Identity Theft Expert Speaker

Follow me
By
Services for Real Estate Pros - IDTheftSecurity.com Inc

ARCHIVED BLOG POSTS

2014 

The rate of malware (ransomware) attacks on small businesses climbs at an alarming rate. The security firm McAfee warns that soon, attacks that come through social platforms will be “ubiquitous.” Small businesses are typically not able to subsidize the internal security placements to fend off the...
05/19/2014
The biggest threat to your data may not come from external hackers. Find out how to guard against intentional or accidental internal cyber breaches. The NSA leaks we keep hearing about are a constant reminder of just how vulnerable data is and how this vulnerability can result in data breaches by...
05/19/2014
Nicole Muscara’s alarm clock acquired an alarming feature: a hidden camera placed by a stalker. She discovered something odd when she one day set the alarm; it wasn’t her clock. Stories like this are happening more commonly. Recently a Kansas City, Missouri woman discovered 11 hidden cameras in h...
05/18/2014
Identity theft can be fatal to the victim — if it’s of the medical kind. Medical ID theft can result in getting the wrong blood type during a transfusion, the wrong diagnosis or the wrong prescription — all because the thief’s medical history gets integrated with the victim’s. I hope you’re scare...
05/18/2014
The more advanced that communications become, the more likely your personal information is getting leaked out—every time you search the Web, send texts or e-mails, etc. Your private data is literally “out there.” However, there are six software programs to protect your privacy online. Expiration ...
05/18/2014
Here’s why you should never assume that burglary won’t have negative effects on your children. Victim Support, an independent charity, and home security specialist ADT, have new research findings: Children who’ve experienced a home burglary are more likely to have problems at school and sleep dif...
05/16/2014
Did you accidentally leave the back door open? This thought can be scary because you know that leaving the back door open at home could allow someone to enter your home and take your personal belongings. The same is true for a backdoor in the computer world. It is a vulnerability that gives an at...
05/15/2014
Today’s commerce occurs very much online, with products and services ranging from A to Z. Hence, these many online merchants have hundreds of millions of people around the globe registered with them for convenient purchases. To verify authentication as the true user of these services, the registr...
05/14/2014
Can you name 10 ways you can get hacked this summer? I can. Hotel HackingThose hotel electronic card locks for doors aren’t as secure as you think. A criminal attaches a little electronic gizmo beneath the lock, and presto, he’s in your room. You can’t stop this, but you can make the burglary wor...
05/13/2014
The Health Insurance Portability and Accountability Act (HIPAA) Security Rule requires that covered entities conduct a risk assessment of their healthcare organization. A risk assessment helps your organization ensure it is compliant with HIPAA's administrative, physical, and technical safeguards...
05/12/2014