Unleashing the power within...

5 Easy Ways To Get Ripped Off and Privacy Invaded

Stay in touch…

5 Easy Ways To Get Ripped Off and Privacy Invaded

Many of my friends routinely tell me of about things they do that are totally absent of security minded thinking. Personal security is a subject many don’t understand, and of course it saddens me to see good people get manipulated by thoughtless people. I thought I would share some of their mistakes with hopes that these touch home. I’m going to outline 5 easy ways to get ripped off or have your privacy invaded. Although this post tends to have humorous overtone, the things expressed here should be taken seriously.

5) Online Registration
Online registration is one of the easiest ways to get taken to the ringer. How many times do we come across websites that want you to register. A lot of us come across these on a weekly (and daily) basis. Most of the time you are required to provide information online, then confirm your account via an email. Typically the information on the website includes your registration name, email, username, and a password. The problem here is that most of us provide the same username and password on online registration as the actual email address we use. Never assume every company is honest. The dishonest company will simply test your credentials obtained from your registration by applying the username and password provided in your registration to your email account. If it’s the same you just made a copy of your house key, and gave it to a stranger. Always use a different username/password for registering for things online than the email account you are likely asked to provide when you are registering.

4) ATM Card
One of the most recent schemes are based on how you actually use your ATM card. I am always amazed to stand in line at the store and watch how many people utilize their ATM card. Using your ATM card is not a problem. The problem is how the card is used. Most banks do not distinguish a cost difference in using your card as a credit card versus using it as a debit card (Please don’t add this as a fee Bank of America. Just in case you’re reading this too). The question I have is if your transaction cost to use your card as either a debit or credit card is negligible or zero, why do you used debit by default. It makes no sense to utilize your pin (which is attached to debit cards) when you are in public (ie.. grocery store, shopping mall, corner store…). Using your pin at wireless pay stations is even worst. Avoid allowing people to look over your shoulders and watch you enter your pin. Use an ATM card as a credit card (when applicable) simply because it is the most efficient and secure way to use it.

3) Hot Spot
Now that Hot Spots are growing at a fast rate, so are the number of instances of Wi-Fi hijacking. For those not quite sure of what Wi-Fi is, its wireless Internet. It is understandable and definitely convenient to use free Wi-Fi. However, free Wi-Fi comes at cost. The cost is simply the risk involved. I can’t tell how many times I’ve walked in a Starbucks and seen someone with their credit card on the table while they are entering their card info on a website. Many have a misconception that because the website is supposedly trusted, your wireless network is too. This could not be more wrong. They are two separate systems and your credit card information is clearly exposed. Don’t use your credit card for purchases on a public unsecured network.

2) Sweepstakes
This one is really a head scratcher. How many times do you walk in a store and see a sweepstakes box for a vacation, a car, an iPad, $1 Million, etc… I hate to put water on your fire of hope but 95% of these are bogus. There are legitimate ones, but most are not. However, this point is not to address the validity, it’s what happens to the information you place on the little card you drop in the box. The answer is it becomes part of a mailing list that company pay big $$$ for. Occasionally everyone should Google their name. You will be surprised what pops up. You may see your name, address, and phone number. Any idea how it got there? Your information was given away in most cases. In other rare cases you are entering your personal information so much on websites, it’s literally cached/saved on the web. Do not complete sweepstake forms unless you can absolutely confirm the validity.

1) Chain Email
This one is my favorite, but one that hate. The quickest way to get me upset with you is to include my email address in a chain email. For those that aren’t aware of what a chain email is, it’s the emails you get that have hundreds of names in the “To” or “CC” line. The sad part is that most have no idea of the harm. There are people out there unfortunately that are out to rip you off. They are out to hack into your email to snoop for your email contacts so that they can send your friends email on your behalf. Most of the time there is hidden code/malware (virus type code intended to invade your computer) in the email. In most cases you can hit the Reply All button on email and copy all of the email addresses and paste it in a spreadsheet so that you can send them annoying spam email. How many times do you read an email that says “Forward this email to 10 people today”, or something of that nature. Don’t forward it, and definitely don’t reply. You should create a “NEW” email, email that person who sent you the email, insist that they take you off of the distribution, and tell them to stop forwarding you chain email.

Bonus) Facebook Apps

This week the U.S. Government made a significant move toward personal security (after hearing about this blog).  The new legislation called the “Privacy Bill of Rights” focuses on the following:

  • Individual Control: Consumers have a right to exercise control over what personal data organizations collect from them and how they use it.
  • Transparency: Consumers have a right to easily understandable information about privacy and security practices.
  • Respect for Context: Consumers have a right to expect that organizations will collect, use, and disclose personal data in ways that are consistent with the context in which consumers provide the data.
  • Security: Consumers have a right to expect their data will be stored and transmitted securely.
  • Access and Accuracy: Consumers have a right to access and correct personal data in usable formats, in a manner that is appropriate to the sensitivity of the data and the risk of adverse consequences to consumers if the data are inaccurate.
  • Focused Collection: Consumers have a right to reasonable limits on the personal data that companies collect and retain.
  • Accountability: Consumers have a right to have personal data handled by companies with appropriate measures in place to assure they adhere to the Consumer Privacy Bill of Rights.

The Privacy Bill of Rights was constructed with my bonus point in mind.  It is mind-blowing how many people are willing to give away their personal information to play a game (specifically Facebook apps). Does anyone actually read the Facebook disclaimer when you agree to sign up for a Facebook game? It clearly tells you something. It tells you that your personal information can be shared with the distributor of the game. Well lets see what the get: 1) where you were born, 2) where you grew up, 3) where you went to school, 4) your birthday, 5) your phone number, 6) oh yes–your contacts…and more!!! Is the game worth giving all this away to a stranger? Now all you have to do is email them your social security number. Why not?  Do not give consent to electronic applications to obtain your personal information unless it is a trustworthy and notable application.

Do you like this blog, let us know. For more informative blogs like this join the newsletter seen on this page.

The content of this blog is edited, approved, and published by MBASmart Publishing.  Topics outlined in this blog are included in our professional development book.  Kindle users can download this book today here.