Sponsor Robert Siciliano as he runs the Boston Marathon for Miles for Miracles, Children's Hospital Boston
ROBERT SICILIANO is fiercely committed to informing, educating, and empowering Americans so they can be protected from violence and crime in the physical and virtual worlds.

FREE EBOOK

Check here if you're human

Sponsors

Medical Identity Theft

Must-have Apps for Safe Long Distance Driving

…nearing dangerous weather. This app automatically updates to wherever you currently are located. Additional Apps for Road Travel iTriage helps you figure out medications and medical conditions. It tells you where the nearest medical treatment centers are. You can also ask medical questions and get fast answers. So if, for instance, you notice that one of your legs has begun to swell and ache after you’ve been on the road all day, you can plug in…

Before you die, do This

…d have copies of life insurance documents and contact information for the carrier. In a Nutshell, the Top 26 Marriage license Divorce papers Living will (what should be done if you’re alive but incapacitated) Personal/family medical history Authorization to release medical care information Durable healthcare POA Do-not-resuscitate (DNR) order Tax returns Housing, land and cemetery deeds Escrow mortgage accounts Proof of loans made and owed debts…

Tips for backing up and protecting your data while traveling

…son of giving is now upon us — but don’t forget, it’s also the season of stealing — and no, I don’t mean your wallet or the gift package at your doorstep, but your Social Security number, credit card information, medical records and any other highly confidential information that you have stored on your computers. Thieves want your data — the information stored in your smartphone, laptop and other devices. People are especially…

Why you want a Copy of your Medical Records

…a file cabinet. But medical identity theft is very much out there; know the signs: You’re denied coverage because you allegedly have a condition you were never diagnosed with. A collection agency is hounding you about unpaid medical bills you never had. Your credit report shows medical collection notices. The bill is for treatment you didn’t receive. Your health care provider says you’ve reached your coverage limit. Thieves steal identities to…

Medical Identity Theft can be deadly

…e scams; the thief knows if he sends 50,000 such e-mails out with his special software, a predictable percentage of recipients will “see” themselves in the message. A one-ring phone call may be a thief who just obtained your medical records to see if your number is legitimate. Never call back. Be Vigilant If you suspect medical identity theft, keep strict records of all associated correspondence. Immediately obtain all records if you already…

Frequently Asked Questions About Identity Theft

…t? No, financial identity theft, using your personal information to access your money or credit, is not the only type of identity theft, although it is the most common. There are other kinds of identity theft identity theft. Medical identity theft is when someone uses your information to receive medical care. Criminal identity theft is when someone takes over your identity and assumes it as his or her own. They can then give your name to law…

10 Ways to protect Yourself while traveling

…ing or a mugging. But don’t wait till you’re aimlessly wandering the piazza with your face buried in a huge map to take precautions against less violent forms of crime. Before traveling, make copies of your driver’s license, medical insurance card, etc., and give these to a trusted adult. Have another set of copies in your home. Scan them and email to yourself. Never post your travel plans on social media until you return. You never know who’s…

How The Internet of Things can go very wrong

The Internet—one of history’s greatest inventions—is also one of history’s greatest platforms for crime. Here are ways things can go very wrong with the Internet of Things. Med-hacking. Researchers have hacked many medical devices. Though it apparently hasn’t happened in the real world, yet, but it looks like it’s only a matter of time before medical equipment becomes hacked, such as automatic insulin pumps and pacemakers. The FDA is quite new…

Mailroom Error, Big Data Breach

…the case involving about 3,700 Medicare Advantage members. Freedom Blue and Security Blue members received risk assessment results that actually belonged to other individuals. The addresses, birthdates, member ID numbers and medical information of some members ended up in the hands of other members. And how? An innocent mistake committed by a mailroom employee. Though there was no evidence of malicious use of this personal information, it just…

Healthcare High on Hackers’ Hitlist

…ising to see breaches become more common in the healthcare sector. What distinguishes healthcare-industry hacking from retail hacking is that the retail hacker simply wants a credit card number. But the crook who cracks into medical records—that’s your patients’ individual profile chockfull of personal medical information. Healthcare hackers may want to steal your patients’ identities to commit insurance fraud, so your records should be…

Medical Identity Theft Can be Deadly

…ne can access your mail. Keep medical documents secure: Keep all of your hard copy medical documents in a file that locks. If it’s in cyberspace, make sure the files are encrypted and not in folder on your desktop that says “Medical.” Shred all medical documents: Make sure to properly dispose of your medical documents so you don’t become a victim to dumpster-diving thieves. This includes digital files as well.McAfee LiveSafe (put tm in here and…

Data Brokers: Walking the Tightrope

…thing new, the volume and type of data has changed, thanks to the Internet, making data broking a multibillion dollar venture. Today’s technology allows data brokers to snatch and sell information about your closest friends, medical conditions, unsavory habits, even your literal footsteps—online and offline. Data brokers today will classify people into groups such as those with genetic diseases or poverty. These are called vulnerable consumers,…

Medical Identity Theft Protection And Prevention

…ercent of ID theft is medical, says the Identity Theft Resource Center. The nonfatal fallout of medical identity theft can be quite dastardly, like the crook using your private data to commit other forms of ID theft. Prevent Medical ID Theft Always review your medical bills. Is a bill for service your child never received? Never give your health insurance card to anyone for their use. Shred medical documents you no longer need, including…

