online security: Creating an Effective Business Continuity Plan - 01/04/20 03:12 AM
Most of us have no idea when a disaster is about to strike, and even if we do have a little warning, it’s very possible that things can go very wrong.
This is where you can put a business continuity plan to good use. What does this do? It gives your business the best odds of success during any disaster.
What Exactly is Business Continuity?
Business continuity, or BC, generally refers to the act of maintaining the function of a business as quickly as possible after a disaster. This might be a fire, a flood, or even a cyber-attack. With this plan in place, … (44 comments)

online security: A Guide to How Hackers Hack - 12/27/19 09:53 AM
You have surely heard of hackers, but do you really know how they work? Hackers are well known for being bad guys, though there are certainly good hackers out there too. Here’s a brief guide to help you understand how a hacker can hack:
Directions for Hacking are Easy to Come By
Hackers don’t have to look far for help, especially if they don’t know much about hacking. First is a well-known website known as Kali Linux. It has a ton of tools available for hackers, and the site features many links to other hacking resources. Of course, people who want to hack … (3 comments)

online security: Fake Emails are Becoming a Major Issue for Businesses - 12/04/19 11:18 AM
You might be surprised to know that more than 3.4 billion fake emails are sent around the globe each day. What does this mean? It means that almost every company out there is vulnerable to cybercrimes in the form of “spoofing” and “phishing.” On top of this, most companies out there have not protected themselves from this type of cyber attack. What’s even more interesting is that the vast majority of these emails are not coming from some foreign land, but they are coming from sources based in the US.
This all sounds pretty dreary, but it’s not all bad. Research is … (68 comments)

online security: “Choking Game” Killing Kids, and Authorities Have to Step Up - 07/11/19 05:35 AM
It only took a minute for 12-year old Erik Robinson to die while playing a macabre game called the “Choking Game.” His mother desperately tried to save her son when she found him with a Boy Scout rope around his neck, but it was too late. Erik was brain dead due to lack of oxygen, and mom had to make the choice to remove her son from life support.
Sadly, she is not alone. The only viable statistics run between 1995 and 2007, where 82 kids have died while playing the “Choking Game,” an act where people cut off their own air … (4 comments)

online security: Deepfakes and the Impact on Cybersecurity Now and in the Future - 06/25/19 05:35 AM
Can you believe what you see in a video? Most people say ‘yes,’ but the truth is, you no longer can. We all know that photos can be altered, but videos? Thanks to artificial intelligence, these, too, are being altered at a very quick rate.
These videos, known as “deepfakes,” are out there, and they are doing a number on cybersecurity. In fact, leaders in the cybersecurity sector are warning consumers that high tech video alteration is here, and it is very difficult to tell with the naked eye whether or not a video is real or fake.
Leaders in cybersecurity shared an … (4 comments)

online security: Young Kids Getting Sexually Exploited Online More Than Ever Before - 06/18/19 06:13 AM
An alarming new study is out, and if you are a parent, you should take note…children as young as 8-years old are being sexually exploited via social media. This is a definite downturn from past research, and it seems like one thing is to blame: live streaming.
YouTube serves up videos of kids, in clothing, that pedophiles consume and share as if it is child porn. It’s gotten so bad that YouTube has had to disable the comments sections of videos with kids in them.
Apps like TikTok are very popular with younger kids, and they are also becoming more popular for the … (1 comments)

online security: Who Has Access to Your Personal Info? The Answer Might Surprise You - 05/30/19 06:48 AM
Are you aware that many people probably have access to your personal info? If you have ever gotten an apartment, have insurance, or applied for a job, someone has done a background check on you, and you might be shocked by what’s in there, including your debts, income, loan payments, and more. On top of this, there are also companies collecting information on you including:
Lenders Employers Government agencies Volunteer organizations Landlords Banks/credit unions Insurance companies Debt collectors Utility companies…and more Thanks to the Fair Credit Reporting Act (FCRA), you can get a copy of these reports every year for a … (4 comments)

online security: How To Determine a Fake Website - 01/22/19 08:09 AM
There are a lot of scammers out there, and one of the things they do is create fake websites to try to trick you into giving them personal information. Here are some ways that you can determine if a website is fake or not:
How Did I Get Here?
Ask yourself how you got to the site. Did you click a link in an email? Email is the most effective ways scammers direct their victims to fake sites. Same thing goes with links from social media sites, Danger Will Robinson! Don’t click these links. Instead, go to websites via a search through Google … (9 comments)

online security: Protect your USPS Mail from Getting Stolen - 12/20/18 05:26 AM
USPSID stands for U.S. Postal Service Informed Delivery. It is a good thing to sign up for because it informs you of your expected deliveries.
But there’s a problem: Someone ELSE could pose as you and sign up for this service, getting your mail before you have a chance to.
In fact, it has already happened. Crooks have signed up as other address owners and collected their mail.
This can lead to credit card fraud if some of that mail includes new credit cards or credit card applications.
And what if the mail includes a check? The thief could find a way to get it … (11 comments)

online security: 10 Ways to Prevent Holiday Shopping Scams - 12/11/18 06:02 AM
The winter holidays: a time for festivities and … fraud-tivities.
Gift Card Grab
Never, ever enter your credit card or other sensitive information to claim a gift card that comes via email.
Never Buy Over Public WiFi
Shopping over public WiFi means your credit card, bank account or login data could get picked up by a cyber thief. Use a VPN.
Coupon Cautious
If a coupon deal seems too good to be true, then assume it is. End of story. Next.
Password Housekeeping
Change the passwords for all your sensitive accounts. No two passwords should be the same. Passwords should be a random salad of upper and lower … (4 comments)

