ARCHIVED BLOG POSTS

2014 

A public cloud service can bring on five risks to a business. Here they are, and their solutions. The three A’s: authentication, authorization, access control. Here are some questions to ponder about a cloud service: How often does it clean up dormant accounts? What kind of authentication is nece...
01/22/2014
The Internet of Things—IoT—is a formal term referring to distinctly identifiable objects (cars, kitchen appliances, smartphones) and their cyber-representations on the Internet. By 2020, it’s projected by at least one expert that there will be over 30 billion “things” represented virtually. All o...
01/22/2014
Being stuck at an airport due to winter weather can be a real downer, but with an assortment of devices, apps and other instruments for connecting to the world, you can make that down time pass in a jiffy. With today’s technology, gone are the days where you nearly go bonkers doing endless crossw...
01/21/2014
Social media makes dumb criminals look (and act) even dumber. Take the case of Damian and Rolando Lozano of Texas, who were suspected of stealing items from 17 cars in the town of Rosenberg. Damian was caught, but Rolando was still out there somewhere. The Rosenberg police posted Rolando’s photo ...
01/20/2014
If your personal information gets compromised, a thief will open up financial accounts in your name. However, they will not pay the bills, and this will ruin your credit. Whether bad credit results from the legitimate credit holder’s irresponsibility or from identity theft, your ability to buy a ...
01/19/2014
America the Superpower is also the super choice for criminals wanting to steal credit card information. Security experts warn that this problem will get worse before it improves. That ancient technology of the magnetic strip on the back of credit and debit cards is a godsend to criminals. The eas...
01/19/2014
There are numerous tax related scams out there. And as a business or even a consumer, forewarned is forearmed. Tax relief. Predators scan through tax lien notices to see who’s in deep with the IRS, then offer them tax relief services which are fraudulent. You pay them, and voila, your money not o...
01/18/2014
Find your lost car keys, smartphone and abducted child. Yes, you read that correctly: There’s now a device that can locate your missing child (or wandering elderly grandmother). And the device that can do this is TINY. Imagine a device that can be used as a keychain and not only locate missing pe...
01/17/2014
There’s an app that can practically read your mind via your mobile device. The technology is called predictive analysis, and Google’s Now app is at the forefront. Other apps that utilize predictive analysis include Grokr and Osito: predicting the smartphone user’s next move. How does this work? S...
01/16/2014
It’s the New Year so time for new starts and new resolutions. With a new year upon us, now is a good time to clean out the clutter. Clutter is overwhelming, messy and inefficient and it transcends in both our physical and digital lives. Here are some tips to help clear the clutter out of your dig...
01/16/2014
Rainmaker
890,709

Robert Siciliano

Realty Security and Identity Theft Expert Speaker
Ping me to book a program for your group
*
*
*
*
Spam prevention