Posts

Identity Theft for Businesses: Mobile Data Breach

,

Mobile Data Theft

Technology is the focal point of data breach and workplace identity theft because corporations create, transmit, and store so many pieces of information digitally that it becomes a highly attractive target. This book is not intended to address the complex maze that larger organizations face in protecting their technological and digital assets. Rather, the purpose of this book is to begin to familiarize business employees, executives, and vendors with the various security issues facing them.
The task, then, is to develop a capable team (internal and external) to address these issues. In my experience, the following technology-related issues pose the greatest data-loss threats inside organizations:

  • Laptop Theft: According to the Ponemon Institute, 36 percent of reported breaches are due to a lost or stolen laptop.
  • Mobile Data Theft: Thumb drives, CDs, DVDs, tape backups, smart phones
  • Malware: Software that infects corporate systems, allowing criminals inside these networks
  • Hacking: Breaking into your computer system from the outside, using networks, wireless connections, remote access, and your Internet pipeline
  • Wireless Theft: Wireless connections to the Internet in airports, hotels, cafes, and conferences
  • Insider Theft: When someone in the IT department (or elsewhere) decides to make extra money by selling your data

According to the Ponemon Institute, ‘‘Thirty-six percent of all cases in this year’s study involved lost or stolen laptop computers or other mobile data-bearing devices. Data breaches concerning lost, missing, or stolen laptop computers are more expensive than other incidents. Specifically, in this year’s study, the per-victim cost for a data breach involving a lost or stolen laptop was just under $225, over $30 more than if a laptop or mobile device was not involved.’’ Continue Reading….

The post above is an excerpt from John’s latest book Privacy Means Profit. To learn more and to purchase the book, visit our website www.ThinkLikeASpy.com.

Privacy Means Profit

Prevent Identity Theft and Secure You and Your Bottom Line

This book builds a bridge between good personal privacy habits (protect your wallet, online banking, trash, etc.) with the skills and motivation to protect workplace data (bulletproof your laptop, server, hiring policies, etc.).

In Privacy Means Profit, John Sileo demonstrates how to keep data theft from destroying your bottom line, both personally and professionally. In addition to sharing his gripping tale of losing $300,000 and his business to data breach, John writes about the risks posed by social media, travel theft, workplace identity theft, and how to keep it from happening to you and your business.

Identity Theft Prevention in a Hotel

, ,

I just finished giving an identity theft prevention and data privacy speech for Pfizer and one of the questions I received was how to protect your laptop, passports, client files, etc. when you leave them behind in your hotel room. I’ve blogged on this before, but thought that I would post a quick video reminder on protecting your identity in a hotel room. We are at such a greater risk of identity theft when we are traveling that it is worth taking a second look at your habits.

For more tips of this type, please visit my YouTube Identity Theft Expert Video Channel at www.YouTube.com/JohnSileo. It is relatively new, but my office is working diligently to add content every week. Some people like to read, some like to watch, so I will continue to add blogs of both types. Travel wisely this summer.

John Sileo
Motivational Identity Theft Speaker

Protect Your Laptop from Identity Theft while Traveling

DND.jpgI just finished speaking to an amazing group of financial advisors at the Lincoln Financial Group Planning Forum. This is a group of people who take the security of their business information, the privacy of their clients and their own personal data safety very seriously. It was an identity theft prevention speech, but specifically geared to the exceptional amount of identity handled by financial planners. These are people who have to proactively protect physical client files, filing cabinets, computers access, wired and wireless networks, trash, mail, hiring policies (to avoid bringing an identity thief into the company), mobile devices, and many other forms of information vulnerability as part of their everyday job. That is a lot of responsibility, and this group handles it beautifully. But I gave them some advice that turned out to be suspect… Read more