Identity Theft Expert Speaker

Follow me
By
Services for Real Estate Pros - IDTheftSecurity.com Inc

ARCHIVED BLOG POSTS

2011 

ShareTweet It doesn’t matter if you are young or old, rich or poor, if you have good credit or bad credit, pay with cash or credit card, whether or not you use the Internet, or even own a computer. You can be a maintenance worker or a scientist. It doesn’t matter. ...
04/29/2011
ShareTweet Every time I ask my butler to take out the trash or get me some Grey Poupon mustard he gives me lip. I’ve relegated him to cleaning my Bentley every day with a tooth brush. When people think about protecting themselves from the bad guy, they mostly think ...
04/29/2011
If you aren’t in the habit of backing up your data, you might assume that it’s difficult or tedious. But I’ve got news for you, it’s easy-peasy. Nowadays, backing up is a complete no brainer. There are many backup options. New PCs often come bundled with backup options included in the “bloat ware...
04/29/2011
ShareTweet GUNS GUNS GUNS. People love their GUNS. Guns are deadly. And as far as the constitution insinuates, that’s the whole point. Frankly, I like the feel of a gun’s craftsmanship and the occasional target or clay pigeon shooting. The idea of guns makes sense ...
04/28/2011
You hear a lot about identity theft protection these days. But what does it look like? I’ve subscribed to no less than six different services in the last decade. Most of them make their presence felt in the form of a charge on your credit card statement, and that’s about it. One thing I like abou...
04/28/2011
ShareTweet The day when your wallet becomes a relic, like an 8-track tape, isn’t here quite yet. But we are getting close. Thinning out your wallet isn’t just nice for your pants pocket. It’s also a good way to minimize your risk for identity theft, should your wall...
04/25/2011
ShareTweet As more online retailers introduce mobile ecommerce applications, criminal hackers are taking notice. Existing mobile operating systems are under attack and, like standard PC operating systems, they sometimes fail to provide the necessary security to supp...
04/23/2011
Recent reports of “The Oak Ridge National Laboratory, home to one of the world’s most powerful supercomputers, has been forced to shut down its email systems and all Internet access for employees since late last Friday, following a sophisticated cyberattack.” The sophisticated cyber attack was re...
04/23/2011
In Colorado Springs the Gazzette.com reports an eighty-three-year-old grandmother has a simple message for the bad guys: “Nobody better mess with me.” “A man used a crow bar or similar tool to pry at the back door of her central Colorado Springs home. Throwing her 112 pound frame against the door...
04/23/2011
“The serial killer who dumped his victim’s bodies in the thick brush along several miles of New York’s breathtaking beachfront may have dismembered several of them, law enforcement authorities have told ABC News.” The chance of you ever coming face to face with a serial killer is extremely slim, ...
04/20/2011