Identity Theft Expert Speaker

Follow me
By
Services for Real Estate Pros - IDTheftSecurity.com Inc

ARCHIVED BLOG POSTS

2015 

Deadbolts aren’t hyped up; they really are superior to regular knob locks. Though we keep shaking our head in amazement whenever yet another news story comes out about a burglar or rapist who waltzed through an unlocked door and committed mayhem, it remains a hard fact that many criminals gain en...
02/13/2015
Some thieves specialize in hanging around tourist spots to spot the tourists and make them victims of hands-on crime such as purse snatching or a mugging. But don’t wait till you’re aimlessly wandering the piazza with your face buried in a huge map to take precautions against less violent forms o...
02/12/2015
A bear in the wild that wants to protect its young from another predator isn’t worried about manners. This is how people should feel when in circumstances that don’t feel right. The bear has a gut instinct not to let its young near a predator. A woman who feels funny about getting into an elevato...
02/11/2015
After taking all the necessary steps to Fixing a Credit Report after being hacked, it is then tome to rebuild your credit. Bad credit is bad credit no matter how it happens. No matter how responsible you are with your money, you won’t get a loan if there’s no evidence of this. The evidence comes ...
02/10/2015
A recent study says that people are more mindful of online safety issues than what experts had previously believed. An article on phys.org says that Nitesh Saxena, PhD, wanted to know what goes on in users’ brains when they come upon malicious websites or malware warnings. Saxena points out that ...
02/09/2015
5 Comments
I really enjoy reading blogs. And since you are here, reading my blog post, I’m guessing you do too. Blogs are a great way of gaining information and learning about different perspectives on a wide variety of topics. Unfortunately, spammers have tainted this medium with splogs. The word splog is ...
02/08/2015
2 Comments
A rootkit is a kind of software that conceals malware from standard detection methods. A good analogy for a rootkit would be a burglar breaking into your house. The burglar is dressed all in black, so that his form blends into the darkness. He tiptoes around to hide his sounds so he’s more likely...
02/06/2015
Smart criminals love dumb homeowners, but even a dumb burglar can score big when the homeowner makes just a little slip in security measures. Don’t nickel-and-dime your door locks; get high quality locks. A cheap lock is cheap. Don’t hide keys. Anyone knows to check under the flower pot or on top...
02/05/2015
Years ago, having “the talk” with your kids meant telling them where babies come from. Nowadays, “the talk” has a whole new meaning. Your kids may be able to explain in detail how a baby is created, but may be clueless (because so many adults are) about something called “data permanence.” Don’t b...
02/04/2015
First off, how NOT to fix a hacked credit report: signing on with a service that promises to correct the problem in a jiffy—a “sounds too good to be true” advertisement. A company that claims they will 100% fix your bad credit by removing negative information from your credit report is a bit scam...
02/03/2015