SlideShare a Scribd company logo
WARNING
You are entering a BS free zone
How to Avoid Online Marketing Scams and Ripoffs
How to Avoid Online Marketing Scams and Ripoffs
How to Avoid Online Marketing Scams and Ripoffs
How to Avoid Online Marketing Scams and Ripoffs
How to Avoid Online Marketing Scams and Ripoffs
How to Avoid Online Marketing Scams and Ripoffs
How to Avoid Online Marketing Scams and Ripoffs
How to Avoid Online Marketing Scams and Ripoffs
How to Avoid Online Marketing Scams and Ripoffs
How to Avoid Online Marketing Scams and Ripoffs
How to Avoid Online Marketing Scams and Ripoffs
How to Avoid Online Marketing Scams and Ripoffs
How to Avoid Online Marketing Scams and Ripoffs
How to Avoid Online Marketing Scams and Ripoffs
How to Avoid Online Marketing Scams and Ripoffs
How to Avoid Online Marketing Scams and Ripoffs
How to Avoid Online Marketing Scams and Ripoffs
Exploit #1
“Law of the High Seas” in cross
border transactions
 When you buy products or services online from another
country you effectively don’t have any legal protection
The laws of your country don’t apply to something sourced
outside your country
Law enforcement from the vendor’s country are likely to be
disinterested unless the offence takes place inside that country
 Even when you buy online from within your own country,
don’t expect much help
 You will be seen as a business customer and not a consumer,
which typically provides less legal protection
 If things are not right, it’s up to you to prove the case and
it’s simply not worth the effort and cost unless the amount of
money involved is large
Treat your purchases as ‘full and final’ and once you
have paid do not expect you will ever get this money
back.
If you aren’t happy to make the purchase under
these effective terms, then don’t make the purchase
Exploit #2
Easily faked reputations
Not only was Groucho was right, but he would have laughed at
how easy it has become to fake your reputation on the internet
‘ ‘
Take a seller’s reputation, testimonials, income
claims, and even peer referrals with a grain of salt as
these are regularly and convincingly exaggerated or
totally fabricated.
Would you make that purchase without any of the
reassurances and testimonials? If not, then don’t buy.
Exploit #3
True identities are easy to
mask
 It is very easy to disguise many aspects of the true identity of
an individual or company online
 Most purchasers are inclined to take statements made at face
value, and this fact is often exploited
 It can be difficult to obtain ‘validation’ because references and
other substantiating evidence is also easily faked
 We checked out a company offering some similar services to us in the area of social
media activity
 Payment was in US$
 Nothing on the site indicated where the business was located, ownership, principals,
etc – however there was reference to a Facebook Fan Page
 The Facebook Fan page gave the full address which was confirmed by Google Maps, as
a respected Midtown Manhattan address
 This was further substantiated by a Manhattan area code 212 telephone number
 However the domain was registered to a company in Chennai, India
 Further investigation revealed the US address to be a sham and the business totally
operating from India
You need to be aware how easy it is to promote a false identity online,
and the less scrupulous will position themselves with an identity that
appears bona fide and rings no warning bells.
Scrutinize everything with care and look for anything that is slightly
out of place – like spelling or grammatical mistakes, things not
explained as they should be, or an address too good to be true.
Any group misleading the purchaser about their identity, location or
any other factor should be avoided totally, and if the integrity of the
provider is important you should seek to validate the information (see
next slide)
Validating an Online Identity/Bona Fides
Check social media identities for depth and consistency.
• It is increasingly difficult to maintain a false identity as well as credible multiple
social media profiles for any length of time. Warning signs of a ‘flaky’ identity
include no social media profiles, very recent profiles, activity that is superficial
and lacks depth of 2-way engagement, excessive duplication between social media
channels or a general lack of believability when you scan recent posts
Check the LinkedIn profiles of the owner(s) or senior management
• Failure to clearly indicate the individual(s) behind the business is an initial
warning sign – why would this be the case? When identified, search for these
individuals initially on LinkedIn. While this is not foolproof, if the individual does
not appear or the information is inconsistent, this is a further warning sign
• Undertake a Bing or Google search on the company ID and the names of the
principals
Validating an Online Identity/Bona Fides
Undertake a Bing or Google search on the company ID and the names of the
principals
• Be aware that if this group or person is seriously trying to portray a false identity
there will likely be a ‘web’ of identities or URL’s that will appear to substantiate
one another. So look for authority sites or websites that appear only once and are
not connected with any others in the search as possibly being of more value. Try
adding a few terms such as ‘scam’, ‘quality’, ‘true identity’, ‘real identity’ to the
search to see what might appear
Undertake a ‘WhoIS’ search on the organisation
• There are many different “WhoIS” providers and services – look for
inconsistencies!
Exploit #4
Originality, ownership and
copyright uncertainties
 The purchaser of online marketing resources – including