Healthcare Data under Attack

…tion to security. One hospital visit can net six to 10 companies having access to your data, says Kam. This includes the ambulance company, hospital, extraneous labs and the health insurance company. If someone snatches your medical records, you’ll be in a major jam. For instance, the thief who claims to be you can get medical treatment for an STD—and that will go on your record. Worse, the thief may have a different blood type. What if you’re…

The Future of Identity Theft

…d SSN. So your identity can be defined by how you move a mouse and your keystroke patterns. Medical Identity There’s no focal mechanism for the mitigation of medical identity theft, making it easy for thieves to keep getting medical treatment. Many people get their medical identity stolen without knowing it. Statistics Crime rate statistics are not telling the whole story. The illusion is that crime rates are on the decline; this is because…

Healthcare Records vulnerable to Criminals

…licious events can occur within a healthcare IT environment during the time that intelligence is gathered. Not only can cyber criminals get ahold of patient addresses, SSNs and medical condition data, but they can manipulate medical equipment. Healthcare providers accounted for 72 percent of malicious traffic according to the SANS-Norse Healthcare Cyberthreat Report. In addition, healthcare business associates: 9.0 percent; health plans: 6.1…

Health Care Information Breaches rise

…on is shared. People who know that HIPAA isn’t airtight can be turned off from revealing they have an STD or a psychiatric disorder to their doctor unless absolutely necessary. Patients must be notified by their health plan, medical institution or medical provider when it’s been determined that their health information has been breached, says HITECH law. The Department of Human Health must also be notified. The Department will reveal breaches…

Medical Identity Theft: Ins and Outs

…allows a thief access. Hospitals rely on the honor system, believing patients are who they say they are—but people lie. And while most of the administrators are doing their jobs ethically, some lie too. When a thief steals a medical ID to procure medical care, the thief’s medical condition and diagnosis are added to the victim’s medical record. Ouch. This may end up as a misdiagnosis, and the introduction of data that might conflict with the…

Does Identity Theft Protection Really Work?

…th criminals who broker our stolen data. There are websites that store our information. If your sensitive data shows up, you are notified. Medical identity theft protection: Some companies say they will help protect you from medical identity theft. I’m not sure how, but maybe they have relationships with the Medical Information Bureau. Recovery: When you read the fine print, it usually says the company will only help you recover from identity…

Cheating and Bullying: It’s a Bigger Problem than You Think!

The whole purpose of your “youth” is to grow and learn. It’s time to take in lots of information, so ultimately they can evolve, accomplish, and get ahead. However the pressure to grow and climb the ladder of life often leads to unwanted behaviors and actions that lead to significant negative consequences. And with everyone being online these days, it only adds to these consequences. Technology has really added fuel to the fire for two…

The Upside of Electronic Health Records – Will This Be Possible?

…the same time. The patient then takes the smart card to a drugstore, where the pharmacist can insert it into a reader to confirm the details of the prescription. Meanwhile, those details are now on the database so that other medical professionals can view them as necessary. The downside of digitizing medical documents is that opening up sensitive personal data to greater numbers of people can increase the risk of it being viewed by unauthorized…

Mobile Malware is Here: Beware!

…ur friends and family and store their phone numbers. Today’s smartphones have become our most personal computer and contain much more than pictures and contacts. They now allow us to access financial data, bank accounts, and medical information from anywhere at any time. And for many people, their mobile device has or is replacing their PC. With all this convenience and access, comes some risk. Criminal hackers see this as an opportunity for…

Mobile Security: Tips for Using Personal Devices at Work

…lth Insurance Portability and Accountability Act also known as *HIPAA: The rule under HIPPA requires health plans, health care providers, and others required by HIPAA to notify individuals (patients) of any breaches of their medical data. Overall routine patient information is gathered for all hospital patients, such as the patient’s Social Security number, name, address, D.O.B, gender and other data that helps them authenticate the patient’s…

Are Your Mobile Apps Up To No Good?

…t this infographic…   If it’s digital then that means it’s also “repeatable” and can be copied, pasted, duplicated and sent an infinite amount of times. For example 18.3 million US adult Smartphone owners have looked up medical information. 32.5 million US adult Smartphone owners access banking information. Using applications that don’t care much about your privacy can expose this data. Android applications can ask for 124 types of…

Identity Thief Gets 4 Years in Club Fed

…fake driver’s licenses, washed checks, and used “mules” to steal sensitive documents, make purchases with stolen credit, and sell the merchandise. The thief’s attorneys described him as a “38-year-old drug addict who has had medical and mental setbacks and was living in a motel.” I don’t know what his mental setbacks are, but all the meth he was doing may have been a contributing factor. I spoke about this very case at the Merchant Risk…

How to Respond in a Medical Emergency

First, I’m no doctor so this advice is not intended to be substitute for consulting with a medical professional. If you think you are experiencing a medical emergency, seek immediate medical attention. But I am a Dad and these things interest me. So I hopped on over the American College of Emergency Physicians (ACEP) and took a page out of their book “What to do in a Medical Emergency” They have information on everything from Abdominal Pain to…

I’m Running the Boston Marathon Monday April 16th

…nsive and extremely time consuming. Early in my training I’ve had “IT Band Syndrome” issues. And anytime they attach “syndrome” to anything you’re pretty much disadvantaged. This means the medical community doesn’t have an answer. This is a ligament/tendon that starts at your hip and ends at your knee that hurts to heck after about 2 miles at the knee. After about 20 physical therapy treatments and…

How Safe Is Paying With Your Phone?

