Business Relevance Identity theft describes what happens to the individual, you and me, when our private identifying information is stolen. Corporate data privacy starts by training a roomful of potential identity theft victims. Destroy the data Chapter 5. Money can always be earned back; time and relationships cannot. As Your Bank for a Lifetime, it's our mission to create value through lifelong relationships with our neighbors in Pennsylvania and New York.
Many times, thieves just steal the entire box in the middle of the night and replace it by morning. Contact all three credit bureaus by phone or online to establish this freeze Experian. What happened to my business, and to me, is more common than you may realize. The key is to remove your name from each search engine as you hear about it. In these examples, we will apply the skills of trigger request for information , reflex hogwash! With enough practice, this mind-set should become a habit, and no longer require conscious thought.
Monitor Dumpster Diving: A spy or thief rummages through your home or business garbage looking for documents that allow them to exploit existing accounts or set up new credit card accounts, establish phone service, drain bank accounts, take out loans, and more. Is the content really worth it? Look closely at the Contents for Privacy Means Profit. Until that happens, though, we need to make the learning process a conscious effort. Chapter 15 Recovering Your Identity: When All Else Fails The second to last of the book, is for those who have already had their identities stolen. Our task is to make data protection interesting and easy to remember. Source: Your Mail The more mail you stop, junk or legitimate, the less chance it will be stolen.
I Boot Camp: Privacy Means Profit. After the speech, an Air Force commander asked me why he was having such a hard time convincing his younger soldiers to protect sensitive military data. Heartland Payment Systems stock value declined 64 percent in the days after it acknowledged a data breach. Shop securely online from reputable, recognizable companies. By keeping our identities simple, and sharing them only on a need-to-know basis, we have less to lose, less to be stolen, less to shred, less to lock up, and, consequently, more time and brain cells to protect items that we actually need. On all of her doors are double-deadbolts, which are connected to a thumbprint scanner. This book is a must-read for any individual with a Social Security Number and any business leader who doesn't want the negative publicity, customer flight, legal battles and stock depreciation resulting from data breach.
Give a man a fish and you feed him for a day. They know that if you like to eat at certain restaurants, you will also probably be interested in their products. Opt out of information sharing, telemarketing, and junk mail. More than any people I know, you understand the importance of privacy. The problem, which has been publicly documented, has led the Pentagon to ban social networking from at least one branch of the military at time of publication. For example, when we are done with a bank statement, we should shred the document. Does the document on your desk contain sensitive or confidential information? In this section, I list a handful of places to opt out.
This might include sales and marketing materials, websites, public filings, and the like. For all documents, consult with your lawyer, accountant, or tax advisor regarding how long you need to store them, as times can vary. Please take the time now to indicate the items on the list here that affect you or your family. Spam Set up a free e-mail account e. There is no need to broadcast this to others unless you frequently authorize people to join your wireless network as would a wireless hotspot like Starbucks.
Use a Firewall A firewall is a device that regulates who or what from the Internet has access into your data. This eliminates the most vulnerable stages of mailing. Call each credit card company, cancel your existing card, and have the firm issue a new card with a new credit card number. Ride a bike, and coast along a lot. When such a network is discovered, he or she uses the Internet connection to commit crimes usually associated with pornography or methamphetamines or to browse your computer and steal information. Protecting this information outside of the office will eliminate the single most damaging source of data theft in the workplace. Your powers of observation have already been sharpened.
This foundation of belief is clearly lacking among corporate executives. Business Relevance As a business leader, it is essential that you clearly understand the relationship between identity theft, data breach, and your bottom line. Have new checks sent to your bank for pickup. But their secrecy goes even further. Temporarily reversing your credit freeze can be inconvenient, yes, but it serves as a reminder to keep your identity simple.
That way, your card will never be out of your sight control. We all want to be in control of something, and con artists are all too ready to give us that control in exchange for something. Credit Offers: Opt out of prescreened credit offers, which are frequently stolen from mailboxes. This is the same drawback to using your browser to remember your passwords: it centralizes them all in one place. Secure the Systems Secure technology has always been an important theme in the world of spies.