Identity Theft Expert Speaker

Follow me
By
Services for Real Estate Pros - IDTheftSecurity.com Inc

ARCHIVED BLOG POSTS

2015 

Every time you have a medical procedure done, including routine checkups and treatment for minor issues, paperwork is generated. You should have copies of every single paper. This is one line of defense against medical identity theft.Review your paperwork thoroughly for unauthorized or duplicate ...
11/17/2015
It’s about time: a biometric for your smartphone that will change the way you think about biometric security.This revolutionary biometric comes from Biometric Signature ID and it’s called BioTect-ID, and though it’s a biometric, it does not involve any so-called invasiveness of collecting body pa...
11/16/2015
Do these bank robbers have bricks for brains? They actually posted photos of themselves with wads of the stolen cash on Facebook, says a story on thesmokinggun.com.The alleged bank robers are John Mogan, 28 and Ashley Duboe, 24, and they’ve been charged with robbing a bank in Ohio. Mogan has alre...
11/16/2015
The Bring Your Own Device (BYOD) movement has in some ways saved companies money, but in other ways put customer data at risk. Employees are onsite, telecommuting or traveling on business. This means their devices, and company data could be anywhere at any given moment.A company manager or owner ...
11/15/2015
Your child is active online. Did it ever occur to you that he or she uses a fake name so that they can’t be identified by you? Chances are, you, the parent, also uses a pseudonym. It’s very common.Cyberspace is full of obvious pseudonyms, but a phony name can also be a regular name that many peop...
11/12/2015
These days, who doesn’t travel with their laptop? But commonality doesn’t make it inherently safe for your sensitive information that’s stored in the device. In fact, traveling with your laptop is inherently unsecure.Whether you’re traveling for business or to visit family this holiday season, he...
11/11/2015
It’s been stated more than once that WWIII will most likely be cyber-based, such as dismantling a country’s entire infrastructure via cyber weapons. And don’t think for a moment this doesn’t mean murdering people.A report at bits.blogs.nytimes.com notes that foreign hackers have cracked into the ...
11/10/2015
You’ve probably heard of the gofundme.com site, where all sorts of stories are posted of people seeking donations. Some are tragic, others are trite. You may be touched by a particular story, perhaps one in which an entire family is killed in a house fire.You click the “Donate Now” button and don...
11/09/2015
LinkedIn is a free service that allows professional people to network with each other. Often, a LinkedIn member will receive an e-mail from another LinkedIn member “inviting” them to join their network. Sometimes, the inviter is someone the recipient doesn’t know, but the recipient will link up a...
11/05/2015
So you think it’s really a far-out left-field idea: a burglar studying Facebook and other social media to select homes to rob. Well think again.A survey, conducted by home security expert Friedland, found: 78 percent of burglars use social media to select targets. 74 percent touted the virtues of...
11/04/2015
Rainmaker
1,064,985

Robert Siciliano

Realty Security and Identity Theft Expert Speaker
local_phone(617) 329-1182
Contact The Author