Recession Turns IT Workers Into Hackers

Robert Siciliano Identity Theft Expert

What a nasty headline for an article.

From ABCnews.com the journalist roasts IT professionals on a spit. And the comments were all inspiring.

As the recession rears its ugly head, disgruntled ex employees are in the best position to drop a bomb in the companies network or suck all the data out with a few terabyte drives.

A recent study by McAfee and Purdue University put the tally of fraud, data loss and damage done at 1 trillion dollars. A thousand billion sounds like a lot of money.

To paraphrase some of the comments;

No matter how you look at it, when heads start to roll, most people that are about to be let go feel unjust and express hostility towards the employer (often, rightly so). These are the same people who were loyal company employees for years. Unfortunately, these are no win-win situations when it comes to the downsizing and companies should take proper actions to address it.

Your system admin is the gate keeper. Anyone who has access to sensitive data can potentially abuse the privilege. The loan officer, the loan processor, the secretary, the human resources gal two cubes down the hall, the cleaning people that take out our trash at night… Without proper controls in place anybody can be the bad guy. On the other hand, with adequate management these issues can be avoided, even when it comes to IT employees.

Manage your end points, your USB devices, your computer ports, your printers… Segregate your system administration roles. Tools are there. And who is going to implement them? Your IT guy. (thank you Sashimi11)

With the incredible amount of layoffs occurring, companies are bound to layoff an employee who will exact some revenge. Some say “Companies whose knee-jerk response is to cut costs by canning employees deserve some wrath”. But, in the end, the wrath doesn’t get you your job back. (thank you Patches777)

Most are working individuals, doing what they do best. All the while staying under the radar, and afraid, just like everyone else, of the threat of layoffs. The latter doesn’t mean an internal flip is switched and they bug out and start stealing trade secrets. (thank you kyleratliff)

On another note, as budgets are cut and IT pros are let go, the show must go on.

Bill Lynch of RazorThreat said to me “We are encountering lots of very frustrated CIO’s who are caught on the horns of a dilemma…their IT budgets and headcount are being slashed but their CEO’s are simultaneously demanding that they reassure them and the Board of Directors that they are not vulnerable to the same kinds of cyber attacks that have plagued some big firms lately.

They know they cannot afford to buy complex, expensive and difficult to deploy new security software and the people to manage them and yet they have to stand before the Board and profess that their networks are secure”.

The fact is, data breaches will continue and IT will often be to blame. There is a light at the end of the tunnel. There are numerous technologies that won’t break the bank and will keep the BOD happy. Companies have to consider numerous threats of theft and mayhem. Review security policies and who has access to what and why. In the end make sure employees are let go with dignity and respect.

Robert Siciliano Identity Theft Speaker discussing Credit Card Fraud Here

Neighborhood Identity Thieves From Hell

Robert Siciliano Identity Theft Expert Speaker

Keep your friends close and your enemies closer. Unfortunately your enemies could be living in your home or across the street. As the economy tanks, people get desperate and thieves victims become those in their lives.

With all the hullabaloo about criminal hackers and identity thieves organizing as webmobs from all over the world, people often forget that it’s the people in our lives that are the closest to us who often perpetrate these crimes.

Especially in tough times, identity thieves could be someone in your inner trusted circle. I’ve consulted on stories where the dad stole his child’s identity. Those closest to us at home or work have direct access to our data.

“Familiar” Identity theft happens because the thief goes through a process of rationalizing their ability to commit the crime. The process is often referred to as the “Fraud Diamond”.

First they have Incentive. They say “I want to or have a need to commit this crime”. Next is Opportunity. They see a hole or weakness in the system they can easily exploit. And of course Rationalization; “I have convinced myself it is worth the risks”. Lastly, Capability; they determine they are the right person for the job and can pull off the scam.

Here a local neighborhood was terrorized by a drug addicted mom and dad who had a penchant for technology and used their skills to feed their habit.

Much of the crimes they committed could have been prevented.