content or software – expects (whether stated or not) that
what they receive is original and does not carry a nasty sting
in the tail by being a copyright infringement
 Unfortunately as many have discovered, this cannot be
guaranteed and you need to take specific steps to lower your
risks in this area
Ensuring You Receive Original Material
When requesting any material including graphics, text, or software to be written or
created for you:
• State clearly on the instructions that the material must be original, and it must
not use any material that is subject to copyright or any other form of
confidentiality or protection
• State clearly that all intellectual property rights including copyright are to be in
your name as the owner
• Also state that at the completion of the contract the provider is to pass to you
the original source files of all material produced and must certify that all copies
have been deleted or destroyed
These requests will by no means prevent something nasty happening but they do
signal you are serious about the issue and not an ‘easy mark’, which is likely to
discourage unscrupulous behaviour
Ensuring You Receive Original Material
There are also checks you can undertake – and/or insist are undertaken – to help
ensure originality. Here are a number of online plagiarism checking applications
• http://copyscape.com/
• http://www.plagium.com/
• http://www.duplichecker.com/
• http://www.scanmyessay.com/
• http://smallseotools.com/plagiarism-checker/
• http://www.dustball.com/cs/plagiarism.checker/
• http://plagiarisma.net/
And for images
• http://tineye.com/
Exploit #5
Exposure of private and
sensitive information
Purchasing online marketing support often requires information to be shared or made
available for access which could be mis-used
 This may include login details and passwords for websites and control panels, email
addresses and passwords, confidential files and personal information
 For example a contractor asked to set up a new company website including hosted
email may openly be given:
 Full admin/super admin access to both front-end and back-end control panels including
access to and ability to modify HTML and CSS files. In cases where more than one
website is hosted together this extends to all the company’s websites
 Knowledge of all company email addresses and potentially ability to access emails via
administrator privileges
 Knowledge of and access to login details for other company systems environments, etc
The dangers are real
 An Australian based online retailer engaged via a well known online contracting
marketplace a company in South Asia to build a new online store. Initial and mid
project milestone payments were made in good faith, however there were repeated
failures to deliver and the developers admitted to having installed incompatible versions
of shopping cart and CMS software and their attempts to remediate had created such
complexity they requested approval to start over with the correct versions
 The client elected to decline and terminated the contractor, writing off the amounts
paid and changing logins and passwords for the site
 About one week later the client’s entire online environment vanished. As the hosting
company commented ‘this was the work of anonymous but highly skilled operators who
removed all traces with precision. It was like going to work one morning to find that the
skyscraper next door had been demolished overnight and in its place was a perfectly
manicured park with no sign there had ever been a building there’
The dangers are real
 The CEO of an Asian company recent;y had a call from his bank, just confirming they
had received his instructions and were about to transfer a 7-figure sum to an account
in the Middle East. This was the first he had heard of the issue
 Several months before he had outsourced the setup of a new website host and company
emails, including his own
 The job had been done smoothly without any problem and that was the last he had
thought about the matter
 Because the issue demanded no attention and was ‘Out of sight, out of mind’ he
neglected to change administration password for the company email system allowing
his and his employee’s emails to be viewed without anyone’s knowledge
 Over time enough information was obtained for his identity to be replicated and he was
saved from a financial disaster by a thin margin
The dangers are real
 A US based online entrepreneur regularly outsourced product and content creation and website
development tasks to a variety of contractors scattered across the world
 A prolific and successful Twitter user, he possessed a well known and memorable Twitter handle
and also many tens of thousands of engaged Twitter followers
 Without warning one morning he was unable to post a Tweet, and found himself unable to log in
to Twitter. Attempts to change his password or recover login details were unsuccessful
 Twitter were not able to help as as far as they were concerned HE was the impostor
 He then received an email from a person stating they were the owner of the Twitter handle that
had until recently been his … and they were offering it for sale
 He recovered the Twitter handle at a cost of $10,000 and although he knows the identity of the
person no action can be taken because no crime was committed
 His Twitter password was the same as he used on the sites he had contractors work on – it
seemed like a good idea to have the same password so he only had to remember one
Forewarned is Forearmed
Don’t accept everything at face value |
Remain aware of these most common
exploits | And the likelihood you will be
the next victim is dramatically lowered
www.nobsoms.com

