Dropbox is a brilliant cloud based service (i.e., your data stored on someone else’s server) that automatically backs up your files and simultaneously keep the most current version on all of your computing devices (Mac and Windows, laptops, workstations, servers, tablets and smartphones). It is highly efficient for giving you access to everything from everywhere while maintaining an off-site backup copy of every version of every document.
And like anything with that much power, there are risks. Using this type of syncing and backup service without understanding the risks and rewards is like driving a Ducati motorcycle without peering into the crystal ball of accidents that take the lives of bikers every year. If you are going to ride the machine, know your limits.
This week, Dropbox appears to have altered their user agreement (without any notice to its users), making it a FAR LESS SECURE SERVICE. Initially, their privacy policy stated:
… all files stored on Dropbox servers are encrypted (AES-256) and are inaccessible without your account password. Quote from PCWorld
Currently, the privacy policy says that Dropbox can access and view your encrypted data, and it might do so to share information with law enforcement. Why is that important? Because it means that the encryption keys that keep your files private are actually stored on Dropbox’s server, not on your own computer. This puts the keys to your data (and every other Dropbox user) in the hands not only of Dropbox employees and law enforcement, but vulnerable to hackers. When the encryption key is located on your computer, at least the risk is spread over Dropbox’s user’s network.
But there is an even bigger issue that this exposes about the world of cloud computing in general: anytime your data lives on a device that you don’t own, you lose a certain amount of control over what happens to it. Here is just a sampling of factors that can affect the privacy and confidentiality of your cloud-stored data:
The cloud service provider changes their Terms of Service (like Dropbox just did) to cover their legal bases, making your data less secure without your even being alerted. This happens almost every week with Facebook, which changes privacy terms constantly. When you log back into your account, you are automatically agreeing to the new Terms of Service (and probably not reading the tens of pages of legal jargon).
The provider is bought out by a new company (possibly one overseas) or has its assets liquidated (the most valuable assets are generally information), that has different standards for data security and sharing. You, by default, are now covered by those standards.
The security of your data is weak in the first place. Security costs money, and many smaller cloud providers haven’t invested enough in protecting that data, leaving the door wide open for savvy hackers. SalesForce.com might be well protected, but is the free backup service or contact manager that you use?
Your data exists in a more public domain than when it is stored on internal, private servers, meaning that it is subject to subpoena without your being notified! In other words, the government and law enforcement has access to it and you will never know they were snooping around. This isn’t a concern for most small businesses, but it is still a cautionary note.
So does this mean we should all shut down our Dropbox, Carbonite, iBackup accounts? No. Does this mean that corporations should not implement the highly scalable, dramatically efficient solutions provided by the cloud? No. It means that both individuals and businesses must educate themselves on the up and down sides of this shift in computing. They can begin the process by realizing that:
Not all data is created equal and that some types of sensitive data should never be placed in someone else’s control. This is exactly why there are data classification systems (I subscribe to those used by the military and spy agencies: Public, Internal, Confidential and Top Secret).
Not all cloud providers are created equal and you must understand the privacy policy, terms of service and track record of each one individually (just like you would choose a car with a better crash-test rating for your family).
Anything of immense power comes with costs, and those costs must be calculated into the relative ROI of the equation. In other words, the answer here, like most complex things in life, exists in the gray area, not in a black or white, one-size-fits all generalization.
John Sileo writes and speaks on Information Leadership, including identity theft prevention, data breach, social media risk and online reputation. His clients include the Department of Defense, Homeland Security, the Federal Reserve Bank, FDIC, FTC and hundreds of corporations of all sizes. Learn more about hismotivational data security events.
https://sileo.com/wp-content/uploads/2022/03/Sileo-Logo-2020-Horizontal-Color-Flat-web.png00johnsileohttps://sileo.com/wp-content/uploads/2022/03/Sileo-Logo-2020-Horizontal-Color-Flat-web.pngjohnsileo2011-05-18 16:48:422022-10-10 15:57:59Dropbox a Crystal Ball of Cloud Computing Pros & Cons
Remember the iconic 1984 Super Bowl ad with Apple shattering Big Brother? How times have changed! Now they are Big Brother.
