Going Analog: Tom Kellermann Emerging Cyberthreats
Cybersecurity

Going Analog: Tom Kellermann Emerging Cyberthreats

John speaks with Tom Kellermann, Chief Cybersecurity Officer at Carbon Black, about emerging cyberthreats and what we can do to protect...
Read More
How to Turbocharge your Cybersecurity Awareness Training
Cybersecurity

How to Turbocharge your Cybersecurity Awareness Training

Security awareness training can’t be a boring afterthought if it’s going to work.  Own it. Secure it. Protect it.  Those...
Read More
Deepfakes: When Seeing May Not Be Believing
Cybersecurity

Deepfakes: When Seeing May Not Be Believing

How deepfake videos can undermine our elections, the stock markets and our belief in truth itself Last weekend, attendees at...
Read More
How to Protect Your College Student from Identity Theft on Campus
Identity Theft

How to Protect Your College Student from Identity Theft on Campus

Five tips for better data and device  security habits at college This fall, roughly 19.9 million college students will attend...
Read More
Russian Election Interference Coming to Your Vote in 2020
Cybersecurity

Russian Election Interference Coming to Your Vote in 2020

What will it take for Americans, especially our politicians, to care about Russian election interference? That’s a question I’ve been...
Read More
Is Document Shredding Still a Thing in This Digital Age?
Identity Theft

Is Document Shredding Still a Thing in This Digital Age?

Document shredding seems to have fallen out of favor. I recently received some questions from a client wondering if, in...
Read More
FaceApp is Fun, But Putin Will Own Your Privacy
Online Privacy

FaceApp is Fun, But Putin Will Own Your Privacy

FaceApp quite literally owns your face forever (or atleast the image of your face). It’s funny how we spend billions...
Read More
BREACHED! Customer Data from Quest Diagnostics & Lab Corp
Identity Theft

BREACHED! Customer Data from Quest Diagnostics & Lab Corp

Within just a few days of each other, both Quest Diagnostics and Lab Corp, two of the largest blood testing...
Read More
Just Wait for the Cavity: Dental Cyber Security
Cybersecurity

Just Wait for the Cavity: Dental Cyber Security

Dental Cyber Security is kind of like, well, being a dentist. You’re in your patient’s mouth. The red flags are...
Read More
RobbinHood Ransomware Attack Brings Down Baltimore
Cyber Blackmail

RobbinHood Ransomware Attack Brings Down Baltimore

Since May 7, Baltimore has been dealing with a ransomware attack that brought many city systems to a standstill. Hackers...
Read More
Uncategorized

Local Government Cyber Security: Our Next Big Threat

Read More
Security Awareness Programs Like Mushy Overnight Oats?
Cybersecurity

Security Awareness Programs Like Mushy Overnight Oats?

To diagnose your under-performing cyber security awareness programs, all you need to do is look at my breakfast today. My...
Read More
Don’t Let Hackers & Cyber Attackers Spoil Your Holiday (Video)
Cybersecurity Identity Theft

Don’t Let Hackers & Cyber Attackers Spoil Your Holiday (Video)

Read More
Marriott Data Breach: 500 Million Accounts Compromised
Cybersecurity Identity Theft

Marriott Data Breach: 500 Million Accounts Compromised

If you have stayed at one of Marriott’s Starwood hotels in the past few years, chances are you have been...
Read More
Sextortion Scams & Cyber Blackmail on the Rise
Cyber Blackmail

Sextortion Scams & Cyber Blackmail on the Rise

Sextortion scams are on the rise, and cyber criminals are using our discomfort in talking about this subject to continue...
Read More
Are Alexa, Google & Siri Eavesdropping on You?
Online Privacy

Are Alexa, Google & Siri Eavesdropping on You?

Amazon and Google have both come out with wildly popular digital assistants that are loosely known as smart speakers. Amazons is...
Read More
How to Delete Your Facebook Account
Cybersecurity News & Media Online Privacy

How to Delete Your Facebook Account

Now, more than ever, I am being asked how to delete a Facebook account. It’s totally understandable given the massive amount...
Read More
6 Ways Your Facebook Privacy Is Compromised | Sileo Group
Cybersecurity

6 Ways Your Facebook Privacy Is Compromised | Sileo Group

One billion people worldwide use Facebook to share the details of their lives with their friends and may be unaware...
Read More
Delete Your Facebook After Cambridge Analytica?
Online Privacy

Delete Your Facebook After Cambridge Analytica?