1. Get a credit freeze or fraud alert
2. Invest in a locking mail box
3. Shred all throwaway paper work
4. Turn off the paper
5. Turn on WPA security for your wireless network
6. Pay attention to all your statements and refute unauthorized charges
7. As a national spokesperson for uni-ball, I recommend using a uni-ball® pen, which contains Uni “Super Ink” formula, to write checks and sign important documents. This specially-formulated ink won’t wash out and protects against check washing. Those closest to you have access to your canceled checks and can rewrite to themselves.

Robert Siciliano Identity Theft Speaker Expert discussing family identity theft Here

THIEVES INITIATE NEW IDENTITY THEFT SCAMS IN TIME FOR TAX SEASON

uni-ball® teams with Identity Theft Resource Center and Identity Theft Expert Robert Siciliano to Warn Consumers of Latest Scams and Offer Anti-Theft Solutions 

Oak Brook, Ill. – March 4, 2009 – Tax time scams are at an all-time high, according to Robert Siciliano, well-known identity and security theft expert and author of the book “The Safety Minute: How to Take Control of Personal Security and Prevent Fraud.”  As economic pressures continue to increase, Siciliano says criminal activities such as sophisticated, organized theft, including the number of new scams intended to trick consumers this tax season, are expected to rise as well. 

“More than 155 million tax forms were filed last year,” said Siciliano, “the majority of them without incident.1  But people need to understand that thieves are inventing new ways to steal identities each and every day.  And since tax time is a key period when we see a spike in identity theft, it’s crucial that we get the word out now and educate people about the latest scams.”  

As part of the its ongoing campaign to elevate awareness about the growing threat of identity theft, uni-ball®, a leading brand of pens, many of which contain specially formulated ink that helps prevent check fraud, is working with the Identity Theft Resource Center (ITRC) and Siciliano to help stop identity thieves in their tracks.   As CEO of IDTheftSecurity.com, Siciliano has seen first-hand the brute blow identity theft delivers to its victims, and has helped scores of them dig out from the financial and emotional turmoil of being scammed.  

Together, the ITRC, Siciliano and uni-ball are issuing the following warnings, asking consumers to be on high alert during tax time for these identity theft scams and more:

·         Professional Thieves and Targeted Attacks.  The ITRC anticipates an increase in more sophisticated ways to “mine” information, sometimes by organized crime groups. Cybercrime, which includes transporting or selling large amounts of personal information from one group both nationally and internationally, will continue and expand. Part of this trend includes “skimming” (duplicate scanning of credit cards or debit cards), and the use of fake fronts on payment scanners and ATM machines. 

uni-ball® teams with Siciliano to promote simple anti-theft solutions during tax season – Add One

·         Tax Preparer Scams.  Most recently, there are reports of tax preparers telling clients they must pay back their 2008 stimulus payments and then pocketing the money.  Not all professional tax preparers have your best interest at heart, according to the ITRC.  Make sure you do research and choose your tax preparer wisely.

·         Check Fraud. As it becomes more difficult to get new lines of credit, identity thieves may be increasingly drawn to commit check fraud. These crimes may take the form of stolen checks, using checks thrown into the trash by unknowing consumers, or a type of identity theft known as “check washing.” Check washing occurs when checks or other tax-related documents are stolen from the mail or by other means and the ink is erased using common household chemicals, allowing thieves to endorse checks to themselves.   This is where something as simple and inexpensive as a uni-ball pen can help.  Select Uni-ball pens contain specially formulated gel ink (trademarked Uni-Super Ink™) that is absorbed into the paper’s fibers and can never be washed out. 

·         Late Payment Scam.  As people fall behind on their utilities or taxes, lists are created and available either internally or as public record. These lists can fall into the wrong hands and thieves call unassuming people to collect.

  • Text Messaging Scams: Phexting.  Criminal hackers have access to everything these days, including the technology that generates cell phone numbers, as well as access to mass text messaging services. Once the data is secured, they are able to send text messages that install keyloggers (a method of capturing and recording user keystrokes) or direct you to Web sites that steal personal data.

