ARCHIVED BLOG POSTS

2012 

We’ve all been there. You search your pockets, your belt clip, jacket pockets, every draw, cabinet, bag, couch, and floor, every crevice of your car and dog house.  You wonder if you left it in the bar last night or over your friend’s house. You’d text all your buddies to see if they have it but,...
12/19/2012
Natural disaster scam: Sadly, scammers seem to come out of the woodwork during a natural disaster such as Hurricane Sandy to catch consumers when they’re in a panic, looking for answers, and when they’re most vulnerable. People should not click on links or respond to phishing e-mails for relief d...
12/19/2012
There are two kinds of identity theft you must protect yourself from: New account fraud: Refers to financial identity theft in which the victim’s personal identifying information and good credit standing are used to create new accounts, which are then used to obtain products and services. Stolen ...
12/19/2012
Teens are spending more and more time online these days and while the Internet offers a variety of benefits it can also serve as a dangerous space –and not just in America. According to McAfee’s Exploring the Digital Divide study that examines teen online behavior, teens oversees and in the US ar...
12/18/2012
When searching for a product online it’s unfortunately too easy to end up on a site that isn’t secure. The following websites will provide a worry free and more secure experience than many others: Amazon.com: Amazon is the global leader in e-commerce. Started in 1995, Amazon has significantly exp...
12/18/2012
How times have changed. I can remember when Christmas didn’t start until after Thanksgiving—not before Halloween as we see things in stores and online now. Seems like the holiday season and decorations start earlier and earlier every year. But one thing that hasn’t changed is that Black Friday is...
12/18/2012
Holiday shopping is easy, convenient and it can be secure too. Here are 10 tips to a secure online shopping experience during the holiday season: Avoid spoofed websites. Common sense says any time you receive an offer via an e-mail automatically be suspicious. The same goes with offers via tweets...
12/09/2012
Malicious software (malware) is, in many ways, very well understood. Security experts know how it works and why. Cybercriminals’ motivations are pretty straightforward—making money from malware and related attacks. In the latest McAfee Threats Report: Q3 2012 , malware is still growing and while ...
12/09/2012
In a world where a Twitter tweet can be heard around the world instantly, a friend’s video on YouTube can go viral overnight, and you can speak to anyone online across the globe without using a phone, it seems backwards that the local hospital may still be keeping your medical information in a fi...
12/09/2012
iPhones, Androids and other smartphones are much more than just a way to call our friends and family and store their phone numbers. Today’s smartphones have become our most personal computer and contain much more than pictures and contacts. They now allow us to access financial data, bank account...
12/02/2012
Rainmaker
905,248

Robert Siciliano

Realty Security and Identity Theft Expert Speaker
Ping me to book a program for your group
*
*
*
*
Spam prevention