Identity Theft Expert Speaker

Follow me
By
Services for Real Estate Pros - IDTheftSecurity.com Inc

ARCHIVED BLOG POSTS

2015 

4 Comments
Define Pwn: Pwn is a slang term derived from the verb own, as meaning to appropriate or to conquer to gain ownership. The term implies domination or humiliation of a rival. And when it’s done by hacking email, the person is effectively pwned. No matter how “private” you are on the Internet, no ma...
11/27/2015
There’s a name for the survival sack that you take with you outdoors in the event of survival emergency: bugout bag.Let’s start with the key components to net a three-day survival: Water: one liter per person per day Food: “energy bars” or backpack meals Small pot or large cup (though if you have...
11/26/2015
A phishing e-mail is sent by a cyberthief to trick its recipient into revealing sensitive information so that the crook could steal money from the recipient or gain access to a business’s classified information. One way to lure an employee is for the crook to make the e-mail appear like it was se...
11/25/2015
The Internet has almost as many videos as there are stars in the heavens. And you know that some have to be hoaxes. Sometimes it’s obvious, while other times it’s easy to be fooled. For example, the hoax of the “angel” intercepting a truck just about to run over a bicyclist is obviously fake. Isn...
11/24/2015
With Cyber Monday, you don’t have to camp outside in the cold overnight so you can be the first person busting through the doors like on Black Friday. But you still may get trampled to a pulpby cyber scammers waiting for their prey.How can you avoid these predators? You know that old mantra: If i...
11/23/2015
What do you really know about water storage? Below you’ll find information that you probably never even thought of before, or information that contradicts what you’ve always believed to be correct.Storage barrels. These can remain on cellar or basement cement that’s not heated. Cooler cement will...
11/23/2015
This application for your mobile device will change things in a huge way: Locks down smartphones with a finger-based biometric password Multi-factor authentication all-in-one It’s called BioTect-ID And why should you consider the world’s first biometric password for your mobile device? Because mo...
11/22/2015
A bug bounty refers to the reward a bad-guy hacker gets upon discovering a vulnerability, weakness or flaw in a company’s system.This is akin to giving a reward to a burglar for pointing out weaknesses in your home’s security.But whom better to ask than a burglar, right? Same with a company’s com...
11/19/2015
There should be more TV commercials for preventing identity theft—it’s nearly epidemic. But also epidemic is the lack of identity security that people have when traveling. Here are some ways to avoid having your identity stolen while traveling: Prior to leaving for your trip, clean out your purse...
11/19/2015
After receiving medical treatment, many people never look over the paperwork (save for bill total) and just shove it into some folder in a file cabinet. But medical identity theft is very much out there; know the signs: You’re denied coverage because you allegedly have a condition you were never ...
11/18/2015