Sponsor Robert Siciliano as he runs the Boston Marathon for Miles for Miracles, Children's Hospital Boston
ROBERT SICILIANO is fiercely committed to informing, educating, and empowering Americans so they can be protected from violence and crime in the physical and virtual worlds.

FREE EBOOK

Check here if you're human

Sponsors

Insider Identity Theft

Ransomware as a Service: A new threat to businesses everywhere

…y software current, use administrative rights and use a firewall. Use the most recent version of your operating system and browser. Back up all data. Train employees on security measures for all devices. How can you mitigate insider threats? Tune into the Carbonite webinar that I’ll be hosting live on Wednesday, March 15th at 11 am ET, to learn how. Register here: http://go.carbonite.com/security-threat/blog. Consultant Robert Siciliano is an…

How to protect your network from malicious insiders

…here is a pattern that most insider threats use: The first step is to gain access to the company’s system. Once they have access to the network, they will investigate it and seek out any vulnerable areas. The malicious insider then sets up a workstation to control the scheme and spread the destruction. What type of destruction can you expect? The hacker could introduce malware or they could steal or delete critical information, all of…

Businesses struggling to keep up with latest wave of malware attacks

…demand a ransom for access, climbed more than 110% in the last year alone. Once infected, the only way to regain access to the files is to pay a fee, usually between $300 and $500, for a decryption key. How can you mitigate insider threats? Tune into the Carbonite webinar that I’ll be hosting live on Wednesday, March 15th at 11 am ET, to learn how. Register here: http://go.carbonite.com/security-threat/blog. Consultant Robert Siciliano is an…

11 Ways to Mitigate Insider Security Threats

…a: Always encrypt your data If you want to minimize the impact of an insider threat, always encrypt data. Not all employees need access to all data and encryption adds another layer of protection. Know the different types of insider threatsThere are different types of insider threats. Some are malicious, and some are simply due to negligence. Malicious threats may be identified by employee behavior, such as attempting to hoard data. In this…

Introducing the very first Biometric Password Lockdown App

…mind, knowing that even the most brilliant hacker will never be able to duplicate or steal your gesture. Elimination of having to keep body-part details in files Keeping your privacy and security safe from being exposed against your control Being the first to benefit from this cutting-edge security technology You can actually receive early edition copies of the app for reduced prices and get insider information if you become a backer on…

The World’s First Biometric Password Lockdown App is here

…ioTect-ID’s technology out there so everyone knows about this groundbreaking advance in security. Here is what you’ll achieve: You’ll be the first to benefit from this hack-proof technology You’ll have peace of mind like you’ve never had before Eliminated possible exposure of your body parts data kept in files You can actually receive early edition copies of the app for reduced prices and get insider information if you become a backer on…

What is private Information and what is not?

…on their mobile phone…clicks the link, gives out sensitive company information and just like that a hacker has found his way in. Even when employees are trained in security awareness, this kind of risk will always exist. An insider could be the bad guy who visually hacks sensitive data on the computer screen of an employee who was called away for a brief moment by another employee. Tips for Training Employees on Security Savvy Make it fun. Give…

Data Breaches: How To Protect Your Business From Internal Threats

…stems administrator.” It’s apparent now that the nation’s most significant intelligence and security team failed to install the most up-to-date, anti-leak software. This news coincides with two recent reports that show insiders are becoming the most significant reason data breaches proliferate. While threats to data security and privacy are often perceived to come from the outside via criminal hackers, recent research has marked internal…

Protecting Your Business’s Data From Organized Crime

…olders and entire drives These 11 steps are a good start. However, standard security measures are never enough. Depending on the size, scope, type of data requiring protection, compliance and regulatory environment, possible insider threats, and what “bring your own device” policies may be in place, risks and threats must be defined and prioritized. This often requires consulting a professional. There are two considerations small…