·         Internet Scams: Phishing.  Phony e-mails that try to trick customers into giving out personal information are the hottest, and most disturbing, new scam on the Internet. “Phishing” frauds attempt to make Internet users believe they are receiving email from a specific, trusted source, or that they are securely connected to a trusted Web site, when that is not the case.  This scam is generally used as a means to convince individuals to provide personal or financial information that enables the perpetrators to commit credit card, bank fraud or other forms of identity theft.

“Identity theft is a giant octopus,” said Siciliano.  “Educate yourself on the many facets of the problem and learn your options to defend yourself from each leg of this monster.  Doing something as simple as paying attention to the pen you use could save you thousands of dollars and endless hours of headaches.  Personally, I never write checks or sign important documents without using a uni-ball gel pen with specially formulated Uni-Super Ink.”  

“Uni-ball pens with Uni-Super Ink help prevent identity theft,” said Steve Gradman, senior brand manager of uni-ball.  “Our goal is to help ease the minds of individuals when writing sensitive materials – from legal and medical documents to checks and tax forms.  It’s a simple, inexpensive pen, but it packs a lot of punch when it comes to identity theft prevention.

uni-ball®teams with Siciliano to promote simple anti-theft solutions during tax season – Add Two 

Many uni-ball pens, including the uni-ball 207 gel pen, the Jetstream, Jetstream RT and Vision Elite roller ball pens, use specially formulated inks that contain tiny color pigments.  This exclusive “Super Ink™” helps prevent document and check fraud by absorbing into the paper fibers. When an individual tries to wash or lift the inked information written on the document, the ink remains “trapped” within the fibers of the paper, thereby discouraging the efforts of identity thieves.

Identity theft rose 22 percent in 2008, and Siciliano predicts it will go up again in 2009.   “Now is the time to become educated in order to prevent this offensive crime,” he said.

 For more information on how to protect yourself this tax season, visit www.uniball-na.com

### 

1 http://www.irs.gov/newsroom/article/0,,id=188359,00.html 

About uni-ball®

uni-ball® is a world leader in providing an optimal writing experience, offering writing instruments with superior functionality and affordability.  From the JetStream® pen’s smooth write to the intense color and superior performance of the uni-ball 207 gel pen, the brand allows one to enjoy the ultimate in writing performance coupled with a distinctive, contemporary style.  Newell Rubbermaid Office Products, marketer and distributor of uni-ball® pens in North America, is a worldwide leader in the manufacturing and marketing of writing instruments, art products and office organization and technology products, including such well known brands as Paper Mate®, Sharpie®, DYMO® Parker®, Waterman®, EXPO®, uni-ball®, and Rolodex®, among others. Visit www.uniball-na.com for more information.

About Robert Siciliano

Robert Siciliano “The Lifesaver” is an expert on personal security and identity theft. He has 25 years of experience in self-defense, security work, martial arts and white collar crimes.  An author, sought after media personality and identity theft speaker, Robert has been seen on the Today Show, CBS Early Show, CNN, MSNBC, FOX, CNBC, USA Today, Forbes, Good Housekeeping, Readers Digest, Consumer Digest, Boston Globe, Washington Post, Chicago Tribune, ABC News.com, TechRepublic, Search Security, AP, UPI, Reuters, and Entrepreneur. Robert recently released his third book, “The Safety Minute: How to Take Control of Personal Security and Prevent Fraud”.

About the ITRC

The San Diego-based Identity Theft Resource Center (ITRC) is a non-profit (501(c) 3) organization established in December 1999, to support victims of identity theft in resolving their cases, and to broaden public education and awareness in the understanding of identity theft. It is the on-going mission of the ITRC to assist victims, educate consumers, research identity theft and increase public and corporate awareness about this problem.  

Are You a Hacker or Hackee?

Robert Siciliano Identity Theft Expert Speaker

In the past decade there have been hundreds of data breaches resulting in millions of compromised records. The motivation behind these hacks? Identity Theft. As a results dozens of new laws and government intervention to protect citizen data.

