Privacy Means Profit - John D. Sileo - E-Book

Privacy Means Profit E-Book

John D. Sileo

0,0
16,99 €

oder
-100%
Sammeln Sie Punkte in unserem Gutscheinprogramm und kaufen Sie E-Books und Hörbücher mit bis zu 100% Rabatt.

Mehr erfahren.
Beschreibung

Bulletproof your organization against data breach, identity theft, and corporate espionage In this updated and revised edition of Privacy Means Profit, John Sileo demonstrates how to keep data theft from destroying your bottom line, both personally and professionally. In addition to sharing his gripping tale of losing $300,000 and his business to data breach, John writes about the risks posed by social media, travel theft, workplace identity theft, and how to keep it from happening to you and your business. By interlacing his personal experience with cutting-edge research and unforgettable stories, John not only inspires change inside of your organization, but outlines a simple framework with which to build a Culture of Privacy. This book is a must-read for any individual with a Social Security Number and any business leader who doesn't want the negative publicity, customer flight, legal battles and stock depreciation resulting from data breach. Protect your net worth and bottom line using the 7 Mindsets of a Spy * Accumulate Layers of Privacy * Eliminate the Source * Destroy Data Risk * Lock Your Assets * Evaluate the Offer * Interrogate the Enemy * Monitor the Signs In this revised edition, John includes an 8th Mindset, Adaptation, which serves as an additional bridge between personal protection and bulletproofing your organization. Privacy Means Profit offers a one-stop guide to protecting what's most important and most at risk-your essential business and personal data.

Sie lesen das E-Book in den Legimi-Apps auf:

Android
iOS
von Legimi
zertifizierten E-Readern

Seitenzahl: 366

Veröffentlichungsjahr: 2010

Bewertungen
0,0
0
0
0
0
0
Mehr Informationen
Mehr Informationen
Legimi prüft nicht, ob Rezensionen von Nutzern stammen, die den betreffenden Titel tatsächlich gekauft oder gelesen/gehört haben. Wir entfernen aber gefälschte Rezensionen.