According to recent Wall Street Journal findings, Apple Inc.’s iPhones and Google Inc.’s Android smartphones regularly transmit your locations back to Apple and Google, respectively. This new information only intensifies the privacy concerns that many people already have regarding smartphones. Essentially, they know where you are anytime your phone is on, and can sell that to advertisers in your area (or will be selling it soon enough).
The actual answer here is for the public to put enough pressure on Apple and Google that they stop the practice of tracking our location-based data and no longer collect, store or transmit it in any way without our consent.
You may ask, “don’t all cell phone carriers know where you are due to cell tower usage?” Yes, but Google and Apple are not cell phone carriers, they are software and hardware designers and should have no real reason (other than information control) to be tracking your every move without your knowledge. Google and Apple are not AT&T or Verizon, therefore they should not be recording, synching and transmitting your location like it appears they are.
Both companies are trying to build huge databases that allow them to pinpoint your exact location. So how are they doing it? By recording the cell phone towers and WiFi hotspots that you pass and that your phone utilizes. This data will ultimately be used to help them market location based services to their audience, which is a market that is expected to rise $6 billion in the next 3 years.
The Wall Street Journal found through research by security analyst Samy Kamkar, the HTC Android phone collected its location every few seconds and transmitted the data to Google at least several times an hour. It transmitted the name, location and signal strength of any nearby WiFi networks, as well as a unique phone identifier. This was not as personal of information like what the Street-View cars collected that Google had to shut down some time ago.
So what do we do now? According to the Wall Street Journal, neither Apple or Google commented when contacted about these findings, so it is hard to know the extent of how they are using the data collected. Right now, there really isn’t much you can do to stop GPS tracing of your location without your consent. Of course you could power down your phone, but we are all way too additcted to these handy little digital Swiss Army Knives to do that. You can turn of GPS services, but again, that makes it impossible to use maps and other location-based apps.
The actual answer here is for the public to put enough pressure on Apple and Google that they stop the practice of tracking our location-based data and no longer collect, store or transmit it in any way without our consent.
While this may be the future of privacy, it is better that we are aware of what may come rather than remain in the dark about the possibilities of technology.
John Sileo is the President of The Sileo Group and the award winning author of four books, including his latest workbook, The Smartphone Survival Guide. He speaks around the world on identity theft, online reputation and influence. His clients include the Department of Defense, Pfizer and Homeland Security. Learn more at www.ThinkLikeASpy.com.
https://sileo.com/wp-content/uploads/2022/03/Sileo-Logo-2020-Horizontal-Color-Flat-web.png00johnsileohttps://sileo.com/wp-content/uploads/2022/03/Sileo-Logo-2020-Horizontal-Color-Flat-web.pngjohnsileo2011-04-27 08:14:442023-07-06 13:04:06iPhone and Droid Want to Be Your Big Brother
For six years I have done almost nothing professionally but study and speak on phenomenons that drive companies out of business or otherwise destroy their reputation. In the process, I have discovered what I consider to be an under-recognized and highly powerful maxim that remains relatively untapped both by people (especially leaders), and by businesses. We talk about it, but we rarely take an active role in improving it.
Reputation gets you what you want.
I know this because I have seen countless people’s reputation destroyed by identity theft (including mine when I was thought to be a criminal) and hundreds of businesses’ reputations wrecked because of data breach, social networking over-exposure or reputation hijacking. I know this because I’ve worked as a reputation management partner to companies that aggressively manage what the world thinks of them from an offensive perspective – they cultivate it long in advance of any attack.
Think of Apple – they have had a reputation of producing simple, functional, beautiful gadgets that WOW us. Now, even when they release the most modest of upgrades, we all jump to buy them because of Apple’s reputation. Apple works day and night to protect and project this reputation, but because of the nature of reputation (you can’t blow your own horn too loudly), it is a silent and subtle campaign that accumulates over time.
