Travel Safety Tips Part 2
This is part 2 of our series on all stages of travel safety. Learn to think like the criminals think,...
Read MoreTravel Safety Tips Part 1
Protect your identity when planning your travels by reading our comprehensive four-part series on all stages of travel safety. Learn...
Read MoreChip and PIN Credit Cards Finally Explained
On October 15, 2015, Chip and Pin credit cards will shift the burden of fraud from banks to retailers. In...
Read MoreMedical Identity Theft: A Modern Day Plague
While experiencing medical identity theft isn’t always as devastating as dying from the plague, it’s easy to draw some parallels.
Read MoreTop Tips to Stop Tax-time Identity Theft – Part 1
Tax time identity theft is rampant. Here's what you need to know in a 3 part series to protect your...
Read MoreData Breach Experts to Board of Directors: Wake the Hell Up
One of my favorite data breach experts, Larry Ponemon, issued a report with Raytheon that corporate boards of directors should...
Read More3 Key Protections for Anthem Breach Victims
Are you a victim of the Anthem breach? If so, you can minimize the possible damage that can be done...
Read MoreSony Cyber Attack: A Case Study in Cyber Leadership Failure
Sony's embarrassing data breach is our classroom. Cyber Leadership is a topic that we wrongly discuss AFTER the attack. Read...
Read MoreCyber Security Expert Sileo on Check Fraud Scams
Beware of a new check fraud scam where an unsolicited check arrives for you in the mail. If you cash...
Read MoreBeware Cyber Security Grinches & Holiday Scams
Beware of holiday scams that come around this time of year. Let us teach you how to protect your information...
Read MoreCyber Espionage’s Latest Target? Your Baby Cam!
A Russian website streaming footage from thousands of devices (such as baby monitors) reminds us of the steps we need...
Read MoreUSPS Breach Ironic, Moronic or Both?
USPS breach is a great example of why information is stolen that isn't going to be used for financial gain....
Read MoreAndroid Flashlight App Shines Light on Your Data
Android flashlight apps collect unnecessary user data and accesses areas of the device completely unrelated to the purpose of the...
Read MoreEbola & Cybergeddon: Why the Novelty Could Kill You
Ebola is a magnet for media attention, even in countries with few casualties. Is the prospect of cybergeddon informed by...
Read MoreAfter Dropbox Breach, Is It Safe to Use? (Snowden Would Say No)
Is the Dropbox Breach something to worry about? Dropbox denies a breach, but even if it wasn't technically hacked, the...
Read MoreGameOver Zeus Virus Test
The GameOver Zeus Virus can intercept and send out your bank account numbers and passwords. Here's how to test for...
Read MoreIs Home Depot Data Breach an Example of the “New Normal”?
The Home Depot Data Breach shows that retailers and consumer alike have given in to complacency - we lose interest...
Read MoreApple Pay Makes Mobile Payments Sexy; But Secure?
Apple Pay has done what others who have tried mobile wallet concepts in the past have not: they’ve made it...
Read MoreAnti-SPAM Software
Want to know one of the best ways to get rid of email scams? Get rid of the emails by...
Read MoreiCloud Hacked for Nude Jennifer Lawrence Photos? How to Keep from Being Next
Celebrity accounts being hacked is just the tip of the iceberg of cloud-based security hacks. Learn how to keep yourself...
Read MoreUS Companies Face Cyber Attacks; Live in a State of Cyberseige
Chase Bank is the latest in the cyber attack / cyberseige playing field. Why? A number of factors.
Read MoreData Breach Expert on UPS Breach (Same ol Same ol)
After UPS Breach, Homeland Security has warned US retailers that malicious software that allows hackers to steal customer financial data...
Read More3 Steps to Stop Wallet / Purse Identity Theft
Identity theft prevention starts with the IDs we carry with us every day in purses and wallets. Protect those and...
Read MoreInheritance Scam: Detection Questions You Should Ask!
We have developed five questions you should ask about any email or phone call you suspect might be a scam....
Read MoreA Smarter Solution for Thief-Proof Passwords
One of the first recommendations I make to my corporate and individual clients alike is to utilize a password manager...
Read MoreEMV Security is Coming, Ready or Not (And You’d Better Be!)
Almost half of the world’s credit card fraud now happens in the United States; EMV security measures aim to curtail...
Read MoreData Breach Expert’s Pragmatic View on PF Chang’s News
Data breach expert John Sileo weighs in on what's bound to happen in the wake of the P.F. Chang's data...
