Credit Card Hackers Target Small Business

Robert Siciliano Identity Theft Speaker

Up until now, identity thieves have been hunting elephants. But that may soon change.

According to this study, small to medium size businesses (SMB’s) are the criminal hackers next target. This should come as no surprise, as large enterprise networks have gradually become better at defending themselves.

Over the past few years, criminal hackers have acted like hornets, attacking and swarming unassuming enterprise networks. Big business has responded by allocated billions of dollars in funding for technology and talent to thwart their sting.

In 2009, enterprise defense is the best it has ever been. It’s still lax, but now the path of least resistance has become SMB’s. Your mom and pop shops simply don’t have the resources, including deep pockets, to keep up.

Studies by the International Council for Small Business show that one fifth of small businesses aren’t even equipped with basic defenses, such as McAfee security software. Furthermore, as many as 60% don’t even have wireless encryption activated. What is most disturbing, but not surprising to this security analyst, is two thirds don’t have any type of security plan in place.

According to poll responses, these same SMB’s overwhelmingly believe that they aren’t targets, that only big businesses need to worry. However, this same study shows that 85% of fraud related to criminal hacks occurs within this exact group.

The National Retail Federation stated that Level 3 businesses are only 60% compliant and Level 4’s are even less secure.

PCI Compliance, a Visa based organization that regulates merchants in order to prevent credit card fraud, recognizes retailers at different levels. Level 1 retailers process 6,000,000 Visa transactions per year, Level 2 retailers process 1,000,000 to 6,000,000, Level 3 retailers process 20,000 to 1,000,000, and Level 4 retailers process fewer than 20,000.

Many security issues stem from the SMB’s lack of resources, coupled with their shift to online transactions and the handling and storage of their own data.

Some say that the responsibility of handling these transactions should be shifted back to the banks.

One additional recommendation for these Level 3 and 4s is to adopt a strategy in which the merchant never handles the credit data at all. The merchant would have an online shopping cart, but the credit card transaction would be diverted to the bank server, without ever being touched by the merchant.

I’m one of those Level 4 merchants and this is the strategy that I use. All orders are taken online and nobody aside from the bank handles client credit card data. PCI compliance is a breeze – no hiccups.

While this is practical for some SMB’s, it doesn’t work for others, so those retailers need to get their act together immediately, because criminal hackers are watching.

See identity theft speaker Robert Siciliano discuss data breaches here.

I’m excited to work with uni-ball in 2009 in a partnership to help raise awareness about the growing threat of identity theft and provide tips for protecting yourself. Check out uniball-na.com for more information.

Identity Theft Expert and MyLaptopGPS Note That Rise in Security Technology Spending Needs to Encompass Laptop Computers

(BOSTON, Mass. – March 13, 2009 – IDTheftSecurity.com) Research announced in March shows that IT spending on so-called Identity and Access Management (IAM) technologies is set to grow at a compound annual growth rate of nearly 30 percent. Widely televised and quoted personal security and identity theft expert Robert Siciliano observed that this IAM spending needs to encompass the security of portable computing assets. He directed organizations of all kinds to laptop tracking and data retrieval technology from laptop computer security firm MyLaptopGPS.

“Perhaps the easiest point of entry for identity thieves seeking to steal information is the mobile computing device,” said Siciliano. “Typically a cinch to steal, laptop computers are often home to valuable data. IT departments concerned with managing identities and access on their systems are therefore remiss to neglect their fleets of mobile computing equipment; smart organizations in fact restrict the use of their laptops — and track them.”

CEO of IDTheftSecurity.com and a member of the Bank Fraud & IT Security Report‘s editorial board, Siciliano leads Fortune 500 companies and their clients through presentations that explore security solutions for businesses and individuals. Author of “The Safety Minute: 01” and a longtime identity theft speaker, he has discussed data security and consumer protection on CNBC, NBC’s “Today Show,” FOX News Network, and elsewhere.

IAM known as “provisioning” recently accounted for approximately 60 percent of global IAM market revenue, according to a press announcement regarding an associated report by the industry research firm RNCOS. User provisioning, as defined by RNCOS, is a type of identity management software whereby users may be represented by multiple objects on multiple systems in a computer database.

This projected increase in IAM spending is in response to rising concern over identity theft and data breaches, RNCOS noted. For instance, during the six months immediately preceded February of 2009, the illegal trade of personal information in online chat rooms increased by approximately 25 percent, according to research from Affinion Security Center, whose press announcement noted a 50 percent year-over-year increase in identity theft complaints reported to the Federal Trade Commission in 2008.