Reputation is everything. A strong reputation gives you job security even in a shaky economy. It can be your sales team’s best closing tool or worst enemy (imagine BP trying to close its next off-shore drilling deal). It’s a long term asset that is subject to short term manipulation. And in the age of social media and constant access to data, your reputation can be damaged in a minute.
Reputation has traditionally been a defensive art – we don’t think about it or act to improve it until we are attacked. We are reactive and take for granted something that not only defines who we are, but makes us our money. But acting after the attack is far more costly than building a solid reputation foundation that can withstand the occasional threat. Take Reputation Hijacking for example.
Reputation Hijacking
Steve Fezzik is widely recognized as one of the top sports gamblers in the business. He consistently beats the odds in Vegas, and has developed a highly profitable career based on his sterling reputation of winning when others can’t. And Steve Fezzik’s reputation is exactly why someone else purchased the URL of his name (www.SteveFezzik.com), put his picture and bio on the site, and proceeded to sell betting cards (odds on gambling opportunities) using his name and an anonymous PayPal account. Someone else is still cashing in on his reputation and trashing it as they go because they don’t have his skill set for picking winners. His story is sad and all too common. And he is essentially helpless to change the plot, as he would have had to play a bit of reputation offense to protect himself. In his case, the steps would have been rather straightforward:
Trademark his name in relation to the gaming business so that he has a leg to stand on when someone else misuses his identity for financial gain.
Purchase the most common URLs associated with his name and expertise early in the game, before others find a way to use them.
Hire a pit bull of an intellectual property lawyer (in advance of needing them) to immediately and very publicly put a stop to reputation squatting using simple tools like Cease and Desist. I realize that most people don’t have to worry about this level of protection, but if your name is your business, or your brand is your reputation, your way of thinking in the Internet age will need to change.
Offensively develop an online reputation stronghold that serves as a clearinghouse for your voice and reputation. We can learn a great deal from celebrities who develop a significant presence on Twitter, a Facebook Fan Page, a blog, a YouTube channel or another vehicle of digital reputation management to fill in the space where tabloids and Perez Hilton type chatter can easily fill in the void. Most celebrity press releases, for example, are now launched from Twitter, making any other source of breaking news a bit suspect.
In other words, in your absence, someone else will leverage your reputation, especially online, where it is an easy target. Your refusal to manage it in advance already makes your reputation worth less. Would Lady Gaga fail to insure her voice, own her URL namesake or trademark her marketing brilliance? But she’s a star, you say. In the world of social media, instant communication and lack of privacy, so are you. Just make sure you avoid the black hole of reputation inertia.
John Sileo’s keynote speeches train organizations to play aggressive information offense before the attack, including reputation hijacking, identity theft, data breach, cyber crime, social networking exposure and human fraud. Learn more about having a Reputation Management Partner at ThinkLikeASpy.com or call him directly on 800.258.8076.
https://sileo.com/wp-content/uploads/2022/03/Sileo-Logo-2020-Horizontal-Color-Flat-web.png00johnsileohttps://sileo.com/wp-content/uploads/2022/03/Sileo-Logo-2020-Horizontal-Color-Flat-web.pngjohnsileo2011-03-02 10:06:482023-07-06 13:03:52Reputation Gets You What You Want
Google recently offered $20,000 to the first person who could hack their web browser, Chrome. Without question, a hacker will crack it and prove that their browser isn’t as mighty as they might think.
So why waste the money?
In that question, ‘why waste the money?’ lies one of the root causes of all data theft inside of organizations. Google’s $20,000 investment is far from a waste of money. Consider:
The average breach inside of an organization costs $6.75 million in recover costs (Ponemon Study). $20,000 up front to define weak points is a minuscule investment.
