Identity Theft Expert Speaker

Follow me
By
Services for Real Estate Pros - IDTheftSecurity.com Inc

ARCHIVED BLOG POSTS

2014 

Home monitoring, and home security, traditionally target a very specific type of customer: the homeowner who isn’t intimidated by complex set-up, has the resources to pay for installation, and who’s comfortable with monthly or annual fees. In short, a relatively small portion of the population. B...
08/31/2014
You WILL be hacked. Remember that mantra if you’re a business. Business leaders need to realize the effect that a data breach would have on customers and clients—an aftermath of distrust which can take a lot of time and money to rebuild. Interactions is a customer experience marketing group that ...
08/31/2014
Many technology executives don’t have a favorable outlook on their ability to sideswipe cybercriminals, according to research conducted by McKinsey and World Economic Forum. The research also shows that both big and small businesses lack the ability to make sturdy decisions, and struggle to quant...
08/29/2014
Identity theft isn’t just the stuff of exciting movie and TV dramas; this happens in real life—and often. In fact, that Target breach that made headlines, Neiman Marcus, those 1. 2 Billion records the Russian cyber gang hacked: all identity theft. In 2012, according to one research firm, 12.6 mil...
08/28/2014
There are some mistakes you don’t get to avoid the second time around because you’re dead because of them. This applies to home security errors. #1. Unlocked doors. It takes two seconds to lock a door. This should be a habit, whether you’ve just arrived home at midnight or are stepping back into ...
08/27/2014
Gee, even the rich and famous can be burglarized. Recently a man apparently broke into the West Los Angeles home of Sandra Bullock; he’d also been stalking her. He pleaded not guilty to the charges which include weapons possession—one of the weapons was a machine gun—all found in his home. All in...
08/27/2014
Computer viruses are here to stay, which means users need to know the best way to eradicate them the moment they attack. Like disease viruses, computer viruses evolve and get “smarter.” The many different kinds of computer viruses (such as worms, Trojans, spyware) are called malware: malicious so...
08/26/2014
Wow, a dog that normally sells for at least a thousand bucks is being given away for free, and it’s young and healthy. Hmmm. The ad is on Facebook, too. Double hmmm. In Lorain, Ohio, Jessica was that person who saw the Facebook ad—for a free English bulldog puppy. Free! But she had to pay shippin...
08/25/2014
Your computer probably has a virus if you can answer “Yes” to any of the questions below: Is your computer running quite slowly? A virus often causes a computer to run slowly. But realize that this symptom can also mean that a computer needs more memory, or that the hard disk needs defragmenting....
08/24/2014
OpenSSL vulnerabilities are sticking around for a while. In fact, recently two new ones were announced: One allows criminals to run an arbitrary code on a vulnerable computer/device, and the other allows man-in-the-middle attacks. A more famous openSSL vulnerability that made headlines earlier th...
08/24/2014