“With an explosion in the use of mobile computing devices, sensitive data is bound to find its way onto them,” said MyLaptopGPS’ chief technology officer, Dan Yost, who invited readers to visit the MyLaptopGPS blog. “In other words, the spike in identity theft only makes sense. But the reality must change, and simple measures for laptop computer security can slow, even reverse, the trend.”

The theft rate for laptop computers equipped with MyLaptopGPS is just 0.4 percent, or 32 times lower than the average. Additionally, Yost pointed to SafeRegistry™, a comprehensive system from MyLaptopGPS for inventorying entire fleets of mobile computers, as well as a full line of highly renowned SafeTags™, which are police-traceable property tags designed to secure iPods™, cell phones, BlackBerry™ devices and other mobile property.

Yost’s expertise has been featured twice in CXO Europe. Furthermore, in December of 2008, he and Siciliano co-delivered a presentation titled “Information in the Modern Age: Maintaining Privacy in an Era of Medical Record Identity Theft” at the 4th Annual World Healthcare Innovation & Technology Congress in Washington, D.C., where Former U.S. Congressman Newt Gingrich delivered the keynote address.

Readers who belong to LinkedIn® are encouraged to join the MyLaptopGPS group there. Featured in Inc. Magazine and TechRepublic, MyLaptopGPS maintains the Realtime Estimated Damage Index (REDI™), a running tally of highly publicized laptop and desktop computer thefts and losses and these losses’ associated costs. A log of these high-profile laptop thefts is available at MyLaptopGPS’ website.

Readers may download a demo of MyLaptopGPS. They also have the opportunity to read one of two reports tailored to the type of organization they run.

MyLaptopGPS combines Internet-based laptop GPS tracking with other functionalities to secure mobile computing devices. A user launches MyLaptopGPS’ features remotely, protecting data even while the machine is in a criminal’s hands. Once connected to the Internet, the software silently retrieves and then deletes files from machines as it tracks the stolen or missing hardware — at once returning the data to its rightful owner and removing it from the lost mobile computing device.

YouTube video shows Siciliano on a local FOX News affiliate discussing the importance of securing mobile computing devices on college campuses, where laptop theft can run rampant. To learn more about identity theft, a major concern for anyone who’s lost a laptop computer or other mobile computing device to thieves, readers may go to video of Siciliano at VideoJug.

###

About MyLaptopGPS

Celebrating 25 years in business, Tri-8, Inc. (DBA MyLaptopGPS.com) has specialized in complete system integration since its founding in 1984. From real-time electronic payment processing software to renowned mid-market ERP implementations, the executive team at MyLaptopGPS has been serving leading enterprises and implementing world-class data systems that simply work. With MyLaptopGPS™, Tri-8, Inc. brings a level of expertise, dedication, knowledge and service that is unmatched. MyLaptopGPS™’s rock-solid performance, security, and reliability flow directly from the company’s commitment to top-notch software products and services.

About IDTheftSecurity.com

Identity theft affects us all, and Robert Siciliano, CEO of IDTheftSecurity.com and member of the Bank Fraud & IT Security Report‘s editorial board, makes it his mission to educate Fortune 500 companies and their clients. A leader of personal safety and security seminars nationwide, Siciliano has been featured on “The Today Show,” CNN, MSNBC, CNBC, “FOX News,” “The Suze Orman Show,” “The Montel Williams Show,” “Maury Povich,” “Sally Jesse Raphael,” “The Howard Stern Show,” and “Inside Edition.” Numerous magazines, print news outlets, and wire services have turned to him, as well, for expert commentary on personal security and identity theft. These include ForbesUSA TodayEntrepreneur, Woman’s DayMademoiselleGood HousekeepingThe New York TimesLos Angeles Times,Washington TimesThe Washington PostChicago TribuneUnited Press InternationalReuters, and others. For more information, visit Siciliano’s Web site,blog, and YouTube page.

The media are encouraged to get in touch with any of the following individuals:

John Dunivan

MyLaptopGPS Media Relations

PHONE: (405) 747-6654 (direct line)

jd@MyLaptopGPS.com

http://www.MyLaptopGPS.com

Robert Siciliano, Personal Security Expert

CEO of IDTheftSecurity.com

PHONE: 888-SICILIANO (742-4542)

FAX: 877-2-FAX-NOW (232-9669)

Robert@IDTheftSecurity.com

http://www.idtheftsecurity.com

Brent Skinner

President & CEO of STETrevisions

PHONE: 617-875-4859

FAX: 866-663-6557

BrentSkinner@STETrevisions.com

http://www.STETrevisions.com

http://www.brentskinner.blogspot.com

Recession Turns IT Workers Into Hackers

Robert Siciliano Identity Theft Expert

What a nasty headline for an article.

