ARCHIVED BLOG POSTS

2015 

You can’t be too neurotic about shredding sensitive documents to smithereens. For example, some people make a career out of “dumpster diving,” digging through trash in search of bank account information, credit card preapprovals, medical bills, mortgage statements, etc., and then they commit frau...
05/29/2015
Maybe you believe that kids should not have smartphones because the devices can tell a pedophile where a child is located. But there’s other reasons that perhaps you haven’t thought of: cyberbullying, violent porn, online drug purchases, you name it.Smartphones give kids ongoing Internet access; ...
05/28/2015
Imagine a lifeguard at the beach sitting on his perch. His job is to patrol and monitor for signs of trouble. He sees a surfer being attacked by a shark. Wow, a lot of good it does that he’s in a completely helpless position; by the time he scrambles off his perch and runs towards the water, the ...
05/27/2015
You will love the Tri-Band WiFi technology; it can connect all of your devices at the same time. The only router capable of this is the Netgear Nighthawk X6 AC3200 Tri-Band Wi-Fi Router (a.k.a. Netgear R8000).This router provides three connections and has six wing-like antennas. Another feature i...
05/26/2015
There will always be the person who lives on the Equator to whom you can sell an electric heater. As they say, there is a sucker born every minute.This is why cyber criminals will always have a field day, like the crook who posed as a tax man who got an elderly couple to send $100,000 to an offsh...
05/25/2015
Wired internet or wireless WiFi, the warnings are out there: Don’t visit any websites that you have important accounts with when using a public computer (hotel, airport, café, etc.).Visiting even a more trivial account, such as an online community for cheese lovers, could sink you—in that a cyber...
05/24/2015
Criminals use six basic principles to influence and steal. In the first post we discussed: Reciprocation: Do something nice for a person and they will feel obligated to return the favor. Social Proof: This is the “It’s okay if everyone else does it” approach. Commitment and Consistency: Get someo...
05/22/2015
Criminals use six basic principles of Influence to steal. In this post we will discuss the first 3. The ability to influence boils down to science. By applying some science, anyone can learn to be more influential. It’s easy to influence sheep and cattle. It’s a bit more complicated to influence ...
05/21/2015
Beware. This is tough to read. An expectant woman had spotted an ad on Craigslist asking for baby clothes, so she contacted the ad placer—a woman—then went to her Longmont, Colorado house alone.The woman stabbed the would-be seller and removed the seven-month-old fetus. The baby died but the vict...
05/20/2015
Public Wi-Fi is the location where you can get online: airport, airplane, coffee house, hotel, motel and more. Many people don’t give this a second thought, unaware of how risky this really is.Public Wi-Fi is very non-secure, a goldmine for hackers who want to steal your identity and commit fraud...
05/19/2015
Rainmaker
912,353

Robert Siciliano

Realty Security and Identity Theft Expert Speaker
Ping me to book a program for your group
*
*
*
*
Spam prevention