Identity Theft Expert Speaker

Follow me
By
Services for Real Estate Pros - IDTheftSecurity.com Inc

ARCHIVED BLOG POSTS

2014 

How much easier international travel is for United Airlines fliers: They can now use their iOS or Android device to scan their passports. If a customer checks in with United’s mobile application for international flights, they can access the passport-scanning feature. One can check in within 24 h...
08/13/2014
In the security business, there’s a lot of talk about protecting your smartphones and computers from malware and viruses, as well as loss and theft. It makes sense. Most of us use our smartphones and computers on a daily basis and keep important information on them like passwords, user names, and...
08/12/2014
You’ve surely heard of “B2B” or business-to-business marketing. The new game plan is “B2C” – business to consumer marketing, particularly in the healthcare industry. The Affordable Care Act allows healthcare organizations to directly deal with consumers on a  massive scale for the first time. How...
08/11/2014
Beware of “Free Wi-Fi” or “Totally Free Internet,” as this probably IS too good to be true. These are likely set up by thieves to trick you into getting on a malicious website. AT&T and Xfinity have provided many free hotspots for travelers to get free Wi-Fi: all over the country. Sounds great, r...
08/10/2014
There are ways to keep the hackers at bay—for the most part, anyways, since no protection is 100 percent efficient. #1 Password protect. A device lost or stolen puts all your accounts at risk. Even simply placing your devices on your desk, they can be accessed by a nosy spouse, contractor or baby...
08/10/2014
The Russians have definitely come…in the world of cybercrime. A Russian ring of hackers has amassed 1.2 billion stolen passwords and usernames involving 400,000 websites. The criminals have also garnered 542 million e-mail addresses. And these Russians didn’t discriminate: Any website they could ...
08/08/2014
You’re not special; a hacker CAN get into your computer or smartphone. Would you know how to clean up this mess? Start by locating the portal through which the hacker got in such as a browser, emal program. Next, disconnect/uninstall this gateway from the Internet so it doesn’t invade other syste...
08/08/2014
See if you’ve been employing the safeguards below to protect your identity while traveling. #1 Put snail mail on hold. Crooks love to scavenge through overflowing mail boxes to seek out personal information to steal an identity. Prevent this by arranging the postal service to put a stop on your m...
08/07/2014
The ripple effect continues to haunt Target: It’s expected that seven of its board of directors members may be replaced because they failed to provide effective oversight into the corporation’s data-protection risks. Boards simply need to be more proactive in safeguarding their companies against ...
08/06/2014
Don’t think in terms of “if” you’ll suffer a data breach, but rather, “when.” Once you establish this mindset, it’s time for you to develop a response plan. After all, a security system that’s impenetrable has yet to be invented. What’s even more, an amazing number of businesses don’t even have t...
08/05/2014