Identity Theft Expert Speaker

Follow me
By
Services for Real Estate Pros - IDTheftSecurity.com Inc

ARCHIVED BLOG POSTS

2014 

Data breaches need not be launched maliciously in order to be very troublesome, as was the case involving about 3,700 Medicare Advantage members. Freedom Blue and Security Blue members received risk assessment results that actually belonged to other individuals. The addresses, birthdates, member ...
08/22/2014
Somewhere out there is a dictionary that when you look up the term wire money, the definition says scam! Even though legitimate money-transfer businesses exist like Western Union, a request to wire money for that new car or vacation package is most probably a rip-off. And the crooks behind these ...
08/21/2014
A few bungling burglars will be paying lots of time for their crime: one in prison and one six feet under. The surviving robber has been charged with the death of his alleged accomplice, even though the accomplice was shot dead by the owner of the home that they were apparently intending to rob. ...
08/20/2014
If you think that retailers are the biggest target for cyber criminals, you have it more than a wee bit wrong. Hackers are really going after the healthcare and pharmaceutical industries. In fact, “Will Healthcare Be the Next Retail?” is the name of a recent report released by BitSight Technologi...
08/19/2014
“You have won!” Yippeeee! NOT! Let’s see if you’re in that percentage of the population who will fall for this lottery scam. The alert can be an e-mail, snail mail or phone call, claiming you won a bundle of money. But keep this alert a secret due to some “mix-up in names” and you must contact a ...
08/18/2014
It’s August which for parents (and kids) means it is back to school time. It can be easy to reminisce about your school days—passing notes to the cute girl or boy in class, late-night study sessions with friends, or playing tag on the playground. But your kids’ school experience is way different ...
08/17/2014
The Better Business Bureau says beware of big summertime scams: five in particular. “Wow, it’s a steal!” No, that’s not necessarily from the customer; it’s from the crook who entices the consumer with an irresistible deal involving airfare and room and board. If you see a deal that seems too good...
08/17/2014
The purpose of antivirus (AV) software is to detect, neutralize or eradicate malware (malicious software). AV software not only will identify and destroy the computer virus, but it’s also designed to fight off other kinds of threats such as phishing attacks, worms, Trojan horses, rootkits and mor...
08/15/2014
It’s well-worth your time and money to make a burglar’s job very difficult. Employ the following home security tips: Lock up! How many times have you read about a home intruder who “entered through an unlocked window”? Keep your windows and doors locked as much as possible. Deadbolts. A deadbolt ...
08/14/2014
Some may remember the James Kim case out of Oregon in December 2006. Kim inadvertently chose an old logging road while driving home, getting lost in the woods. He left his wife and two young kids in the vehicle while he sought help, promising to return by early afternoon. He never did and his bod...
08/13/2014