What Is....Business Identity Theft!
By Nigel Ross
()
About this ebook
An easy to read ebook of Business Identity Theft, which shows the beginner all they need to understand about this sometimes complex crime of the 20th century. This book addresses the facts that this is the fastest growing crime of all and that a third of all adults will experience in their life time.
Nigel Ross
Hi, having spent years within security, it was a natural step to set up an Identity Theft Consultancy to answer people's concerns. Being qualified by the Identity Management Institute(IMI) as an Certified Identity Protection Adviser(CIPA) running my business in the UK all consultants that are employed by www.identitytheftsecuresolutions.com (my company) are like myself CIPA. Looking forward to serving you and educating the public with more Ebooks to follow!! Kind Regards, Nigel Ross.
Read more from Nigel Ross
ID Theft Scams and Solutions (A guide on how to protect your identity) Rating: 0 out of 5 stars0 ratingsWhat Is....Identity Theft! Rating: 0 out of 5 stars0 ratingsWise Up To...Protecting Your Child Online Rating: 0 out of 5 stars0 ratings
Related to What Is....Business Identity Theft!
Related ebooks
How to Survive Identity Theft: Regain Your Money, Credit, and Reputation Rating: 0 out of 5 stars0 ratingsYour Personal Information Is At Risk: A Guide For Protecting Yourself Rating: 0 out of 5 stars0 ratingsUnderstanding Identity Theft: Protect Your Identity From Theft Rating: 3 out of 5 stars3/5How to Prevent Identity Theft: How Anyone Can Protect Themselves from Being a Victim of Identity Theft Rating: 0 out of 5 stars0 ratingsTackling Fraud Rating: 4 out of 5 stars4/5The Credit Code Rating: 0 out of 5 stars0 ratingsMethods to Overcome the Financial and Money Transfer Blockade against Palestine and any Country Suffering from Financial Blockade Rating: 0 out of 5 stars0 ratingsResolving Your Debt/Credit Crisis Rating: 1 out of 5 stars1/5How to Safeguard Your Debit & Credit Card From Fraud Rating: 0 out of 5 stars0 ratingsJust Rewards: Credit Cards vs. Debit Cards: Financial Freedom, #44 Rating: 0 out of 5 stars0 ratingsThe Military Credit Blueprint: The Step-By-Step Guide for Military Credit Repair Rating: 0 out of 5 stars0 ratingsMemoirs of a Fraudster: Confessions Rating: 0 out of 5 stars0 ratingsHow to Win a Merchant Dispute or Fraudulent Chargeback Case Rating: 0 out of 5 stars0 ratingsCash Advance: The Complete Guide to Payday Loans Rating: 0 out of 5 stars0 ratingsThe Credit Card Game and How to Master It Rating: 0 out of 5 stars0 ratingsCashing in on Credit Cards: Scott A. Wheeler, Rt(R)(Mr)(Ct) Rating: 5 out of 5 stars5/5The Fraudster Rating: 0 out of 5 stars0 ratingsHOW to Use Credit Cards: Credit Cards Offer Massive Benefits When We Use Them Correctly: MFI Series1, #21 Rating: 5 out of 5 stars5/5Cash Building Strategies: How to Earn Regular Income Online Rating: 0 out of 5 stars0 ratingsThe Online Identity Theft Prevention Kit: Stop Scammers, Hackers, and Identity Thieves from Ruining Your Life Rating: 0 out of 5 stars0 ratingsIdentity Theft Prevention what to do when your identity is stolen & how to repair your credit Rating: 0 out of 5 stars0 ratingsThe Gods of the Terminal Rating: 5 out of 5 stars5/5Fraud Smarts - Fraud Prevention Handbook Rating: 0 out of 5 stars0 ratingsBusiness Loans (Volume 5) Rating: 5 out of 5 stars5/5Social Security Rating: 0 out of 5 stars0 ratingsDon't Be Scammed by Home Sale and Rental Scams: I Was Scammed Books Rating: 0 out of 5 stars0 ratingsFraud Smarts Rating: 5 out of 5 stars5/5Making Common Cents of Credit: A Common Sense Approach to Understanding, Managing, & Restoring Your Credit Rating: 0 out of 5 stars0 ratingsScam Prevention Rating: 4 out of 5 stars4/5Bitcoinpreneur Rating: 0 out of 5 stars0 ratings
True Crime For You
Quest for Love: Memoir of a Child Sex Slave Rating: 5 out of 5 stars5/5400 Things Cops Know: Street-Smart Lessons from a Veteran Patrolman Rating: 4 out of 5 stars4/5Fallen Idols: A Century of Screen Sex Scandals Rating: 4 out of 5 stars4/5Vanished in Vermillion: The Real Story of South Dakota’s Most Infamous Cold Case Rating: 4 out of 5 stars4/5How to Be Invisible: Protect Your Home, Your Children, Your Assets, and Your Life Rating: 4 out of 5 stars4/5Under the Bridge Rating: 4 out of 5 stars4/5The Enigma of Ted Bundy: The Questions and Controversies Surrounding America's Most Infamous Serial Killer Rating: 5 out of 5 stars5/5Beyond Bizarre: Frightening Facts and Blood-Curdling True Tales Rating: 4 out of 5 stars4/5Manhunt: The 12-Day Chase for Lincoln's Killer: An Edgar Award Winner Rating: 4 out of 5 stars4/5Hollywood's Dark History: Silver Screen Scandals Rating: 4 out of 5 stars4/5Savage Appetites: Four True Stories of Women, Crime, and Obsession Rating: 4 out of 5 stars4/5Confession of a Serial Killer: The Untold Story of Dennis Rader, the BTK Killer Rating: 4 out of 5 stars4/5Buried Memories: My Story: Updated Edition Rating: 4 out of 5 stars4/5The Devil's Chessboard: Allen Dulles, the CIA, and the Rise of America's Secret Government Rating: 5 out of 5 stars5/5Mindhunter: Inside the FBI's Elite Serial Crime Unit Rating: 4 out of 5 stars4/5Are You There Alone?: The Unspeakable Crime of Andrea Yates Rating: 4 out of 5 