Book description
Bulletproof your organization against data breach, identity theft, and corporate espionage
In this updated and revised edition of Privacy Means Profit, John Sileo demonstrates how to keep data theft from destroying your bottom line, both personally and professionally. In addition to sharing his gripping tale of losing $300,000 and his business to data breach, John writes about the risks posed by social media, travel theft, workplace identity theft, and how to keep it from happening to you and your business.
By interlacing his personal experience with cutting-edge research and unforgettable stories, John not only inspires change inside of your organization, but outlines a simple framework with which to build a Culture of Privacy. This book is a must-read for any individual with a Social Security Number and any business leader who doesn't want the negative publicity, customer flight, legal battles and stock depreciation resulting from data breach.
Protect your net worth and bottom line using the 7 Mindsets of a Spy
Accumulate Layers of Privacy
Eliminate the Source
Destroy Data Risk
Lock Your Assets
Evaluate the Offer
Interrogate the Enemy
Monitor the Signs
In this revised edition, John includes an 8th Mindset, Adaptation, which serves as an additional bridge between personal protection and bulletproofing your organization. Privacy Means Profit offers a one-stop guide to protecting what's most important and most at risk-your essential business and personal data.
Table of contents
- Copyright
- Acknowledgments
- 1. Boot Camp: Privacy Means Profit
-
2. Basic Training: Think Like a Spy
- 4. The First Mind-Set: Eliminate the Source
- 5. The Second Mind-Set: Destroy the Data
-
6. The Third Mind-Set: Secure the Systems
- 6.1. Secure Mind-Set
- 6.2. Secure Your Computer
- 6.3. Hire a Professional
-
6.4. Fifteen Ways to Protect Your Computer
- 6.4.1. 1. Lock It Up
- 6.4.2. 2. Deploy Security Software
- 6.4.3. 3. Install Antivirus and Antispyware
- 6.4.4. Spyware Infection Symptoms
- 6.4.5. 4. Use a Firewall
- 6.4.6. 5. Enable a Pop-up Blocker
- 6.4.7. 6. Back Up Data
- 6.4.8. 7. ConFIGURE for Automatic Operating System Updates
- 6.4.9. 8. Encrypt Your Wireless Connection
- 6.4.10. 9. Encrypt Your Hard Drive
- 6.4.11. 10. Protect Your Passwords
- 6.4.12. Password Protection Software
- 6.4.13. 11. Recognize Phishing Scams
- 6.4.14. 12. Shop Securely
- 6.4.15. 13. Protect Your Laptop
- 6.4.16. 14. Understand the Cloud
- 6.4.17. 15. Protect Your Spouse/Partner and Children
- 6.5. Use Your Computer to Help Prevent Identity Theft
- 7. The Fourth Mind-Set: Lock the Docs
- 8. The Fifth Mind-Set: Evaluate the Risk
- 9. The Sixth Mind-Set: Interrogate the Enemy
- 10. The Seventh Mind-Set: Monitor the Signs
-
3. Field Combat: Target the Enemy
-
11. Deploy Targeting Strategies: Accumulate, Prioritize, and Adapt
-
11.1. Victory #1: Building a Culture of Privacy from the Ashes of Failure
- 11.1.1. Phase 1: Defining the Problem (Pinpointing Our Risk)
- 11.1.2. Phase 2: Motivating/Engaging the Troops (Establishing Personal Buy-in)
- 11.1.3. Phase 3: Destroying the Data
- 11.1.4. Phase 4: Securing the Systems
- 11.1.5. Phase 5: Locking the Docs
- 11.1.6. Phase 6: Social Engineering Training
- 11.1.7. Phase 7: Ongoing Monitoring, Education, and Improvement
- 11.2. Target the Enemy: Three Principles
-
11.1. Victory #1: Building a Culture of Privacy from the Ashes of Failure
- 12. Defend Online Identity: Social Networking and the Cloud
- 13. Protect Mobile Data: Laptop Responsibility
- 14. Travel with Care: Business Trips and Vacations
-
15. Recover Your Identity: When All Else Fails
-
15.1. Action Items Checklist: Take Action Now
- 15.1.1. 1. Deactivate the Affected Accounts
- 15.1.2. 2. Alert New Creditors About Fraud
- 15.1.3. 3. Place a Fraud Alert on Your Credit File
- 15.1.4. 4. Submit an ID Theft Affidavit
- 15.1.5. 5. File a Police Report
- 15.1.6. 6. Sign Up for Identity Theft Monitoring
- 15.1.7. 7. Monitor Statements Very Closely
- 15.1.8. 8. Contact Check Verification Services
- 15.1.9. 9. Freeze Your Credit (or Extend Your Fraud Alerts)
- 15.1.10. 10. File an Identity Theft Victim's Report with the FTC
- 15.1.11. 11. Notify the Postal Inspector
- 15.1.12. 12. Contact the Social Security Administration
- 15.1.13. 13. Contact the Passport Office
- 15.1.14. 14. Secure Your Phone Service
- 15.1.15. 15. Safeguard Your Driver's License
- 15.1.16. 16. Visit the Theft Resource Center
- 15.1.17. 17. Consider Hiring an Attorney
-
15.1. Action Items Checklist: Take Action Now
- 16. Prioritize Your Attack: The Privacy Calendar
-
11. Deploy Targeting Strategies: Accumulate, Prioritize, and Adapt
- Resources
-
Notes
- 16.1. Part I Boot Camp: Privacy Means Profit
-
16.2. Part II Basic Training: Think Like a Spy
- 16.2.1. Chapter 4 The First Mind-Set: Eliminate the Source
- 16.2.2. Chapter 5 The Second Mind-Set: Destroy the Data
- 16.2.3. Chapter 6 The Third Mind-Set: Secure the Systems
- 16.2.4. Chapter 7 The Fourth Mind-Set: Lock the Docs
- 16.2.5. Chapter 9 The Sixth Mind-Set: Interrogate the Enemy
- 16.2.6. Chapter 10 The Seventh Mind-Set: Monitor the Signs
- 16.3. Part III Field Combat: Target the Enemy
- About the Author
Product information
- Title: Privacy Means Profit: Prevent Identity Theft and Secure You and Your Bottom Line
- Author(s):
- Release date: August 2010
- Publisher(s): Wiley
- ISBN: 9780470583890
You might also like
book
Fighting Identity Theft!: How to Protect Your Personal Finances
This Element is an excerpt from Homebuyers Beware: Who’s Ripping You Off Now?--What You Must Know …
book
The Truth About Identity Theft
Praise for The Truth About Identity Theft “This book will open your eyes, scare you smart, …
book
The Truth About Identity Theft
This Element is an excerpt from The Truth About Avoiding Scams (9780132333856) by Steve Weisman. Available …
book
Identity Theft Alert: 10 Rules You Must Follow to Protect Yourself from America’s #1 Crime
Protect yourself from identity theft! Nearly 17 million Americans were victimized by identity theft in 2012 …