Black, White or Grey, over the past decade the media has given the term “hacker” a negative connotation. Or is it hackers that gave the term a negative connotation? Just asking!? Either way, whenever I’m talking bad guy hacker I’m careful to precede the word hacker with “criminal” so I don’t piss off anyone who considers themselves a good guy hacker.

Thomas Edison, Benjamin Franklin and Alexander Graham Bell were all hackers. Good ones too.

Hackers in general take pride in their skills, as they should. They are often a head above the rest, on top of what is new and ahead of whats next in technology. Many are self taught and many hone their skills with additional formal training.

In the past the word “Cracker” has been tossed around and never quite stuck when referring to criminal hackers. And of course “scriptkddie”, referring to bad hackers that are just trying to make a name for themselves. We don’t hear that term much anymore due to the fact that most mischievous hackers are generally criminal because they are breaking the law.

What many are beginning to realize is there is a battle going on 24/7/365 between the whitehats and the blackhats. President Obama has chimed in with a directive to review the nations cyber security as it relates to security and our critical infrastructures. You are either a (criminal) hacker or a hackee. Predator or prey.

The US Federal Aviation Administration, the bureau that would have been in the best position to stop 9/11, recently disclosed a breach in a server that was hacked.

Very recently reports came in from a Romanian based blog bragging about scriptkiddie type accomplishments that the criminal hackers had compromised sites owned by Kaspersky Security, F-Secure and BitDefender. To what degree they were compromised and if was considered a real threat is unknown. They all reported data was not stolen. Initial reports include hacks known as SQL injections and cross-site scripting, which affects applications and can steal data.

All this means the criminal hackers are not messing around. While this all may be over the heads of most hackees, it’s a real problem that everyone should and, unfortunately, will continue to become more familiar with. As a citizen who uses various technologies, you need to make a concerted effort to understand what you are up against and put systems in place to protect yourself.

Robert Siciliano Identity Theft Speaker Expert discussing criminal hackers busted Here

Identity Theft Speaker Expert on National Television 2/24/09 M&J Show

Robert is in NYC Tues AM on the Morning Show with Mike and Juliet “M&J Investigates” work at home scams. http://www.mandjshow.com/about-the-show.

Here are past shows:
Holiday Scams http://www.youtube.com/watch?v=Q22ifUbTbiY

Cyber Monday Scams http://www.youtube.com/watch?v=Ixn26vVTfns

More here: http://www.youtube.com/user/stungundotcom

Show times and listings http://www.mandjshow.com/about-the-show/

Homepage www.IDTheftsecurity.com

LinkedIn http://www.linkedin.com/in/robertsiciliano
Twitter https://twitter.com/RobertSiciliano
FriendFeed http://friendfeed.com/identitytheft
Blog http://robertsiciliano.com/blog/
YouTube http://www.youtube.com/stungundotcom
Finextra http://www.finextra.com/community/profile.aspx?id=44396
BankInnovation http://bankinnovation.net/profile/IdentityTheftSpeaker
Facebook http://www.facebook.com/people/Robert-Siciliano/534933030
IMDB http://www.imdb.com/name/nm2892079/resume
Wiki http://en.wikipedia.org/wiki/Robert_Siciliano

Preventing Inside Jobs, Keeping Inside Hackers – Out

Robert Siciliano Identity Theft Speaker and Expert

Are you familiar with a “Logic Bomb”? This is a brilliant piece of code, a virus, designed for destruction. The goal of a logic bomb is to disable existing systems that may monitor data, protect it, back it up or access it. A logic bomb is designed to multiply like any virus and spread throughout a network multiplying its effects.

In a Wall Street Journal story an example provided, depicts an employee at Fannie Mae, knowing he is about to be fired commits an act of workplace violence by installing a logic bomb set to detonate almost 3 months after his departure. The detonation would have taken the organization off line for almost a week and cost millions and millions of dollars.

In this true crime story, an observant programmer, still employed noticed the code and disabled it before the damage could be done.

