+353-1-416-8900REST OF WORLD
+44-20-3973-8888REST OF WORLD
1-917-300-0470EAST COAST U.S
1-800-526-8630U.S. (TOLL FREE)


Privacy Means Profit. Prevent Identity Theft and Secure You and Your Bottom Line. Edition No. 1

  • ID: 2217088
  • Book
  • September 2010
  • 256 Pages
  • John Wiley and Sons Ltd

Bulletproof your organization against data breach, identity theft, and corporate espionage

In this updated and revised edition of Privacy Means Profit, John Sileo demonstrates how to keep data theft from destroying your bottom line, both personally and professionally. In addition to sharing his gripping tale of losing $300,000 and his business to data breach, John writes about the risks posed by social media, travel theft, workplace identity theft, and how to keep it from happening to you and your business.

By interlacing his personal experience with cutting-edge research and unforgettable stories, John not only inspires change inside of your organization, but outlines a simple framework with which to build a Culture of Privacy. This book is a must-read for any individual with a Social Security Number and any business leader who doesn't want the negative publicity, customer flight, legal battles and stock depreciation resulting from data breach.

Protect your net worth and bottom line using the 7 Mindsets of a Spy

  • Accumulate Layers of Privacy
  • Eliminate the Source
  • Destroy Data Risk
  • Lock Your Assets
  • Evaluate the Offer
  • Interrogate the Enemy
  • Monitor the Signs

In this revised edition, John includes an 8th Mindset, Adaptation, which serves as an additional bridge between personal protection and bulletproofing your organization. Privacy Means Profit offers a one-stop guide to protecting what's most important and most at risk-your essential business and personal data.

Note: Product cover images may vary from those shown

I Boot Camp: Privacy Means Profit.

1 Motivate the Troops.

2 Define the Problem.

3 Engage the Brain.

II Basic Training: Think Like a Spy.

4 The First Mind-Set: Eliminate the Source.

5 The Second Mind-Set: Destroy the Data.

6 The Third Mind-Set: Secure the Systems.

7 The Fourth Mind-Set: Lock the Docs.

8 The Fifth Mind-Set: Evaluate the Risk.

9 The Sixth Mind-Set: Interrogate the Enemy.

10 The Seventh Mind-Set: Monitor the Signs.

III Field Combat: Target the Enemy.

11 Deploy Target Strategies: Accumulate, Prioritize, and Adapt.

12 Defend Online Identity: Social Networking and the Cloud.

13 Protect Mobile Data: Laptop Responsibility.

14 Travel with Care: Business Trips and Vacations.

15 Recover Your Identity: When All Else Fails.

16 Prioritize Your Attack: The Privacy Calendar.




About the Author.

Note: Product cover images may vary from those shown
John Sileo
Note: Product cover images may vary from those shown