You are previewing Privacy Means Profit: Prevent Identity Theft and Secure You and Your Bottom Line.
O'Reilly logo
Privacy Means Profit: Prevent Identity Theft and Secure You and Your Bottom Line

Book Description

Bulletproof your organization against data breach, identity theft, and corporate espionage

In this updated and revised edition of Privacy Means Profit, John Sileo demonstrates how to keep data theft from destroying your bottom line, both personally and professionally. In addition to sharing his gripping tale of losing $300,000 and his business to data breach, John writes about the risks posed by social media, travel theft, workplace identity theft, and how to keep it from happening to you and your business.

By interlacing his personal experience with cutting-edge research and unforgettable stories, John not only inspires change inside of your organization, but outlines a simple framework with which to build a Culture of Privacy. This book is a must-read for any individual with a Social Security Number and any business leader who doesn't want the negative publicity, customer flight, legal battles and stock depreciation resulting from data breach.

Protect your net worth and bottom line using the 7 Mindsets of a Spy

Accumulate Layers of Privacy

Eliminate the Source

Destroy Data Risk

Lock Your Assets

Evaluate the Offer

Interrogate the Enemy

Monitor the Signs

In this revised edition, John includes an 8th Mindset, Adaptation, which serves as an additional bridge between personal protection and bulletproofing your organization. Privacy Means Profit offers a one-stop guide to protecting what's most important and most at risk-your essential business and personal data.