Read MoreFacebook Using Your Likes, Browsing History & Mood Manipulation
Facebook is using every tool in their arsenal to boost ad effectiveness, including your Likes, Apps and even mood manipulation.
Read More5 Ways to Doom Your Next Cyber Security Summit (Cyber Security Speakers Like Ambien)
Boring Cyber Security Speakers are a meeting pro's nightmare, an IT department’s budget-buster & an organization’s fast track to breach....
Read MoreSecurity Keynote Speaker on Rachael Ray, 60 Minutes…
Tired of boring security keynote speakers? This is a sampling of national television shows that security keynote speaker John Sileo...
Read MoreFacebook Privacy Settings Get Needed Update
It took losing customers to get a significant update to Facebook privacy settings. Lesson: serve your customers well and they...
Read MoreInternet Privacy Expert Reviews DuckDuckGo Private Search Engine
How an Internet privacy expert uses DuckDuckGo.com to foil Google's ability to track, aggregate and sell every term searched online.
Read MoreHeartbleed: There’s Always a Fee Behind Free
Want a perfect example of the security maxim - "you get what you pay for"? The recent Heartbleed Bug incident...
Read More3 C-Suite Lessons from Target CEO Resignation
The Target CEO Resignation of Gregg Steinhafel had better be a wakeup call to you and your organization. Learn from...
Read More5 Steps to Stop Lost Wallet Identity Theft
Feeling the panic of a lost wallet or missing purse? Scared you might become a victim of identity theft? Take...
Read MoreMicrosoft Warns of Internet Explorer Security Gap
Internet Explorer security gap allows attackers to gain the same user rights as the current user. Read recommendations of what...
Read MoreIdentity Theft Victim? YOUR NEXT 3 MOVES ARE ABSOLUTELY CRITICAL!
Are you an identity theft victim? Had your purse stolen or lost your wallet? Your next steps are critical, and...
Read MoreHow do I Get Businesses to Ask For Photo ID?
Having trouble getting businesses to ask for your photo ID even though you've written it on the back of your...
Read MoreHow to Keep the Heartbleed Bug from Hacking Your Bank Account
Your banking passwords are likely at risk due to the Heartbleed Bug, which enders the little lock symbol in your...
Read MoreOver 90% of Rachael Ray Show Audience Faces Identity Theft Risks
Do you face the same type of identity theft risks these audience members did on The Rachael Ray Show?
Read MoreJimmy Carter Exposes 1 of 2 Non-Secrets of World’s Most Powerful People
How do the world's most powerful, wealthy and well connected people keep their lives more private than you? Ask Jimmy...
Read MoreLatest Tax Scams "Target" Data Breach Victims
Identity theft once again tops the “Dirty Dozen” tax scams put forth by the IRS for 2014. Data breach victims...
Read MoreFacebook knows what you said, EVEN IF YOU DELETE B4 POSTING!
Do you ever engage in self-censorship on Facebook? Most of us do, & Facebook is watching EXACTLY what you delete...
Read MoreNetflix Users: Don’t Fall Hook, Line, & Sinker for Latest Phishing Scheme
Netflix users are being fooled by the same old phishing scam in new clothes.
Read MoreIs the CIA Spying on the Senate?
What does it mean if we have the CIA spying on the Senate? In short, an erosion of democratic principles...
Read MoreTarget Breach Leaves Profits Down 50% – Proof Enough?
Will the Target Breach cost the company more than what it would have cost to prevent it? With earnings down...
Read MoreIdentity Theft Speaker Says Fraud from Target Breach is Your Fault (As of Today)
The Target Data Breach was Target's Fault. But if you've done nothing to protect yourself, identity theft speaker John Sileo...
Read MoreSileo on Fox: Google + DeepMind Artificial Intelligence
Is Google spying on us even more than the NSA? https://192.241.219.145/google-big-brother/ Google spies on us in far more complex ways...
Read MoreBiometrics are Like Passwords You Leave EVERYWHERE
Biometrics seem like the silver bullet of identity theft prevention, right? They will replace passwords, no? Actually, they just might...
Read MoreNSA Angry Birds Help the Government Spy on Your Intimate Details
Guess who's been spying on you all along? NSA Angry Birds and other "leaky" apps on your mobile devices. And...
Read MoreIdentity Theft Expert John Sileo on The Rachael Ray Show
Identity Theft Expert John Sileo will be appearing on CBS's The Rachael Ray Show this Wednesday, January 29 to talk...