Credit Card Theft increasing for Banks and Retailers

…s disclosed, 89 percent of the breaches and loss of data incidents could have been thwarted. 76 percent of breaches were due to stolen or weak account credentials. In 2013 alone, 40 percent of the top breaches were recorded. Insider mistakes or threats accounted for 31 percent of insiders. Social engineering was responsible for 29 percent of breaches. Physical loss such as forgetting where one placed a device, flash drive, etc., was responsible…

5 ways your identity is stolen

…your SSN are looking at your doctor, your school and even your bank. Once they find a vulnerability in those networks, they might sell your SSN on the black market for thieves to open new mobile phone accounts in your name. Insider identity theft: Employees with access to company databases have been known to download thousands and even millions of records onto a single thumb drive. Once accessed, the opening of new accounts begins. Tax fraud:…

Classifieds Ripe For Rental Fraud

…n Craigslist that scammers ended up relisting for a third of my asking price. People would pull into my driveway and knock on my door while the listing was active and even after the listing I posted had expired too. Business Insider reports, “Since lenders have tightened their requirements for getting a mortgage—which is making it harder to buy a home—the rental market is hot right now. Turns out, so is the online identity theft market, which is…

Protect Your Gaming Account As You Would Your Bank Account

…ot be such an obvious priority, but when accounts created for playing massively multiplayer online games are not properly secured, but connected to credit card accounts, gamers set themselves up for fraud. PCMech offers some insider tips for MMO players. The fundamentals of account protection include: Password protection: Never give out your password. If you contact customer service and they ask you to verify your account by providing a…

IT Security: Preventing Insider Threat

…ur small business and how you would get in if you lost your keys. Maybe through an unlocked window? And if a burglar knew what you knew about where you hide that extra key? How much damage could he do, knowing what you know? Insider threats pose the same problem. They know the ins and outs of all systems in place and can wreak havoc on your operation while they are employed and sometimes after they are let go. The problems begin when we put…

Identity Fraud: Stolen Puerto Rican IDs Filter In The Workplace

…ing Social Security cards, Puerto Rico birth certificates and other identification documents to undocumented aliens and others residing in the United States. Businesses hiring illegal immigrants with stolen IDs face possible insider fraud among other legal and liability issues. One way too effectively vet whether the person being hired is who they say they are, regardless of what documentation they produce is to pull their credit report. Often a…

Insider Identity Theft Still a Problem

…about personal security and identity theft, headlines often read “Utility Worker Steals Identities” or “Human Resource Officers Steal Identities” and even “Police Officer Steals Identities.” Back then the primary concern was insider identity theft, perpetrated by those who had direct access to victims’ data. Ecommerce grew up, and more people started banking and shopping online. Black Friday turned into Cyber Monday, and companies like eBay and…

Top 5 Business Security Risks

…cookies, or codes stored in temp files. Some operating systems also include an “auto-complete” feature, which remembers usernames and passwords. 4. Inside Jobs: With millions losing jobs, there are many opportunities for an insider to plug in a thumb drive and steal client data or other proprietary information. Networks are like candy bars, hard on the outside, soft and chewy on the inside. Insiders who fear layoffs may be easily tempted to use…

Criminal Hackers Responsible For Most Data Breaches

…data breach events that occur. It is clear that without a mandatory national reporting requirement, many data breaches will continue to be unreported, or under-reported.” The majority of these attacks were malicious hacks or insider theft, rather than the result of employee errors. InformationWeek reports, “Some states, but not all, have data breach notification laws, which require any organization that suffers a breach to notify that state’s…

Data Leakage is a Correctable and Solvable Problem

…/download to USB sensitive data without any problem. I’ve said this before and I’ll say it again: Zafesoft can prevent such incidents from both of the above. Company administrators can remove access for a suspected malicious insider at any time and even if they have the physical file with them, it’ll be in encrypted format which they won’t be able to open. Secondly, the Zafe technology travels with the information so they…

