Identity Theft Expert Speaker

Follow me
By
Services for Real Estate Pros - IDTheftSecurity.com Inc

ARCHIVED BLOG POSTS

2013 

It doesn’t matter where, when or to whom—a burglar will go where there is easy access and easy money, or goods to be resold. One favorite target of criminals is houses of worship, which often have audio equipment and cash-filled collection boxes on hand. Case in point: The Bartlesville, Oklahoma ...
04/29/2013
BestHomeSecurityCompanys.com (BHSC) recently reached an agreement with leading personal and home security expert Robert Siciliano in a deal that would grant BHSC exclusive articles, videos, media queries and other exclusive work from Robert Siciliano. For BHSC it was an easy decision to add Rober...
04/29/2013
You’ve probably never even thought that “browsing the web privately” was something that you needed to take extra steps to do. Most people think all web surfing is relatively private and nobody is really paying any attention. Unfortunately, there are many people, particularly in the form of market...
04/29/2013
Training for a marathon is a taxing, physical, emotional and expensive process. For me personally, that means five cortisone shots, almost a hundred physical therapy appointments and a few arguments with my wife. Why do it? Why climb a mountain? Why be a police officer? Why be an emergency room n...
04/26/2013
Micro charges are charges ranging from 20 cents to $10 and either are fraudulent, legitimate or fall into the category of “grey charges,” which describe sneaky recurring or unwanted charges. These charges often go undetected because they are so small. Nine out of 10 credit card holders don’t scru...
04/26/2013
Privacy on social networks seems a little oxymoronic to me. We tell the world about our lives, but we don’t want everyone to knoweverything. I know many people who only want some people to share in their experiences, but those same people often friend people they don’t know. See what I mean? Anyw...
04/26/2013
A Virtual Private Network (VPN) is a network set up to communicate privately over a public network. For example: You occasionally want to or need to work from home and your employer knows that if you do, the data that travels between your PC and an office PC needs to be protected. So your employe...
04/16/2013
We hear an awful lot about hackers breaking into systems and taking down networks or stealing millions of data records. The general understanding we have for hacking is bad guys want to disrupt things to make a point or to make money. But how do they really use our personal information against us...
04/16/2013
Consumers are oblivious to the dangers of connecting in a free wireless environment. If they actually knew how vulnerable they are, all that coffee shops would do is sell coffee.Nobody would stick around and connect to the internet. Everyone—and I mean everyone—always asks me if they should conne...
04/16/2013
My wife was searching online for a specialist to take care of a minor medical condition. While browsing, a certain ad caught her eye, so she checked out its website and made a phone call to get more information. The receptionist was warm and friendly and gave her all kinds of advice and direction...
04/13/2013