+353-1-416-8900REST OF WORLD
+44-20-3973-8888REST OF WORLD
1-917-300-0470EAST COAST U.S
1-800-526-8630U.S. (TOLL FREE)


Privacy Means Profit. Prevent Identity Theft and Secure You and Your Bottom Line

  • ID: 2217088
  • Book
  • 256 Pages
  • John Wiley and Sons Ltd
1 of 3
Praise for Privacy Means Profit

“You would be an idiot to hand out the keys to your house or your business and to give away your credit cards and passwords and then hope for the best. Not following John Sileo’s advice and protecting your privacy is just that: hoping for the best. This book is the answer to giving yourself peace of mind.”—Larry Winget, five–time New York Times and Wall Street Journal bestselling author and TV personality

“Whether you are leading a large organization or your family, Privacy Means Profit is a sobering, practical, and readable guide for preventing information theft and regaining peace of mind.”—Patrick Lencioni, President, The Table Group; author, The Five Dysfunctions of a Team and Getting Naked

John Sileo’s identity was stolen from his small business and used to embezzle hundreds of thousands of dollars from his clients. The data breach ultimately destroyed John’s business and consumed two years of his life as he fought to stay out of jail. Then he chose to fight back and speak out.

Emerging from this crisis, John became America’s leading professional speaker on information survival, including identity theft prevention, data security, and safe social networking.

His satisfied clients include the Department of Defense, the Federal Trade Commission, the FDIC, Blue Cross Blue Shield, Pfizer, the Federal Reserve Bank, Lincoln Financial Group, and hundreds of corporations, organizations, and associations around the world.

Note: Product cover images may vary from those shown
2 of 3

I Boot Camp: Privacy Means Profit.

1 Motivate the Troops.

2 Define the Problem.

3 Engage the Brain.

II Basic Training: Think Like a Spy.

4 The First Mind–Set: Eliminate the Source.

5 The Second Mind–Set: Destroy the Data.

6 The Third Mind–Set: Secure the Systems.

7 The Fourth Mind–Set: Lock the Docs.

8 The Fifth Mind–Set: Evaluate the Risk.

9 The Sixth Mind–Set: Interrogate the Enemy.

10 The Seventh Mind–Set: Monitor the Signs.

III Field Combat: Target the Enemy.

11 Deploy Target Strategies: Accumulate, Prioritize, and Adapt.

12 Defend Online Identity: Social Networking and the Cloud.

13 Protect Mobile Data: Laptop Responsibility.

14 Travel with Care: Business Trips and Vacations.

15 Recover Your Identity: When All Else Fails.

16 Prioritize Your Attack: The Privacy Calendar.




About the Author.

Note: Product cover images may vary from those shown
3 of 3


4 of 3
John Sileo
Note: Product cover images may vary from those shown