Chrome is at the center of Google’s strategic initiatives in search, cloud computing, Google Docs, Gmail, displacing Microsoft IE and mobile OS platforms – in other words, it is a very valuable asset, so Google is putting their money where their money is (protecting their profits).
By offering up $20,000 to have it hacked IN ADVANCE of successful malicious attacks (which are certain to come), Google is spending very little to have the entire hacker community beta test the security of their product.
I would bet that there will be tens or hundreds of successful hacks into their browser, all of which will be fixed by the next time they commission a hack.
Anticipating the inevitable attacks and investing in advance to minimize the chances and resulting costs of a breach is a perfect example of Information Offense. Instead of waiting for your data to be compromised (defense), you take far less costly steps up front to deflate the risk. Only the most enlightened leaders I work with inside of corporations understand the value of spending a little bit on security now to reap huge benefits (in the form of avoided losses) down the road.
Too many leaders are so focused on the revenue side of the model (most of them are from a sales background) that they lack the depth of seeing the entire picture – the long-term health and profitability of the company. You know the saying… an ounce of prevention being worth a pound of cure. Just think of the ounce being loose change and the pound being solid gold.
Marshall Goldsmith, the executive coach, nails the behavior behind this phenomenon in his book, What Got You Here Won’t Get You There,
“Avoiding mistakes is one of those unseen, unheralded achievements that are not allowed to take up our time and thought. And yet… many times, avoiding a bad deal can affect the bottom line more significantly than scoring a big sale… That’s the funny thing about stopping some behavior. It gets no attention, but it can be as crucial as everything else we do combined.”
Listen to Google and Mr. Goldsmith, and avoid the mistakes before you make them by asking yourself this simple question: How can I refocus my efforts and resources on playing offense rather than defense?
John Sileo’s motivational keynote speeches train organizations to play aggressive information offense before the attack, whether that is identity theft, data breach, cyber crime, social networking exposure or human fraud. Learn more at www.ThinkLikeASpy.com or call him directly on 800.258.8076.
https://sileo.com/wp-content/uploads/2022/03/Sileo-Logo-2020-Horizontal-Color-Flat-web.png00johnsileohttps://sileo.com/wp-content/uploads/2022/03/Sileo-Logo-2020-Horizontal-Color-Flat-web.pngjohnsileo2011-02-07 11:45:262023-07-06 13:03:19Information Offense – How Google Plays
Achilles, an ancient Greek superhero — half human, half god — was in the business of war. His only human quality (and therefore his only exploitable weakness) was his heel, which when pierced by a Trojan arrow brought Achilles to the ground, defeated. From this Greek myth, the Achilles’ Heel has come to symbolize a deadly weakness in spite of overall strength; a weakness that can potentially lead to downfall. As I formulated my thoughts in regard to New Zealand, I realized that the same weaknesses are almost universal — applying equally well to nations, corporations and individuals.During a recent 60 Minutes interview, I was asked off camera to name the Achilles’ heel of an entire country’s data security perspective; what exactly were the country’s greatest weaknesses. The country happened to be New Zealand, a forward-thinking nation smart enough to take preventative steps to avoid the identity theft problems we face in the States. The question was revealing, as was the metaphor they applied to the discussion.
For starters, let’s assume your business is strong, maybe even profitable in these tough economic times. In the spirit of Sun Tzu and The Art of War, you’ve dug in your forces, preparing for a lengthy battle: you’ve reduced costs, maximized your workforce, and focused on your most profitable strategies. As your competitors suffocate under market pressure, you breathe stronger as a result of the exercise. But like Achilles, your survival through adversity blinds you and even conditions you to ignore pending threats. You begin to think that your overall strength translates into an absence of weaknesses; and in general, you might be right. But Achilles didn’t die because of his overall strength, which was significant; he died because he ignored critical details. What details are you and your company ignoring?