online security: Protect Yourself From Gift Card Scams - 12/04/18 08:03 AM
So maybe Christmas now means the very predictable gift card swap, but hey, who can’t use a gift card? But beware, there are a ton of scams. This includes physical, not just digital, gift cards.
Regardless of who gave you the card, you should always practice security measures. Below are two common ways that fraudsters operate.
Transform Gift Card to Cash Twice.
If someone gives you a $200 gift card to an electronics store and then it’s stolen, you technically have lost money, as this is the same as someone stealing a wad of cash from your pocket.
Nevertheless, you’ll feel the loss just as … (22 comments)

online security: How Your Username Can Be used to Track You - 11/20/18 07:05 AM
You probably have a few usernames, or you might have just one that you use for every site. Either way, your user names can be used not just to identify you online, but it can also be used to track you and find out information about you. How do people track you based on your user name? They do the following:
They Start with a Google Search
The first thing people do to track your username is do a Google search. You will be amazed by all of the information that is out there. However, Google is not the only game in town, … (12 comments)

online security: Do Not take that Stupid Facebook Quiz - 10/11/18 06:19 AM
Where should you live in the world? What Game of Thrones family are you in? What is the food that best describes your personality? All of these answers are given and found by doing quizzes on Facebook. You have surely seen them if you use Facebook, and have may have taken these quizzes, but you definitely might want to consider stopping. If you have ever used one of these quizzes, you have probably given these third-party apps permission to access some of your personal data. Not only does this affect you, it might also affect the people on your friends list. … (35 comments)

online security: 15 Year Old’s Naked Photos Spread Like Wild Fire - 09/04/18 08:48 AM
You have probably heard the story before. Teenage girl takes some scantily clad photos and sends them to her latest boyfriend. “What could go wrong?,” she thinks. Well, a lot could go wrong, and an article on really lays that out. You might think that the boyfriend is to blame for this 15-year old’s photos spreading like wildfire, but the truth is this: he deleted them soon after getting them…the photos got out because the teen kept them on her phone and some classmates took that phone.
Ultimately, the photos got into the hands of the victim’s best friend. At this point, … (3 comments)

online security: Is Your Small Business Staff Trained in Security Awareness? - 02/15/18 07:11 AM
The Ponemon Institute released a shocking statistic: about 80% of all corporate data leaks is due to human error. In other words, it only takes a single staff member to cause a huge issue. Here’s a scenario: Let’s say that you have an employee, Betty. Betty is lovely. We love Betty. But when Betty is checking her personal email during her lunch break and sees she has an offer that promises a 10-pound weight loss in only a week, she clicks the link. She wants to learn more about it, so she clicks the link in the email. What she doesn’t … (2 comments)

online security: Black Hat 2017 was an Amazing Event - 07/29/17 07:11 AM
In July, more than 15,000 security pros, hackers, hobbyists, and researchers met in Las Vegas for the Black Hat Conference 2017 at Mandalay Bay in Las Vegas. This was the 20th year that the security conference was held, and both black and white hat hackers joined together to discuss security.
For two decades, Black Hat has gained a reputation for demonstrations of some of the most cutting-edge research in information security as well as development and industry trends. The event has also had its share of controversy – sometimes enough to cause last-minute cancelations.
Launched in 1997 as a single conference in Las … (5 comments)

online security: ISPs invading Subscriber’s Privacy - 07/26/17 06:41 AM
It’s hard to keep track of the news of politics these days, and even if you can, how do you know it’s even real? The political landscape has greatly changed since January, and there have been a lot of laws passed that will affect us all, including the repeal of a law that protected your privacy on the internet. Basically, with this repeal, your internet service provider, or ISP, can sell your browsing history to anyone.
If you use the internet, you will be affected by this law. Not only will this change allow your ISP sell your browsing history to the … (3 comments)

online security: Are you Scam Aware or a Sitting Duck? - 06/28/17 08:06 AM
You might have heard about all of the scams out there, and think that you are pretty scam savvy. But, the truth is, most of us aren’t, and even a simple phone call could get you caught up in a big scam.
One such scam occurs when criminals call random phone numbers and ask questions, such as “Can you hear me?” When you say “yes,” they record it. They then bill you for a service or product, and when you try to fight it, they say…but you said ‘Yes.’ Not only does this happen with private numbers, it also happens with businesses. … (3 comments)

online security: Getting Owned or Pwned SUCKS! - 06/13/17 11:32 AM
A well done New York Times article recently re-introduced this topic to the masses. Being “owned” isn’t new, but the term is not becoming part of popular culture. If you use the internet or are often on social media, odds are good that you have been OWNED. Whether you are called out for a misspelling on your latest Facebook post, or you were proven wrong after sharing a “fact” or post from another site…you have probably been owned.
The word “owned” comes from the hacker world, and real “ownage” is not just about proving you wrong. You might also see it as … (1 comments)

online security: Smart and Easy Ways to Protect Your Digital Life - 06/06/17 06:37 AM
Even if you don’t realize it, your identity is all over the internet. Whether you posted to an internet forum in 1996 or you ever had a MySpace page, this information is still out there, and you have to protect it. Here are some simple and easy ways that you can protect your digital life: 
Change Passwords – The first thing you should do is make sure you are regularly changing passwords. Make your passwords difficult to guess, and a mixture of letters, numbers, and symbols. Also, make sure that you are protecting your account when resetting passwords. For instance, you … (8 comments)

Robert Siciliano, Realty Security and Identity Theft Expert Speaker ( Inc) Rainmaker large

Robert Siciliano

Realty Security and Identity Theft Expert Speaker

Boston, MA

More about me… Inc

Address: PO Box 15145, Boston, MA, 02215

Office: (617) 329-1182

Email Me




RSS 2.0 Feed for this blog