7 Steps to Secure Profitable Business Data (Part III)

By | July 10th, 2011|Uncategorized|

By John Sileo, [cc id='csid'] consumer security expert In Part II of this series, we started getting on our way in the technological side of protecting our business’ data. Once you go through with the remaining three steps, you should feel confident in the measures you took to secure your business. 5. Don’t let your [...]

Top 7 Tips to Prevent Identity Theft (Part I)

By | May 28th, 2011|Uncategorized|

By John Sileo, [cc id='csid'] consumer security expert Step one of my 7 Steps to Secure Profitable Business Data is to “Start with the humans.” It is crucial to the success of your business’ security efforts that you give your employees the tools to protect themselves personally from identity theft. This develops a privacy language [...]

7 Steps to Secure Profitable Business Data (Part II)

By | April 1st, 2011|Uncategorized|

By John Sileo, [cc id='csid'] consumer security expert In the first part of this article series, we discussed the first two steps of securing your business data, which focus on resolving the underlying human issues behind data theft. The remaining five will help you begin protecting the technological weaknesses common to many businesses—take on the [...]

7 Steps to Secure Profitable Business Data (Part I)

By | February 15th, 2011|Uncategorized|

By John Sileo, [cc id='csid'] consumer security expert Everybody wants your data. Why? Because it’s profitable, it’s relatively easy to access and the resulting crime is almost impossible to trace. Take, for example, the 100+ million customer records have been breached in the past months. Sony PlayStation Network, Citigroup, Epsilon, RSA, Lockheed have faced billions [...]

John Sileo – Privacy and Identity Theft Expert

By | September 12th, 2010|Uncategorized|

John Sileo’s identity was stolen out of his corporation and used to commit a series of crimes, including $300,000 worth of digital embezzlement. While the data thief (an "internal spy") operated behind the safety of John’s identity, John and his business were held legally and financially responsible for the felonies committed. Ultimately, the data breach [...]

Load More Posts