Information, like Achilles himself, is power. And maintaining control and ownership of your information is quite possibly the most threatening Achilles’ heel any data-reliant business faces. Companies that don’t actively take control of their data are prime targets for identity theft, social engineering, data breach, corporate espionage, and social media exploitation. Regardless of your title, you have a great deal to learn from Achilles’ mistakes, and a significant opportunity to protect your own corporate heel.
Achilles 3 Fatal Mistakes and How to Avoid Them
Admit Your Vulnerabilities. Achilles forgot that he was human, failing to take inventory of his weakness in spite of superior strength. Though his faults were limited — a small tendon at the base of his foot — his failure to protect himself in the right spots proved fatal. When protecting data, it is imperative to understand that your greatest vulnerabilities lie with the people inside of your company. No matter how secure your computer systems, no matter how much physical security you deploy, humans will always be your weakest link. The more technological security you implement, the quicker data thieves will be to attempt to socially engineer those inside your company (or pose as an insider) to capture your data. Admitting vulnerabilities doesn’t have to be a public, embarrassing act. It can be as simple as a quiet conversation with yourself and key players about where your business is ignoring risk.
The three greatest human vulnerabilities tend to be: 1. Unawareness of the risks posed by data loss, 2. Lack of emotional connection to the importance of data privacy (personally in professionally) and it’s affect on profitability, and 3. Misunderstanding that in a world where information is power, it’s no longer about whom you trust, but how you trust. These symptoms suggest that your privacy training has either been non-existent or dry, overly technical, policy related and lacking a strong “what’s-in-it-for-me” link between the individuals in your organization and the data they protect every day.
If this is true inside of your business, rethink your training from this perspective: Your audience members (employees) are individuals with their own identity concerns, not just assets of the company who can be forced to follow a privacy policy that they don’t even pretend to understand. By tapping into their personal vulnerabilities regarding private information (protecting their own Social Security Number, etc.), you can develop a framework and a language for training them to protect sensitive corporate information. Like in martial arts, where you channel your opponent’s energy to your favor, use your employee’s humanness to your advantage. Pinpoint these vulnerabilities and shine the light of education on them.
Fight Prevention Paralysis. One of the most unfortunate and destructive character traits among humans is our hesitation to prevent problems. It is human nature to invest time to prevent tragedy only after we’ve experienced the pain that results from inaction. We hop on the treadmill and order from the healthy menu only after our heart screams for attention. We install a home security system only after we’ve been robbed. Pain motivates action, but the damage is usually done. You can bet that had he the chance to do it all over again, Achilles would slap a piece of armor around his heel (just like TJMAXX would encrypt their wireless networks and AT&T would secure their iPad data).
Prevention doesn’t get the proper attention because its connection to the bottom line is initially harder to see. You are, in essence, eliminating a cost to your business that doesn’t yet exist (the costs of a future data breach: restoring and monitoring customer credit, brand damage, stock depreciation, legal costs, etc.). This seems counterintuitive when you could be eliminating costs that already exist. But here is the flaw in that method of thinking: the cost of prevention is a tiny fraction of the cost of recovery. When you prevent disaster, you get a huge return on your investment (should a breach ever occur). Statistics say that a breach will occur inside of your organization, which means that by failing to invest in prevention you are consciously denying your organization a highly profitable investment. Why would you insure your business against low percentage risks (fire), but turn the other way when confronted with a risk that has already affected 80% of businesses (data breach) and has an almost guaranteed double digit ROI? It is your responsibility to demonstrate how the numbers work; spend small amounts of money preventing, or vast sums of time and money recovering.
Harden the Riskiest Targets. Once you have admitted to and cataloged your vulnerabilities and allocated the resources to protect them, it is time to focus on those solutions with the greatest return on your investment. A constant problem in business is knowing how to see clearly through information overexposure and pick the right projects. Just think of how much stronger Achilles would have been had he placed armor over his heel (which was human) rather than his chest (which was immortal). There is no financially responsible way to lower your risk to zero, so you have to make the right choices. Most businesses will gain the greatest security by focusing on the following targets first:
Bulletproof Your People. Most fraud is still committed the old fashioned way – by manipulating trusting, unsuspecting people inside of your organization. Train your people for what they are: the first line of defense against fraud. Begin by preventing identity theft among your staff and then bridge this personal knowledge into the world of professional data privacy.
