Welcome!
If you have an account, please:
Log in
Yes, it's THAT book!

Drop your email here to stay informed of the status of my "tell most" book about the National Security Agency:

--OR--

Check out the Kickstarter here (click)

--OR--

I want info first...

Fair enough. Click the thumbnail below:

Employees are allies, not the adversary
How can I help you?
Contact Jeremy
Recommendations

Here's something that


I, Jeremy Duffy, actually recommend and think is worth checking out.
No web-bugs, no bs, just a legit recommmendation that I have personally evaluated before allowing it to be listed here:

Think something's here that shouldn't be? contact me!

Trusting Companies

It's safer and smarter to distrust any company and especially any webservice until and unless you find enough evidence to show they are legit and worth your time and money.

Why You Can't Trust Them

Motives

Companies do all kinds of crazy things like offer rebates, extended warranties, mug you of your password, etc. that aren't illegal, but aren't really done to benefit you. Instead, they make money or learn more about you or both.

Historically and with few exceptions, companies do anything they can that is allowed by law to make money, no matter the consequences or effect on customers, employees, or even the company itself.

Consider:

Do I really need to go on? I could list hundreds and hundreds of examples of companies abusing everyone in the world and pillaging everything they can, but I hope you can see the point.

In each case, the only thing that stopped these abuses were laws and regulations. Competition never can because ethical companies cost more.

There are very few companies with any kind of morality out there, but if you do find one, support them as much as you can.

Privacy Protection

Hopefully you're already aware how Data brokering is big business. Almost any company you do business with sells your information to other companies so they can tag and brand you like cattle.

There's always some new scheme or trick that companies will use to learn more about you so they can tailor marketing or at least sell you and your family.

Carelessness

Consider TJX who famously lost millions of people's credit and debit card information due to security negligence. Or AOL's equally famous mistake of posting private search records on the Internet.

Companies often don't secure their networks properly or make stupid choices that harm us. For many, many more examples, check out the Data-loss database online.

Employee Abuse

Even IF you could trust the company's motives and practices, the employees may go rogue and steal or sell your data themselves. Or perhaps they can use it to spy on you or do other mean things.

How to Know Who to Trust

Search them!

Perhaps you feel this is paranoid, but don't judge too quickly. I've personally made the mistake of putting a webstore on my gift registry as the source for something I wanted, but not long after, my brother called to say he did a quick web search and found out that the store was a scam operation.

Talk about embarrassing. I'm the computer security expert (supposedly) and yet I hadn't even bothered to do a simple web search.

It's pretty easy, try a search for the name of the company paired with "sucks, scam, ripoff, evil" etc. As an example, check out this listing from the search "Lifelock sucks".

You should be able to sort through the angry meaningless rants and legitimate complaints pretty quickly. Either way you'll get valuable data in a hurry that will help you to know whether to trust them.

Size and permanence

A large, vested company that couldn't restructure, leave the country, or disappear quickly and easily is more likely to deal with you fairly than one that doesn't.

Consequences

If a company cheats you, there needs to be some punishment that is swift, effective, and consistent. While that doesn't always happen, the better we get at making it so companies have no benefit in abusing people, the less they will.

Technically we already have regulatory agencies, but they are often slow, inefficient, or outright corrupt.

In the short-term, you can protect yourself by using credit cards for many of your purchases or just treating all companies as if they could turn on you at any second.
seminar destroy Tutorial
prev: Account Hijacking|INDEX|
Online Addiction: From gambling to surfing and online gaming, people can destroy themselves and others with online addiction.
Posting Online: The Internet never forgets anything completely. Make sure you don't make mistakes that will stick with you for the rest of your life.
Protecting Photos: The Internet never forgets anything completely. Make sure you don't make mistakes that will stick with you for the rest of your life.
Getting Tricked: You WERE doing fine... until someone convinced you to install a virus or give away your passwords. Don't fall for it!
Account Hijacking: One of the most common security risks today is people getting their accounts taken over and then used to trick their friends and family.
Trusting Webservices: An online service promises they'll 'Never abuse or misuse your data' and you believe them? Think again.

Share This

Have a Comment or Question?

1 Comment to “Trusting Companies”

» Comments RSS Feed

Trusting Companies… I don’t trust any large company, they constantly profile their employees, which is dangerous. Then sell their employee profiling to anyone including the credit bureaus, it’s insane

I tend not to trust any business that has entered the stock market. Because if it did, then it is controlled by shareholders, and they are by definition “in it for the money alone”.