stars4/5Devil's Knot: The True Story of the West Memphis Three Rating: 4 out of 5 stars4/5Wicked New Orleans: The Dark Side of the Big Easy Rating: 4 out of 5 stars4/5Dead Mountain: The Untold True Story of the Dyatlov Pass Incident Rating: 4 out of 5 stars4/5Cop Without a Badge: The Extraordinary Undercover Life of Kevin Maher Rating: 3 out of 5 stars3/5The Ivy League Counterfeiter Rating: 4 out of 5 stars4/5Manhattan Cult Story: My Unbelievable True Story of Sex, Crimes, Chaos, and Survival Rating: 5 out of 5 stars5/5My Story Rating: 4 out of 5 stars4/518 Tiny Deaths: The Untold Story of Frances Glessner Lee and the Invention of Modern Forensics Rating: 4 out of 5 stars4/5An Assassin in Utopia: The True Story of a Nineteenth-Century Sex Cult and a President's Murder Rating: 0 out of 5 stars0 ratingsBreaking Free: How I Escaped Polygamy, the FLDS Cult, and My Father, Warren Jeffs Rating: 4 out of 5 stars4/5
Reviews for What Is....Business Identity Theft!
0 ratings0 reviews
Book preview
What Is....Business Identity Theft! - Nigel Ross
What Is…Business Identity Theft
By Nigel Ross
~~~
Smashwords Edition
Copyright © 2013 Nigel Ross.
All rights are reserved.
Smashwords Edition, License Notes
This ebook is licensed for your personal enjoyment only. This ebook may not be re-sold or given away to other people. If you would like to share this book with another person, please purchase an additional copy for each recipient. If you’re reading this book and did not purchase it, or it was not purchased for your use only, then please return to Smashwords.com and purchase your own copy. Thank you for respecting the hard work of this author.
Table of Contents
IDENTITY THEFT AND BUSINESSES
1. Data Loss and Identity Theft – The Same but Different
2. Your Business as the True Victim of Data Loss
3. Pre-Texting
4. Notification Laws
5. Red Flags Rule
6. Identity Theft Prevention Program
7. Administering the Program
8. Training/Education
9. Promoting your Protection
10. Being a Good Steward
11. Red Flags Rule Wrap Up
12. Preparing for the Attack
13. Triage
14. Business Ethics is not an Oxymoron
15. The Politics of Data Loss
16. Connecting the Dots
17. Final Words
18. Wrapping It Up
ALSO BY NIGEL ROSS
Identity Theft and Businesses
The following Ebook is for business owners. By the way, we are defining business owners as including anyone in for profit businesses, not for profit or government organizations, as well as any executives, risk managers, compliance or human resource officers, or anyone else who has a vested interest in the success of the organization. If you are not a business owner, this section may not be for you, but it may tell you what to expect from your employer. This section is primarily focused on what business owners need to know about the risks that they face and what they should do to reduce their liability and to protect their business, their employees and their customers. It also covers what they should do if and when they lose data.
1. Data Loss and Identity Theft – The Same but Different
As a business owner, your interests are far different than the average consumer when it comes to Identity Theft and Data Loss. And the more that you read the news or watch the media, the more likely you are to be concerned.
It is very important to understand that Data Loss does not necessarily mean Identity Theft. This may seem like a relatively obvious statement to you, but many people think or act as if they are the same (if only so they can use it as the basis for a class action lawsuit). While it is true that data loss can lead to Identity Theft, more often than not, the loss of data has less to do with the data that is being stolen than it does with the media on which the data was being stored.
The first thing to understand is how likely you are to lose data. To date, there have been two excellent studies -- one completed in 2006 by the Ponemon Institute, and a second commissioned in 2007 by McAfee -- that have looked at the problem of data loss in business today. Both studies included companies of many different sizes and from different industries, culminating in findings that, for a business owner, are scarier than any ghost story.
The Ponemon Institute conducted an independent survey entitled U.S. Survey: Confidential Data as Risk, which started with the following paragraph that pretty much says it all:
A primary reason corporate data security breaches occur is because companies do not know where sensitive or confidential business information resides within the network or enterprise systems. This lack of knowledge coupled with insufficient controls over data stores can pose a serious threat for both businesses and governmental organizations. Moreover, the danger doesn’t stop at the network but includes employees’ and contractors’ laptop computers and other portable storage devices.
The examples of risks from this survey are pretty clear. It means that we’ve all become so used to handling personal information as part of our jobs that we often forget how important it is to that person. Since we handle it routinely, we eventually lose our sensitivity to it and become careless. It only takes one mistake to cause a data loss.
The McAfee study was completed by Datamonitor "to measure IT