Read MoreHow do the RICH protect their Online Accounts?
Everyone should be able to protect their money like the wealthy. So here's a simple guide to two-step authentication, which...
Read MoreData Security Expert John Sileo on Fox Business (Target Data Breach)
Were you part of the Target data breach? Data Security Expert John Sileo goes on Fox Business to help you...
Read MoreData Breach Expert John Sileo on Fox & Friends – Target Data Breach
http://www.youtube.com/watch?v=EY8S8Ssfzgw Data Breach Expert John Sileo goes on Fox & Friends to discuss the 110 million records breached at Target.
Read MoreIdentity Theft Speaker Shares Latest Statistics on Cost of ID Theft
In the latest National Crime Victimization Survey, identity theft cost Americans more than all other property crimes combined; to be...
Read MoreTop Tips for Tax ID Theft Prevention: Part 3
Stop falling for IRS and tax-related scams that lead to tax ID theft. Because we are distracted during tax season,...
Read MoreSnapchat Hacked? Duh! Of Course It Was.
Snapchat hacked? Who would have ever thought that Snapchat would be the next huge breach victim? (Everyone paying attention)
Read MoreDo Fitness Apps Share Your Health w/ Others (Insurance Co's)?
There are considerable privacy risks for users of mobile health & fitness apps. Assume that your health data is being...
Read MoreData Privacy Expert on the Irony of Dictionary.com’s Word of the Year
Data Privacy Expert finds it ironic that Dictionary.com's word of the year is something they fail to practice.
Read MoreFacebook Privacy and Security Info Graphic
Facebook Privacy and security cannot be taken for granted. Check out this amazing info graphic to learn how to keep...
Read MoreTarget Data Breach Touches 40 Million In-Store Shoppers
40 million customers who have used a credit or debit card at Target stores in the US between11/27 and 12/15...
Read More10 Times NOT To Use Your Debit Cards this Holiday Season!
This holiday season, consider leaving your debit card at home for safety reasons. If you can't here are some tips...
Read MoreFinland, Vodka & the Allure of Introversion
There I was, an extrovert taken in by one of the world’s “quietest” cities, staring at my shoes until Finn...
Read MoreElder Fraud Expert Answers: How do I prevent & resolve it?
Elder fraud expert John Sileo talks about how to prevent elder fraud from happening and what to do if it...
Read MoreElder Fraud Expert Answers: What are the Most Common Schemes?
There are a variety of schemes out there for con artists and unscrupulous relatives to commit elder fraud against senior...
Read MoreElder Fraud Expert Answers: Why Are Senior Citizens Targeted?
Seniors lose approximately $2.6 billion per year to elder fraud, meaning fraud by outside scammers or theft by family members...
Read MoreDoes the NSA or Google Spy More on You? [Burning Questions Ep. 4]
Google's chairman says we need to do a better job defending our privacy against the NSA. Interesting coming from a...
Read MoreMobile Device Statistics on Our Children
Do you let your 2 year old play with a mobile device? See how many other parents do in these...
Read MoreCryptoLocker Alert: A Virus You Need to Understand
CryptoLocker - undetectable by most anti-virus programs, will lock all of your files and demand a ransom before you have...
Read MoreHoGo Document Protection: 10 Questions w/ Digital Privacy Expert John Sileo
Mike Spinney and HoGo Data Protection took a few minutes out of their day to interview me for their blog...
Read MorePrivacy Expert: NSA Intercepting Your Address Books, Buddy Lists
What makes a privacy expert nervous? To glimpse the magnitude of our personal information being collected by our government beneath...
Read MoreEngaging Keynote Speaker / Healthcare Speaker for Hospital Associations
Engaging Keynote Speaker John Sileo is frequently brought in for hospital associations, healthcare conference and medical events. Watch him at...
Read MoreDigital Footprint: Exposing Your Secrets, Eroding Your Privacy
NPR hosted a 4 part series on how you are being digitally tracked. This summary shows the implications for the...
Read MoreWelcome to the Surveillance Economy!
The Surveillance Economy is upon us! Automatic license plate readers use small, high-speed cameras to photograph thousands of license plates...
Read MoreHow Do I Stop Obamacare Identity Theft? [Burning Questions Ep. 3]
Health Exchanges anchor Obamacare. But do they increase your chances of becoming a victim of "Obamacare identity theft"? Here's how...