Only if a business is entirely owned by people who created it (or someone with similar mindset) will I even consider giving them a chance to prove that “users”, “quality”, “security” or anything of that sort is actually their top priority.

Loading...

If you want to learn more about my professional background, click here to learn more.

Check out one of my guides/tutorials:

email Tutorial
|INDEX|next: E-mail Viruses

E-mail Dangers

Until we find out who the people are who actually buy things from spammers and kick them off the Internet, you're going to have to learn how to deal with and prevent spam.
E-mail Viruses - Learn how viruses are spread through e-mail and how to stop them
Phishing - Spot and avoid lures that pull you into the dark side of the web
Don't be one of those people that loses thousands of dollars to the classic Nigerian Scam.

E-mail Etiquette

Use CC only when necessary and BCC the rest of the time.
Use Reply-All when you mean to and never when you don't.
Practice proper E-mail Forwarding to protect privacy and make e-mails more readable.
Always personalize your e-mails to make it obvious to your recipient that it's valid.

E-mail Tips and Tricks

Using E-Mail Aliases Properly - Be careful about using sensitive data (like your real name) in an e-mail account.
Remember to treat your e-mail account with the security it deserves.
Use a decoy e-mail account to keep your main e-mail account free of spam.
Avoid using any Internet provider's default e-mail.

... or check out any of my other guides and tutorials by clicking here!

Online Addiction

Concerned about online addiction? You should be. Learn the types, the signs, and the preventions.

[Click for full description]

The Consequences of Posting Online

It's fun to post online. What you think, what you feel. But words typed and posted on the Internet can come back to bite you more than anything you could say with your mouth.

[Click for full description]

Photo Safety

You can reveal far more than you intended when you post a photo online. Don't make a critical mistake and check your photos before they're online.

[Click for full description]

Tricks and Scams

Just because you won't willing give up data doesn't mean that I can't trick you out of it. Don't fall for these well known tricks!

[Click for full description]

Account Hijacking

One of the newest threats we face is the risk of someone getting control of your online account and using it against you and the people you know. Do everything you can to prevent that from happening!

[Click for full description]

Trusting Companies

Store, online or off, are not known for being fair and helpful unless it benefits them to be so. Good deals exist, but many are bad deals in disguise. It's not in your best interests to be too trusting with any of them.

[Click for full description]

Preventing Spam

Spam is annoying and worthless, but you still see it every single day. Here are some tips for preventing and reducing spam.

[Click for full description]

E-mail Viruses

Make sure that viruses don't sneak onto your computer through your e-mails. Read some simple tips to prevent that from happening.

[Click for full description]

Phishing

By far the most dangerous thing you'll find in e-mails is a lie. Sending a bogus e-mail to someone is generally called phishing, but can also be referred to as a Nigerian scam (depending on the goal of the e-mail). Learn to recognize and deal with phishing before it's too late.

[Click for full description]

Nigerian Scam

Many people have lost thousands and even hundreds of thousands of dollars to the classic Nigerian Scam. Don't fall for it!

[Click for full description]

How to Use "CC" Properly

Don't violate people's privacy and invite spam into their accounts by CC'ing all your contacts. Learn the proper way to send mass e-mails first.

[Click for full description]

Reply-All

It's easy to embarass yourself or harm your career when you don't know how to use Reply-All appropriately.

[Click for full description]

How to Forward E-mails Properly

Don't forward e-mails carelessly or you risk looking foolish as best and violating the privacy of all your contacts at worst.

[Click for full description]

Personalize E-mail

Follow this simple rule of e-mail etiquette to help prevent your friends and family from falling for phishing scams.

[Click for full description]

Using E-Mail Aliases Properly

It can be hard to find a good name to use in an e-mail account that hasn't been used and doesn't give away too much information about you.

[Click for full description]

Protecting E-mail Passwords

Your e-mail account is the most important online account you have. Remember to treat it as such!.

[Click for full description]

Using a Decoy E-Mail Account

Why it's very important to use a buffer e-mail account to shield your main account from people and companies that you don't trust.

[Click for full description]

The ISP E-mail Trap

Don't fall for the trap of using the free e-mail account provided to you by your Internet service!

[Click for full description]