From ABCnews.com the journalist roasts IT professionals on a spit. And the comments were all inspiring.

As the recession rears its ugly head, disgruntled ex employees are in the best position to drop a bomb in the companies network or suck all the data out with a few terabyte drives.

A recent study by McAfee and Purdue University put the tally of fraud, data loss and damage done at 1 trillion dollars. A thousand billion sounds like a lot of money.

To paraphrase some of the comments;

No matter how you look at it, when heads start to roll, most people that are about to be let go feel unjust and express hostility towards the employer (often, rightly so). These are the same people who were loyal company employees for years. Unfortunately, these are no win-win situations when it comes to the downsizing and companies should take proper actions to address it.

Your system admin is the gate keeper. Anyone who has access to sensitive data can potentially abuse the privilege. The loan officer, the loan processor, the secretary, the human resources gal two cubes down the hall, the cleaning people that take out our trash at night… Without proper controls in place anybody can be the bad guy. On the other hand, with adequate management these issues can be avoided, even when it comes to IT employees.

Manage your end points, your USB devices, your computer ports, your printers… Segregate your system administration roles. Tools are there. And who is going to implement them? Your IT guy. (thank you Sashimi11)

With the incredible amount of layoffs occurring, companies are bound to layoff an employee who will exact some revenge. Some say “Companies whose knee-jerk response is to cut costs by canning employees deserve some wrath”. But, in the end, the wrath doesn’t get you your job back. (thank you Patches777)

Most are working individuals, doing what they do best. All the while staying under the radar, and afraid, just like everyone else, of the threat of layoffs. The latter doesn’t mean an internal flip is switched and they bug out and start stealing trade secrets. (thank you kyleratliff)

On another note, as budgets are cut and IT pros are let go, the show must go on.

Bill Lynch of RazorThreat said to me “We are encountering lots of very frustrated CIO’s who are caught on the horns of a dilemma…their IT budgets and headcount are being slashed but their CEO’s are simultaneously demanding that they reassure them and the Board of Directors that they are not vulnerable to the same kinds of cyber attacks that have plagued some big firms lately.

They know they cannot afford to buy complex, expensive and difficult to deploy new security software and the people to manage them and yet they have to stand before the Board and profess that their networks are secure”.

The fact is, data breaches will continue and IT will often be to blame. There is a light at the end of the tunnel. There are numerous technologies that won’t break the bank and will keep the BOD happy. Companies have to consider numerous threats of theft and mayhem. Review security policies and who has access to what and why. In the end make sure employees are let go with dignity and respect.

Robert Siciliano Identity Theft Speaker discussing Credit Card Fraud Here

Twitter Is a Security Mess

Robert Siciliano Identity Theft Speaker Expert

Mischievous Hack attacks on Twitter are increasing and it seems there is no end in sight. While twitters developers are working to make it more secure, the open nature of the application fuels mischievous and even criminal hacking.

Twitter is microblogging. In 140 characters or less you tell your followers what you are doing or point them towards something that may enhance their lives. Most Tweeple are twits and say nothing of value. Their tweets are mundane and serve no benefit to anyone.

If you don’t use Twitter thats OK. But there is a chance you eventually will. Many thought they’d never use Facebook, but millions do. Micro blogging is a weird phenom that makes sense to many, and not at all to most.

Users can get tweets via email, on your phone or via SMS texts. People have sent tweets while giving birth, in the crowd watching the Obama inauguration, celebrating New Years, and just about anything you can think of.

I’m on Twitter. I spend my energies informing my readers about security. The most effective tweets have a pithy title related to an article, blog post or TV appearance. All security related.

Since Twitters inceptions hundreds of 3rd party applications have been built around Twitter. Apps that enhance, manage or are just for fun. Much of twitters technology is an open book which has allowed hackers both good and bad to build these apps, and of course wreak havoc.

One such hack is using a Twitter accounts mobile phone number to spoof messages to the users followers.

Other Twitter hacks have included full account take over where messages were sent to all followers of Obama, Britney Speakers, Fox and a CNN anchor.

Recent studys also show that Twittersquating, when brand names are hijacked is also a problem on Twitter

So if you decide to Twitter, know that its not very secure and be cautious about plugging your mobile number into the system.