Table of Contents

  1. Copyright
  2. Acknowledgments
  3. 1. Boot Camp: Privacy Means Profit
    1. 1. Motivate the Troops
      1. 1.1. Let My Failure Motivate Your Change
      2. 1.2. The Three Enemies of Privacy: Apathy, Ignorance, and Inaction
      3. 1.3. Inaction Destroyed My Business
      4. 1.4. How to Get the Most Out of This Book
    2. 2. Define the Problem
      1. 2.1. What Is Identity?
      2. 2.2. Common Sources of Identity
      3. 2.3. How Individuals' Identities Are Stolen (It's Not All Cybercrime)
      4. 2.4. Defining Common Methods of Theft
      5. 2.5. The Five Main Types of Identity Theft
        1. 2.5.1. Financial
        2. 2.5.2. Social Security Number
        3. 2.5.3. Character/Criminal
        4. 2.5.4. Medical
        5. 2.5.5. Driver's License
      6. 2.6. Failure to Define
    3. 3. Engage the Brain
      1. 3.1. Think Like a Spy
        1. 3.1.1. Know Thine Enemy
      2. 3.2. The Seven Mind-Sets of a Spy
        1. 3.2.1. Eliminate the Source
        2. 3.2.2. Destroy the Data
        3. 3.2.3. Secure the Systems
        4. 3.2.4. Lock the Docs
        5. 3.2.5. Evaluate the Risk
        6. 3.2.6. Interrogate the Enemy
        7. 3.2.7. Monitor the Signs
      3. 3.3. Field Combat: Target the Enemy
  4. 2. Basic Training: Think Like a Spy
    1. 4. The First Mind-Set: Eliminate the Source
      1. 4.1. Eliminate Mind-Set
      2. 4.2. Eliminate the Source
        1. 4.2.1. Source: Your Credit Report
          1. 4.2.1.1. Credit Freeze
        2. 4.2.2. Source: Wallets and Purses
        3. 4.2.3. Source: Junk Mail, Telemarketing, and Information Commerce
        4. 4.2.4. Source: Your Mail
        5. 4.2.5. Source: Cell Phones
          1. 4.2.5.1. Passwords
        6. 4.2.6. Source: Website Data Leakage
          1. 4.2.6.1. Websites
          2. 4.2.6.2. Spam
        7. 4.2.7. Source: Your Car
    2. 5. The Second Mind-Set: Destroy the Data
      1. 5.1. Destroy Mind-Set
      2. 5.2. Destroy Physical Information: Files, Documents, Credit Cards
      3. 5.3. Destroy Physical Information
      4. 5.4. Destroy Digital Information: Disks, E-mails, CDs
    3. 6. The Third Mind-Set: Secure the Systems
      1. 6.1. Secure Mind-Set
      2. 6.2. Secure Your Computer
      3. 6.3. Hire a Professional
      4. 6.4. Fifteen Ways to Protect Your Computer
        1. 6.4.1. 1. Lock It Up
        2. 6.4.2. 2. Deploy Security Software
        3. 6.4.3. 3. Install Antivirus and Antispyware
        4. 6.4.4. Spyware Infection Symptoms
        5. 6.4.5. 4. Use a Firewall
        6. 6.4.6. 5. Enable a Pop-up Blocker
        7. 6.4.7. 6. Back Up Data
        8. 6.4.8. 7. ConFIGURE for Automatic Operating System Updates
        9. 6.4.9. 8. Encrypt Your Wireless Connection
        10. 6.4.10. 9. Encrypt Your Hard Drive
        11. 6.4.11. 10. Protect Your Passwords
        12. 6.4.12. Password Protection Software
        13. 6.4.13. 11. Recognize Phishing Scams
        14. 6.4.14. 12. Shop Securely
        15. 6.4.15. 13. Protect Your Laptop
        16. 6.4.16. 14. Understand the Cloud
        17. 6.4.17. 15. Protect Your Spouse/Partner and Children
      5. 6.5. Use Your Computer to Help Prevent Identity Theft
    4. 7. The Fourth Mind-Set: Lock the Docs
      1. 7.1. Lock Mind-Set
      2. 7.2. Create a Safe House
        1. 7.2.1. Safe Room
      3. 7.3. Essential Identity Documents and How to Lock Them
      4. 7.4. Lock Your Vital Physical Documents
      5. 7.5. Securing Your Mail
        1. 7.5.1. Lock Your Mail Against Theft
    5. 8. The Fifth Mind-Set: Evaluate the Risk
      1. 8.1. Evaluate Mind-Set
      2. 8.2. Social Engineers Exploit Our Distracted Minds
      3. 8.3. The Privacy Reflex: Trigger, Reflex, and Response
        1. 8.3.1. The Trigger: Requests for Identity
        2. 8.3.2. The Reflex: Hogwash!
        3. 8.3.3. Overcoming Emotional Biases That Cloud Our Reactions
        4. 8.3.4. Additional Social Engineering Techniques
        5. 8.3.5. The Response: Slow Down and Observe
        6. 8.3.6. Examples of Evaluating the Risk
    6. 9. The Sixth Mind-Set: Interrogate the Enemy
      1. 9.1. Interrogate Mind-Set
      2. 9.2. The Four Phases of Interrogation: ConJOB
        1. 9.2.1. 1. Control
        2. 9.2.2. Access
        3. 9.2.3. Am I Allowing Access On a Need-to-Know Basis Only?
        4. 9.2.4. 2. Justify
        5. 9.2.5. 3. Options
        6. 9.2.6. Five Advanced Interrogation Techniques
        7. 9.2.7. 4. Benefits
      3. 9.3. Risk Scenarios: Practice Interrogating the Enemy
