online safety: Covid-19 Remote Desktop Has Significant Risks - 03/20/20 07:04 AM
Are you newly working from home? Or are you an old pro? Either way, it is likely you are using some form of remote desktop protocol. Those of us who have been working home as our primary means of earning a living, know these tools very well and are accustomed to eliminating the various distractions in our home environment in order to get the job done. There are some precautions to be aware of.
None of us think that we are going to get hacked, even though we have seen time and time again that it is very possible. Even the largest … (2 comments)

online safety: Creating an Effective Business Continuity Plan - 01/04/20 03:12 AM
Most of us have no idea when a disaster is about to strike, and even if we do have a little warning, it’s very possible that things can go very wrong.
This is where you can put a business continuity plan to good use. What does this do? It gives your business the best odds of success during any disaster.
What Exactly is Business Continuity?
Business continuity, or BC, generally refers to the act of maintaining the function of a business as quickly as possible after a disaster. This might be a fire, a flood, or even a cyber-attack. With this plan in place, … (44 comments)

online safety: A Guide to How Hackers Hack - 12/27/19 09:53 AM
You have surely heard of hackers, but do you really know how they work? Hackers are well known for being bad guys, though there are certainly good hackers out there too. Here’s a brief guide to help you understand how a hacker can hack:
Directions for Hacking are Easy to Come By
Hackers don’t have to look far for help, especially if they don’t know much about hacking. First is a well-known website known as Kali Linux. It has a ton of tools available for hackers, and the site features many links to other hacking resources. Of course, people who want to hack … (3 comments)

online safety: “Choking Game” Killing Kids, and Authorities Have to Step Up - 07/11/19 05:35 AM
It only took a minute for 12-year old Erik Robinson to die while playing a macabre game called the “Choking Game.” His mother desperately tried to save her son when she found him with a Boy Scout rope around his neck, but it was too late. Erik was brain dead due to lack of oxygen, and mom had to make the choice to remove her son from life support.
Sadly, she is not alone. The only viable statistics run between 1995 and 2007, where 82 kids have died while playing the “Choking Game,” an act where people cut off their own air … (4 comments)

online safety: Young Kids Getting Sexually Exploited Online More Than Ever Before - 06/18/19 06:13 AM
An alarming new study is out, and if you are a parent, you should take note…children as young as 8-years old are being sexually exploited via social media. This is a definite downturn from past research, and it seems like one thing is to blame: live streaming.
YouTube serves up videos of kids, in clothing, that pedophiles consume and share as if it is child porn. It’s gotten so bad that YouTube has had to disable the comments sections of videos with kids in them.
Apps like TikTok are very popular with younger kids, and they are also becoming more popular for the … (1 comments)

online safety: Who Has Access to Your Personal Info? The Answer Might Surprise You - 05/30/19 06:48 AM
Are you aware that many people probably have access to your personal info? If you have ever gotten an apartment, have insurance, or applied for a job, someone has done a background check on you, and you might be shocked by what’s in there, including your debts, income, loan payments, and more. On top of this, there are also companies collecting information on you including:
Lenders Employers Government agencies Volunteer organizations Landlords Banks/credit unions Insurance companies Debt collectors Utility companies…and more Thanks to the Fair Credit Reporting Act (FCRA), you can get a copy of these reports every year for a … (4 comments)

online safety: How To Determine a Fake Website - 01/22/19 08:09 AM
There are a lot of scammers out there, and one of the things they do is create fake websites to try to trick you into giving them personal information. Here are some ways that you can determine if a website is fake or not:
How Did I Get Here?
Ask yourself how you got to the site. Did you click a link in an email? Email is the most effective ways scammers direct their victims to fake sites. Same thing goes with links from social media sites, Danger Will Robinson! Don’t click these links. Instead, go to websites via a search through Google … (9 comments)

online safety: Protect your USPS Mail from Getting Stolen - 12/20/18 05:26 AM
USPSID stands for U.S. Postal Service Informed Delivery. It is a good thing to sign up for because it informs you of your expected deliveries.
But there’s a problem: Someone ELSE could pose as you and sign up for this service, getting your mail before you have a chance to.
In fact, it has already happened. Crooks have signed up as other address owners and collected their mail.
This can lead to credit card fraud if some of that mail includes new credit cards or credit card applications.
And what if the mail includes a check? The thief could find a way to get it … (11 comments)

online safety: Protect Yourself From Gift Card Scams - 12/04/18 08:03 AM
So maybe Christmas now means the very predictable gift card swap, but hey, who can’t use a gift card? But beware, there are a ton of scams. This includes physical, not just digital, gift cards.
Regardless of who gave you the card, you should always practice security measures. Below are two common ways that fraudsters operate.
Transform Gift Card to Cash Twice.
If someone gives you a $200 gift card to an electronics store and then it’s stolen, you technically have lost money, as this is the same as someone stealing a wad of cash from your pocket.
Nevertheless, you’ll feel the loss just as … (22 comments)

online safety: How Your Username Can Be used to Track You - 11/20/18 07:05 AM
You probably have a few usernames, or you might have just one that you use for every site. Either way, your user names can be used not just to identify you online, but it can also be used to track you and find out information about you. How do people track you based on your user name? They do the following:
They Start with a Google Search
The first thing people do to track your username is do a Google search. You will be amazed by all of the information that is out there. However, Google is not the only game in town, … (12 comments)

online safety: Do Not take that Stupid Facebook Quiz - 10/11/18 06:19 AM
Where should you live in the world? What Game of Thrones family are you in? What is the food that best describes your personality? All of these answers are given and found by doing quizzes on Facebook. You have surely seen them if you use Facebook, and have may have taken these quizzes, but you definitely might want to consider stopping. If you have ever used one of these quizzes, you have probably given these third-party apps permission to access some of your personal data. Not only does this affect you, it might also affect the people on your friends list. … (35 comments)