…ent sign-on experience for both their online and mobile channels, including multifactor authentication programs for mobile. Consumer Reports estimates that almost 30% of Americans that use their phones for banking, accessing medical records, and storing other sensitive data do not take precautions to secure their phones. Download a mobile security product such as McAfee Mobile Security. This is particularly crucial for Android users, as Androids…

One in Three Massachusetts Residents’ Records Breached

…significant resources to securing their data, you’re more than likely at least as vulnerable. The Boston Globe reports, “Personal information from nearly one out of three Massachusetts residents, from names and addresses to medical histories, has been compromised through data theft or loss since the beginning of 2010, according to statistics released yesterday by the office of Attorney General Martha Coakley.” Facts: Since January 2010, 1,166…

Safe Banking On Your Mobile Device

…le banks are trying to do their part, users have to take additional steps to make sure that their mobile data is protected. Consumer Reports estimates that almost 30% of Americans that use their phones for banking, accessing medical records, and storing other sensitive data, do not take precautions to secure their phones. So, here are some tips for mobile bankers of all ages to keep you safe while banking on the go: Connect to your bank’s mobile…

Data Theft Doesn’t Always Mean Being Hacked

…breached record in the hopes the service will mitigate the loss. Data loss like this may cost UCLA hundreds of thousands of dollars by the time the dust settles. The documents stolen were birth certificates, home addresses, medical documents and numerical medical identifiers. The information breached did not include Social Security numbers or financial information. Meanwhile reports state the data was encrypted, but the password to access the…

2012 Threats: Are You Ready?

…phone. – Hacked cars, GPS and any wireless equipment—Cybercriminals are now targeting embedded operating systems or even hardware to gain control of everything from cars to global positioning system (GPS) trackers and medical equipment. – Cyberwar—Not trying to create fear here, just from observation, McAfee Labs has seen an increase in high-tech spying and other “cyber” techniques to gain intelligence. As technology evolves and our…

Boosting Healthcare Security with Smart Cards

…ts’ identities. “Accurate identification of each person that receives healthcare” is “the cornerstone of quality medical care and good health systems management.” This benefits patients in several ways, including: “Decreases medical errors. Optimal medical care requires that a healthcare provider have access to all relevant medical history and know what medications have been prescribed. A validated patient identity can be linked to a healthcare…

Medical Temp Arrested For Identity Theft

You’ve probably heard the phrase “a fox watching the henhouse.” Today, that applies to people on the inside of organizations who work in trusted positions, and who use those positions to steal client or employee information for their own personal gain. As much as 70% of all identity theft is committed by individuals with inside access to organizations such as corporations, banks, or government agencies, or by someone who has an existing…

Home Alarm System Aids Tornado Victims

The ADT Pulse alarm system I have has a “Panic” button in case we are in an emergency situation where we need help. I’ve always visualized situations such as home invasion or maybe medical or fire emergency as its intended function. Well one ADT customer Jarod Stice and his fiancé Jessica Bennett — along with their dog – were huddled under two sheets of plywood and a tarp in the basement of their new Joplin, MO home, while one of the…

Top 5 Business Security Risks

1. Data Breaches: Businesses suffer most often from data breaches, making up 35% of total breaches. Medical and healthcare services are also frequent targets, accounting for 29.1% of breaches. Government and military make up 16.2%, banking, credit, and financial services account for 10.5%, and 9.2% of breaches occur in educational institutes. Even if you protect your PC and keep your critical security patches and antivirus definitions updated,…

Scammers Use Medical Issues To Prey On People’s Good Nature

…ch who believed they were helping to pay for her son’s medical care as he underwent chemotherapy. She is accused of shaving her son’s head and eyebrows. Court records show she told her son he had leukemia.” These medical scams are generally successful because someone somewhere is going to tap into their good nature and help out. And while I suggest helping out whenever possible, simply beware of medical and disease scams and be…

Identity Thief Steals Identity For 17 Years

…if he himself had a criminal record, was married, and on welfare. While the real Smith has no criminal record, he spent eight days in jail because of Kidd’s crimes. The real Smith has had liens placed on his home, was denied medical care, and lost his driver’s license, all because Kidd stole his identity. When people ask, “Why would anyone steal my identity? I have no money,” I point to Kidd. When they say, “But I have bad credit,” I point to…

Dealing With Daily Digital Surveillance

Our everyday activities are being monitored, today, right now, either by self-imposed technology or the ever-present Big Brother. Traditionally, documenting our existence went like this: You’re born, and you get a medical and a birth record. These documents follow you throughout your life, filed and viewed by many. You must present these records in order to be admitted to a school, to be hired, or to be issued insurance. You get a Social…

Planning To Travel Safely And Securely

…ness. #2 Register with the US Embassy or Consulate and inform them and relatives of your exact travel plans. If your destination becomes unstable, the embassy will make you aware of the current climate. Know your options for medical care. #3 Get your shots, including Hepatitis A and B and Tetanus/diphtheria vaccinations. Malaria and other intestinal virus can ruin a trip or even kill you. #4 Get medical travel insurance. This doesn’t need to be…

