Avatar

About csid-root-admin

This author has not yet filled in any details.
So far csid-root-admin has created 9 blog entries.

Calculate Your Business’ Data Risk & Restoration Costs

By | August 29th, 2011|Uncategorized|

By John Sileo, [cc id='csid'] consumer security expert Businesses everywhere are under assault. Thieves want to access your customer databases, employee records, intellectual property and ultimately your bottom line. More than 80% of businesses surveyed have already experienced at least one breach. Combine this with the average cost to repair data loss—a stunning $7.2 million [...]

7 Steps to Secure Profitable Business Data (Part III)

By | July 10th, 2011|Uncategorized|

By John Sileo, [cc id='csid'] consumer security expert In Part II of this series, we started getting on our way in the technological side of protecting our business’ data. Once you go through with the remaining three steps, you should feel confident in the measures you took to secure your business. 5. Don’t let your [...]

Medical Identity Theft in 2011 (Part III)

By | June 12th, 2011|Uncategorized|

Adam Kennedy - [cc id='csid'] Restoration Supervisor; Certified Identity Theft Risk Management Specialist Medical Identity Theft is a hot topic in the ID theft industry due to the severity of the consequences involved in this type of fraud. For that reason, I have been writing this series to inform you of how medical identity theft occurs [...]

Top 7 Tips to Prevent Identity Theft (Part I)

By | May 28th, 2011|Uncategorized|

By John Sileo, [cc id='csid'] consumer security expert Step one of my 7 Steps to Secure Profitable Business Data is to “Start with the humans.” It is crucial to the success of your business’ security efforts that you give your employees the tools to protect themselves personally from identity theft. This develops a privacy language [...]

Medical Identity Theft in 2011 (Part 2)

By | April 20th, 2011|Uncategorized|

Adam Kennedy - [cc id='csid'] Restoration Supervisor; Certified Identity Theft Risk Management Specialist I recently began a series covering the severity of medical identity theft. In Part II of this series, I am going to cover some of the ways Identity Thieves are using medical information to commit fraud and put both your health and [...]

7 Steps to Secure Profitable Business Data (Part II)

By | April 1st, 2011|Uncategorized|

By John Sileo, [cc id='csid'] consumer security expert In the first part of this article series, we discussed the first two steps of securing your business data, which focus on resolving the underlying human issues behind data theft. The remaining five will help you begin protecting the technological weaknesses common to many businesses—take on the [...]

Medical Identity Theft in 2011 (Part 1)

By | March 26th, 2011|Uncategorized|

Adam Kennedy - [cc id='csid'] Restoration Supervisor; Certified Identity Theft Risk Management Specialist By now you’ve heard horror stories involving individuals’ credit scores being ruined by financial identity theft, ads on the television for credit monitoring protection, and you may have experienced identity theft in your own home.  While financial identity theft continues to receive [...]

7 Steps to Secure Profitable Business Data (Part I)

By | February 15th, 2011|Uncategorized|

By John Sileo, [cc id='csid'] consumer security expert Everybody wants your data. Why? Because it’s profitable, it’s relatively easy to access and the resulting crime is almost impossible to trace. Take, for example, the 100+ million customer records have been breached in the past months. Sony PlayStation Network, Citigroup, Epsilon, RSA, Lockheed have faced billions [...]

John Sileo – Privacy and Identity Theft Expert

By | September 12th, 2010|Uncategorized|

John Sileo’s identity was stolen out of his corporation and used to commit a series of crimes, including $300,000 worth of digital embezzlement. While the data thief (an "internal spy") operated behind the safety of John’s identity, John and his business were held legally and financially responsible for the felonies committed. Ultimately, the data breach [...]

Load More Posts