What Is Business/Commercial Identity Theft?
Business or commercial identity theft happens when thieves use an existing business’ name to get credit, or they may bill a business’ clients for products and services. Sometimes the Social Security...
View ArticlePodcast: The Latest From Google
Listen Here: Digital Marketing Strategist & Business Development Manager at the Lucid Agency, Molly Scott, will be discussing the Hummingbird update, Google engineer’s most recent algorithm, and...
View ArticlePodcast: Finding the Best Travel Apps
Listen Here: Fred Perrotta is an entrepreneur and travel junkie who co-founded the luggage company Tortuga Backpacks. As a frequent traveler and tech startup consultant, Fred has tested dozens of...
View Article10 Holiday Security Tips
Christmas trees, mistletoe, candy canes, turkey and stuffing bring out scammers, phishers, burglars and identity thieves. I’m not purposefully trying to be a Grinch here, but I’m just reminding you...
View ArticleHouse Keys For The Kids…When Your Children Are Ready
Going home to an empty house. Education.com reports that according to the U.S. census, one-third of all school-age children in the United States are, for some part of the week, latchkey kids—that is,...
View ArticleNorth Carolinians Scammed For Millions Dating Online
This year, 17 such victims have reported a dating scam that has cost them a combined $700,000, says the North Carolina Attorney General’s office. The typical victim is a woman in her early 60s. One...
View ArticleCard Issuers Losing $562 In Costs To Grey Charges
Hey merchants, yes you, BillGuard released a report that examined the grey charge problem among US debit and credit cardholders and the service costs impacting card issuers and retailers. The report...
View ArticleDanger: Wireless Toilets Next On Hackers’ List
Just about anything wireless is hackable today. Everything—from PCs to mobiles to tablets to home automation devices to pacemakers to insulin dispensers and even cars—are hackable. And now “smart”...
View ArticleWhat’s The Point Of $1 Million In Insurance For Identity Theft?
Honesty is the best policy, right? I’ve spent my life being honest, and do you know what is the most important lesson I’ve learned is? The truth hurts. And when you (meaning me too) says it like it is,...
View Article4 Ways To Share Paid Hotspots
There are a number of scenarios you might be in where friends, family and colleagues need to jump on a (read: your) wireless connection, but they’d rather not pay a connection fee. So if you have the...
View ArticleIdentity Thieves Go After the Deceased
There are a reported 2.5 million cases of identity theft among the deceased every year. Theft of deceased people’s identity happens partly because of the availability of public records coupled with the...
View ArticleMirror Mirror Online, Who Is the Most Dangerous Celebrity of Them All?
We all do it. We probably all just don’t admit it. Well I admit it—I’ve searched for that elusive picture of Kimye’s baby North (who I thought would be called Kadence, but I’m not in the know, which is...
View ArticleTop 5 Home Security System Scams
When a home security salesman comes a-knockin’, beware, pay attention and know what you are getting into. He might not be who he says he is, or he might have tactics under his belt that will cost you...
View ArticleCellular Base Station Range Extenders Vulnerable to Attack
Low-powered cellular base stations are often found in residential homes and small businesses where mobile coverage is scant. The device, which also known as a femtocell, connects to DSL or cable...
View ArticleMobile, Wearable And Now…Implantable Technology?
It began with the laptop. The laptop was the first portable internet-connected device that freed up millions to create a mobile workforce. Next was the smartphone, which didn’t really take off until...
View ArticleStandard Door Frames Make Burglary Easy
Stop what you are doing. Walk over to your front or back door. Open it. Look down at the doorjamb where the holes are—you know, where your doorknob and deadbolt locks (hopefully they are Schlage) go...
View ArticleLaptop Theft Leads to Identity Theft
Ever lose a mobile device? Have one stolen? Know someone who has? Device loss and theft is a common issue when it comes to identity theft and results in data breaches. Some studies have shown as many...
View ArticleSocint: Disseminating Cybercrime Through Social Intelligence
People talk—A LOT. They can’t stop talking. Talking, getting something off your mind and out there feels good. Talking takes the pressure off one’s mind; our mouths are like relief valves for our...
View ArticleApple Makes Life Harder For iPhone Thieves
You probably know that iPhones are high on the wish list of thieves all over the country —so much so that data from the New York City Police Department reveals that iPhone and iPad thefts have soared...
View ArticleScammers Use Online Calendars To Phish Victims
You’ve been here before: You’re at work, you get a notification via a popup, then an email, then a text reminding you of an appointment on your calendar. For most busy professionals, this is pretty...
View ArticleWhy Mobile Security is a Must
Smartphone use continues to increase. More than one third of Americans have dropped landlines and only use mobiles. It is very possible that within the next 10 years, the landline will be obsolete and...
View ArticleGood Heavens! Churches are Big Targets for Burglars
Is nothing sacred? Well, no. Not even churches. Really, especially churches. The problem with churches, like any public place, is that by design, they are open for anyone to come in and worship at any...
View ArticleHackproof Your Facebook Account
With over one billion people connected to Facebook, we have to assume that many of them are criminals. (Criminals are people with friends too!) But the criminals we need to be concerned about are the...
View Article7 Scary Privacy Issues To Be Aware Of
We are all too aware of the National Security Agency breaking encryption. 7 Scary Privacy Issues To Be Aware Of The NSA has frequently been known to be implanting back doors on various servers,...
View ArticleNew App Stores House Or Car Keys Online. Is It Safe?
Ever lock yourself out of your car or home? I’ve done each at least once this year; that’s about my average. After the last time I got stuck on the cold side of my front door, I decided to go with...