Blue Cross Blue Shield Applications Found in Trash

…eally have no control over what that agent will do with the information. Private investigator William Cobra Staubs, was doing some dumpster diving conducting some “research” this week and happened upon a big box of discarded medical files and applications tossed there by what appears to be a Blue Cross Blue Shield agent who didn’t need them any longer. He found over 30 documents and approximately 50 Social Security numbers. “Cobra”, as he is…

5 Tips to Help Prevent Home Invasion

…out to get very graphic. The Boston Globe reports “A woman hacked to death with a machete and knife in her home was alive for all 32 slash and stab wounds that split open her skull, sliced through bones and pierced organs, a medical examiner testified.” Steven Spader, 17 years old at the time formed “Disciples of Destruction” a gang, “pleaded not guilty to first-degree murder, attempted murder, conspiracy to commit murder and burglary and…

Part 1 of Identity Theft – 5 Identity Theft Myths Unveiled

…rotected and private in a locking file cabinet at home or protected PC. Opt out of junk mail. Invest in an identity theft protection service and get a credit freeze. #2 Identity theft is only a financial crime. There is also medical identity theft when someone poses as you to get medical attention, criminal identity theft when the thief commits crimes under your identity. There is also employment fraud when they use your SSN to get a job and…

McAfee Reveals the Top Ten Most Dangerous Places to Leave Your Social Security Number

…d products for the medical field such as distributers of diabetes or dialysis supplies, medical billing services, pharmaceutical companies, etc.) #8 – Non-Profit Organizations (23) #9 – Technology Companies (22) #10 (tied) – Medical Insurance and Medical Offices/Clinics (21) Your Social Security Number is Your National ID For the past 70 years, the Social Security number has become our de facto national ID. The numbers were first issued in the…

11 Ways To Prevent Home Invasions

…reason your house is chosen is someone tipped off the home-invader that you have valuables. You may have done it via social media or your friends or children or baby sitter might have unintentionally bragged. In states where medical marijuana is legal that may be an additional consideration. Peephole: Install peepholes, talk through the door. Do not call the police!: If you live in a high crime area where law enforcement takes a while to…

Almost 13 Million Records Breached in 2010…So Far

…heft Resource Center, there have been 371 data breaches that have exposed 12,871,065 records so far this year in the United States. NetworkWorld reports that businesses suffered the most breaches, making up 35% of the total. Medical and healthcare services accounted for 29.1% of breaches. The government and military made up 16.2% of breaches. Banking, credit, and financial services experienced 10.5% of breaches, and 9.2% of breaches occurred in…

Telemarketing Scams Target the Elderly

…blem, and a legal fee — that requires victims to send a sizable chunk of cash to free up their winnings. The recent victims are elderly and, for the most part, widowed, childless or estranged from family. They may have medical or other issues that cloud their judgment.” Once the bad-guy locks in on them, they won’t let go until the bank account is beyond empty. Victims have been known to pull all the equity out of their houses as well. In…

Medical Identity Theft

2008-2009 Press Releases

…Affect a Total of Nearly One Million Consumers as Industry Fights Legislation February 7, 2008 : MyLaptopGPS and Identity Theft Expert:Loss of Laptops Belonging to Health Insurers Have Placed Hundreds of Thousands at Risk of Medical Identity Theft January 24, 2008 : MyLaptopGPS and Identity Theft Expert:Massive Holes in Laptop Computer Security Can Cost Organizations Millions January 17, 2008: Identity Theft Expert and Speaker on Personal…

Woman Suspect in Pot Stealing Home Invasion

…le the pot plants as well as electroni cs. The teen was not harmed. Luck il y. The pot plants belonged to the teen’s mother, who is a medicinal marijuana card-holder . California has led the charge to legalize weed for medical purposes. And many a quack provides medicinal marijuana cards to anyone who has even the slightest ailment. A side effect of having the law past has led to many such crimes. Even though it ’ s semi legal, it’s still…

Data Breaches Persist In Health Care

…#8217;t recognize, do an online search to see what it is you’ve found. You should also set administrative privileges to prevent the installation of new software without your knowledge. If you must use P2P software, be sure that you don’t share your hard drive’s data. When you install and configure the software, don’t let the P2P program select data for you. The Smartcard Alliance has released an in-depth report called “Medical Identity Theft in…

Published Articles

…identity-card-focuses-on-us-workers-immigrants MARCH http://bizsecurity.about.com/b/2010/03/03/you-can-rob-my-office-now.htm (quoted March 2010 You Can Rob My Office Now) http://www.acetermlife.com/health/how-to-protect-your-medical-identity (quoted March 2010 How to Protect Your Medical Identity) http://www.huffingtonpost.com/robert-siciliano/social-media-messages-tel_b_484698.html (quoted March 2010 Social Media Messages Telling Too Much?)…

Radio Appearances

…o HERE 01/29/10 Fox News Radio KTRH Audio HERE 01/29/10 Fox News Radio WSBA Audio HERE 01/29/10 Fox News Radio KCOL Audio HERE 01/29/10 Fox News Radio KFBK Audio HERE 01/29/10 Fox News radio KURV Audio HERE 01/25/10 American Medical Association XM Radio Audio HERE 01/25/10 Michael Ray Dresser, Dresser After Dark Audio HERE 01/25/10 KSCO Rosemary Chalmers Morning Show Audio HERE 01/23/10 WNJC The Lee and Brian Show Audio HERE 01/22/10 WFLO AM/FM,…

