ARCHIVED BLOG POSTS
2015
1
Comments
Every time you have a medical procedure done, including routine checkups and treatment for minor issues, paperwork is generated. You should have copies of every single paper. This is one line of defense against medical identity theft.Review your paperwork thoroughly for unauthorized or duplicate ...
11/17/2015
It’s about time: a biometric for your smartphone that will change the way you think about biometric security.This revolutionary biometric comes from Biometric Signature ID and it’s called BioTect-ID, and though it’s a biometric, it does not involve any so-called invasiveness of collecting body pa...
11/16/2015
3
Comments
Do these bank robbers have bricks for brains? They actually posted photos of themselves with wads of the stolen cash on Facebook, says a story on thesmokinggun.com.The alleged bank robers are John Mogan, 28 and Ashley Duboe, 24, and they’ve been charged with robbing a bank in Ohio. Mogan has alre...
11/16/2015
0
Comments
The Bring Your Own Device (BYOD) movement has in some ways saved companies money, but in other ways put customer data at risk. Employees are onsite, telecommuting or traveling on business. This means their devices, and company data could be anywhere at any given moment.A company manager or owner ...
11/15/2015
3
Comments
Your child is active online. Did it ever occur to you that he or she uses a fake name so that they can’t be identified by you? Chances are, you, the parent, also uses a pseudonym. It’s very common.Cyberspace is full of obvious pseudonyms, but a phony name can also be a regular name that many peop...
11/12/2015
37
Comments
These days, who doesn’t travel with their laptop? But commonality doesn’t make it inherently safe for your sensitive information that’s stored in the device. In fact, traveling with your laptop is inherently unsecure.Whether you’re traveling for business or to visit family this holiday season, he...
11/11/2015
1
Comments
It’s been stated more than once that WWIII will most likely be cyber-based, such as dismantling a country’s entire infrastructure via cyber weapons. And don’t think for a moment this doesn’t mean murdering people.A report at bits.blogs.nytimes.com notes that foreign hackers have cracked into the ...
11/10/2015
1
Comments
You’ve probably heard of the gofundme.com site, where all sorts of stories are posted of people seeking donations. Some are tragic, others are trite. You may be touched by a particular story, perhaps one in which an entire family is killed in a house fire.You click the “Donate Now” button and don...
11/09/2015
2
Comments
LinkedIn is a free service that allows professional people to network with each other. Often, a LinkedIn member will receive an e-mail from another LinkedIn member “inviting” them to join their network. Sometimes, the inviter is someone the recipient doesn’t know, but the recipient will link up a...
11/05/2015
1
Comments
So you think it’s really a far-out left-field idea: a burglar studying Facebook and other social media to select homes to rob. Well think again.A survey, conducted by home security expert Friedland, found: 78 percent of burglars use social media to select targets. 74 percent touted the virtues of...
11/04/2015