Think for a moment about your home/flat/apartment and how you would break in if you lost your keys. And if a burglar knew what you knew about where you hide and store your stuff. How much damage could he do, knowing what you know? Insiders pose the same problem. They know the ins and outs of all systems in place and can wreak havoc on your operation while they are employed and sometimes after they are let go.

The problems begin when we put people in a trusted place. They are granted access because that’s their job to perform certain duties and they are granted carte blanche access. Ultimately this is a people problem and needs to be addressed that way.

1. Limited Sources; only grant access to a few trusted sources. Minimize the amount of staff that has access to whatever systems in place.

2. Due Diligence; in the information age, our lives are an open book. Background checks from information brokers are very necessary. Not doing a background check increases your liability. A person previously convicted of a crime just might do it again.

3. Limit Access; even a good apple eventually can go bad. By restricting the access to even those who are in a trusted position, in the event they turn sour, they can only do limited damage.

4. Defense in Depth; audit, audit, audit. This is all about checks and balances. Separation of powers. Multiple layers of authorization. We’ve all watched the movie where in order to launch the missile there were 2 keys held by 2 people, who pressed 2 buttons in order for the missile to launch. Put systems in place that facilitate someone always watching over someone’s shoulder. This way the bad apple can’t hide or execute their malicious intent.

5. Prosecute the Guilty; in the event of a breach of trust, make an example of the person that others won’t forget. Public hangings set a strong deterrent.

It is human nature to trust each other. We are raised to be civil towards one another and to respect those in authoritative positions. It takes a significant amount of trust in your fellow human being to drive down the street while cars are heading toward you only separated by a thin painted line. Without trust we wouldn’t get out of bed in the morning.

This explains why we are completely beside ourselves when someone who we have bestowed our faith and trust in deceives us. A week doesn’t go by where we read of the local girls team soccor coach was preying upon his underage team members. And we are still shocked.

Throughout our lives, and especially lately, we have observed government officials, CEOs from major corporations down to front line staff and many others who have been put in positions of trust, who ultimately deceived. Putting someone in a trusted position, without checks and balances can lead to utter destruction, and is liable and irresponsible.

Robert Siciliano Identity Theft Speaker and Expert; video discussing background checks

Unlucky in Love? Feb. 13th is Your Lucky Day!

Unlucky in Love? Feb. 13th is Your Lucky Day!

Hi,
Lisa Daily, friend and colleage wrote a great book “How to Date Like a Grown-Up: Everything You Need to Know to Get Out There, Get Lucky, or Even Get Married in Your 40s, 50s and Beyond” and featured me and my tips on safe dating both online and off.

Buy it!

If you’ve been unlucky in love (or just not lucky enough). Friday, February 13th will be your lucky day.

Why? If you buy How to Date Like a Grown-Up: Everything You Need to Know to Get Out There, Get Lucky, or Even Get Married in Your 40s, 50s and Beyond (written by my friend, bestselling author Lisa Daily) today at Amazon.com, you’ll get more than $800 worth of free bonus gifts.

How’s that for a Valentine’s Day present?

How to Date Like a Grown-Up offers realistic, counterintuitive advice that will help you finally find the relationship you deserve, including: where and how to meet better men, 5 easy tips to chat up any stranger, what you may be doing to make yourself a magnet for losers, little-known secrets to dramatically improve your dating odds, and the one simple thing you can do in the bedroom to make a man speed up his marriage proposal. (It’s not what you think!)

For today only, you can get an online goodie bag worth $800 when you purchase How To Date Like a Grown-Up: Everything You Need To Know To Get Out There, Get Lucky, or Even Get Married in Your 40s, 50s and Beyond. (It’s about $12 at www.Amazon.com)

For details and a complete listing of all the goodie bag items, which includes a free T-Tapp exercise video download (lose 2 sizes in 30 days!), free dating site membership, a collection of fantastic audio downloads, sneak peek chapters of not-yet-released books from bestselling authors, and lots of other goodies, check out www.lisadaily.com/swagbag

Here are some of the bonuses you’ll receive if you purchase HOW TO DATE LIKE A GROWN-UP today!