Safe Travel Security at Home and Abroad

…to you, “you’re screwed.” And it’s true. Medical identity theft occurs when the perpetrator uses your name and, in some cases, other aspects of your identity, such as insurance information, to obtain medical Medical Temp Arrested For Identity Theft You’ve probably heard the phrase “a fox watching the henhouse.” Today, that applies to people on the inside of organizations who work in trusted positions, and who use those…

Identity Theft Protection Prevention and Awareness

…to you, “you’re screwed.” And it’s true. Medical identity theft occurs when the perpetrator uses your name and, in some cases, other aspects of your identity, such as insurance information, to obtain medical Medical Temp Arrested For Identity Theft You’ve probably heard the phrase “a fox watching the henhouse.” Today, that applies to people on the inside of organizations who work in trusted positions, and who use those…

Executive Security

…to you, “you’re screwed.” And it’s true. Medical identity theft occurs when the perpetrator uses your name and, in some cases, other aspects of your identity, such as insurance information, to obtain medical Medical Temp Arrested For Identity Theft You’ve probably heard the phrase “a fox watching the henhouse.” Today, that applies to people on the inside of organizations who work in trusted positions, and who use those…

Media

…hackers’ biggest obstacle to stealing personal information Your new Facebook friend or Twitter followers could be CIA, FBI, or a criminal hacker Social media scams: How easy is it for someone to pretend to be you? Check your medical record lately? You’ll be shocked at what people are doing with your medical information! How foursquare, Gowalla, and Facebook Places are making it easier for criminals to track you down Want REAL privacy on…

Elderly Couple Assaulted During Home Invasion

…owing her fear, the suspect came back to the bedroom. “She was making noise and he didn’t want her making noise, he would kick her hard.” The victim’s wife was transported to Methodist Hospital in the Medical Center due to brain swelling from being kicked by the suspect. Her husband tells us they will monitor her overnight and she may be able to go home on Tuesday. Locking your doors isn’t enough. Locking your windows…

1.5 Million Americans Have Been Victims of Medical Identity

…dentity Theft Expert The Smartcard Alliance has released an in-depth report called “ Medical Identity Theft in Healthcare . ” While identity theft is a global issue that garners much media attention, most do not realize that medical identity theft is a serious and growing threat. Many authorities consider medical identity theft one of the fastest growing crimes in America . With the digital age of healthcare upon us, the risks are expected to…

ID Theft Ring Gleaned Socials From Medical Records

…cases other aspects of your identity, such as insurance information, to obtain medical treatment or medication or to make false claims for treatment or medication. As a result, erroneous or fraudulent entries wind up on your medical records, or sometimes entirely fictional medical records are created in your name. Financial identity theft as it relates to new account fraud is when an identity thief gets the victim’s Social Security number…

Dumb Criminals – The Best Way to Get Caught? Call 911!

…e address and the dunces description and arrested him. Karma man karma. And in an amazing criminal history that spans 55 years, an 80-year-old woman, known as the “Beverly Hills Burglar,” gets three years for breaking into a medical building. Her rap sheet was well known in Beverly Hills as she’s been to the clink in the past. She was quoted saying “I’m 80 years old,” she said. “I don’t think I’ll ever come…

When FTC Sends a Warning, Data Theft Has Jumped the Shark

…x files, health records, and passwords. This is the same P2P software that allows users to download pirated music, movies and software. An academic from Dartmouth College found that he was able to obtain tens of thousands of medical files using P2P software. In my own research, I have uncovered tax returns, student loan applications, credit reports and Social Security numbers. I’ve found family rosters which include usernames, passwords and…

Crimeware: Do It Yourself Criminal Hacking

…e. USA Today reports they’ve been blasting out fake e-mail messages crafted to look like official notices from UPS (UPS), FedEx (FDX) or the IRS; or account updates from Vonage, Facebook or Microsoft Outlook (MSFT); or medical alerts about the H1N1 flu virus. The faked messages invariably ask the recipient to click on a Web link; doing so infects the PC with a banking Trojan, a malicious program designed to steal financial account logons….

Forget Privacy, Think Security

…y.com, “the focus today should be security, not privacy” he continued. That right there is a ready made quote for you to copy/paste and make me a sage like my two counterparts :)~ Think of it like this: from birth you have a medical and birth record. These docs follow you everywhere in life and are filed and viewed by many. You can’t get admissions to schools, jobs or insurances without presenting these records. You are granted a Social Security…

2009 Data Breaches: Identity Theft Continues

…, the business sector increased to 41% of all the publicly reported breaches. While there are some small statistical changes in the other sectors, business continues to increase for the fifth year in a row. The financial and medical industries, perhaps due to stringent regulations, maintain the lowest percentage of breaches. Business 41.2% Educational 15.7% Government/Military 18.1% Health/Medical 13.7% Banking/Credit/Financial 11.4% The ITRC…

Resolve to Dissolve Identity Theft

…shing new lines of credit; government benefit programs; and tax purposes. Invest in a good cross cut shredder and USE IT! Destroy all documents that include personal identifying information (account numbers, birth date, SSN, medical numbers). This includes those pre-approved credit card offers that fill your mailbox. When in doubt, shred it! Order your credit reports! Go to www.annualcreditreport.com or call 877-322-8228 to obtain your free…