Robert Siciliano Identity theft Speaker Expert discussing Scams Cons and Schemes Here

Recycle Your Phone? Sell it on eBay? Lose it? Still Have Your Data On It?

Robert Siciliano Identity Theft Speaker – Expert

Cell phones are the invention of the 20th century. Its a computer and a phone. Its as cool as the invention of the wheel. Its the single most effective communication tool since the land line.

Millions of cell phones are sold every year. Many are lost, stolen, millions more end up on eBay, recycled or tossed in the trash. Many of these phones still have enough data on them to commit identity theft or, in the wrong hands, make your life miserable.

A study done in December by Regenersis, a UK based recycler, tested a sampling of 2000 cell phones. They learned 99% had personal identifying data such as banking info, credit card data, personal emails, contacts, text messages, pictures, music, videos, calendar entries, notes, mailing lists, to-do lists, automatic log-ins for Twitter, LinkedIn, Facebook and more.

Studies show cell phones are replaced on average of every 18 months. Over the past 4-5 years Blackberrys, iPhones and countless other smartphone/PDAs have flooded the market. All of these devices technologies are upgraded within 6 months and the user wants the latest and greatest.

What kind if data is on your phone today? If it fell in the wrong hands would someone have access to all your social network sites? Usernames and passwords? Customer data? Corporate secrets?

Someone recently bought a Blackberry off eBay and scored phone numbers for Hollywood producers, writers and movie stars Natalie Portman, Julianne Moore and Jude Law. Not a huge deal, but in the wrong hands problematic for the affected.

What if someone got the names, addresses and emails for everyone in your life? Not good.

Its not just cell phones that often contain data. Thumbdrives, MP3 players, are also problematic. Credant Technologies surveyed 500 dry cleaners who said they found numerous USB sticks during the course of a year. Multiplying that by the number of dry cleaners and got a figure of approximately 9000 USBs lost and found annually.

To protect yourself, consider some of the tips below, and this is not a complete list. Please feel free to add in comments.

Don’t store data that will be considered a “data breach” if lost, stolen, sold, recycled.

On phones have strong password protection. Lock it up.

Remove your sim card upon selling.

Reformat the phones operating system multiple times. This generally wipes off the data, but there are programs that do it more thoroughly. There is no universal way to reformat. It is different with every phone/manufacturer/operating system.

Robert Siciliano Identity Theft Expert discussing cell phone security Here

Quarter Million Dollar Bounty for Criminal Hacker

Robert Siciliano Identity Theft Speaker and Expert

In a Microsoft press release a global bounty has been offered for the arrest and prosecution of whoever has created and released the “conficker” virus.

Conficker was released in the last quarter of 2008 and has infected a wide estimate of 2 million to 10 million PCs. After issuing patches, Microsoft estimates approximately 3 million PCs globally are still compromised.

However none of the PCs infected with the conficker are displaying any of the characteristics generally exhibited by the recent spate of viruses offering a remote control component and often used to host spoofed websites and other malicious fraud related activities.

Although, this virus is designed to constantly ping some 250 different domains that were most likely controlled by the criminal hackers that created it. The virus acts like any software calling home looking for an update, checking time/dates stamps and what version is running.

It is widely believed that conficker is waiting for its next set of updates to unleash the endgame its writers had in mind. BRILLIANT!

Many who study conficker as it phones home have been monitoring the 250 domains looking for the next “update”.

Each of these top level domains include .com, .net and .org. All of which fall under Internet Corporation for Assigned Names and Numbers (ICANN), who heads up the domain registration industry. ICANNs rules prohibit such reserving of domains. ICANN then worked with registrars in heading off any future registration of conficker sought domains.

What has been out of the control of ICANN has been .ws and .cn (China) based domains and due to the ferocity of conficker and negocitions by ICANN, China and other global registrars have agreed to make it difficult for conficker to continue to control its 250 base domains or seek others along the string.

What we are seeing here is a global effort by international agency’s, security professionals from around the world and Microsoft working together to defeat an unknown attacker, that if left un-matched, could infect a significant portion of the worlds computers.

This story is not over.

Robert Siciliano Identity Theft Expert-Speaker video discussing rise in identity theft Here

Identity Theft Protection Expert and One You Security: Year-Over-Year Spike in Data Breaches Will Prompt Consumers to Protect Their Own Financial Identities

(SARASOTA, Fla. – July 23, 2008 – One You Security) The first half of 2008 saw a more than two-thirds year-over-year increase in the number of data breaches, revealed research reported last week. More than ever, consumers need a way to protect themselves as more of their Social Security numbers seem to go missing with every new breach of data, according to Robert Siciliano, widely televised and quoted identity theft protection expert and chief security analyst for One You Security, LLC. The key, he said, is One You Security’s service, which helps to render these universal identifiers useless to the thieves who would otherwise use them to steal consumers’ financial identities.