Protect Your Mobile Data. Laptops, smart phones and portable drives are the most common sources of severe data theft. The solution to this very powerful and ubiquitous form of computing is a quilt-work of security including password strengthening, data transport limitations, access-level privileges, whole disk and wireless encryption, VPN and firewall configuration, physical locking and human decision making (e.g., don’t leave it unattended the next time you get coffee at your corporate conference).
Prevent Insider Theft: Perform thorough background checks, reference verification and personality assessment to weed out dishonest employees before they join your organization. Implement an ongoing “honesty meter” for your employees that ensures they haven’t picked up bad or illegal habits since joining your company.
Classify Your Data. Develop a system of classification that includes public, internal, confidential and top secret levels, along with secure destruction and storage guidelines.
Anticipate the Clouds. Cloud computing (when you store your data on other people’s servers), is quickly becoming a major threat to the security of organizational data. Whether an employee is posting sensitive corporate info on their Facebook page (which Facebook has the right to distribute as they see fit) or you are storing customer data in a poorly protected, non-compliant server farm, you will ultimately be held responsible when that data is breached. You must be aware of who owns that data, today and in the future, when your storage company is bought out or goes bankrupt.
We have much to learn from the foresight of New Zealand; they are an excellent example of how organizations should defend their Achilles’ heel. To begin with, they have begun to acknowledge their vulnerabilities in advance of the problem (in fact, their chief vulnerability is that dangerous form of innocence that comes from having very few data theft issues, so far). In addition, they are taking steps to proactively prevent the expansion of identity theft and data breach in their domain (as evidenced by the corresponding educational story on 60 Minutes). Finally, they are targeting solutions that cost less and deliver more value. I was in New Zealand to instruct them on data security. Ironically, I gained as much knowledge on my area of expertise from them as I believe they did from me.
John Sileo speaks professionally on identity theft, data breach and social networking safety. His clients include the Department of Defense, the FDIC, FTC, Pfizer and the Federal Reserve Bank. Learn more about bringing him in to motivate your organization to better protect information assets.
https://sileo.com/wp-content/uploads/2022/03/Sileo-Logo-2020-Horizontal-Color-Flat-web.png00johnsileohttps://sileo.com/wp-content/uploads/2022/03/Sileo-Logo-2020-Horizontal-Color-Flat-web.pngjohnsileo2010-11-10 12:20:152024-02-25 12:32:01Identity Theft Expert John Sileo on 60 Minutes
Technology is the focal point of data breach and workplace identity theft because corporations create, transmit, and store so many pieces of information digitally that it becomes a highly attractive target. This book is not intended to address the complex maze that larger organizations face in protecting their technological and digital assets. Rather, the purpose of this book is to begin to familiarize business employees, executives, and vendors with the various security issues facing them.
The task, then, is to develop a capable team (internal and external) to address these issues. In my experience, the following technology-related issues pose the greatest data-loss threats inside organizations:
Laptop Theft: According to the Ponemon Institute, 36 percent of reported breaches are due to a lost or stolen laptop.
Mobile Data Theft: Thumb drives, CDs, DVDs, tape backups, smart phones
Malware: Software that infects corporate systems, allowing criminals inside these networks
Hacking: Breaking into your computer system from the outside, using networks, wireless connections, remote access, and your Internet pipeline
Wireless Theft: Wireless connections to the Internet in airports, hotels, cafes, and conferences
Insider Theft: When someone in the IT department (or elsewhere) decides to make extra money by selling your data
According to the Ponemon Institute, ‘‘Thirty-six percent of all cases in this year’s study involved lost or stolen laptop computers or other mobile data-bearing devices. Data breaches concerning lost, missing, or stolen laptop computers are more expensive than other incidents. Specifically, in this year’s study, the per-victim cost for a data breach involving a lost or stolen laptop was just under $225, over $30 more than if a laptop or mobile device was not involved.’’ Continue Reading….
