Robert Siciliano Identity theft Expert

Most believe corporate espionage is the stuff of James Bond. However even small to medium businesses are being affected according to a story published in USA Today.

Spying has been going on since the beginning of time. Most spying starts because a person or entity needs information that otherwise is kept confidential or private from prying eyes. Whether need to know or want to know spying is alive and well.

Most of us have spied at some point in our lives as children rifling through our siblings or parents closets and draws. As we grow older our parents may spy on us, to protect us from ourselves. Then we get into a romantic relationship as a teen and when things aren’t working out so well, spying on our teen mate helps us find out why.

As we grow older, hopefully this type of behavior subsides and we learn to trust in others and the “need to know” diminishes, until someone gives us a serious reason to spy again. Unfortunately this same behavior can fester and people who spy can eventually stalk. Stalking is of course illegal and can end tragically.

Tools to spy today are a plenty. There are more ways to gather intelligence than ever before. With all the gadgets and means of communication, tapping that intelligence is too easy. A quick search of “spy shop” or “spy store” turns up a whole collection of small wireless cameras, listening devices, software and hardware that helps a person collect enough data on their target to do some damage or “find the truth”.

Spyware is commercially available software, when installed on a computer or mobile phone can track keystrokes, emails, instant messages and chats. In the wrong hands this can be damaging. Keycathers are hardware devices installed in the back of a PC tandem to the keyboard as a USB or PS2 connection that logs thousands of keystrokes gathering raw data.

It’s necessary to monitor children on the internet knowing where they go and who they communicate with, but there should also be open dialog that promotes smart internet use. If a person is concerned about their spouse skipping out on them then that’s an entirely different story and requires another set of rules. Just know when you engage in these activities, whether skipping or spying, be prepared for the consequences.

Protecting yourself and your business form this type of spying is difficult but possible. Always keep in mind that someone on the “inside” like friends, family members, employees, or someone with additional access can be paid off like a cleaning person or security guard that can get places where sensitive data can be retrieved.

  1. Make sure there are no additional hardware devices attached to your computer that shouldn’t be there.
  2. Hire someone or look online for devices that allow for you to do your own sweeps for electronic devices that are planted in key areas where audio can be picked up.
  3. Lock down the administration of your computers to prevent the unauthorized installation of spyware.
  4. Run spyware removal programs that will detect even non-detectable spyware. Any providers of this technology feel free to chime in.
  5. Never leave file cabinets unlocked or paper work lying around.
  6. Shed everything you are throwing away that may have sensitive data.
  7. Lock down your wireless connections which are often the path of least resistance.
  8. Don’t giveaway all your data in social networks making it easy for people to spy on you.
  9. Know that identity thieves use these same tools so protect yourself. Get a credit freeze. Go online now and search “credit freeze” or “security freeze” and go to consumersunion.org and follow the steps for the state you live in. This is an absolutely necessary tool to secure your credit. In most cases it prevents new accounts from being opened in your name. This makes the SSN useless to the thief.
  10. Invest in Intelius Identity Theft Protection and Prevention. While not all forms of identity theft can be prevented, you can effectively manage your personal identifying information by knowing what’s buzzing out there in regards to YOU.

Includes;
Personal Identity Profile – Find out if you’re at risk for identity theft with a detailed report of your identity information, including a current credit report, address history, aliases, and more.

24/7 Identity Monitoring and Alerts – Prevent identity theft with automatic monitoring that scans billions of public records daily and alerts you to suspicious activity.

Identity Recovery Assistance – Let professionals help you recover your identity if you ever become a victim of identity theft.

Robert Siciliano Identity theft speaker discusses mobile phone stalking and spying on Tyra Banks

Be Sociable, Share!