More Related Content

PPTX
Black Hat SEO (The Complete Guide) - Chase Reiner
PPTX
Information security training Phishing
ODP
Using Your Blog to Build Links Through Interviews
PDF
How to outsource_internet_marketing
PDF
26 Cold Email Templates Which Guarantee A Response
KEY
Partnering With Social Media Savvy Agents To Meet More Buyers Online
PDF
How To Build and Market To Your Email List
DOCX
Top brands that received a google penalty! Maps of Arabia
Black Hat SEO (The Complete Guide) - Chase Reiner
Information security training Phishing
Using Your Blog to Build Links Through Interviews
How to outsource_internet_marketing
26 Cold Email Templates Which Guarantee A Response
Partnering With Social Media Savvy Agents To Meet More Buyers Online
How To Build and Market To Your Email List
Top brands that received a google penalty! Maps of Arabia

What's hot (14)

PPT
Google places webinar
PPT
2020 Networking Tips by LinkedIn Expert Career Coach Anne Pryor
PPTX
Hack for security
PDF
Blake Morgan's SEO brand seminar - reputational risk
PPTX
Assignment!!!!!!!
PDF
How We've Built Almost 20,000 Links By Hand
PPTX
10 work from home options for content writers
PPTX
[500DISTRO] Cracking the SEO Code: Tricks & Tactics To Magnify Search Visibility
PPTX
PubCon New Orleans 2013 - Golden Nuggets
DOCX
The new seo and why you need to understand it - Presentation Transcript
PPT
Unit 8 ass 1
PPTX
3 Rules of Relationship-Powered Link Building #pubcon
PDF
128 link-building-strategy-ideas-your-secret-link-building by letruongan.com
PDF
Facebook Black book 3 - make money online everyday
Google places webinar
2020 Networking Tips by LinkedIn Expert Career Coach Anne Pryor
Hack for security
Blake Morgan's SEO brand seminar - reputational risk
Assignment!!!!!!!
How We've Built Almost 20,000 Links By Hand
10 work from home options for content writers
[500DISTRO] Cracking the SEO Code: Tricks & Tactics To Magnify Search Visibility
PubCon New Orleans 2013 - Golden Nuggets
The new seo and why you need to understand it - Presentation Transcript
Unit 8 ass 1
3 Rules of Relationship-Powered Link Building #pubcon
128 link-building-strategy-ideas-your-secret-link-building by letruongan.com
Facebook Black book 3 - make money online everyday
Ad

Viewers also liked (8)

ODP
Plant Unit Slideshow
PPTX
I'll Have What She's Having
PPTX
Strategic Level of Confidence Valuation Method
ODP
Plant Unit Slideshow
PPTX
Service Design Thinks 2 - Service Design at Scale -Intro
ODP
Plant Unit Slide Show
PDF
Bike
PDF
Bike
Plant Unit Slideshow
I'll Have What She's Having
Strategic Level of Confidence Valuation Method
Plant Unit Slideshow
Service Design Thinks 2 - Service Design at Scale -Intro
Plant Unit Slide Show
Bike
Bike
Ad

Similar to How to Avoid Online Marketing Scams and Ripoffs (20)

PPTX
Chapter 17 a fraud in e commerce Jen
PPT
Fraud Presentation
PPTX
E-Commerce: Challenges and Issues
PPTX
Leveraging Online Social Networking For Business
PPTX
E commerce law and ethics
PPTX
E commerce-securityy
PDF
Ijnsa050215
PPTX
Fraud in e marketing sem4
PDF
E-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSES
PPTX
Security Threats which security threat is any potential danger that can explo...
PDF
Shockproofing Your Use of Social Media
PPTX
Social Media's Dark Side: Risks, Reasons & Remedies
PPTX
Everything Attorneys Need to Know About Web Based Technology
PPT
Rayane hazimeh building trust in the digital age teenagers and students
PPTX
E commerce
PPT
Legal Issues In Social Media Oct. 2012
PPTX
Bp Corp Pres Short
PPT
Security&reliability
PPTX
Internet & Social Media issues for brand owners
PDF
Identity Theft
Chapter 17 a fraud in e commerce Jen
Fraud Presentation
E-Commerce: Challenges and Issues
Leveraging Online Social Networking For Business
E commerce law and ethics
E commerce-securityy
Ijnsa050215
Fraud in e marketing sem4
E-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSES
Security Threats which security threat is any potential danger that can explo...
Shockproofing Your Use of Social Media
Social Media's Dark Side: Risks, Reasons & Remedies
Everything Attorneys Need to Know About Web Based Technology
Rayane hazimeh building trust in the digital age teenagers and students
E commerce
Legal Issues In Social Media Oct. 2012
Bp Corp Pres Short
Security&reliability
Internet & Social Media issues for brand owners
Identity Theft

