Identity Theft Expert Speaker

Follow me
By
Services for Real Estate Pros - IDTheftSecurity.com Inc

ARCHIVED BLOG POSTS

2012 

Most of us have read the resume of a friend or family member and did a double take and asked “Is this really you?” Resumes are designed to express to a potential employer your work history and skill sets. They are designed as a guide for an employer to use as a checklist to evaluate your potentia...
05/26/2012
Spammers send unwanted emails or texts that are both annoying and frightening. Most spam messages are useless advertisements selling stuff you don’t need or want. In 1995, 8,069 unique pieces of malware were detected. One out of 20 emails were spam, and the Melissa virus infected hundreds of tho...
05/26/2012
Phishing occurs when scammers send emails that appear to have been sent by legitimate, trusted organizations in order to lure recipients into clicking links and entering login data and other credentials. SMiShing is a version of phishing in which scammers send text messages rather than emails, w...
05/26/2012
Going “Green” isn’t a fad, it’s necessary to save the planet. If you have watched any of the documentaries on the Discovery Channel about how the polar icecaps are melting then you might have the same sick feeling in the pit of your stomach like I do. Conservatively, sea levels will rise around ...
05/20/2012
Go through your smartphone right now. Look at each app and seriously consider whether you need it. If not, delete it. Then, determine which of the free apps are worth upgrading to the paid versions, since free apps that contain advertising that puts an additional drain on your battery. Using a s...
05/20/2012
A week doesn’t go by where we see news reports of a single house fire, small or large multi family building go up in flames. Dozens of people are displaced and often, someone dies. But when you think about it, fires in businesses seem to be less common. This is probably due in part to businesses...
05/14/2012
For the 12th year in a row, identity theft complaints top the list of consumer complaints [PDF] received by the Federal Trade Commission. 15% of more than 1.8 million total complaints filed in 2011 involved identity theft. Javelin Strategy & Research estimates that nearly 12 million Americans we...
05/14/2012
A “Logic Bomb” isn’t really logical, it’s a virus, designed to take down your corporate network and disable existing systems that may monitor data, protect it, back it up or access it. A logic bomb is designed to multiply like any virus and spread throughout a network multiplying its effects. In...
05/14/2012
If your PC is bogged down with useless software and your desktop is jammed with icons and documents, then your PC is next to useless as a productivity tool. Even scarier is the increased likelihood that if you have lost track of your files, you could easily have sensitive personal information ex...
05/05/2012
Business or corporate identity theft occurs when a thief uses an existing business’ name to obtain credit, or bills a business’s legitimate clients for products and services. Often, but not always, a Social Security Number of a company officer is required to commit business identity theft. Other ...
05/05/2012