Instigate change. Start a new collaborative Blog Group

Create group
Blogs
Robert Siciliano

How Do I Protect Myself When Using Wi-Fi?

Wi-Fi is everywhere. Whether you travel for business or simply need Internet access while out and about, your options are plentiful. You can sign on at airports, hotels, coffee shops, fast food restau...

04 Jul 2012
Robert Siciliano

What Are The Risks Of Mobile Spam?

Spammers send unwanted emails or texts that are both annoying and frightening. Most spam messages are useless advertisements selling stuff you don’t need or want. In 1995, 8,069 unique pieces of malwa...

01 Jun 2012
Robert Siciliano

Free Mobile Apps Equal Drained Battery

Go through your smartphone right now. Look at each app and seriously consider whether you need it. If not, delete it. Then, determine which of the free apps are worth upgrading to the paid versions, s...

27 May 2012
Robert Siciliano

IT Security: Preventing Insider Threat

A “Logic Bomb” isn’t really logical, it’s a virus, designed to take down your corporate network and disable existing systems that may monitor data, protect it, back it up or access it. A logic bomb is...

24 May 2012
Robert Siciliano

Business Security Measures to Prevent Fake Twitter Accounts

Hacking a business Twitter account seems to be a favorite pastime for those wanting some kind of retribution and for others it’s just plain fun. Once the businesses Twitter account is hacked their r...

30 Apr 2012
Robert Siciliano

Watch Those Corporate Card Statements

Charges on corporate credit cards can often go unnoticed even when employees are submitting expense reports. Especially if the charges are small. The Federal Trade Commission filed a lawsuit describin...

27 Apr 2012
Robert Siciliano

FCC and Carriers to Create Stolen Phone Consortium

Stolen phones are a big problem here in the US. Many are stolen in robberies. Robberies are, by definition, violent crimes, and there are many instances of robberies of mobile phones that resulted in ...

25 Apr 2012
Robert Siciliano

Employee ID Verification for Small Business

When hiring new employees the first concern is often “how good of an employee will they be” but in fact the first concern should be “are they actually who they say they are” because regardless of the ...

25 Apr 2012
Robert Siciliano

Business Data Breaches Key in Rise of ID Theft

The 2012 Identity Fraud Report: Social Media and Mobile Forming the New Fraud Frontier report released by Javelin Strategy & Research Data Breaches increasing and more damaging – “One likely contr...

19 Apr 2012
Robert Siciliano

What Happens to Your Profile After You Die?

If you were hit by a bus, and passed on to whatever heaven might exist, would you care about your Facebook page? Probably not. But your loved ones more than likely would. Things like email, websites, ...

18 Apr 2012
Robert Siciliano

QR Codes Could Deliver Malware

You’ve seen barcodes all your life. So you know what they look like: rectangles “boxes” comprised of a series of vertical lines. When a cashier scans a barcode, you hear a familiar beep and you are ch...

26 Mar 2012
Robert Siciliano

I Found Your Data on That Used Device You Sold

Over the past 15 years, the increasingly rapid evolution of technology has resulted in new computers or mobile phones becoming outdated in a matter of one or two years. Chances are, you’ve gone throug...

14 Mar 2012

Now hiring