Category: Thought Leadership

video chat

Hey…Watch This: The Dangers of Video Chat and How to Protect Yourself

It is astounding when we sit back and think about just how far communication has come in recent history. While many can remember only having the option of a letter or a phone call, these days there is a plethora of ways to engage each other. Distance and cost are not as much of a concern with the integration of communication services through the internet. However, with the ease of sharing our private lives with friends and acquaintances, comes risk.

vacation

Security and Your Vacation Plans: TMI?

Social networking has made the phrase “TMI” almost obsolete. “TMI” or “too much information” used to be a phrase used when someone shared some information which would have been better kept to themselves. In the voyeuristic society in which we now exist, everyone seems to be hungry to share and receive as thorough a view into other’s lives as possible. While this can be a fun diversion and an effective way to organize with friends, it can also lead to some serious consequences. These days, TMI can be more than something that will gross out your friends. It can make you the target of crime.

search engine

Online Reputation: What the Search Giants Know About You, Part 1

CEO Kent Lawson does a little digging online to determine how much of his past information is available for public consumption. As he says, he was “quite surprised by how much information they were able to pull together. The tentacles of data matching against public databases do create a remarkably thorough dossier.” Check out Part 2 next Monday, June 27, when he explains what you can do if some of the information you read about yourself is wrong, personally intrusive, or seriously damaging to your reputation.

airport wifi

Airports and Identity Theft: Staying Safer While On The Road

Airports can be dangerous because they provide a great venue for identity thieves to engage in their crimes. Luggage transfer, public WiFi and a chaotic environment all leave travelers open to becoming victims of identity theft. Read on to learn more about the identity theft risks inherent in airport travel today, and ways you can avoid becoming a victim.

funeral

Is Nothing Sacred? Death, Identity Theft, and Steps You Can Take Thereafter

Identity thieves obtain information about deceased individuals in various ways. They may monitor obituaries, steal death certificates, or even get the information from websites that offer the Social Security Death Index file. These web sites are supposed to be used for genealogy research but are sometimes used to steal identities. Unfortunately, the thief may also be a family member who may take advantage of the situation or who has already been using the deceased’s identity. This may be especially true if the deceased suffered from a lengthy illness, mental confusion, or if there is disagreement among family members prior to death.

hotel wifi

Ask the Expert: Is It Safe For Me to Use Hotel Wifi?

In his latest Ask the Expert column, CEO Kent Lawson points out that most hotel networks are completely unsecured. Read more to discover why the risks associated with using a hotel network — whether wired or wirelessly — are much greater than using a wireless network at your home or office, and some simple steps you can take to protect yourself today.

hotel identity theft

Home Away from Home?: Identity Theft and Hotels

Whether travel is for business or pleasure, travelers must be on the alert for opportunities that identity thieves may try to take advantage of in any given situation. Unfortunately you cannot trust anyone you meet (housekeeping staff, bellmen, security guards, front desk clerks, etc) with your personal information. While your hotel should be a place to offer refuge from the hustle and bustle of travel, it can also be a breeding ground for identity theft.

How Cyberpunks Hack Wifi Hotspots

Think hacking is difficult? Think again. CEO Kent Lawson outlines the two basic ways that cyberpunks can snoop on your online activities and explains why security experts (and even most WiFi hotspot Terms and Conditions) urge consumers to use a Virtual Private Network to secure their Internet communications.

dislike

Facebook and Hackers: I Dislike This Dislike Scam

Most Facebook users are familiar with the “like” button. It was first introduced to Facebook in February of 2009 and from the start was met with huge success. It is a great way for users to show that they support anything from a bagel shop to their friend buying a new car. Inevitably though, with the invention of the “like” came the burning desire of users to be able to dislike something. Thus the mythical “dislike” button was born. There were many questions and rumors surrounding whether or not Facebook would allow users to express their discontent for their friends’ relationship status change from “in a relationship” to “single,” to express discontent with a post, or disagree with a friend’s choice of sports team affiliation.