More from David Christensen (20)

PPTX
Australia population trends
PPTX
Strategic Level of Confidence Matrix 2017
PPTX
Not Quitting Time Yet - Cardiovascular Disease and Obesity
PPTX
Expat Health Insurance - The Onshore/Offshore Conundrum
PDF
A Thousand Words
PPTX
PowerPoint Apocalypse | I love the smell of presentations in the morning
PDF
Longevity and skincare – the connection
PDF
David Christensen Capability and Experience in Presentation Development
PPTX
God of Wonders | Third Day | South Island New Zealand | Trey Ratcliffe
PDF
Melasma treatment
PDF
Joint ventures key success factors
PDF
Barriers to E Commerce Adoption by Consumers
PDF
8 Facts about doing business in the real world
PDF
Thailand Causes of Death Infographic
PPTX
15 reasons to love cucumbers
PDF
Business lessons from the highway
PPT
Url's for sale
KEY
30 pieces of silver
PDF
David Christensen Plans and Presentations Credentials
PDF
Joint Marketing Venture Plan
Australia population trends
Strategic Level of Confidence Matrix 2017
Not Quitting Time Yet - Cardiovascular Disease and Obesity
Expat Health Insurance - The Onshore/Offshore Conundrum
A Thousand Words
PowerPoint Apocalypse | I love the smell of presentations in the morning
Longevity and skincare – the connection
David Christensen Capability and Experience in Presentation Development
God of Wonders | Third Day | South Island New Zealand | Trey Ratcliffe
Melasma treatment
Joint ventures key success factors
Barriers to E Commerce Adoption by Consumers
8 Facts about doing business in the real world
Thailand Causes of Death Infographic
15 reasons to love cucumbers
Business lessons from the highway
Url's for sale
30 pieces of silver
David Christensen Plans and Presentations Credentials
Joint Marketing Venture Plan

Recently uploaded (20)

PDF
The Ikigai Template _ Recalibrate How You Spend Your Time.pdf
PDF
simpleintnettestmetiaerl for the simple testint
PDF
Buy Cash App Verified Accounts Instantly – Secure Crypto Deal.pdf
PPTX
Mathew Digital SEO Checklist Guidlines 2025
PPTX
Database Information System - Management Information System
PPTX
Top Website Bugs That Hurt User Experience – And How Expert Web Design Fixes
PDF
Session 1 (Week 1)fghjmgfdsfgthyjkhfdsadfghjkhgfdsa
PPTX
t_and_OpenAI_Combined_two_pressentations
PPTX
Introduction to cybersecurity and digital nettiquette
PDF
Understand the Gitlab_presentation_task.pdf
PDF
SlidesGDGoCxRAIS about Google Dialogflow and NotebookLM.pdf
PDF
Smart Home Technology for Health Monitoring (www.kiu.ac.ug)
PPTX
IPCNA VIRTUAL CLASSES INTERMEDIATE 6 PROJECT.pptx
PDF
Top 8 Trusted Sources to Buy Verified Cash App Accounts.pdf
PPT
250152213-Excitation-SystemWERRT (1).ppt
PPTX
Cyber Hygine IN organizations in MSME or
PPTX
AI_Cyberattack_Solutions AI AI AI AI .pptx
PPTX
KSS ON CYBERSECURITY INCIDENT RESPONSE AND PLANNING MANAGEMENT.pptx
PDF
Lean-Manufacturing-Tools-Techniques-and-How-To-Use-Them.pdf
PPTX
The-Importance-of-School-Sanitation.pptx
The Ikigai Template _ Recalibrate How You Spend Your Time.pdf
simpleintnettestmetiaerl for the simple testint
Buy Cash App Verified Accounts Instantly – Secure Crypto Deal.pdf
Mathew Digital SEO Checklist Guidlines 2025
Database Information System - Management Information System
Top Website Bugs That Hurt User Experience – And How Expert Web Design Fixes
Session 1 (Week 1)fghjmgfdsfgthyjkhfdsadfghjkhgfdsa
t_and_OpenAI_Combined_two_pressentations
Introduction to cybersecurity and digital nettiquette
Understand the Gitlab_presentation_task.pdf
SlidesGDGoCxRAIS about Google Dialogflow and NotebookLM.pdf
Smart Home Technology for Health Monitoring (www.kiu.ac.ug)
IPCNA VIRTUAL CLASSES INTERMEDIATE 6 PROJECT.pptx
Top 8 Trusted Sources to Buy Verified Cash App Accounts.pdf
250152213-Excitation-SystemWERRT (1).ppt
Cyber Hygine IN organizations in MSME or
AI_Cyberattack_Solutions AI AI AI AI .pptx
KSS ON CYBERSECURITY INCIDENT RESPONSE AND PLANNING MANAGEMENT.pptx
Lean-Manufacturing-Tools-Techniques-and-How-To-Use-Them.pdf
The-Importance-of-School-Sanitation.pptx

