ARCHIVED BLOG POSTS

2011 

Prognosticators are silly. Or that’s how I’ve always viewed them, anyway. They combine past experience with their perspective on current trends to make predictions and pretend to be smarter than you. Many prognosticators in the financial world have failed miserably, and we’re all paying the price...
02/27/2011
Social media is the fifth form of mainstream media. At this point, most people know how to use social media, and how to navigate the various websites. But what most users don’t yet realize is how social media can be used against them. Social media identity theft occurs for a number of reasons. 1....
02/27/2011
Admittedly, I don’t know EVERYTHING about computers. I know enough to break them and enough to fix them most of the time. But, occasionally I need help. Generally that help comes in the form of remote assistance from Dell, where I buy all my PCs. With each PC I get the 3 year Dell warranty, so if...
02/27/2011
When people ask me, “How do I protect myself from credit card fraud?” I tell them, “Cancel the card, or never use it.” Because that’s the only way. Otherwise, all you can do is hope the merchant has a sophisticated system in place to mitigate the fraud. The FBI’s Internet Crime Complaint Center’...
02/27/2011
The lowest of low life scammers generally prey upon the weaker and often the frail. And all too often that is children or elderly. In this case, snow removal scams happen when we have winters like this one where snow is piling up 6-10 feet over the course of the season. Daily television news repo...
02/26/2011
Whether you’re a road warrior or simply own multiple PCs and want access to all your data from anywhere, here are a few easy ways to do it, and one not so easy option. All of these options are secure, as long as you don’t leave a remote PC logged into your account, or log in from a PC that is alr...
02/26/2011
The Department of Defense proclaims, “The national security depends on our defense installations and facilities being in the right place, at the right time, with the right qualities and capacities to protect our national resources.” But by relying on Social Security numbers as primary identifiers...
02/23/2011
The number of households in the United States that rely solely on wireless telephones continues increasing. More than one in four households had cell phones and no landlines in the first half of 2010, which is an increase of 2.1% since the second half of 2009. And almost one in six households use...
02/23/2011
Recently, I worked with a Fox News reporter in Boston on a story about home burglaries and home security systems. The victim in our story states “I see the big smashed in window, glass everywhere,” says David Barstow of Methuen. While his family was gone for only a couple of hours, a group of tee...
02/23/2011
Neither, they are just a mechanism to how the Web works. The bigger question is, are the uses thereof good or bad. Microsoft, Google, and Firefox are implementing do-not-track features into their browsers, giving consumers the option to block cookies that may track their surfing for advertising p...
02/23/2011
Rainmaker
905,321

Robert Siciliano

Realty Security and Identity Theft Expert Speaker
Ping me to book a program for your group
*
*
*
*
Spam prevention