Purchase HOW TO DATE LIKE A GROWN-UP today and you’ll receive:

* $5 OFF (20%!) THE FABULOUS MAN-MAGNET PARFUME GLACé (www.HerbanAvenues.com)

* Free exclusive T-Tapp exercise video download from Teresa Tapp (Lose 2 sizes in 4 weeks!)

* Two months FREE membership at Cupid.com, the premier online dating site. (www.cupid.com)

* 7 THINGS EVERY WOMAN MUST KNOW TO PROTECT HERSELF ONLINE EXCLUSIVE AUDIO DOWNLOAD
Lisa Daily interviews Robert Siciliano of www.IDTheftSecurity.com about the key things every woman must know to protect herself from online predators.

* Two Free Chapters From FOCUS ON THE GOOD STUFF Bestselling Author Mike Robbins (www.focusonthegoodstuff.com )

* A collection of 5 hilarious essays and 5 audio downloads from humor writer Lisa Earle McLeod, author of Forget Perfect and Finding Grace When You Can’t Even Find Clean Underwear (www.forgetperfect.com)

* Free audio and video access to the Wealthy Girl Summit (www.beawealthygirl.com)

*Free Excerpt and audio programs of Aging Backwards: Secrets to Staying Young

* Your 2009 Shoe Personality Predictions from Donna Sozio

* Free copy of Letters From Friends e-book –by Emily McKay

* Sneak peek of UNPREDICTABLE by the hilarious Eileen Cook (www.eileencook.com)

* Sneak preview of SWEET LIFE by bestselling author Mia King (www.miaking.com)

*Excerpt of SLEEPING WITH WARD CLEAVER by bestselling author Jenny Gardiner (www.jennygardiner.net)

* FREE The Daughter-in-Law Rules eBook (www.thedilrules.com)

* $500 OFF YOUR TUITION TO THE DREAMGIRL ACADEMY WEEKEND SEMINAR

To get your free bonuses worth more than $800, purchase How to Date Like a Grown-Up before 12 midnight PST TODAY at Amazon.com (where it’s currently bargain-priced under $12) and email your receipt to swagbag@lisadaily.com.

The reviews so far:

“Witty and smart, this is a must-read for any woman ready to find Mr. Right. Or at least Mr. Right Now.”
–Christopher Hopkins, Oprah’s Makeover Guy and author of Staging Your Comeback: A Complete Beauty Revival for Women Over 45

“This is for every women who’s come to the realization, “This is a different world, I’m a different person, and I’m not doing things the same old way.”
–Lisa McLeod, Buffalo News, author of Finding Grace When You Can’t Even Find Clean Underwear

“Not only is Lisa Daily absolutely hilarious, but she gives the best advice! Read, laugh, enjoy, but do what she suggests because her advice is spot on!”
-Jennifer Muscato, E! News
##

Tech Executives Are The New Sexy

Robert Siciliano Identity Theft Expert – Speaker

Not to long ago the CIO was a pocket protected, sugared up, soda pop drinking, potato chip eating, caffeinated, non sociable…..well….geek. Not anymore. But you knew that. Serious, Geek is getting even more sexy, stripper pole sexy. A familiar story, a colleague of mine built a tech startup, it has gone from $4 million to $175 million in 3 years. He tells me behemoth tech companies literally send scantily clad hotties to his office weekly, making numerous offers he has to refuse. Hes married, and, he has a board of directors that won’t sell.

Companies not so flush with cash and armed with solutions that actually work, are holding back and not selling out because they are undervalued due to the economic crisis. What compounds their pain is retailers and others who need their technology aren’t buying. It astonishes me that with the amount of data beaches over the past year alone, companies aren’t making the necessary investments.

I see struggling companies offering technologies including identity theft protection, data security that prevents data breaches, defending against criminal hackers from the inside and out, biometric solutions and credit card fraud prevention using multi-factor authentication, all solutions yet to be widely implemented. Solutions that work!