I’ve written A LOT about Facebook in the past. What not to post What not to like What not to...
Read More
Make Your Kid’s Internet of Things Toy Story a Safe and Happy One
Cybersecurity

Make Your Kid’s Internet of Things Toy Story a Safe and Happy One

What do IOT Toys have to do with your kids? Remember when the most dangerous thing a parent had to...
Read More
12th Day: Holiday Security Tips All Wrapped up Together
Identity Theft

12th Day: Holiday Security Tips All Wrapped up Together

There is no better gift to give yourself, your loved ones and your friends than peace of mind during the...
Read More
11th Day: Is that Holiday Email Really a Lump of Coal?
Identity Theft

11th Day: Is that Holiday Email Really a Lump of Coal?

Don’t be fooled by the holiday email pretending to bear goodwill or gifts.
Read More
10th Day: Beware the Phony Santa Claus Comin’ to Town
Identity Theft

10th Day: Beware the Phony Santa Claus Comin’ to Town

Because of the power of social media holiday scammers like to make you think you are giving to a charitable...
Read More
9th Day: I’m getting Nuttin’ (But Scams) for Christmas
Identity Theft

9th Day: I’m getting Nuttin’ (But Scams) for Christmas

You might get nuttin' for Christmas if you don't outsmart the thieves! Protect those packages you order online.
Read More
8th Day: What to Give the Person Who has Everything (and Wants to Keep it!)
Identity Theft Social Engineering

8th Day: What to Give the Person Who has Everything (and Wants to Keep it!)

Looking for a great holiday gift? Forget the fruitcake and buy them something that will make their life calmer and...
Read More
7th Day: It’s a Wonderful Life—Let’s Keep it That Way
Social Engineering

7th Day: It’s a Wonderful Life—Let’s Keep it That Way

Want to know how to catch fraudulent purchases on your credit and debit card accounts before they land you in...
Read More
6th Day: Don’t Let the Grinch Steal Your Party!
Identity Theft

6th Day: Don’t Let the Grinch Steal Your Party!

Holiday parties can be a major source of identity theft. While the hosts are off making merry, the guests are...
Read More
5th Day: Don’t Tell Facebook You Won’t Be Home for the Holidays
Identity Theft

5th Day: Don’t Tell Facebook You Won’t Be Home for the Holidays

Data Scrooges regularly visit social media profiles to take advantage of our charity during the holidays. Give graciously, but not...
Read More
4th Day: Holiday Shopping Quiz – Is Credit or Debit Smarter?
Identity Theft

4th Day: Holiday Shopping Quiz – Is Credit or Debit Smarter?

Do you realize that one form of payment is MUCH riskier than another regardless of whether you shop online or...
Read More
Don’t Get Juice Jacked at the Airport
Video Tips

Don’t Get Juice Jacked at the Airport

Do you know those USB phone charging stations at the airport? Did you realize that they can be hijacked by...
Read More
3rd Day: Stopping Hackers When You’re Shopping on Wi-Fi
Identity Theft

3rd Day: Stopping Hackers When You’re Shopping on Wi-Fi

Did you know that the free Wi-Fi hotspot you are using to do your holiday shopping while sipping coffee is...
Read More
2nd Day: It’s Beginning to Look a Lot Like Christmas- at the Mall!
Identity Theft

2nd Day: It’s Beginning to Look a Lot Like Christmas- at the Mall!