Insider Identity Theft

10 Business Identity Theft Risks in 2010

…. By gaining the trust of employees over the phone, via email or in person, a con-man can get almost anything he needs to get whatever he wants. The best defense is effective policies coupled with ongoing awareness training. Insider identity theft can ruin your business. Most companies have done their due-diligence to keep the bad guy from hacking from the outside. But many organizations have neglected the risks associated with employees gone…

Data Breaches: The Insanity Continues

…sk is made more difficult by the scarcity of information provided (publicly) for approximately 1/3 of the recorded breaches. For the remainder, those events that do state how the breach occurred, malicious attacks (Hacking + Insider Theft) have taken the lead (36.4%) over human error (Data on the Move + Accidental Exposure = 27.5%) in 2009. This was a change from all previous years, where human error was higher than malicious attacks. One theory…

Expanding Internet Capabilities Makes U.S. IT More Vulnerable

…and software along the global supply chain route, conduct remote intrusions into our networks, establish the physical and technical presence necessary to re-route and monitor our wireless communications, and plant dangerous insiders within our private sector and government organizations. The actors that currently have all of these capabilities – which is a finding that is distinct from whether and when they are using them – include…

Identity Theft 2010 Top 10 Predictions

…medical care will cause a spike in this area of identity theft. The Social Security Administration has noted an increase in uninsured people using the coverage of a friend, relative or even a stranger to get medical care. 7. Insider Identity Theft: In the coming year, this will increase due to the failure to follow simple security protocols in the workplace. This will create opportunities for thieves to gain access to personal identifying…

Smarten Up. Increase Your Information Security Vocabulary

…assist them in decision making. They and their merry band of volunteers are watching you. USAToday Michelle Kessler is all technology and Byron Acohido and Jon Swartz are very respected journalists who come up with the best insider stories on the planet, and have never ever called me. The Washington Post Security Fix by Brian Krebs. Nobody has more crack heads, meth addicts and criminal hackers begging to tell their stories to a well known…

Insider Identity Theft Can Be Most Damaging

…ear over an eight year period by compromising the online bank accounts of numerous employees and wiring money to fraudulent accounts outside the bank. This is a classic case of the fox watching the hen house. This guy was an insider terrorist, looking his colleagues straight in the eye and lying to them. I rank him with pedophiles and serial killers. As much as 70% of all identity theft is committed by someone with inside access to organizations…

Insider Identity Theft Poses Major Threats

Robert Siciliano Identity Theft Expert A Boston woman has been indicted for allegedly stealing at least 34 identities, which she was able to access from her workplace, a medical cost-management firm. “This was an extensive scheme in which the defendant used her access to the victims’ personal identifying information as a means to steal their identities, obtain credit cards in their names without their knowledge, and then use those credit…

Check Fraud Identity Theft is Rising

…s,” to deposit and cash counterfeit checks, netting them millions of dollars. Three bank tellers were involved, stealing and selling customer profiles which included names, Social Security numbers, and account numbers. Insider identity theft of this kind accounts for up to 70% of all instances of identity theft. Check fraud victims include banks, businesses and consumers themselves. Our current system for cashing checks is somewhat flawed….

Malicious insider attacks to rise. McAfee has a warning

…’s biggest software maker has warned companies to expect an increase in “insider” security attacks by disgruntled, laid-off workers. With millions losing their jobs their are a plethora of opportunities for insiders to plug in an iPod, thumdrive or other external source and steal client data, or other proprietary information. Its been said before, company networks are like candy bars, hard on the outside and soft and chewy on…

Identity Theft Protection Expert and One You Security: Efforts to Remove Social Security Numbers from Medicare Cards Are Misplaced

…t attributed to the office of U.S. Congressional Representative Paul Hodes (Dem.-NH) called for legislation to remove Social Security numbers from senior citizens’ Medicare cards. But according to at least one industry insider, Robert Siciliano — the widely televised and quoted identity theft protection expert and chief security analyst for One You Security, LLC — the effort is well-meaning yet misplaced. Furthermore, Siciliano…

 

Xtreme School

Featured in

Anderson Cooper John Stossel Robert Siciliano Featured in