Identity Theft 2010 Top 10 Predictions

…ild’s SSN can be used for more than just opening a line of credit. 6. Medical Identity Theft: While not a new crime, this will reflect the distress of those who have become unemployed. High COBRA premiums, growing individual medical insurance costs, or the inability to afford insurance or medical care will cause a spike in this area of identity theft. The Social Security Administration has noted an increase in uninsured people using the coverage…

Sponsored Broadcast Radio

…o HERE 01.29.10 Fox News Radio KTRH Audio HERE 01.29.10 Fox News Radio WSBA Audio HERE 01.29.10 Fox News Radio KCOL Audio HERE 01.29.10 Fox News Radio KFBK Audio HERE 01.29.10 Fox News radio KURV Audio HERE 01.25.10 American Medical Association XM Radio Audio HERE 01.25.10 Michael Ray Dresser, Dresser After Dark Audio HERE 01.25.10 KSCO Rosemary Chalmers Morning Show Audio HERE 01.23.10 WNJC The Lee and Brian Show Audio HERE 01.22.10 WFLO AM/FM,…

Identity Theft Myths Part 3of3 During PYIW

…This is the third and final post on the subject. Myth #8: I don’t use the Internet, so my personal information is not exposed online. Your personal information appears in more places than you might realize, whether it’s your medical records, a job application, or a school emergency contact form. Many of these records are kept in electronic databases and transmitted online. Social networking sites are another good source of personal information…

Identity Theft Myths Part 1of3 During PYIW

…theft (theft of information for financial gain) is most prevalent, other types of identity theft can be equally dangerous, potentially costly, and time consuming to resolve. For example, with medical identity theft, personal medical records are used to access medical treatment or drugs, or to make false insurance claims. With criminal identity theft, a person uses faulty or stolen identification to avoid prosecution by law enforcement. Medical

National Protect Your Identity Week Facilitates Identity Theft Protection and Education

…as another when apprehended for a crime) Financial identity theft (using another’s identity to obtain goods and services) Identity cloning (using another’s information to assume his or her identity in daily life) Medical identity theft (using another’s information to obtain medical care or drugs) We will be discussing these and many others issues of fraud on an ongoing basis. 1. Protecting yourself from new account fraud…

The Scourge of Medical Identity Theft

…tive personal information that corporations do, these facilities are now subject to similar regulations. But protecting yourself from medical identity theft isn’t as easy as protecting yourself from financial identity theft. Medical ID cards, insurance cards and medical statements that come in the mail can all be used to steal your medical identity. Install a locking mailbox to prevent your mail from being stolen. Don’t carry cards in your…

Will a National ID Card Prevent Identity Theft?

…to be entirely avoidable, a number of other factors would have to come into play, effectively establishing accountability through identity proofing. Effective identity proofing is also necessary in order to reliably prevent medical and criminal identity theft. As you might have guessed, identity proofing simply means proving that individuals are who they say they are. Identity proofing often begins with personal questions, like the name of a…

Insider Identity Theft Poses Major Threats

Robert Siciliano Identity Theft Expert A Boston woman has been indicted for allegedly stealing at least 34 identities, which she was able to access from her workplace, a medical cost-management firm. “This was an extensive scheme in which the defendant used her access to the victims’ personal identifying information as a means to steal their identities, obtain credit cards in their names without their knowledge, and then use those credit…

Requests For Social Security Numbers Leads to Identity Theft

Robert Siciliano Identity Theft Expert A patient at a Washington state medical clinic was asked for his Social Security number numerous times. Many of us have endured this familiar process. Considering the recent buzz about identity theft, this patient became concerned about releasing his own sensitive personal data, and requested that the facility remove his Social Security number from their records. The clinic refused, the patient put up a…

Social Media Identity Theft Hits MLB Coach On Twitter

…good credit, bad credit. Victims include children, the elderly, celebrities and politicians, even the dead. Identity theft may include new account fraud, account takeover, criminal identity theft, business identity theft and medical identity theft. Most of these result in financial loss. One form of identity theft that is particularly damaging to the victim’s reputation is social media identity theft. Social media identity thieves have…

Privacy Is Dead, Identity Theft Prospers

…e Settings –> Privacy Settings menu. If you are reading this, you are participating in society. The price you pay is sacraficing your personal identifying information in order to get an Internet connection, credit, a car, medical attention, to go to school or buy a pair of shoes. While many citizens scream against Big Brother and corporate America abusing their trust, many will also give up all their privacy for ten% off a new pair of shoes….