Identity thieves and scammers take advantage of distracted shoppers, especially on Black Friday and Cyber Monday. Here are some helpful...
Read More
12 Days to a Safe Christmas: Prevent Holiday Identity Theft
Identity Theft

12 Days to a Safe Christmas: Prevent Holiday Identity Theft

This holiday season, Sileo.com would like to offer the gift peace of mind to our readers. Here are 12 tips...
Read More
Password Managers Protect the Organization
Cybersecurity

Password Managers Protect the Organization

We hear all the time about stupid things people do when it comes to creating passwords; the most commonly used...
Read More
Catching Credit Card Thieves in the Act through Automatic Account Alerts
Identity Theft

Catching Credit Card Thieves in the Act through Automatic Account Alerts

While we don't have a sure-fire way of knowing who may get and use your credit card information, we do...
Read More
How to Stop Wi-Fi Hotspot Hackers
Cybersecurity

How to Stop Wi-Fi Hotspot Hackers

Nearly everyone offers free Wi-Fi these days, including lots of cyber criminals. They've become so good at mimicking legitimate hotspots...
Read More
John Sileo Receives CPAE Hall of Fame Award
News & Media

John Sileo Receives CPAE Hall of Fame Award

DENVER, /PRNewswire/ -- Just a decade before stepping on stage to receive the speaking industry's most prestigious award, John Sileo thought he might be...
Read More
Don’t Let Data Thieves Spoil Your Vacation
Video Tips

Don’t Let Data Thieves Spoil Your Vacation

Nothing… spoils a hard-earned vacation, or a critical business trip faster than fraud. Hotel theft, ATM skimming, pick pockets. Do...
Read More
Is Your Free Wi-Fi Hotspot Being Hacked?
Video Tips

Is Your Free Wi-Fi Hotspot Being Hacked?

Don’t you just love the convenience of free Wi-Fi hotspots? You can access your bank account, send emails, browse in...
Read More
Don’t Get Hooked by Phishing Scams
Video Tips

Don’t Get Hooked by Phishing Scams

Have you ever wondered how cyber criminals install malware on your computer?  I’m going to show you and give you...
Read More
A Smarter Solution for Thief-Proof Passwords
Video Tips

A Smarter Solution for Thief-Proof Passwords

Don't you find it nearly impossible to remember all of those passwords you have to create for your online accounts?...
Read More
Is Your Fitness Tracker Sharing Your Vital Statistics?
Video Tips

Is Your Fitness Tracker Sharing Your Vital Statistics?

  I'm out here in Vancouver. I just took a run and it reminded me of a question that someone...
Read More
Securing the Smartphone Supercomputer in Your Pocket
Video Tips

Securing the Smartphone Supercomputer in Your Pocket

What do you call this thing? A phone, right? That’s exactly where all the trouble starts. When we call it...
Read More
Are You a Victim of Credit ID Theft & Don’t Know it?
Video Tips

Are You a Victim of Credit ID Theft & Don’t Know it?

Here’s something you might not know. Twenty-five percent of you have already been victims of identity theft and you don't...
Read More
3 Secrets of Hack-Proof Passwords
Video Tips

3 Secrets of Hack-Proof Passwords

All right be honest with me. You’re still creating passwords on your online accounts that use your dog’s name or...
Read More
Threat Alert: Ransomware Becoming Rampant
Video Tips

Threat Alert: Ransomware Becoming Rampant

  One of the very greatest threats you face in terms of cyber crime is something called ransomware. It's a...
Read More
How to Bulletproof Against a Stolen Smartphone
Video Tips

How to Bulletproof Against a Stolen Smartphone

I’d just come off stage in San Diego and was headed to NYC for another speech when my cell rang....
Read More
Roomba Selling, I Mean Sharing our Home Data?
Cybersecurity

Roomba Selling, I Mean Sharing our Home Data?

What a difference a word makes. On July 24, Reuters published a story about an interview with Colin Angle, the...
Read More
Equifax Data Breach Protection Tips
Cybersecurity Identity Theft

Equifax Data Breach Protection Tips

How to Protect Yourself from the Equifax Data Breach Equifax, one of the three major consumer credit reporting agencies disclosed...
Read More
Beware Disaster Scams in the Wake of Hurricane Harvey
Identity Theft

Beware Disaster Scams in the Wake of Hurricane Harvey

Identity thieves are already on the prowl as Hurricane Harvey wreaks havoc on Texas. Take these important steps to protect...
Read More
Trump Russia Investigation Update: Did Campaign HELP Russians Plot Disinformation Strategy?
Cybersecurity

Trump Russia Investigation Update: Did Campaign HELP Russians Plot Disinformation Strategy?