"Smart consumers notice the data breaches," said Siciliano. "They also realize that every security breach runs the risk of leaking data likely to include Social Security numbers, maybe even theirs. And until the infrastructure in place for identifying people fundamentally changes, these smart consumers will clamor for ways to protect their financial identities themselves. With its capacity to strip thieves of the ability to use Social Security numbers as a way to obtain financial identities, One You’s service provides the very solution these consumers seek."

Subscribers to One You Security receive newsletters and special alerts from Siciliano. Through these, they get the latest data on breaches and learn more about identity theft prevention. Chief security analyst for One You Security and a member of the Bank Fraud & IT Security Report‘s editorial board, Siciliano regularly discusses data security and consumer protection on CNBC, on NBC’s "Today Show," FOX News Network, and elsewhere.

Between Jan. 1 and June 27 of 2008, the number of data breaches recorded by the Identity Theft Resource Center (ITRC) was 342, the nonprofit organization reported in a June 27th statement, which noted that this was more than 69 percent greater than the same time period in 2007.

Spikes in the business sector fueled the overall increase despite significant decreases in others, revealed the ITRC’s data, which also provided numbers for 2006. Whereas the ITRC found that data breaches were down since 2006 in the educational sector by 24 percent and in the government and military sector by 43 percent, data breaches jumped over the past two years by 75 percent in the business sector. Furthermore, since 2006 the number of data breaches has increased in the health and medical sector by 15 percent and in the banking, financial and credit sector by 25 percent.

"Given the entire identification system’s reliance on Social Security numbers," said Chris Harris, president and CEO of One You Security, "the most practical approach by far is to make those digits functionally useless to the thieves who obtain them. For a long time, the frequency of data breaches has left consumers in need of a quickly implementable solution that allows them to protect their financial identities. As much as a seventy-five percent increase in the number of data breaches over the past couple years only intensifies that need, which One You meets."

Consumers who choose One You Security do so in part because the company strives to transform their Social Security numbers into meaningless strings of digits of no use to thieves. The firm backs all its offerings with a 100 percent service guarantee.

The YouTube video below shows Siciliano on "FOX Newschannel,” where he explains how the ubiquity of Social Security numbers as universal identifiers helps thieves online and off-line. A collection of videos at VideoJug features Siciliano sharing advice on how consumers can protect themselves from identity theft and fraud.

###

About One You Security, LLC

Sarasota, Fla.-based One You Security‘s mission is to eliminate the threat and consequences of identity theft. For just $10 per month, anyone can sign up for One You Security’s identity theft protection service, a proactive, preventative approach whereby the company activates and manages its customers’ fraud alerts with major credit bureaus. Subscribers also receive full access to ongoing education from identity theft protection expert Robert Siciliano, chief security analyst for One You Security, which backs up its promise to protect clients’ financial identities with a 100 percent service guarantee. To sign up for One You Security, dial 1-800-434-2010.

About IDTheftSecurity.com

Identity theft affects us all, and Robert Siciliano, CEO of IDTheftSecurity.com, chief security analyst for One You Security, and member of the Bank Fraud & IT Security Report‘s editorial board, makes it his mission to provide consumer education solutions on identity theft to Fortune 500 companies and their clients. Author of "The Safety Minute: 01" and leader of personal safety and security seminars nationwide, Siciliano has been featured on "The Today Show," CNN, MSNBC, CNBC, "FOX News," "The Suze Orman Show," "The Montel Williams Show," "Maury Povich," "Sally Jesse Raphael," "The Howard Stern Show," and "Inside Edition." Numerous magazines, print news outlets, and wire services have turned to him, as well, for expert commentary on personal security and identity theft protection. These include Forbes, USA Today, Entrepreneur, Woman’s Day, Mademoiselle, Good Housekeeping, The New York Times, Los Angeles Times, Washington Times, The Washington Post, Chicago Tribune, United Press International, Reuters, and others. For more information, visit Siciliano’s Web site, blog, and YouTube page.