Prevent Identity Theft and Secure You and Your Bottom Line
This book builds a bridge between good personal privacy habits (protect your wallet, online banking, trash, etc.) with the skills and motivation to protect workplace data (bulletproof your laptop, server, hiring policies, etc.).
In Privacy Means Profit, John Sileo demonstrates how to keep data theft from destroying your bottom line, both personally and professionally. In addition to sharing his gripping tale of losing $300,000 and his business to data breach, John writes about the risks posed by social media, travel theft, workplace identity theft, and how to keep it from happening to you and your business.
https://sileo.com/wp-content/uploads/2022/03/Sileo-Logo-2020-Horizontal-Color-Flat-web.png00johnsileohttps://sileo.com/wp-content/uploads/2022/03/Sileo-Logo-2020-Horizontal-Color-Flat-web.pngjohnsileo2010-09-08 16:17:462023-07-06 12:58:27Identity Theft for Businesses: Mobile Data Breach
Most people wouldn’t throw out their Social Security card or toss a credit card in the trash. Yet careful souls worldwide have been dumping old computers by the millions, filling landfills with exactly that kind of sensitive information, where aggressive high-tech criminals can readily scoop it up.
According to the latest statistics from the EPA, 205 million computer products were disposed of in 2007, with a paltry 48 million of those recycled. That leaves plenty of identities in the garbage stream just waiting to be poached.
Indeed, many computers are being mined for Social Security numbers, credit card information, bank statements, investment records and various other tidbits that open the door for everything from credit card fraud to full-on identity theft. While exact numbers are difficult to come by, there’s no doubt it’s happening with ever more frequency.
“I’ve personally met hundreds of people who have had their identity stolen this way,” says John Sileo, identity protection expert and author of “Privacy Means Profit,” available at thinklikeaspy.com. “The thing is, if thieves are smart — which they are — it should be a massive problem, because it’s such an easy way to get data.”
You don’t have to be a victim. Taking these three simple steps when discarding a desktop or laptop computer virtually guarantees your private information can’t be stolen.
https://sileo.com/wp-content/uploads/2022/03/Sileo-Logo-2020-Horizontal-Color-Flat-web.png00johnsileohttps://sileo.com/wp-content/uploads/2022/03/Sileo-Logo-2020-Horizontal-Color-Flat-web.pngjohnsileo2010-09-07 09:56:062023-07-06 12:58:173 Steps To Take When Disposing Of Your Computer
John recently did a second radio interview on business identity theft for New Construction Strategies hosted by Ted Garrison. The construction industry, like most industries, battles with data theft on a daily basis. Insider theft, cyber crimes, social networking exposure – these are just a few of the areas that businesses need to defend against in the information economy. Listen to the interview to learn more.
“Privacy Means Profit” John Sileo with Ted Garrison
Data breach, identify theft, and corporate espionage can cause huge damage if you don’t stop them upfront because the impact goes right to your bottom line. “We spend thousands of dollars on our computers but we don’t necessarily put the money into protecting the data that is on them,” reports identity theft expert John Sileo. Listen Sileo explain how this can destroy your company and how to prevent this disaster.
LISTEN NOW
https://sileo.com/wp-content/uploads/2022/03/Sileo-Logo-2020-Horizontal-Color-Flat-web.png00johnsileohttps://sileo.com/wp-content/uploads/2022/03/Sileo-Logo-2020-Horizontal-Color-Flat-web.pngjohnsileo2010-08-31 09:03:142023-07-06 12:57:50Business Identity Theft Radio Interview, Part II
John recently did a radio interview on business identity theft for New Construction Strategies hosted by Ted Garrison. The construction industry, like most industries, battles with data theft on a daily basis. Insider theft, cyber crimes, social networking exposure – these are just a few of the areas that businesses need to defend against in the information economy. Listen to the interview to learn more.