Table of Contents
Title Page
Copyright Page
Dedication
Acknowledgments
I - Boot Camp: Privacy Means Profit
Chapter 1 - Motivate the Troops
Let My Failure Motivate Your Change
The Three Enemies of Privacy: Apathy, Ignorance, and Inaction
Inaction Destroyed My Business
How to Get the Most Out of This Book
Chapter 2 - Define the Problem
What Is Identity?
Common Sources of Identity
How Individuals’ Identities Are Stolen (It’s Not All Cybercrime)
Defining Common Methods of Theft
The Five Main Types of Identity Theft
Failure to Define
Chapter 3 - Engage the Brain
Think Like a Spy
The Seven Mind-Sets of a Spy
Field Combat: Target the Enemy
II - Basic Training: Think Like a Spy
Chapter 4 - The First Mind-Set: Eliminate the Source
Eliminate Mind-Set
Eliminate the Source
Chapter 5 - The Second Mind-Set: Destroy the Data
Destroy Mind-Set
Destroy Physical Information: Files, Documents, Credit Cards
Destroy Physical Information
Destroy Digital Information: Disks, E-mails, CDs
Chapter 6 - The Third Mind-Set: Secure the Systems
Secure Mind-Set
Secure Your Computer
Hire a Professional
Fifteen Ways to Protect Your Computer
Use Your Computer to Help Prevent Identity Theft
Chapter 7 - The Fourth Mind-Set: Lock the Docs
Lock Mind-Set
Create a Safe House
Essential Identity Documents and How to Lock Them
Lock Your Vital Physical Documents
Securing Your Mail
Chapter 8 - The Fifth Mind-Set: Evaluate the Risk
Evaluate Mind-Set
Social Engineers Exploit Our Distracted Minds
The Privacy Reflex: Trigger, Reflex, and Response
Chapter 9 - The Sixth Mind-Set: Interrogate the Enemy
Interrogate Mind-Set
The Four Phases of Interrogation: ConJOB
Risk Scenarios: Practice Interrogating the Enemy
Chapter 10 - The Seventh Mind-Set: Monitor the Signs
Monitor Mind-Set
Create a Dossier
Monitor Your Credit Report Consistently
Monitor Your Financial Transactions Effortlessly
Monitor Your Annual Social Security Statement
Make Photocopies and Logs
III - Field Combat: Target the Enemy
Chapter 11 - Deploy Targeting Strategies: Accumulate, Prioritize, and Adapt
Victory #1: Building a Culture of Privacy from the Ashes of Failure
Target the Enemy: Three Principles
Chapter 12 - Defend Online Identity: Social Networking and the Cloud
Defend Mind-set
Social Networking’s Secret Weapon: Trust
Thirteen Hazards of Social Networking
Ten Steps to Safer Facebooking
E-mail
Google
Chapter 13 - Protect Mobile Data: Laptop Responsibility
Mobile Data Device Responsibilities and Best Practices
Chapter 14 - Travel with Care: Business Trips and Vacations
Before You Leave Home
During Travel
Upon Returning Home
Chapter 15 - Recover Your Identity: When All Else Fails
Action Items Checklist: Take Action Now
Chapter 16 - Prioritize Your Attack: The Privacy Calendar
Resources
Notes
Index
About the Author
Copyright © 2010 by John Sileo. All rights reserved.
Published by John Wiley & Sons, Inc., Hoboken, New Jersey.
Published simultaneously in Canada.
No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600, or on the web at www.copyright.com. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at http://www.wiley.com/go/permissions.
Limit of Liability/Disclaimer of Warranty: While the publisher and author have used their best efforts in preparing this book, they make no representations or warranties with respect to the accuracy or completeness of the contents of this book and specifically disclaim any implied warranties of merchantability or fitness for a particular purpose. No warranty may be created or extended by sales representatives or written sales materials. The advice and strategies contained herein may not be suitable for your situation. You should consult with a professional where appropriate. Neither the publisher nor author shall be liable for any loss of profit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages.
For general information on our other products and services or for technical support, please contact our Customer Care Department within the United States at (800) 762-2974, outside the United States at (317) 572-3993 or fax (317) 572-4002.
Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic books. For more information about Wiley products, visit our web site at www.wiley.com.
ISBN 978-0-470-58389-0 (cloth)
To my wife Mary, the strongest, most courageous, most important person in my life. I’ve loved you since I was eight, and will love you till the day I die.
For an electronic version of The Privacy Calendar (with live links), visit www.Sileo.com/privacy-calendar.
Acknowledgments
During the week that this book is published, it will have been 14 years since I joined my family’s 40-year-old business. It will have been exactly 7 years since I found out I could be sent to prison for another man’s crimes, and 5 years since those crimes destroyed the family business. This book is the symbol of a delicious victory for so many people; it is tangible proof that we took the bushel of sour lemons handed us and cooked up a sweet lemon pie.
You need to know the truth: One person doesn’t write a book. Not even close. I am listed as the author, and get way too much of the credit; but in reality, this accomplishment is as much about others as it is about me. And therein lies the most enjoyable part of writing it: it brought us together like well-written words. I owe everything to those people who stood with me through the ugly times, serving as constant reminders that it is okay to trust others.
To Mom and Dad, whom I get to work and play with every day at the business we created out of the ashes. Thanks for being my perfect triumvirate—loving parents, complementary business partners and best friends. (Mom, I left out that comma in honor of you.)
To My Love, who is the coauthor of everything I do. To Sophie and Makayla, you two give me all of the meaning I will ever need in life.
To Liz Crider, who brought this book to completion and kept our business in order as I traveled the world for three months. You are a godsend to our business, and a member of our family.
To Larry Winget, first as my friend, second as my advisor, and third, for getting me this book deal.
To my sister, Andrea, whose wisdom centers me and presence fills me with joy.
To everyone on my team: You each deserve your own line of acknowledgment:
Michael Zinanti, Brad Montgomery, Eric and Karen Peacock, Chris Rogers, John and Kathy Robinson, Peter and Elisabeth Jacobson, Pat Connolly, Mark Throndson, Scott Halford, Steve Spangler, Carly Reed, Lou Heckler, Scott Friedman, Bill Morrow, Nancy Noonan, Diane Sieg, Howard Wallin, Pat Lencioni, Lars Hanson, Michael Santarcangelo, Sue Gwillim, Brian Bostwick, my amazing sister-in-law Julie Walters (who actually read my first book), Fran, Steve, Phil and Sparky Bellio, Jenny Fowler, Lesley Signal, Rachel and Erin Batchelor, Suzanne Vaughan, Geoff Watson, Andrew Kilsby, Linda and Jay Foley, Joseph Fanganello, Dave J., Frank E., Mary B., and everyone at the Department of Defense, and all those mates I’ve missed. Thank you for your patience, counsel, and friendship.
A special thanks to:
My editor, Daniel Ambrosio (and his team), at John Wiley & Sons, Inc., for putting your faith in me and your hard work into this book.
Jim Van Dyke and everyone at Javelin Strategy & Research for your wonderful reports, sound methodology, and ongoing help.
Larry Ponemon and Mike Spinney of the Ponemon Institute. More than any people I know, you understand the importance of privacy.
All of the bureaus that keep my speaking schedule packed to the gills: Gail Davis & Associates, Washington Speakers Bureau, Goodman Speakers Bureau, FiveStar Speakers, Eagles Talent, Convention Connection, and many others. Thank you for making privacy a profitable profession.
To you, the reader, for being part of the solution.
I
Boot Camp: Privacy Means Profit
People will do something—including changing their behavior—only if it can be demonstrated that doing so is in their own best interests as defined by their own values.
—Marshall Goldsmith, What Got You Here Won’t Get You There
1
Motivate the Troops
People don’t change bad habits until they have a compelling reason. Too often that compelling reason is the result of a habit’s negative outcome; but the promise of positive rewards resulting from the establishment of good habits can be a strong motivator. In the workplace, aligning responsible information stewardship with personal and professional gain can set the stage for good privacy habits.

Let My Failure Motivate Your Change

At breakfast on the morning of August 12, 2003, a small and profitable computer company thrived at the foot of the Rocky Mountains. By lunchtime that day, that same business was on its way to ruin. Within 12 months, due to the theft of personal and company information, a 40-year-old family-business-turned-software-startup was doomed, and John, heir to the prosperous enterprise, faced the prospect of prison for crimes he didn’t commit.
Beyond the specter of prison time for John, the situation held dire consequences for his family and friends. There was a real threat that his wife and two young daughters might be separated from their husband and father, if John went to prison. John’s parents, who founded the company in 1964, shouldered most of the financial responsibility for the dying business and experienced declining health from the resulting stress. In the end, the situation would expose a dark secret kept by John’s close friend, Doug, a recent partner in the business.
It sounds like fiction, and sometimes when I’m recounting the ordeal in front of an audience, it feels like fiction. But it’s 100 percent true. This is the story of how a failure to understand the importance of data privacy not only destroyed a healthy business, but nearly took down an entire family, as well.
If you haven’t already figured it out, I am John Sileo, the business leader whose naïve choices brought about the sad saga. Before I experienced it firsthand, I didn’t understand that both individual and business data privacy are integral to running a profitable company.

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!