortunately, others do it because they are sick individuals that want to watch what you do in the privacy of your home.
Is this one of the more scary cases of hacking a household device you’ve seen?
This one hits close to home because it takes advantage of our kids, but I’ve seen pacemakers turned off, blood pumps shut down, brakes applied in cars, and all of it done remotely by outsiders who are never even seen. If the device is connected to a network, I guarantee you it can be hacked, and in most cases, you never know the bad guys are in control.
How can we avoid this type of hacking of our personal devices, whether it’s a video baby monitor, an iPhone or a pacemaker?
The good news is that’s it’s the same steps you probably already take on your other devices, like laptops, smartphones and iPads:
Buy Digital. Only buy a digital monitor that is password protected, not an analog version that operates on an open radio frequency.
Change Default Passwords. During setup, change the factory defaults on the monitor so that the password is long, strong and device specific. This case we are talking about probably had a default password in place, making it easy to hack.
Firewall Your Privacy. Install a firewall between your Internet connection and ALL devices to keep the peeping Toms out. Hire a professional to set it up properly.
Lock Down Wi-Fi. Make sure your Wi-Fi network is locked down properly with WPA2+ encryption and SSID masking so it can’t be hacked.
Turn Devices Off. If you are not using the device, turn it off, as hackers can more easily crack devices that are up 24/7.
John Sileo is an an award-winning author and keynote speaker on identity theft, internet privacy, fraud training & technology defense. John specializes inmaking security entertaining, so that it works. John is CEO of The Sileo Group, whose clients include the Pentagon, Visa, Homeland Security & Pfizer. John’s body of work includes appearances on 60 Minutes, Rachael Ray, Anderson Cooper & Fox Business. Contact him directly on 800.258.8076.
https://sileo.com/wp-content/uploads/2014/11/baby-cam-1.jpg10002000johnsileohttps://sileo.com/wp-content/uploads/2022/03/Sileo-Logo-2020-Horizontal-Color-Flat-web.pngjohnsileo2013-08-14 19:16:572022-10-10 15:55:08Baby Cam Hacked: What You Can Do To Protect Yourself and Your Children
Although there is a great deal of excitement over the concept of a breach-proof internet, for now Data security training is the only foolproof protection businesses have against the Syrian Electronic Army, Chinese hackers and a host of other internet-based attackers.
Such attackers know that employees tend to be the first line of defense against hackers targeting businesses and they’ve been succesfully breaching sensitive data—financial records, trade secrets and personal information — in more and more high profile cases.
But what if the internet was “hacker-proof”?
Researchers at Los Alamos National Labs in New Mexico believe they have found a way to use quantum physics to cloak internet communications. Businessweek explains that this method, which researchers call “network-centric quantum communications,” uses “digital keys, generated by a truly random set of numbers, theoretically [leaving] hackers with no way to figure out the key’s internal coding.”
As you might imagine, it’s a complicated process, and one that is not without its flaws:
Cost: The going rate for a quantum-secured, impenetrable defense plan for just one business is “tens of thousands of euros” per year. That’s considerably higher than your average corporate VPN or intranet service.
Scope: Quantum messages can only be sent between two parties. That means no “reply all” option or sharing folders of information with multiple recipients.
Distance: Has your email service provider ever stopped you from sending a message to a recipient more than 100 miles away? Quantum messages may be hack-proof, but they can only be sent about that distance before parts of the transmission fade away.
These aren’t just minor hang-ups. We’re accustomed to our online interactions being free (or at least limited to the cost of Wi-Fi), with no real limitations on the size or locations of the audiences with which we interact.
The internet is like the modern U.S. highway system. It’s (relatively) free to use and you can go wherever the open road takes you. Using the quantum-powered internet is the equivalent of riding a streetcar or trolley everyday after driving your whole life. There’s less risk of getting into an accident than when you get behind the wheel of your own car, but the tracks limit where you’re able to go and how fast you can get there.
Until a truly hack-proof, efficient internet exists, data security training is a drivers’ education course for those who need a refresher course on how to keep their personal and corporate information safe.
John Sileo is a data security training provider and in-demand speaker on digital reputation, identity theft and online privacy. His clients include the Department of Defense, Pfizer, Visa, and Homeland Security. See his recent media appearances on 60 Minutes, Anderson Cooper and Fox Business.
https://sileo.com/wp-content/uploads/2013/05/Sileo_6_3.jpg300225johnsileohttps://sileo.com/wp-content/uploads/2022/03/Sileo-Logo-2020-Horizontal-Color-Flat-web.pngjohnsileo2013-06-03 12:36:172022-05-04 15:25:52Will breach-proof internet eliminate need for data security training?