Read MoreCyber Security Webinar: What You Absolutely, Positively Need to Know (10/3/13)
In this FREE Deluxe Webinar, Cyber Security: What You Absolutely, Positively Need to Know, you will learn changes you must...
Read MoreMedical Identity Theft Expert John Sileo on Fox
Medical identity theft expert John Sileo joins Fox and Friends to talk about whether Medical ID theft can actually kill...
Read MoreCan Medical Identity Theft Really Kill You? [Burning Questions Ep. 2]
There has been a great deal in the news about medical identity theft leading to death. Is it possible? Yes....
Read MoreDoes Homeland Security’s Seizure of Electronic Devices Cross the Border?
When you cross international borders, your digital devices can be confiscated, scanned and analyzed without a search warrant? Why should...
Read MoreHow Do I Delete My Facebook Account? [Burning Questions Ep. 1]
It's amazing how many people ask me at the end of a speech or TV interview, "How do I delete...
Read MoreSileo Speaking at NAFCU Technology and Security Conference
John Sileo is speaking at NAFCU Technology &Security Conference. Join us in Vegas for some fun and really get into...
Read MoreInternet Privacy & Kids: Social Network Monitoring in Schools
Whose job is it to provide social network monitoring of our kids’ posts? It's easy to blame the schools and...
Read MoreHigher Education Features Cyber Security Expert John Sileo
Higher Ed is getting much more savvy about training it's students, faculty, alumni & administration on data security, information privacy...
Read MoreFacebook Privacy: New Data Use Policy Banks on User Laziness
Facebook's proposed data use policy flaunts your addiction to their site, knowing you will likely do nothing about it. They'll...
Read MoreInterview with Reputation.com on Business Identity Fraud and Online Reputation
Learn the answers to questions businesses have about protecting their online reputation and preventing business fraud in this interview with...
Read MoreFinancial Planners: Give Your Clients Mobile Security this Holiday Season
Protect your clients during the holidays! Host an event on their behalf to help them lock down their online privacy,...
Read MoreBaby Cam Hacked: What You Can Do To Protect Yourself and Your Children
Just like with any device, an iPhone, laptop, home Wi-Fi, it's only as secure as you make it. If you've...
Read MoreMobile Security Webinar: Defending Your Digital Devices (8/15/13)
Mobile Security Webinar: Defending the Devices that Power Your Productivity Admit it. You compute almost as much on mobile devices...
Read MoreCongress Fails to Limit NSA Surveillance Using Patriot Act Loophole
Are you comfortable with the NSA Surveillance program that allows the government to snoop through your phone call & email...
Read MoreHacking Google Glass Privacy – the Tip of the Iceberg (with SNL video)
Is there such a thing as Google Glass Privacy? How do you feel about someone else being able to film...
Read MoreID Experts Infographic on Data Breach Trends
Data breaches are expected to escalate with the looming threats of organized crime, corporate espionage and cyberterrorism: learn who and...
Read MoreHow To Turn Off Facebook Graph Search
Facebook Graph Search is the Google-like search engine that indexes and shares all of your public posts, photos and Likes....
Read MoreIs Your Privacy Being Threatened by Drone Use?
The United States has used drones over US airspace to help track terrorist plots. Should we be afraid of drones...
Read MoreKeeping Grounded When the Surveillance Accusations Start to Fly
Should you quit the big Internet companies in light of the NSA surveillance scandal? We encourage you to research all...
Read MoreTalking Surveillance Once Again–Know Your Phone Carrier More Precisely
Mobile phone companies, scrambling to stay relevant, are hoping to generate new sources of revenue by selling your confidential data....
Read MoreSnowden chills in Hong Kong as we boil like frogs in a stew of NSA surveillance
Is Snowden’s exposure of NSA surveillance the action of a traitor, or those of a sacrificial frog willing to take...
Read MoreOnline Privacy and Teens: Help Them Care if They Don't
Teens are sharing more online than ever, but don't always think about their online privacy.
Read MoreSummer School for Parents: Protecting Your Kids' Social Media Privacy
School is out for the summer and the tasks that often fall upon the shoulders of your local schools are...
Read MoreWWBD? (What Would Bond Do?) Five Steps to Secure Your Business Data
Data thieves are on the lookout for valuable business data. Take these 5 steps to secure your business data.
Read MoreWill breach-proof internet eliminate need for data security training?
Although there is a great deal of excitement over the concept of a breach-proof internet, for now Data security training...
Read More