ARCHIVED BLOG POSTS

2014 

Here’s four chief ways how data breaches happen: Illegal access to information or systems. Personal Identifying Information (PII) data can be illegally accessed via technology such as computer hacking or infecting computers with viruses, Trojans or worms—leading to stolen data or malfunctioning s...
02/20/2014
I have a growing family. Camping is on my list of family events. The wife isn’t crazy about tents. So I went on Craigslist looking for a second hand camper. I found a $15,000 camper for $2200.00. A pretty good deal to say the least. This ad actually gave me chills it exited me so much. So I sent ...
02/20/2014
A connected home is one in which appliances and accessories are connected to the Internet. An example would be a refrigerator that texts the homeowner when the eggs are about to run out (the egg tray has the sensor). It’s projected that a connected home can be built from the inside out, but conne...
02/19/2014
Would you reasonably expect success when attempting to drive cross country in a 1975 Pinto with balled tires, no brakes, dried cracked belts and with already 250k on the motor? You might if you didn’t stop and think about things. The same is true of an individual or a business who’s still using a...
02/19/2014
You’ve heard of spyware, right? Spyware comes in the form of a virus and as a commercially available and legal software. It’s illegal for a stranger (or even someone you know, unless they own the device, and you just use it) to install spyware on your computer or smartphone and spy on you. Howeve...
02/16/2014
Most information technology (IT) experts are very much unnerved by cyber criminals, says the biggest study involving surveys of IT professionals in mid-sized businesses. 87% send data to cloud accounts or personal e-mail. 58% have sent data to the wrong individual. Over 50% have confessed to taki...
02/16/2014
Yes we all use (or at least 96% of us do) our smartphones to take photos. But almost half of us (49%) have sent or received intimate content (photos, texts, etc.). So it’s time to stop and think about what we’re sharing and with whom. I’ve said this before…the rise of smartphone usage has provide...
02/16/2014
The owner of your favorite restaurant may be tracking your every move—via your smartphone. Not because he’s a snoop, but because he believes knowing when and where you go for entertainment will benefit his business. And how did he pull this caper off? There’s are companys out there, that place se...
02/14/2014
How did that huge recent data breach of a major retailer occur in the first place? Well, valuables can’t be stolen if there aren’t any valuables to begin with. Large merchants will store customers’ credit/debit card data to facilitate faster transactions. But small retailers keep minimal or zero ...
02/13/2014
A reverse peephole viewer is exactly what the words sound like: It reverses the effects of a peephole, meaning it allows you to see inside, from the outside. The viewer’s lenses reverse the effect of the peephole’s convex lenses, and easily fits in your pocket. Law enforcement commonly uses the r...
02/13/2014
Rainmaker
911,727

Robert Siciliano

Realty Security and Identity Theft Expert Speaker
Ping me to book a program for your group
*
*
*
*
Spam prevention