online safety: Is Your Small Business Staff Trained in Security Awareness? - 02/15/18 07:11 AM
The Ponemon Institute released a shocking statistic: about 80% of all corporate data leaks is due to human error. In other words, it only takes a single staff member to cause a huge issue. Here’s a scenario: Let’s say that you have an employee, Betty. Betty is lovely. We love Betty. But when Betty is checking her personal email during her lunch break and sees she has an offer that promises a 10-pound weight loss in only a week, she clicks the link. She wants to learn more about it, so she clicks the link in the email. What she doesn’t … (2 comments)

online safety: Black Hat 2017 was an Amazing Event - 07/29/17 07:11 AM
In July, more than 15,000 security pros, hackers, hobbyists, and researchers met in Las Vegas for the Black Hat Conference 2017 at Mandalay Bay in Las Vegas. This was the 20th year that the security conference was held, and both black and white hat hackers joined together to discuss security.
For two decades, Black Hat has gained a reputation for demonstrations of some of the most cutting-edge research in information security as well as development and industry trends. The event has also had its share of controversy – sometimes enough to cause last-minute cancelations.
Launched in 1997 as a single conference in Las … (5 comments)

online safety: ISPs invading Subscriber’s Privacy - 07/26/17 06:41 AM
It’s hard to keep track of the news of politics these days, and even if you can, how do you know it’s even real? The political landscape has greatly changed since January, and there have been a lot of laws passed that will affect us all, including the repeal of a law that protected your privacy on the internet. Basically, with this repeal, your internet service provider, or ISP, can sell your browsing history to anyone.
If you use the internet, you will be affected by this law. Not only will this change allow your ISP sell your browsing history to the … (3 comments)

online safety: How to Digitally Secure The Remote Teleworker - 03/22/17 06:19 AM
If you employ remote workers, your IT staff has a unique challenge keeping your organization safe. Fortunately, using a combination of best practices for cybersecurity, user awareness campaigns, and a strong policy will help to keep data safe.
New advances in mobile technology and networking have given remote workforces a boost, and while policies for most remote workers generally depend on manager or company preferences, most businesses must accommodate a mobile workforce on some level…and here’s where the challenge lies.
Things such as emails, vulnerable software programs and work documents are all tools that cybercriminals can use to infiltrate your company’s network. These … (2 comments)

online safety: How to erase Yourself from your Job - 12/20/16 05:55 AM
You shouldn’t leave any digital trace of yourself after you leave a job. Hopefully, you’ll be leaving voluntarily and thus have the time to first make backups before you delete anything. This may seem easy, but you need to take inventory to make sure you get EVERYTHING.
Note: make sure that every suggestion below is allowed via a company’s internal policies.
An article at wired.com gives these recommendations:
Use a flash drive for smaller amounts of data. An alternative is a personal account with Dropbox or Google Drive. For more data use an external hard drive. Don’t include company information in your backups. … (3 comments)

online safety: Jihadis using easy to get Privacy Software - 11/09/16 09:57 PM
Over the past two years, the media has tended to sensationalize jihadists’ rapid adoption and strategic use of social media. Despite perpetual news coverage on the issue, the public, by and large, continues to be relatively in the dark about the intricate ways in which many jihadists maintain robust yet secretive online presences.
To accomplish their goals — ranging from propaganda dissemination and recruitment to launching attacks — jihadists must skillfully leverage various digital technologies that are widely advertised and freely accessible online.
Just as smartphones and portable devices have transformed the way much of the world communicates and interacts, jihadists, too, have … (1 comments)

online safety: Can Two-Factor Authentication actually fail? - 07/06/16 12:51 AM
You’ve probably read many times that two-factor authentication is a superb extra layer of protection against a thief hacking into your accounts, because gaining access requires entering a One Time Passcode (OTP)—sent via text or voice—into a login field. In other words, no phone, no access.
But CAN a hacker get the phone? Ask Deray McKesson, an activist with Black Lives Matter. Hackers got his phone.
Now, this doesn’t mean they busted into his home while he was napping and took his phone. Rather, the thief took control of his mobile account.
The thief rerouted McKesson’s text messages – to a different SIM card … (0 comments)

online safety: 10 Ways to Protect your WordPress Site or Blog from Hackers - 06/01/16 12:15 AM
As much as you try, the unfortunate truth is that hackers are going to try to attack and access your WordPress website or blog, whether you like it or not. So, it is up to you to make sure you make the hacker’s job as difficult as possible. Here are some tips:
1. Use Plugins
One way to make your WordPress account less appealing is to use security plugins. These vary in quality, and you might have to purchase some of them, too. Just make sure to do some research before buying them, and when you do, only buy them from a trusted … (1 comments)

online safety: Before you die, do This - 05/06/16 12:02 AM
“Nobody likes to do it, but it has to be done.” You’ve heard that before. This time, it applies to 26 documents that you should have all bundled up in a folder that trusted family members have access to (someplace where fire and water won’t damage them). But first let’s go over some details about what should be in that bundle.
Essential Documents
Your will: Some say not a copy, but the original, accompanied by instructions. Supplying everyone in your will a copy is also advised by others. A completed power of attorney form that your benefactors have access to, should you … (6 comments)

 
Robert Siciliano, Realty Security and Identity Theft Expert Speaker (IDTheftSecurity.com Inc) Rainmaker large

Robert Siciliano

Realty Security and Identity Theft Expert Speaker

Boston, MA

More about me…

IDTheftSecurity.com Inc

Address: PO Box 15145, Boston, MA, 02215

Office: (617) 329-1182

Email Me



Listings

Links

Archives

RSS 2.0 Feed for this blog