The Trump Russia Investigation seems to be getting stickier - so which parts matter and which don't?
Read More
Is Russian Hacking of U.S. Nuclear Power Plants a Reality?
Cybersecurity

Is Russian Hacking of U.S. Nuclear Power Plants a Reality?

Can Russian hacking lead to a mass power-grid outage, the release of radioactive materials, a pre-strike military attack?
Read More
Cyber Security Experts: NotPetya isn’t Ransomware – It’s Cyber Warfare
Cybersecurity

Cyber Security Experts: NotPetya isn’t Ransomware – It’s Cyber Warfare

Cyber security experts have come to the conclusion that the NotPetya ransomware attack wasn't about the ransom, but about political...
Read More
Investigate Russian Hacking for Security, Not Politics (and get on with governing)
Cybersecurity

Investigate Russian Hacking for Security, Not Politics (and get on with governing)

As they say, sunlight is the best disinfectant, and I'm certain that the administration has nothing to hide. But doing...
Read More
7 Steps to Prevent Identity Theft
Identity Theft

7 Steps to Prevent Identity Theft

Preventing identity theft can be easy when you take a few crucial steps. Start now and stop worrying about how...
Read More
Happy About the Election Hacking of Your Presidential Vote?
Cybersecurity

Happy About the Election Hacking of Your Presidential Vote?

Do you feel violated by the election hacking scheme successfully conducted by Vladimir Putin and the Russian government? Regardless of...
Read More
Safe Online Shopping on Cyber Monday
Identity Theft

Safe Online Shopping on Cyber Monday

Cyber Monday can be a huge shopping convenience, or a nasty digital disaster. Make sure you protect your accounts and...
Read More
Internet Providers Lose Right to Sell Your Privacy (But Facebook & Google Still Can)
Online Privacy

Internet Providers Lose Right to Sell Your Privacy (But Facebook & Google Still Can)

Federal regulators have approved new broadband privacy rules that require internet service providers like Comcast and Verizon to ask for...
Read More
Stop Credit Card Thieves in the Act
Social Engineering Video Tips

Stop Credit Card Thieves in the Act

Setting Up Account Alerts Can Help Protect You From Fraud. Did you realize that you can have your credit card...
Read More
Can Size of Trump’s Hands Explain DNC Hack?
Cybersecurity

Can Size of Trump’s Hands Explain DNC Hack?

The DNC hack is a prime example of a very popular type of cyber espionage - political profiling. The DNC's...
Read More
Zuckerberg Hacked: How Not to Be Like Mark
Cybersecurity Identity Theft

Zuckerberg Hacked: How Not to Be Like Mark

Zuckerberg Hacked: Why does a social media titan not follow his own advice? Because knowing something (passwords need to be...
Read More
Some Simple Steps to Social Media Privacy
Online Privacy

Some Simple Steps to Social Media Privacy

When was the last time you checked your privacy settings on your social media profiles? We’ve outlined some of the...
Read More
Panama Papers a Lesson in Cyber Security
Cybersecurity

Panama Papers a Lesson in Cyber Security

The Panama Papers are a leaders lesson in good cyber security. Don't make the same mistakes they did.
Read More
Ransomware: Cyber Security Expert’s Next Big Threat
Cybersecurity

Ransomware: Cyber Security Expert’s Next Big Threat

Ransomware is a type of malware that will lock the contents of your computer and force you to pay a...
Read More
Apple vs FBI: Why the iPhone Backdoor is a Necessary Fight
Cybersecurity

Apple vs FBI: Why the iPhone Backdoor is a Necessary Fight

In the Apple vs FBI iPhone backdoor hacking conversation, do you favor one side over the other? What if your...
Read More
Don’t Get Hooked With Phishing Scams
Cybersecurity

Don’t Get Hooked With Phishing Scams

Just as fishing is one of the oldest occupations around, phishing is one of the oldest scams around. Ever since...
Read More
Safe Online Shopping During the Holidays!
Identity Theft

Safe Online Shopping During the Holidays!