The media are encouraged to get in touch with any of the following individuals:

Chris Harris
President & CEO of One You Security
PHONE: 941-342-0500 (x231)
chris@oneyou.com
http://www.oneyou.com

Robert Siciliano
CEO of IDTheftSecurity.com
Chief Security Analyst for One You Security
PHONE: 888-SICILIANO (742-4542)
FAX: 877-2-FAX-NOW (232-9669)
Robert@IDTheftSecurity.com
http://www.idtheftsecurity.com

Brent W. Skinner
President & CEO of STETrevisions
PHONE: 617-875-4859
FAX: 866-663-6557
BrentSkinner@STETrevisions.com
http://www.STETrevisions.com
http://brentskinner.blogspot.com

CEO “Identity Theft Expert”?? ID compromised 90 times

The press has recently taken issue with CEO of an identity theft prevention company who has given his SSN out for all the world to see. His identity theft protection service is designed to protect the consumer from identity theft.

Because he used the marketing gimmick to drive sales, it has resulted in a never ending battle where identity thieves and others are using his ID to prove a point, that giving out your SSN is never a good idea.

His identity was compromised financially early on and since has been compromised REPORTED 87-90 TIMES.

It is impossible not to give your SSN in a society that needs it for most accounts, insurances etc. Plastering it on a billboard is a great idea when you dont care if your identity is stolen in order to sell a product.

However for the rest of us I’d not recommend it.

The idea is to make the SSN useless by investing in a service that keeps you in-tune, on top of, what is happening regarding your identity by wrapping a security system around your identity.

Stay tuned. Updates on this issue to come.

Identity Theft Expert:MyLaptopGPS™ Helps Laptops for the Wounded by Equipping the Nonprofit’s Computers with Antitheft Security

(BOSTON, Mass. – April 29, 2008 – IDTheftSecurity.com) Today, MyLaptopGPS™ announced its relationship with Laptops for the Wounded to equip the charitable organization’s laptop computers for injured U.S. soldiers with security technology that protects the machines from thieves. To date, MyLaptopGPS has equipped more than 80 mobile computers for Laptops for the Wounded with antitheft technology that allows users at once to delete and silently retrieve data stored on a lost or stolen machine.

“My military service, patriotism and love of America were the motivation for my involvement with Laptops for the Wounded,” said Phil Drouin, vice president of Laptops for the Wounded and a member of its board. “My passion is helping my former brothers in arms who were wounded keeping America and her citizens free. MyLaptopGPS’ generous donation has closed out an early concern of mine, which was the theft of laptops from the hospitals we donate them to.” Drouin is also Information Technologies Project Manager for UnitedHealth Group.

Laptops for the Wounded is a charitable organization that provides hospitals for military personnel with free, webcam-equipped laptop computers. Soldiers wounded on the battlefield are then able to communicate with family as they recuperate far from home.

Last year, TheAssociated Press covered the organization’s donation of 10 mobile computers to the Walter Reed Army Medical Center in Washington, D.C. In March of 2008, Laptops for the Wounded returned to Walter Reed with an additional 18 laptop computers, all equipped with MyLaptopGPS’ security technology.

MyLaptopGPS combines Internet-based GPS tracking — which, for tracking and retrieving stolen laptops, is more effective than other forms of GPS — with other functionalities to secure mobile computing devices. Users launch MyLaptopGPS’ features remotely, protecting data even while the machine is in a criminal’s hands. Once connected to the Internet, the software silently retrieves, and then deletes, files from machines as it tracks the stolen or missing hardware — at once returning the data to its rightful owner and removing it from the lost computer.

Readers may download a demo of MyLaptopGPS. A white paper is also available.

“The loss of personal data to thieves can devastate anyone’s finances,” said Dan Yost, chief technology officer at MyLaptopGPS. “For a soldier wounded on the battlefield and in a hospital thousands of miles from home, this devastation can be especially catastrophic. It’s the reason why MyLaptopGPS decided to donate laptop security technology to protect injured soldiers fortunate enough to have access to mobile computers from Laptops for the Wounded.”

“Those who protect our country deserve the very best protection themselves,” said Robert Siciliano, a widely televised and quoted personal security and identity theft expert and CEO of IDTheftSecurity.com. “MyLaptopGPS’ generous contribution to a worthy cause promises to help spare countless military veterans from identity theft and other crimes.”

According to USA Today, theft of personal data more than tripled in 2007. Readers may view a video below of Siciliano discussing this news on the new “FOX Business” network. To learn more about identity theft, a major concern for anyone who’s lost a laptop computer to thieves, readers may go to video of Siciliano at VideoJug.

