ARCHIVED BLOG POSTS

2014 

Skimming means more than just cutting fat off steak; it’s also when a thief obtains data from that magnetic strip on the back of your credit card (or debit or ATM card). The thief records and copies this data with a counterfeit card reader onto a blank card’s strip, and then makes purchases or ca...
02/27/2014
Crime doesn’t pay—especially when you can’t read. A man in Chicago spent seven minutes disabling a lock on a local bars door, then kept trying to pull the door open even though a sticker on it said “PUSH.” Now that’s a dumb criminal, because even if he couldn’t read or didn’t notice the sticker, ...
02/27/2014
How would you like to carry on a conversation with your home while you’re away? Get the latest scoop is on its safety and security? Schlage, America’s most trusted lock brand, wants you to get connected to your home. With today’s home security technology, the internet and your smartphone, you can...
02/26/2014
Social media is permeating every facet of our lives. It is extremely important to understand security and privacy settings with so much personal information becoming so accessible. Here is the definitive guide to security on Facebook: Step One Logging In Social Authentication: Facebook uses socia...
02/26/2014
When it comes to protecting an organization’s information, flaws with this can involve either implementing strong technology to protect too much trivial data, or inadequate protection of important and sensitive data. In short, not enough attention is cast upon a company’s most important informati...
02/26/2014
Here are nine ways you can add a lot of security to your laptop when traveling. Bag it. Keep the laptop in a sturdy bag that’s specially designed for laptops. The sleeve should be well-padded and the bag TSA-compliant. The bag should be collapsible and expandable (depending on contents), and easy...
02/26/2014
In the wee hours of the morning in Colorado Springs, a 14 year old girl was shot dead by her father as she climbed through a window because he mistook her for an intruder. She died at the hospital from gunshot wounds. When the news broke of this story, it brought the gun advocates and gun opponen...
02/25/2014
Many executives are concerned about social media related risks (e.g., data security and ID theft), but far fewer actually have any social media training. A recent survey of executives puts the concerns into four categories: disclosure of confidential information; damaged brand reputation; ID thef...
02/23/2014
Can you name 11 tips for hotel safety and security? How about just five? Have you ever walked down the hallway of a hotel and passed by rooms with doors left wide-open by cleaning staff? Ever thought of how easy it would be to enter and pretend the room is yours? Imagine what you could steal. Thi...
02/23/2014
One minute or less… …is all the time you may have to escape a fire in your home. Schlage, which is dedicated to keeping homes and families safe, sound and secure, and I ask: “Do you have a smoke alarm?” It can double your chances of escaping death. Home smoke detectors have cut fire fatalities in...
02/22/2014
Rainmaker
887,755

Robert Siciliano

Realty Security and Identity Theft Expert Speaker
Ping me to book a program for your group
*
*
*
*
Spam prevention