View Article5 Home Security Tactics Of The Uber Rich
The uber rich have many reasons to invest in uber security. I met a woman who won a $300 million lottery, and she had some unfortunate stories about how low people go to get at and to moneyed...
View ArticleNFC App On Androids Facilitates Automation
Near field communications (NFC) is the exchange of information between two devices via wireless signal. For example, a wireless signal emitting from your cell phone can act as a credit card when making...
View ArticleI Really Want My Phone to Be My Wallet. Don’t You?
Wallets suck. Seriously. Mine hurts my butt when I sit down. I have to remember to take it with me, and then I’m always afraid of losing it. There’s nothing fun about it. And…well…it’s dirty. It really...
View ArticleStreamlined ‘Passpoint’ WiFi Coming
WiFi connects us everywhere, such as in parks, subways, airplanes, coffee shops and public WiFi hotspots. The WiFi Alliance says there are more than a million hotspots worldwide, and a report by market...
View ArticlePasswords: Fingerprint, Heartbeat Or Brainwaves?
There is no such thing as a truly secure password; there are only more secure or less secure passwords. Passwords are currently the most convenient and effective way to control access to your accounts....
View ArticleSelling Your Smartphone? Beware Of Stowaway Data
Upgrading your mobile device? It has become standard practice to upgrade to a newer device every one to three years. And when doing so, people often sell, donate or discard the old one. The goal is...
View Article6 Tips On Securing Your Home From Those You ‘Trust’
There are going to be times in your life when you will need to simply trust people who you let into your home for various reasons. People such as: House cleaners: House cleaners get in the nooks and...
View ArticleHigh-Tech vs. Low-Tech Locks
High technology doesn’t necessarily mean better, stronger or faster. It does usually mean more convenient, as the word technology is defined as “including the use of materials, tools, techniques, and...
View ArticleUnsecured Wireless Video Baby Monitors Hackable
Baby monitors have evolved from simple one-way radio communications based on older radio waves to highly evolved IP based, internet-connected cameras that can be viewed on a smartphone or tablet. Back...
View ArticleKids And Smartphones: How Old?
How old is old enough for a kid to have a smartphone? Right out of the gate, I’m saying 16, and I know there’ll be some backlash from that. Some will say it all depends on the kid; others will argue...
View ArticlePrepare Now For Device And Data Theft
Digital device theft is a big problem. I’ve seen numerous stories about iPhones being stolen right from a person’s hand while the user was talking on it. Others have reported sitting in a coffee shop...
View Article5 Rules For Using Coffee Shop WiFi
In order to compete with the likes of the chain coffee shops and now fast food joints, just about every coffee shop or small restaurant is supplying its clients with free WiFi. Unfortunately, there are...
View ArticleWould You Use Facebook To Catch A Bad Guy?
In Oklahoma, the OK state, an elderly couple was home invaded and held at knifepoint, and the woman was knocked to the ground. During the ensuing abuse, their home was robbed and the predator got away....
View ArticleWhat Is Scareware?
When it comes to making us fall for their scams, cybercriminals have a number of tricks up their sleeves. One of these tricks is to scare us into thinking that our computers or smartphones have become...
View ArticleShould You Post Pictures Of Children Online?
Most people give no thought whatsoever to posting pictures of their children online. They are proud of their kids, they love them…so why not show the world how wonderful they are so others can enjoy...
View ArticleThe Ultimate Buzz
As many people were celebrating the New Year with sparkling champagne or some other way to get “a buzz on,” I was having a personal “buzz machine” implanted in my spine. No, I have not gotten into some...
View ArticlePodcast: Learning How To Code
Listen Here: Betsy Hauser Idilbi is the cofounder of Tech Talent South – an immersive code school that was recently ranked the 16th best in the world. Betsy is here to tell us more about coding, why...
View ArticlePodcast: Software Solutions for Small Business
Listen Here: Dave Kramer, is the founder of AllProWebTools – an online workflow management dashboard for small businesses. Dave draws on over 30 years of coding and entrepreneurship experience to help...
View ArticleLife Is Too Short: Get Off Your Cell Phone
During my youth, my dad took me fishing. My mom took me on bicycle rides. My dad shouldered me with a small daypack for hikes in the woods. He pointed out chattering squirrels. He helped me see my...
View ArticlePodcast: How To Hire The Perfect Virtual Assistant
Listen Here: Catherine Storing is a business coach, fashion stylist and multi-business owner, including a full service virtual assistantcompany that provides support services for her coaching clients....
View ArticlePodcast: The Pros & Cons Of Hiring A Virtual Assistant
Listen Here: Professional Virtual Assistant, and President of Wisdom Seekers Management & Consulting, Jeffery Sullivan discusses the value that virtual assistants can bring to your business and...
View ArticlePodcast: How To Become A Virtual Assistant
Listen Here: Gina Horkey knows everything there is to know about the world of virtual assistant work. She started as one herself (and still is one), created a course to help others break into VA work...
View ArticlePodcast: Virtual Assistant Technology
Listen Here: Frank Klesitz is the CEO and co-founder of Vyral Marketing, an advertising agency for entrepreneurs in professional services. Virtual Assistant Technology What types of jobs are best for...
View ArticlePodcast: Outsourcing Virtual Assistants
Listen Here: Frank Salas is a successful serial megapreneur who owns 6 businesses and runs them at a high level with the help of an army of amazing Virtual Assistants. Outsourcing Virtual Assistants...
View ArticlePodcast: How To Be The Best On The Internet
Listen Here: Max Cron is the Creative Strategy Director at Online Optimism, a full service digital marketing firm based in New Orleans, Louisiana. With a background in marketing and management ranging...
View Article
More Pages to Explore .....