3 Quick tips to keep your online shopping out of the hands of criminals and hackers.
Read More
Data Breach 2015 Summary
Cybersecurity

Data Breach 2015 Summary

This data breach 2015 summary shows a trend towards medical data breach and a continuation of retail and corporate security...
Read More
The Ashley Madison Hack: An Affair to Remember FOREVER
Cybersecurity Identity Theft Online Privacy

The Ashley Madison Hack: An Affair to Remember FOREVER

Come on, admit it. Don't you feel just a little satisfaction watching 37 million adulterers exposed? "They do kind of...
Read More
Identity Theft Services:  Is ID  Theft Monitoring Worth the $$$?
Identity Theft

Identity Theft Services: Is ID Theft Monitoring Worth the $$$?

Have you ever wondered if identity theft services are worth the money? They are if they meet this criteria...
Read More
Is CHIP & PIN Credit Card Security Worth $100M? (Are You Serious?)
Cybersecurity News & Media

Is CHIP & PIN Credit Card Security Worth $100M? (Are You Serious?)

Target will spend $100 million on chip and PIN technology: is it worth it? And how does the US catch...
Read More
Cyber Security Expert Asks: What is the Weakest Link in your Cyber Security Plan?
Cybersecurity

Cyber Security Expert Asks: What is the Weakest Link in your Cyber Security Plan?

What is the weakest link in your cyber security plan? Answer—any human being who works for your company!
Read More
Benefits and Risks of Wearable Technology
Cybersecurity

Benefits and Risks of Wearable Technology

Wearable technology can be a force for good, but you need to consider the privacy and security implications of the...
Read More
Government Data Breach
Cybersecurity

Government Data Breach

Government data breach puts the private information of our civil servants, military and maybe even spy agencies at risk.
Read More
Going on Vacation? How to Keep Travel Identity Theft from Ruining Your Trip!
Identity Theft

Going on Vacation? How to Keep Travel Identity Theft from Ruining Your Trip!

The last thing you want when going on vacation is to experience travel identity theft. Here's how to stop it...
Read More
Security Expert Hacks In-Flight Entertainment? 5 Cyber Lessons for Leaders
Cybersecurity

Security Expert Hacks In-Flight Entertainment? 5 Cyber Lessons for Leaders

If a hacker can change the course of an airplane using the in-flight entertainment system, how could they change the...
Read More
Travel Safety Tips Part 4
Identity Theft

Travel Safety Tips Part 4

Part 4 of our series on all stages of travel safety. Learn to think like the criminals think, outwit them...
Read More
Travel Safety Tips Part 3
Identity Theft

Travel Safety Tips Part 3

Part 3 of our series on all stages of travel safety. Learn to think like the criminals think, outwit them...
Read More
Travel Safety Tips Part 2
Identity Theft

Travel Safety Tips Part 2

This is part 2 of our series on all stages of travel safety. Learn to think like the criminals think,...
Read More
Travel Safety Tips Part 1
Identity Theft

Travel Safety Tips Part 1

Protect your identity when planning your travels by reading our comprehensive four-part series on all stages of travel safety. Learn...
Read More
Chip and PIN Credit Cards Finally Explained
Cybersecurity

Chip and PIN Credit Cards Finally Explained

On October 15, 2015, Chip and Pin credit cards will shift the burden of fraud from banks to retailers. In...
Read More
Medical Identity Theft: A Modern Day Plague
Identity Theft

Medical Identity Theft: A Modern Day Plague

While experiencing medical identity theft isn’t always as devastating as dying from the plague, it’s easy to draw some parallels.
Read More
Top Tips to Stop Tax-time Identity Theft – Part 1
Identity Theft

Top Tips to Stop Tax-time Identity Theft – Part 1

Tax time identity theft is rampant. Here's what you need to know in a 3 part series to protect your...
Read More
Data Breach Experts to Board of Directors: Wake the Hell Up
Cybersecurity

Data Breach Experts to Board of Directors: Wake the Hell Up

One of my favorite data breach experts, Larry Ponemon, issued a report with Raytheon that corporate boards of directors should...
Read More
3 Key Protections for Anthem Breach Victims
Cybersecurity Identity Theft

