ARCHIVED BLOG POSTS

2016 

Companies have been struggling for years to keep cyber-attacks at bay. Cyberthieves are working faster than ever before to send out their malicious attacks, and it’s become increasingly difficult for companies to keep up.CNN reports that almost one million malware strains are released every day. ...
02/28/2016
Ever wonder how a water leak sensor actually works? Water comes into contact with the sensor. The sensor makes and electrical contact and send a signal. The sensor transmits a signal to a central station of sorts (kind of like how if extreme heat or a needle comes in contact with your skin, your ...
02/27/2016
I love that show, “Forensic Files.” Every so often there’s the case of a person who was found murdered in their apartment due to some forced entry. Which brings me to the topic of apartment security.New Apartment Don’t delay in doing a walk-through of the entire premises, including the laundry ro...
02/26/2016
Imagine the effectiveness of the following sign at your front door when a would-be intruder reads it:WARNING: This house is protected by a remote monitoring service; if you break in while the homeowner is away, he’ll be instantly alerted and the police will be automatically dispatched. And if you...
02/25/2016
Cybercriminals know that the best way to get their claws on the next victim is to appeal to their emotions, not logic.There’s lots of scary things in life, and one is learning that your computer has been infected with a virus. If this happens, you’re now vulnerable to spending money on getting ri...
02/24/2016
Most people have heard of storing information in “the cloud,” but do you know what this means, and if it is even safe?A cloud is basically a network of servers that offer different functions. Some of these servers allow you to store data while others provide various services. The cloud is made of...
02/21/2016
This week I worked with Gemalto, as part of Gemalto’s #ChipAwayAtFraud campaign. I was tasked with using my “chip” card when making a bunch of every day purchases like getting coffee and shopping. Gemalto, one of the world’s leaders in digital security, wanted a real-world take on the EMV card ex...
02/19/2016
If you want to get an idea of how safe or crime-ridden a town may be, do some casual observing including at night: Are women walking or jogging alone at night? Are people hanging out in the evening having a good time? Are children mysteriously absent on a sunny weekend afternoon? Are there a lot ...
02/18/2016
Often, hucksters prey on the consumer’s desperation, which is why it’s no surprise that the No. 1 rip-off (at least between 2011 and 2012)) was bogus products promising weight loss.VICE (vice.com) interviewed psychologist Maria Konnikova about how cyber cons are so successful—even with the most r...
02/17/2016
Scams targeting older people are probably very under-reported, as seniors don’t want to appear senile. The most vulnerable group is educated men over 55, because, quite frankly, they think they know everything.Sweepstakes/Lottery This scam comes in many forms, but the common denominator is that y...
02/16/2016
Rainmaker
904,917

Robert Siciliano

Realty Security and Identity Theft Expert Speaker
Ping me to book a program for your group
*
*
*
*
Spam prevention