This kind of cost cutting has put the attention on the CIO. Budget cuts have put the CIO front and center.

CIO’s are benefiting big time from the current climate. Sure, many have a much bigger workload, but the chief information officer has become an attractive and strategic financial asset.

The CIO is now very in demand. High tech jobs are some of the most recession proof. While tech is their “job”, they have become go-to-gurus for security, and now for corporate strategy and long term company objectives.

Cost cutting often spurs innovation. Who better to turn to than the CIO who knows what works, and, deals with whiny co-workers when stuff doesn’t work. These are people that generally know what goes on in every nook, cranny and crawl space of the facility and know what is a waste and what streamlines productivity.

If you’re not already, tap your CIO for strategic initiatives and they may have something sexy to say.

Great article by Jon Fortt Here

Completely unrelated distraction of a video of credit card skimming Here

The Five Biggest Security Threats Facing Businesses Today

Robert Siciliano 2/12/2

Millennials, the next generation of technology savvy workers are coming to a cubicle near you. They are a generation of technogeeks that dont know they are techno or geeks. I had a rattle. They had a PS2.

This generation knows enough to fix it and enough to break it. They are the best thing and the worst thing to happen to IT administrators. They are armed with netbooks, iphones and their own routers they plug into your network. They access Facebook, Myspace, Bebo and countless other sites that should not be accessible from a corporate network.

Yes, you can control what they do on-site. But it gets more complicated when they are commuting virtually. Using their PCs to log into your network becomes a battle of the techies (your IT guy vs them) to see who wins. They dont want restrictions, they want speed and will do their best to defeat whatever technology IT has in place.

Poison Pharms; is the redirect of your domain of your companies website, it’s the equivalent of someone rerouting your phone lines to a boiler room operation across the street and posing as your business.

Storm Clouds; as many forgo software and adopt software as a service, the potential for data lost or stolen in the cloud rises. The information is virtual, its overseas, it goes through another router you dont control.

Credit Crunch; recent studies show on average companies will allocate ONE more full percentage point of their annual budget into IT security. ONE! Criminals are spending lots more and they are investing whatever they need to get into your networks and they are using your data and turning it into money to do it.

Offshoring; countries in the game only a short time have exploded with growth in their IT sectors. While most have invested heavily in their infrastructures and in security, the pace of growth for some has outpaced security.

Brilliant article by Nick Heath Here

Video of hackers caught Here

Robert Siciliano Identity Theft Expert and Speaker

Malicious insider attacks to rise. McAfee has a warning

Robert Siciliano Identity Theft Expert www.IDTheftSecurity.com

The world’s biggest software maker has warned companies to expect an increase in “insider” security attacks by disgruntled, laid-off workers.

With millions losing their jobs their are a plethora of opportunities for insiders to plug in an iPod, thumdrive or other external source and steal client data, or other proprietary information.
Its been said before, company networks are like candy bars, hard on the outside and soft and chewy on the inside. Insiders fearing the inevitable layoff begin to look for ways to profit from what is immediately within their grasps.

Stealing office supplies only takes them so far. But hundreds, even millions of records or company secrets is worth something to someone. Those on the inside usually know what its worth to who.

Verizon determined insider attacks equate to up to 18% of all breaches. McAfee further disclosed fraud equates to a trillion dollar price tag.

Maggie Shiels Technology reporter, BBC News does a great job Here

Robert Siciliano is and Identity Theft Expert and CEO of IDTheftSecurity.com he is a business builder, strategic marketer, security analyst, published author, television news correspondent. Delivers presentations on identity theft protection and personal security. Works with Fortune 1000, IT and startups. Launching, branding, messaging, representation, m&a facilitator, SEO and media. Current private equity projects include dynamic biometrics, credit card platform multi-factor authentication, security investigations and telemarketing fraud mitigation. Connect with him on LinkedIn

Robert on Fox discussing ID Theft