P2P on Your PC Equals Identity Theft

…alize this was going on. Most of the committee members probably have kids, and their own home PCs probably have P2P software installed. An academic from Dartmouth College found that he was able to obtain tens of thousands of medical files using P2P software. In my own research, I have uncovered tax returns, student loan applications, credit reports and Social Security numbers. I’ve found family rosters which include usernames, passwords and…

Identity Theft Expert and Laptop Computer Security: CTO of MyLaptopGPS Reiterates that a Mobile Computer is Stolen Every 12 Seconds

…XO Europe. Furthermore, in December of 2008, he and widely televised and quoted identity theft expert Robert Siciliano co-delivered a presentation titled “Information in the Modern Age: Maintaining Privacy in an Era of Medical Record Identity Theft” at the 4 th Annual World Healthcare Innovation & Technology Congress in Washington, D.C., where Former U.S. Congressman Newt Gingrich delivered the keynote address. The single most…

Identity Theft Expert and Laptop Computer Security: CTO of MyLaptopGPS Explains Why Internet-based GPS is Best for Laptop Tracking

…XO Europe. Furthermore, in December of 2008, he and widely televised and quoted identity theft expert Robert Siciliano co-delivered a presentation titled “Information in the Modern Age: Maintaining Privacy in an Era of Medical Record Identity Theft” at the 4 th Annual World Healthcare Innovation & Technology Congress in Washington, D.C., where Former U.S. Congressman Newt Gingrich delivered the keynote address. The success rate…

Identity Theft Expert and MyLaptopGPS: Unsecured Mobile Computers Facilitate Noted Increase in Risk of Data Breaches Following Layoffs

…erty. Yost’s expertise has been featured twice in CXO Europe. Furthermore, in December of 2008, he and Siciliano co-delivered a presentation titled “Information in the Modern Age: Maintaining Privacy in an Era of Medical Record Identity Theft” at the 4th Annual World Healthcare Innovation & Technology Congress in Washington, D.C., where Former U.S. Congressman Newt Gingrich delivered the keynote address. Readers who belong…

Identity Theft Expert and MyLaptopGPS Note That Rise in Security Technology Spending Needs to Encompass Laptop Computers

…erty. Yost’s expertise has been featured twice in CXO Europe. Furthermore, in December of 2008, he and Siciliano co-delivered a presentation titled “Information in the Modern Age: Maintaining Privacy in an Era of Medical Record Identity Theft” at the 4 th Annual World Healthcare Innovation & Technology Congress in Washington, D.C., where Former U.S. Congressman Newt Gingrich delivered the keynote address. Readers who belong…

Identity Theft Tax Time Scams

…with Uni-Super Ink help prevent identity theft,” Says Steve Gradman, who is senior brand manager of uni-ball. Their goal is to help ease the minds of individuals when writing sensitive materials – from legal and medical documents to checks and tax forms. It’s a simple, inexpensive pen, but it packs a lot of punch when it comes to identity theft prevention.” As an advocate for uni-ball, I will happily be sharing many more…

THIEVES INITIATE NEW IDENTITY THEFT SCAMS IN TIME FOR TAX SEASON

…Ink.” “Uni-ball pens with Uni-Super Ink help prevent identity theft,” said Steve Gradman, senior brand manager of uni-ball. “Our goal is to help ease the minds of individuals when writing sensitive materials – from legal and medical documents to checks and tax forms. It’s a simple, inexpensive pen, but it packs a lot of punch when it comes to identity theft prevention. uni-ball®teams with Siciliano to promote simple anti-theft solutions during…

Identity Theft Expert and MyLaptopGPS: Recessionary Economic Circumstances Can Greatly Increase Effects of Laptop Computer Theft

…erty. Yost’s expertise has been featured twice in CXO Europe. Furthermore, in December of 2008, he and Siciliano co-delivered a presentation titled “Information in the Modern Age: Maintaining Privacy in an Era of Medical Record Identity Theft” at the 4th Annual World Healthcare Innovation & Technology Congress in Washington, D.C., where Former U.S. Congressman Newt Gingrich delivered the keynote address. Readers who belong…

Identity Theft Expert and MyLaptopGPS: Computer Security Breaches Reported within Days of Each Other Involve Nearly 40,000 Unique Data Records

…perty. Yost’s expertise has been featured twice in CXO Europe. Furthermore, in December of 2008, he and Siciliano co-delivered a presentation titled “Information in the Modern Age: Maintaining Privacy in an Era of Medical Record Identity Theft” at the 4th Annual World Healthcare Innovation & Technology Congress in Washington, D.C., where Former U.S. Congressman Newt Gingrich delivered the keynote address. Readers who belong…

Identity Theft Expert and MyLaptopGPS: Reports of Agreed-to Payout to Veterans Shows How Costly Laptop Theft Can Be

…perty. Yost’s expertise has been featured twice in CXO Europe. Furthermore, in December of 2008, he and Siciliano co-delivered a presentation titled “Information in the Modern Age: Maintaining Privacy in an Era of Medical Record Identity Theft” at the 4th Annual World Healthcare Innovation & Technology Congress in Washington, D.C., where Former U.S. Congressman Newt Gingrich delivered the keynote address. Readers who belong…

Identity Theft Expert and MyLaptopGPS Note the New Variables Brought to Laptop Theft Security by Ultraportable Computers

…perty. Yost’s expertise has been featured twice in CXO Europe. Furthermore, in December of 2008, he and Siciliano co-delivered a presentation titled “Information in the Modern Age: Maintaining Privacy in an Era of Medical Record Identity Theft” at the 4th Annual World Healthcare Innovation & Technology Congress in Washington, D.C., where Former U.S. Congressman Newt Gingrich delivered the keynote address. Readers who belong…

Identity Theft Expert and MyLaptopGPS: Research on Financial Services Firms' Data-Storing Practices Suggests Consequences of Laptop Theft Could be Severe

