Identity Theft Expert Speaker

Follow me
By
Services for Real Estate Pros - IDTheftSecurity.com Inc

ARCHIVED BLOG POSTS

2014 

With the prevalence of mobile devices, more than ever, it’s easy for us to share our lives with the world. And yes, social networks are all about staying in touch with friends and family, and sharing events in your life, but perhaps it’s too easy to share information? With just a few clicks, post...
05/12/2014
Installing a home security system and keeping doors and windows locked is not the end of your crime prevention regimen; it’s only the beginning. And the beginning is YOU. You are your greatest weapon against crime, wherever you are located at any given moment. Unfortunately, that “mama bear” or “...
05/11/2014
Though the breaking news of the Heartbleed vulnerability is a month old, this doesn’t mean that this “bug” has been squashed. There still remain about 318,000 servers that are vulnerable to this OpenSSL bug, according to security researchers, though this figure is about half of what it was a mont...
05/11/2014
No one wants to be a victim of identity theft (at least not that I’m aware of). But even though we may say this, our actions don’t always indicate this—and actions speak louder than words. Some of this information may seem basic or like common sense, but these are still tactics that identity thie...
05/11/2014
We also say we want to be safe online. Yet sometimes our actions betray our words—especially if we’re using simple, short passwords for our online sites. Passwords with less than eight characters are the easiest to crack, especially if they include a proper noun or a word that’s in a dictionary. ...
05/09/2014
Smartphone apps. There are apps wanting your location when they do not need it. Are there any apps requesting your location? You should deny them this information unless it’s absolutely necessary. Another way your phone knows where you are in terms of location is through the data of a photo. Put ...
05/08/2014
Malware is everywhere and isn’t about to disappear. The latest PandaLabs report says that last year alone, of all the malware that ever existed, cyber crooks created and distributed 20 percent of that. Malware comes in the form of Trojans, worms, viruses, adware/spyware and miscellaneous, with Tr...
05/07/2014
There are 10 basic ways a crook can easily rob your identity by getting at your credit card or open a new credit card in your name, but there are also ways you can prevent this from occurring. Simple Thievery Leave a window open and a thief can slide through, then steal your stuff. He can even sl...
05/06/2014
Crooks want your health information. Why? It’s called medical identity theft, and it’s not going away too soon. In fact, the ACA (Affordable Care Act) has only fueled the situation, says the Ponemon Institute, a security research firm. This latest of Ponemon’s four annual Patient Privacy and Data...
05/05/2014
Businesses that focus on the big security breach may very well be missing the smaller threats that can do serious damage. A human can easily kill a gnat. So how is it that just one gnat can drive you crazy, even though you can kill it in an instant? You are bigger and mightier ... yet one gnat ca...
05/05/2014