3 Key Protections for Anthem Breach Victims

Are you a victim of the Anthem breach? If so, you can minimize the possible damage that can be done...
Read More
Sony Cyber Attack: A Case Study in Cyber Leadership Failure
Cybersecurity Online Privacy

Sony Cyber Attack: A Case Study in Cyber Leadership Failure

Sony's embarrassing data breach is our classroom. Cyber Leadership is a topic that we wrongly discuss AFTER the attack. Read...
Read More
Cyber Security Expert Sileo on Check Fraud Scams
Social Engineering

Cyber Security Expert Sileo on Check Fraud Scams

Beware of a new check fraud scam where an unsolicited check arrives for you in the mail. If you cash...
Read More
Beware Cyber Security Grinches & Holiday Scams
Cybersecurity Identity Theft

Beware Cyber Security Grinches & Holiday Scams

Beware of holiday scams that come around this time of year. Let us teach you how to protect your information...
Read More
Cyber Espionage’s Latest Target?  Your Baby Cam!
Cybersecurity

Cyber Espionage’s Latest Target? Your Baby Cam!

A Russian website streaming footage from thousands of devices (such as baby monitors) reminds us of the steps we need...
Read More
USPS Breach Ironic, Moronic or Both?
Cybersecurity

USPS Breach Ironic, Moronic or Both?

USPS breach is a great example of why information is stolen that isn't going to be used for financial gain....
Read More
Android Flashlight App Shines Light on Your Data
Identity Theft

Android Flashlight App Shines Light on Your Data

Android flashlight apps collect unnecessary user data and accesses areas of the device completely unrelated to the purpose of the...
Read More
Ebola & Cybergeddon: Why the Novelty Could Kill You
Cybersecurity

Ebola & Cybergeddon: Why the Novelty Could Kill You

Ebola is a magnet for media attention, even in countries with few casualties. Is the prospect of cybergeddon informed by...
Read More
After Dropbox Breach, Is It Safe to Use? (Snowden Would Say No)
Cybersecurity Online Privacy

After Dropbox Breach, Is It Safe to Use? (Snowden Would Say No)

Is the Dropbox Breach something to worry about? Dropbox denies a breach, but even if it wasn't technically hacked, the...
Read More
GameOver Zeus Virus Test
Cybersecurity Identity Theft

GameOver Zeus Virus Test

The GameOver Zeus Virus can intercept and send out your bank account numbers and passwords. Here's how to test for...
Read More
Is Home Depot Data Breach an Example of the “New Normal”?
Cybersecurity Social Engineering

Is Home Depot Data Breach an Example of the “New Normal”?

The Home Depot Data Breach shows that retailers and consumer alike have given in to complacency - we lose interest...
Read More
Apple Pay Makes Mobile Payments Sexy; But Secure?
Cybersecurity

Apple Pay Makes Mobile Payments Sexy; But Secure?

Apple Pay has done what others who have tried mobile wallet concepts in the past have not: they’ve made it...
Read More
Anti-SPAM Software
Social Engineering

Anti-SPAM Software

Want to know one of the best ways to get rid of email scams? Get rid of the emails by...
Read More
iCloud Hacked for Nude Jennifer Lawrence Photos? How to Keep from Being Next
Cybersecurity

iCloud Hacked for Nude Jennifer Lawrence Photos? How to Keep from Being Next

Celebrity accounts being hacked is just the tip of the iceberg of cloud-based security hacks. Learn how to keep yourself...
Read More
US Companies Face Cyber Attacks; Live in a State of Cyberseige
Cybersecurity

US Companies Face Cyber Attacks; Live in a State of Cyberseige

Chase Bank is the latest in the cyber attack / cyberseige playing field. Why? A number of factors.
Read More
Data Breach Expert on UPS Breach (Same ol Same ol)
Cybersecurity

Data Breach Expert on UPS Breach (Same ol Same ol)

After UPS Breach, Homeland Security has warned US retailers that malicious software that allows hackers to steal customer financial data...
Read More
1 2 3 7