Identity Theft Expert Speaker

Follow me
By
Services for Real Estate Pros - IDTheftSecurity.com Inc

ARCHIVED BLOG POSTS

2016 

Small businesses are hardly immune to attacks by hackers. The illusion of low attack risks comes from the publicity that only huge corporations get when they are breached, like Target, Sony and Anthem. These are giants, so of course it makes headline news. But when a “ma and pa” business gets att...
12/29/2016
Leave personal details off your Facebook page.Does the whole world—or even your private circle, many of whom you haven’t seen in person for years, or even at all—have to know you’re laid up from hernia surgery (i.e., vulnerable, defenseless)?Try this experiment for a week: Assume that the only vi...
12/27/2016
Recently, says a report at wired.com, it’s been unveiled that the obscure Israel-based NSO Group has been selling spyware delivered to smartphones through vulnerabilities in Apple’s iOS operating system.“Pegasus” spyware can put a surveillance out on nearly everything including keystrokes, e-mail...
12/22/2016
You shouldn’t leave any digital trace of yourself after you leave a job. Hopefully, you’ll be leaving voluntarily and thus have the time to first make backups before you delete anything. This may seem easy, but you need to take inventory to make sure you get EVERYTHING.Note: make sure that every ...
12/20/2016
#1. Keep everything up to date. You know those annoying popups telling you updates are available? Do you ever click out of them? Don’t. Always update at the time these appear.#2. Two-step verification. Two-step verification or authentication should be set up for all your accounts that offer it. A...
12/15/2016
Who needs a hanger to steal a car when you can use a laptop? Despite today’s vehicles having far more sophisticated security protection, thieves can still break in—like the two crooks who stole at least 30 Dodge and Jeep vehicles…with just a laptop computer.In Houston, video showed the pair in th...
12/13/2016
As long as humans sit at computer screens, there will always be infected computers. There’s just no end to people being duped into clicking links that download viruses.A report at theregister.co.uk explains how subjects, unaware they were guinea pigs, fell for a phishing experiment. Subjects were...
12/08/2016
If the super big wigs could get their social media accounts hacked, you can too. If you can believe it, the Twitter accounts of the following were recently hacked: Google CEO Sundar Pichai Yahoo CEO Marissa Mayer Oculus CEO Brendan Iribe Twitter co-founder Jack Dorsey Shouldn’t these CEOs know ho...
12/06/2016
If you were to design the ultimate security system for a house, what would you focus on? These days, many people would immediately think in terms of the most technologically advanced alarm system—one that’s voice activated, detects motion anywhere, can be remotely controlled and allows remote vie...
12/01/2016
Trick e-mail = fraudulent wire transfer = hundreds of thousands to millions of dollars stolen.That’s what’s happening with business executives in select industries (e.g., chemical operations, manufacturing), says a report at threatpost.com, citing a finding from Dell SecureWorks.The phishing e-ma...
12/01/2016
Rainmaker
1,069,235

Robert Siciliano

Realty Security and Identity Theft Expert Speaker
local_phone(617) 329-1182
Contact The Author