###

###

About MyLaptopGPS™

Since 1984, Tri-8, Inc. (DBA MyLaptopGPS.com) has specialized in complete system integration. From real-time electronic payment processing software to renowned mid-market ERP implementations, the executive team at MyLaptopGPS has been serving leading enterprises and implementing world-class data systems that simply work. With MyLaptopGPS™, Tri-8, Inc. brings a level of expertise, dedication, knowledge and service that is unmatched. MyLaptopGPS’ rock-solid performance, security, and reliability flow directly from the company’s commitment to top-notch software products and services for almost 25 years.

About IDTheftSecurity.com

Identity theft affects us all, and Robert Siciliano, CEO of IDTheftSecurity.com and member of the Bank Fraud & IT Security Report‘s editorial board, makes it his mission to provide consumer education solutions on identity theft to Fortune 500 companies and their clients. A leader of personal safety and security seminars nationwide, Siciliano has been featured on “The Today Show,” CNN, MSNBC, CNBC, “FOX News,” “The Suze Orman Show,” “The Montel Williams Show,” “Maury Povich,” “Sally Jesse Raphael,” “The Howard Stern Show,” and “Inside Edition.” The Privacy Learning Institute features him on its Website. Numerous magazines, print news outlets, and wire services have turned to him, as well, for expert commentary on personal security and identity theft. These include Forbes, USA Today, Entrepreneur, Woman’s Day, Mademoiselle, Good Housekeeping, The New York Times, Los Angeles Times, Washington Times, The Washington Post, Chicago Tribune, United Press International, Reuters, and others.

For more information, visit Siciliano’s Web site, blog, and YouTube page.

The media are encouraged to get in touch with any of the following individuals:

John Dunivan
MyLaptopGPS Media Relations
PHONE: (405) 747-6654 (direct line)
jd@MyLaptopGPS.com
www.MyLaptopGPS.com

Robert Siciliano, Personal Security Expert
CEO of IDTheftSecurity.com
PHONE: 888-SICILIANO (742-4542)
FAX: 877-2-FAX-NOW (232-9669)
Robert@IDTheftSecurity.com
www.idtheftsecurity.com

Brent W. Skinner
President & CEO of STETrevisions
PHONE: 617-875-4859
FAX: 866-663-6557
BrentSkinner@STETrevisions.biz
www.STETrevisions.biz

Identity Theft Expert and MyLaptopGPS: Computer Losses from U.K. Government Agencies Fuel Rise in Cost of Laptop Thefts This Year

(BOSTON, Mass. – March 11, 2008 – IDTheftSecurity.com) In the U.K., wide-scale laptop computer thefts and losses from the country’s government agencies have contributed to a continuing rise in the estimated cost of laptop theft. Robert Siciliano, a widely televised and quoted personal security and identity theft expert, urged organizations to dodge the financial risk of by adopting affordable laptop computer security measures such as those from MyLaptopGPS™.

“Laptop theft is more than a nuisance,” said Siciliano. “Loss of the hardware is the least of an organization’s worries. Just one lost mobile computer can set a business back thousands of dollars. The associated cost of informing all those whose sensitive information resides on the stolen or otherwise lost machine is just one consideration. And then there are the catastrophic legal bills from potential class action lawsuits. Inexpensive preventive measures are far preferable to a roll of the dice.”

CEO of IDTheftSecurity.com and a member of the Bank Fraud & IT Security Report‘s editorial board, Siciliano leads Fortune 500 companies and their clients in workshops that explore consumer education solutions for security issues. A longtime identity theft speaker and author of “The Safety Minute: 01,” he has discussed data security and consumer protection on CNBC, on NBC’s “Today Show,” FOX News, and elsewhere.

Laptop thefts in the U.K. publicized over the past month have left countless unique data records at risk of further foul play. The government there admitted that it had misplaced or lost to thieves more than 1,000 mobile computers, the Agence France-Presse reported in early March, with 20 percent or more of these having gone missing in 2007.

In a recent example of the hemorrhaging, news outlets reported in February the loss of 5,123 patients’ data records on a laptop computer stolen from a National Health Service hospital in the U.K. In reports last month, the loss of two laptops from the Royal Navy placed another 600,000 unique data records in jeopardy of further foul play.

Three weeks ago, MyLaptopGPS™, provider of Internet-based GPS tracking software for stolen mobile computing equipment, announced the Realtime Estimated Damage Index (REDI). The REDI keeps a running tally of high-profile laptop and desktop computer thefts and losses and the associated costs.