        1. 9.3.1. Scenario 1
        2. 9.3.2. Scenario 2
        3. 9.3.3. Scenario 3
        4. 9.3.4. Scenario 4
    7. 10. The Seventh Mind-Set: Monitor the Signs
      1. 10.1. Monitor Mind-Set
      2. 10.2. Create a Dossier
      3. 10.3. Monitor Your Credit Report Consistently
        1. 10.3.1. What to Monitor
        2. 10.3.2. Identity Monitoring Services
      4. 10.4. Monitor Your Financial Transactions Effortlessly
        1. 10.4.1. Account Alerts
        2. 10.4.2. Online Statements
        3. 10.4.3. Mailed Statements
        4. 10.4.4. Do Nothing
      5. 10.5. Monitor Your Annual Social Security Statement
      6. 10.6. Make Photocopies and Logs
  5. 3. Field Combat: Target the Enemy
    1. 11. Deploy Targeting Strategies: Accumulate, Prioritize, and Adapt
      1. 11.1. Victory #1: Building a Culture of Privacy from the Ashes of Failure
        1. 11.1.1. Phase 1: Defining the Problem (Pinpointing Our Risk)
        2. 11.1.2. Phase 2: Motivating/Engaging the Troops (Establishing Personal Buy-in)
        3. 11.1.3. Phase 3: Destroying the Data
        4. 11.1.4. Phase 4: Securing the Systems
        5. 11.1.5. Phase 5: Locking the Docs
        6. 11.1.6. Phase 6: Social Engineering Training
        7. 11.1.7. Phase 7: Ongoing Monitoring, Education, and Improvement
      2. 11.2. Target the Enemy: Three Principles
        1. 11.2.1. 1. Accumulate
        2. 11.2.2. 2. Prioritize
        3. 11.2.3. 3. Adapt
    2. 12. Defend Online Identity: Social Networking and the Cloud
      1. 12.1. Defend Mind-set
      2. 12.2. Social Networking's Secret Weapon: Trust
      3. 12.3. Thirteen Hazards of Social Networking
      4. 12.4. Ten Steps to Safer Facebooking
      5. 12.5. E-mail
      6. 12.6. Google
    3. 13. Protect Mobile Data: Laptop Responsibility
      1. 13.1. Mobile Data Device Responsibilities and Best Practices
    4. 14. Travel with Care: Business Trips and Vacations
      1. 14.1. Before You Leave Home
        1. 14.1.1. 1. Travel Light (Eliminate)
        2. 14.1.2. 2. Protect Your Home (Accumulate)
        3. 14.1.3. 3. Protect Your Office (Accumulate)
      2. 14.2. During Travel
        1. 14.2.1. 1. Lock It Up (Lock and Secure)
        2. 14.2.2. 2. Carry Your Belongings Safely
        3. 14.2.3. 3. Bank Safely (Monitor)
      3. 14.3. Upon Returning Home
    5. 15. Recover Your Identity: When All Else Fails
      1. 15.1. Action Items Checklist: Take Action Now
        1. 15.1.1. 1. Deactivate the Affected Accounts
        2. 15.1.2. 2. Alert New Creditors About Fraud
        3. 15.1.3. 3. Place a Fraud Alert on Your Credit File
        4. 15.1.4. 4. Submit an ID Theft Affidavit
        5. 15.1.5. 5. File a Police Report
        6. 15.1.6. 6. Sign Up for Identity Theft Monitoring
        7. 15.1.7. 7. Monitor Statements Very Closely
        8. 15.1.8. 8. Contact Check Verification Services
        9. 15.1.9. 9. Freeze Your Credit (or Extend Your Fraud Alerts)
        10. 15.1.10. 10. File an Identity Theft Victim's Report with the FTC
        11. 15.1.11. 11. Notify the Postal Inspector
        12. 15.1.12. 12. Contact the Social Security Administration
        13. 15.1.13. 13. Contact the Passport Office
        14. 15.1.14. 14. Secure Your Phone Service
        15. 15.1.15. 15. Safeguard Your Driver's License
        16. 15.1.16. 16. Visit the Theft Resource Center
        17. 15.1.17. 17. Consider Hiring an Attorney
    6. 16. Prioritize Your Attack: The Privacy Calendar
  6. Resources
  7. Notes
    1. 16.1. Part I Boot Camp: Privacy Means Profit
      1. 16.1.1. Chapter 1 Motivate the Troops
      2. 16.1.2. Chapter 2 Define the Problem
    2. 16.2. Part II Basic Training: Think Like a Spy
      1. 16.2.1. Chapter 4 The First Mind-Set: Eliminate the Source
      2. 16.2.2. Chapter 5 The Second Mind-Set: Destroy the Data
      3. 16.2.3. Chapter 6 The Third Mind-Set: Secure the Systems
      4. 16.2.4. Chapter 7 The Fourth Mind-Set: Lock the Docs
      5. 16.2.5. Chapter 9 The Sixth Mind-Set: Interrogate the Enemy
      6. 16.2.6. Chapter 10 The Seventh Mind-Set: Monitor the Signs
    3. 16.3. Part III Field Combat: Target the Enemy
      1. 16.3.1. Chapter 11 Deploy Targeting Strategies: Accumulate, Prioritize, and Adapt
      2. 16.3.2. Chapter 12 Defend Online Identity: Social Networking and the Cloud
      3. 16.3.3. Chapter 13 Protect Mobile Data: Laptop Responsibility
      4. 16.3.4. Chapter 15 Recover Your Identity: When All Else Fails
  8. About the Author