…perty. Yost’s expertise has been featured twice in CXO Europe. Furthermore, in December of 2008, he and Siciliano co-delivered a presentation titled “Information in the Modern Age: Maintaining Privacy in an Era of Medical Record Identity Theft” at the 4th Annual World Healthcare Innovation & Technology Congress in Washington, D.C., where Former U.S. Congressman Newt Gingrich delivered the keynote address. Readers who belong…

Identity Theft Expert Speaker; Health center workers used deceased patient info to apply for loans

…curity.com discusses Health center workers used deceased patient info to apply for loans. Medical identity theft means lots of things depending on how the person was victimized. Generally something needs to impact the person medical record. In other cases it may impact their health insurance. The thief may gain insurance money, drugs or medical procedures. Below is a case that resulted in financial identity theft due to health care professionals…

Identity Theft Expert and MyLaptopGPS University Laptop Theft Again Places Unique Data Records in the Hands of Criminals

…hat one of its laptop computers, left in an unattended hotel room, had gone missing to theft earlier that week. The school subsequently mailed warning letters to 890 patients whose information such as birthdates, telephones, medical diagnoses and treatment categories may have been on the stolen machine, reported The Oregonian and The Portland Tribune. “Laptop theft is readily mitigated with the proper technology,” said…

Identity Theft Expert and MyLaptopGPS: Two Laptop Thefts Reported in November Yield Nearly 200,000 Unique Data Records for Thieves

…hospitals and outpatient centers, are being notified of a recent laptop theft, reported Computerworld on Nov. 5. Among the data records were thousands that contained Social Security numbers. According to a Nov. 6th report in Medical News Today, a laptop computer belonging to the North Carolina Department of Health and Human Services’ Aging and Adult Services Division had gone missing to thieves. On Nov. 5, The News & Observer reported…

Identity Theft Protection Expert and One You Security: Year-Over-Year Spike in Data Breaches Will Prompt Consumers to Protect Their Own Financial Identities

…and in the government and military sector by 43 percent, data breaches jumped over the past two years by 75 percent in the business sector. Furthermore, since 2006 the number of data breaches has increased in the health and medical sector by 15 percent and in the banking, financial and credit sector by 25 percent. “Given the entire identification system’s reliance on Social Security numbers,” said Chris Harris, president and CEO…

Identity Theft Expert and Speaker on Personal Security: Reported Losses of Data Records during Last Two Weeks Further Erode Consumer Confidence

…t collections company Central Collections Bureau leaving the personal data of around 700,000 customers at risk of further foul play. The information lost included addresses, Social Security numbers, and some customers’ medical codes. “These are only the largest of recent, reported breaches,” said Siciliano. “The fact of the matter is that consumers are really in the dark when it comes to knowing just how many of their unique…

Identity Theft Expert:MyLaptopGPS™ Helps Laptops for the Wounded by Equipping the Nonprofit’s Computers with Antitheft Security

…s wounded on the battlefield are then able to communicate with family as they recuperate far from home. Last year, The Associated Press covered the organization’s donation of 10 mobile computers to the Walter Reed Army Medical Center in Washington, D.C. In March of 2008, Laptops for the Wounded returned to Walter Reed with an additional 18 laptop computers, all equipped with MyLaptopGPS’ security technology. MyLaptopGPS combines…

MyLaptopGPS and Identity Theft Expert: Loss of Laptops Belonging to Health Insurers Have Placed Hundreds of Thousands at Risk of Medical Identity Theft

…rs of Fallon Community Health had gone missing to thieves. Names, dates of birth, some diagnostic information and medical ID numbers were on the machine, which belonged to a third-party contractor that manages Fallon’s medical claims. Medical ID numbers, a report from the previous day in Boston Business Journal said, are sometimes based on Social Security numbers. On Jan. 22, the Connecticut Post Online reported the theft of a mobile…

Identity Theft Expert and Speaker on Personal Security Points to Increasingly Brazen Laptop Thefts as Reason for Firms to Rethink Mobile Computer Security

…an 70,000 people at risk of becoming victims of identity thieves and other financial fraudsters: The Nov.8th edition of The Charlotte Observer reported the loss of a laptop computer belonging to the Cabarrus County Emergency Medical Services. Names, addresses, phone numbers and Social Security numbers for about 28,000 who had received are at the healthcare facility were stored on the lost device, according to the article, which reported that…

Identity Theft: Military Personnel and Their Relatives Are at a Unique Risk—Identity Theft Expert and Speaker on Personal Security

…e comprehensive detection,” free to military families to help protect their identities. ID Watchdog monitors a consumer’s credit identity as well as personal information in 13 different, critical areas (e.g., criminal, medical and Social Security records), and resolves any detected breaches. “The Social Security number shouldn’t be the default tool for identifying soldiers, or anyone else,” said Siciliano. “But…

Identity Theft: P2P Networks Invite Online Thieves—Identity Theft Expert and Speaker on Personal Security

…e, high-tech and low-tech security holes have continued to plague industry and government: On May 17, the Associated Press reported that the Georgia Department of Human Resources had informed 140,000 parents of newborns that medical staff in the state had failed to shred documents containing personal information including Social Security numbers. According to the May 16 edition of ConsumerAffairs.com, data tapes belonging to IBM Corp. and…

 

Xtreme School

Featured in

Anderson Cooper John Stossel Robert Siciliano Featured in