Visible at the company’s website, the REDI estimated the financial damage from computer losses since the beginning of this year alone to be $309,318,519 as of Feb. 21st. Today’s total of $325,376,519 represented a 5 percent increase in just three weeks’ time, a rate that would lead to nearly a 90 percent year-over-year rise in cost by March of 2009. The REDI’s calculation, based on estimates from the FBI and elsewhere reflecting the likelihood that identity theft and other crimes will occur when a laptop is lost, dwarfed the cost of the $9.95 monthly subscription fee for MyLaptopGPS’s software.

“Ninety percent is eye-opening,” said Dan Yost, chief technology officer at MyLaptopGPS. “And yet, the year-over-year increase by this time in 2009 could even exceed one hundred percent. By the middle of February the REDI had already calculated nearly three hundred million dollars in financial losses due to laptop theft this year. Compare that to less than twenty dollars, which is what MyLaptopGPS would have cost any one organization during the same time period. The smart choice is clear.”

A downloadable demo of MyLaptopGPS is available. A white paper is also available.

MyLaptopGPS combines Internet-based GPS tracking — which, for tracking and retrieving stolen laptops, is more effective than other forms of GPS — with other functionalities to secure mobile computing devices. Users launch MyLaptopGPS’ features remotely, protecting data even while the machine is in a criminal’s hands. Once connected to the Internet, the software silently retrieves, and then deletes, files from machines as it tracks the stolen or missing hardware — at once returning the data to its rightful owner and removing it from the lost computer.

“My laptop is a crucial tool,” said Eddie Manning, proprietor of London Airport Transfer Service. “It contains vital business information, even if it doesn’t contain ‘thousands of social security numbers’ like the headline stolen ones do. There is no way I or my business can afford to have the data, nor the machine itself, just walk away. MyLaptopGPS is the answer.”

MyLaptopGPS also offers SafeRegistry™, a comprehensive system for inventorying entire fleets of mobile computers, as well as a full line of highly renowned SafeTags™, which are police-traceable property tags designed to secure iPods, cell phones, BlackBerry devices, and other mobile property.

According to USA Today, theft of personal data more than tripled in 2007. Readers may view video of Siciliano below discussing this news on the new “FOX Business” network. To learn more about identity theft, a major concern for anyone who’s lost a laptop computer to thieves, readers may go to video of Siciliano at VideoJug.

###

About MyLaptopGPS

Since 1984, Tri-8, Inc. (DBA MyLaptopGPS.com) has specialized in complete system integration. From real-time electronic payment processing software to renowned mid-market ERP implementations, the executive team at MyLaptopGPS has been serving leading enterprises and implementing world-class data systems that simply work. With MyLaptopGPS™, Tri-8, Inc. brings a level of expertise, dedication, knowledge and service that is unmatched. MyLaptopGPS™’s rock-solid performance, security, and reliability flow directly from the company’s commitment to top-notch software products and services for almost 25 years.

About IDTheftSecurity.com

Identity theft affects us all, and Robert Siciliano, CEO of IDTheftSecurity.com and member of the Bank Fraud & IT Security Report‘s editorial board, makes it his mission to provide consumer education solutions on identity theft to Fortune 500 companies and their clients. A leader of personal safety and security seminars nationwide, Siciliano has been featured on “The Today Show,” CNN, MSNBC, CNBC, “FOX News,” “The Suze Orman Show,” “The Montel Williams Show,” “Maury Povich,” “Sally Jesse Raphael,” “The Howard Stern Show,” and “Inside Edition.” The Privacy Learning Institute features him on its Website. Numerous magazines, print news outlets, and wire services have turned to him, as well, for expert commentary on personal security and identity theft. These include Forbes, USA Today, Entrepreneur, Woman’s Day, Mademoiselle, Good Housekeeping, The New York Times, Los Angeles Times, Washington Times, The Washington Post, Chicago Tribune, United Press International, Reuters, and others.

For more information, visit Siciliano’s Web site, blog, and YouTube page.

The media are encouraged to get in touch with any of the following individuals:

John Dunivan
MyLaptopGPS Media Relations
PHONE: (405) 747-6654 (direct line)
jd@MyLaptopGPS.com
www.MyLaptopGPS.com

Robert Siciliano, Personal Security Expert
CEO of IDTheftSecurity.com
PHONE: 888-SICILIANO (742-4542)
FAX: 877-2-FAX-NOW (232-9669)
Robert@IDTheftSecurity.com
www.idtheftsecurity.com

Brent W. Skinner
President & CEO of STETrevisions
PHONE: 617-875-4859
FAX: 866-663-6557
BrentSkinner@STETrevisions.biz
www.STETrevisions.biz