How to Avoid Online Marketing Scams and Ripoffs

  • 1. WARNING You are entering a BS free zone
  • 19. Exploit #1 “Law of the High Seas” in cross border transactions
  • 20.  When you buy products or services online from another country you effectively don’t have any legal protection The laws of your country don’t apply to something sourced outside your country Law enforcement from the vendor’s country are likely to be disinterested unless the offence takes place inside that country
  • 21.  Even when you buy online from within your own country, don’t expect much help  You will be seen as a business customer and not a consumer, which typically provides less legal protection  If things are not right, it’s up to you to prove the case and it’s simply not worth the effort and cost unless the amount of money involved is large
  • 22. Treat your purchases as ‘full and final’ and once you have paid do not expect you will ever get this money back. If you aren’t happy to make the purchase under these effective terms, then don’t make the purchase
  • 23. Exploit #2 Easily faked reputations
  • 24. Not only was Groucho was right, but he would have laughed at how easy it has become to fake your reputation on the internet ‘ ‘
  • 25. Take a seller’s reputation, testimonials, income claims, and even peer referrals with a grain of salt as these are regularly and convincingly exaggerated or totally fabricated. Would you make that purchase without any of the reassurances and testimonials? If not, then don’t buy.
  • 26. Exploit #3 True identities are easy to mask
  • 27.  It is very easy to disguise many aspects of the true identity of an individual or company online  Most purchasers are inclined to take statements made at face value, and this fact is often exploited  It can be difficult to obtain ‘validation’ because references and other substantiating evidence is also easily faked
  • 28.  We checked out a company offering some similar services to us in the area of social media activity  Payment was in US$  Nothing on the site indicated where the business was located, ownership, principals, etc – however there was reference to a Facebook Fan Page  The Facebook Fan page gave the full address which was confirmed by Google Maps, as a respected Midtown Manhattan address  This was further substantiated by a Manhattan area code 212 telephone number  However the domain was registered to a company in Chennai, India  Further investigation revealed the US address to be a sham and the business totally operating from India
  • 29. You need to be aware how easy it is to promote a false identity online, and the less scrupulous will position themselves with an identity that appears bona fide and rings no warning bells. Scrutinize everything with care and look for anything that is slightly out of place – like spelling or grammatical mistakes, things not explained as they should be, or an address too good to be true. Any group misleading the purchaser about their identity, location or any other factor should be avoided totally, and if the integrity of the provider is important you should seek to validate the information (see next slide)
  • 30. Validating an Online Identity/Bona Fides Check social media identities for depth and consistency. • It is increasingly difficult to maintain a false identity as well as credible multiple social media profiles for any length of time. Warning signs of a ‘flaky’ identity include no social media profiles, very recent profiles, activity that is superficial and lacks depth of 2-way engagement, excessive duplication between social media channels or a general lack of believability when you scan recent posts Check the LinkedIn profiles of the owner(s) or senior management • Failure to clearly indicate the individual(s) behind the business is an initial warning sign – why would this be the case? When identified, search for these individuals initially on LinkedIn. While this is not foolproof, if the individual does not appear or the information is inconsistent, this is a further warning sign • Undertake a Bing or Google search on the company ID and the names of the principals
  • 31. Validating an Online Identity/Bona Fides Undertake a Bing or Google search on the company ID and the names of the principals • Be aware that if this group or person is seriously trying to portray a false identity there will likely be a ‘web’ of identities or URL’s that will appear to substantiate one another. So look for authority sites or websites that appear only once and are not connected with any others in the search as possibly being of more value. Try adding a few terms such as ‘scam’, ‘quality’, ‘true identity’, ‘real identity’ to the search to see what might appear Undertake a ‘WhoIS’ search on the organisation • There are many different “WhoIS” providers and services – look for inconsistencies!
  • 32. Exploit #4 Originality, ownership and copyright uncertainties
  • 33.  The purchaser of online marketing resources – including content or software – expects (whether stated or not) that what they receive is original and does not carry a nasty sting in the tail by being a copyright infringement  Unfortunately as many have discovered, this cannot be guaranteed and you need to take specific steps to lower your risks in this area
