ARCHIVED BLOG POSTS

2014 

There was once a time when the only threat to a bank’s security was when that innocent-looking man hands a note to the bank teller that makes her face go ashen. And the only security, save for video surveillance, was the armed guards and the silent alarm that the teller triggers. Nowadays, terms ...
06/29/2014
A data breach can slug below the belt and knock a healthcare business flat on its back, as was the case with Columbia University and the New York and Presbyterian Hospital. They paid a $4.8 million settlement (the biggest HIPAA settlement to date) after the electronic records of 6,800 patients (i...
06/25/2014
Criminals do what they do because that’s their nature. Once bad, there’s hardly a chance they can be good. Jeffrey L. Patton, 43, said, “I’ve been scared to death of this day right here,” in reference to being put on trial for two unrelated crimes. So Patton pleaded guilty to the two crimes he wa...
06/25/2014
Do you access your various financial or social media accounts, or other private accounts such as e-mails with your doctor, at public computer stations? At the coffee house or hotel, for instance? Boy, are you ever setting yourself up for cybercrime including identity theft. What usually happens i...
06/24/2014
A debit card from your business, in the virtual hands of a thief, spells a mountain of trouble. The thief can generate a duplicate of your business debit card, then splurge. A “cloned” card can be swiped in a card reader, appearing legitimate. Banks are not legally required to reimburse a busines...
06/23/2014
If you’re sick of junk mail, stop putting off putting a stop to it, because you can actually make a difference by implementing the following 6 strategies. Though you won’t be able to completely eliminate junk mail, the following approaches will considerably de-clutter your mail box. Get off marke...
06/23/2014
Early detection. What do these two words bring to your mind? A grain-sized speck on a mammogram? A colonoscopy? How about a house fire? Without early detection of THIS killer…you could, well…DIE. House fires can be detected early with an advanced, well-designed fire alarm system. This will help s...
06/22/2014
Most of you know how important it is to have security software on your computers to stay protected from viruses, malware, spam and other Internet threats. Unfortunately, cybercriminals also know that it is critical to have security software, and they are using this knowledge to trick us into down...
06/20/2014
Is it coincidence that Beth Jacob CIO resigned from her job as chief information officer of Target Corporation? Or could this possibly be connected to the data breach that slammed Target in December of 2013, affecting as many as 70 million customers? Being a CIO is no easy task, especially when y...
06/19/2014
The routine was well-grounded: Helen Van Orden, 79, worked as a housekeeper from 8 a.m. till noon Monday through Friday at Emeritus at College Park in Manatee. Then she’d go straight home and walk her dog. One day, she was waiting for her son, Charles Van Orden, 61, to call at 9 pm as he did ever...
06/18/2014
Rainmaker
887,755

Robert Siciliano

Realty Security and Identity Theft Expert Speaker
Ping me to book a program for your group
*
*
*
*
Spam prevention