Instigate change. Start a new collaborative Blog Group

Create group
Blogs
Robert Siciliano

Beware of the Green Dot scam

Scammers are at it again, this time with green dot cards: a pre-paid debit card available at stores. It can work like this: Let’s say you run a small business. You’re out and about, then return to f...

05 May 2014
Robert Siciliano

10 unbelievable Identity Theft Cases

Here’s a countdown to the most incredible identity theft cases recorded, compiled by guyism.com. Dr. Gerald Barnes Gerald Barnbaum lost his pharmacist license after committing Medicaid fraud. He sto...

30 Apr 2014
Robert Siciliano

Huge IE Attack: Will Microsoft fix It in Time

If you have IE 6 through 11, watch out. There’s a glitch that enables hackers to exploit flaws in these systems. Microsoft is racing to fix this vulnerability bug. Unfortunately, news is not so good f...

29 Apr 2014
Robert Siciliano

Phishing Alert: Tips To Protect Your Business From Attacks

It's becoming too easy for criminals to get their hands on your banking information, due to your employees' ignorance of phishing scams. Malware attacks have soared recently, targeting banks for the...

29 Apr 2014
Robert Siciliano

The Future of Identity Theft

Identity theft evolves as technology progresses. The Identity Theft Resource Center explains the future of this crime. Definition of Identity The definition will swell up to include biometrics and b...

27 Apr 2014
Robert Siciliano

This Earth Day Clean Your Device Before You Recycle It

One man’s trash is another man’s new identity? Yes, because that “junk mail” you toss in the garbage contains valuable data about yourself. A crook bent on identity theft can potentially have a field ...

16 Apr 2014
Robert Siciliano

Protecting Your Business's Data From Organized Crime

Organized crime rings are using brains, not brawn, to target small businesses and steal critical data. Protect your business by putting these 11 security measures into place. Organized crime has alw...

15 Apr 2014
Robert Siciliano

Beware of the One Ring Scam

“The Ring” means more than just a dead girl crawling out of a well; it can also mean the one ring that you get on your cell phone that’s designed to get you to call back to find out who the caller was...

09 Apr 2014
Robert Siciliano

Workplace Violence 12 Signs Of A Dangerous Person

Workplace violence is something everyone needs to be educated about. Know the warning signs to protect yourself and your employees. The Navy Yard shootings were a harsh reminder that, while studies ...

08 Apr 2014
Robert Siciliano

Credit Card Fraud Security Bleak

The U.S. is no Superpower when it comes to card payments: the card hacking headquarters of the world. Don’t count on credit card fraud going away too soon. After all, Americans practically sleep, eat ...

07 Apr 2014
Robert Siciliano

How To Stop Criminal Hackers In Their Tracks

Do you offer free WiFi? Put these three safeguards in place to protect your customers and your business. On a recent trip from Boston to New York on an Acela Express train, I was writing blogs and d...

01 Apr 2014
Robert Siciliano

Data Breach Notification Bill goes to the House

H.B. 224, a newly introduced data breach notification bill for New Mexico, would mandate that organizations notify breached individuals within 10 days of breach discovery (unencrypted credit card data...

25 Mar 2014