  • 34. Ensuring You Receive Original Material When requesting any material including graphics, text, or software to be written or created for you: • State clearly on the instructions that the material must be original, and it must not use any material that is subject to copyright or any other form of confidentiality or protection • State clearly that all intellectual property rights including copyright are to be in your name as the owner • Also state that at the completion of the contract the provider is to pass to you the original source files of all material produced and must certify that all copies have been deleted or destroyed These requests will by no means prevent something nasty happening but they do signal you are serious about the issue and not an ‘easy mark’, which is likely to discourage unscrupulous behaviour
  • 35. Ensuring You Receive Original Material There are also checks you can undertake – and/or insist are undertaken – to help ensure originality. Here are a number of online plagiarism checking applications • http://copyscape.com/ • http://www.plagium.com/ • http://www.duplichecker.com/ • http://www.scanmyessay.com/ • http://smallseotools.com/plagiarism-checker/ • http://www.dustball.com/cs/plagiarism.checker/ • http://plagiarisma.net/ And for images • http://tineye.com/
  • 36. Exploit #5 Exposure of private and sensitive information
  • 37. Purchasing online marketing support often requires information to be shared or made available for access which could be mis-used  This may include login details and passwords for websites and control panels, email addresses and passwords, confidential files and personal information  For example a contractor asked to set up a new company website including hosted email may openly be given:  Full admin/super admin access to both front-end and back-end control panels including access to and ability to modify HTML and CSS files. In cases where more than one website is hosted together this extends to all the company’s websites  Knowledge of all company email addresses and potentially ability to access emails via administrator privileges  Knowledge of and access to login details for other company systems environments, etc
  • 38. The dangers are real  An Australian based online retailer engaged via a well known online contracting marketplace a company in South Asia to build a new online store. Initial and mid project milestone payments were made in good faith, however there were repeated failures to deliver and the developers admitted to having installed incompatible versions of shopping cart and CMS software and their attempts to remediate had created such complexity they requested approval to start over with the correct versions  The client elected to decline and terminated the contractor, writing off the amounts paid and changing logins and passwords for the site  About one week later the client’s entire online environment vanished. As the hosting company commented ‘this was the work of anonymous but highly skilled operators who removed all traces with precision. It was like going to work one morning to find that the skyscraper next door had been demolished overnight and in its place was a perfectly manicured park with no sign there had ever been a building there’
  • 39. The dangers are real  The CEO of an Asian company recent;y had a call from his bank, just confirming they had received his instructions and were about to transfer a 7-figure sum to an account in the Middle East. This was the first he had heard of the issue  Several months before he had outsourced the setup of a new website host and company emails, including his own  The job had been done smoothly without any problem and that was the last he had thought about the matter  Because the issue demanded no attention and was ‘Out of sight, out of mind’ he neglected to change administration password for the company email system allowing his and his employee’s emails to be viewed without anyone’s knowledge  Over time enough information was obtained for his identity to be replicated and he was saved from a financial disaster by a thin margin
  • 40. The dangers are real  A US based online entrepreneur regularly outsourced product and content creation and website development tasks to a variety of contractors scattered across the world  A prolific and successful Twitter user, he possessed a well known and memorable Twitter handle and also many tens of thousands of engaged Twitter followers  Without warning one morning he was unable to post a Tweet, and found himself unable to log in to Twitter. Attempts to change his password or recover login details were unsuccessful  Twitter were not able to help as as far as they were concerned HE was the impostor  He then received an email from a person stating they were the owner of the Twitter handle that had until recently been his … and they were offering it for sale  He recovered the Twitter handle at a cost of $10,000 and although he knows the identity of the person no action can be taken because no crime was committed  His Twitter password was the same as he used on the sites he had contractors work on – it seemed like a good idea to have the same password so he only had to remember one
  • 42. Don’t accept everything at face value | Remain aware of these most common exploits | And the likelihood you will be the next victim is dramatically lowered