“DODGING THE HIT FROM IDENTITY THEFT: WHY YOU SHOULD CARE” John Sileo with Ted Garrison
Data breach, identify theft, and corporate espionage can cause huge damage if you don’t stop them upfront because the impact goes right to your bottom line. Listen to John Sileo, author of Stolen Lives, describe the horrors of not protecting yourself as well as what you must do to protect yourself.
LISTEN NOW
https://sileo.com/wp-content/uploads/2022/03/Sileo-Logo-2020-Horizontal-Color-Flat-web.png00johnsileohttps://sileo.com/wp-content/uploads/2022/03/Sileo-Logo-2020-Horizontal-Color-Flat-web.pngjohnsileo2010-08-27 06:57:212023-07-06 12:57:42Business Identity Theft Radio Interview, Part I
A few months ago, Google got caught sniffing unencrypted wireless transmissions as its Street View photography vehicles drove around neighborhoods and businesses. It had been “accidentally” listening in on transmissions for more than 3 years – potentially viewing what websites you visit, reading your emails, and browsing the documents you edit and save in the cloud.
Public opinion blames Google, because Google is big and rich and and scarily omnipotent in the world of information domination. It’s fashionable to blame Google. What Google did was, to me, unethical, and they should eliminate both the collection practice and their archive of sniffed data.
But the greater responsibility lies with the businesses and homes that plugged in a wireless network and did nothing to protect it. Don’t tell me that you don’t know better. When you beam unencrypted data outside of your building, it’s no different than putting unshredded trash on your curb – YOU NO LONGER OWN IT. In fact, when you take no steps to protect the data that flies out of your airwaves and into the public domain, you really have no claim against someone taking it. It’s like finding a $100 bill on an abandoned sidewalk – you can claim it or the next lucky person will. Tom Bradley of PC World agrees:
The lesson for businesses and IT administrators is that you have to put forth some effort to at least give the appearance that you intend for the information to be private in order for there to be any inherent expectation of privacy. The burden should not be on Google, or the general public to have to determine whether the data you let freely fly about unencrypted is meant to be shared or is intended for a specific audience.
The Google story illuminates 5 Business Survival Lessons:
This, like so many other business issues,is not a technology problem. The technology to keep out unwanted eyes exists (unless a government wants to tap you) and is accessible and affordable. The problem is human — someone has decided to ignore what they know should be done (especially having read this article)
Private information that you fail to protect is no longer your private information (pragmatically and probably even legally).
In the marketplace of data, just like in business, it is your responsibility to control what you can. Not everything is in your power, but safe wireless transmissions are. Whether it’s trash in a dumpster, posts on Facebook or wireless signals, the responsibility is yours and your business’s, not just Google’s, Facebook’s and corporate America’s. You must do your part.
If you don’t employ at least WPA2 encryption currently on your wireless networks, I can nearly guarantee your data is being watched. And the expense of upgrading is minor compared to the prospect of breach, so lose that excuse.
Prevention isn’t sexy, but it’s profitable. Whether your are preventing data leakage, budget shortfalls, or a heart attack, the key is to do the hard work before it happens.
John Sileo is the award-winning author of Stolen Lives and Privacy Means Profit(Wiley, August 2010), a professional Financial Speaker and America’s leading identity theft expert. His clients include the Department of Defense, FTC, FDIC and Pfizer; his recent media appearances include 60 Minutes. Contact him on 800.258.8076.
https://sileo.com/wp-content/uploads/2022/03/Sileo-Logo-2020-Horizontal-Color-Flat-web.png00johnsileohttps://sileo.com/wp-content/uploads/2022/03/Sileo-Logo-2020-Horizontal-Color-Flat-web.pngjohnsileo2010-06-16 10:31:522023-07-06 12:54:145 Business Survival Lessons from Google’s Spying