Travel Safety Tips Part 2
Identity Theft

Travel Safety Tips Part 2

This is part 2 of our series on all stages of travel safety. Learn to think like the criminals think,...
Read More
Travel Safety Tips Part 1
Identity Theft

Travel Safety Tips Part 1

Protect your identity when planning your travels by reading our comprehensive four-part series on all stages of travel safety. Learn...
Read More
Chip and PIN Credit Cards Finally Explained
Cybersecurity

Chip and PIN Credit Cards Finally Explained

On October 15, 2015, Chip and Pin credit cards will shift the burden of fraud from banks to retailers. In...
Read More
Medical Identity Theft: A Modern Day Plague
Identity Theft

Medical Identity Theft: A Modern Day Plague

While experiencing medical identity theft isn’t always as devastating as dying from the plague, it’s easy to draw some parallels.
Read More
Top Tips to Stop Tax-time Identity Theft – Part 1
Identity Theft

Top Tips to Stop Tax-time Identity Theft – Part 1

Tax time identity theft is rampant. Here's what you need to know in a 3 part series to protect your...
Read More
Data Breach Experts to Board of Directors: Wake the Hell Up
Cybersecurity

Data Breach Experts to Board of Directors: Wake the Hell Up

One of my favorite data breach experts, Larry Ponemon, issued a report with Raytheon that corporate boards of directors should...
Read More
3 Key Protections for Anthem Breach Victims
Cybersecurity Identity Theft

3 Key Protections for Anthem Breach Victims

Are you a victim of the Anthem breach? If so, you can minimize the possible damage that can be done...
Read More
Sony Cyber Attack: A Case Study in Cyber Leadership Failure
Cybersecurity Online Privacy

Sony Cyber Attack: A Case Study in Cyber Leadership Failure

Sony's embarrassing data breach is our classroom. Cyber Leadership is a topic that we wrongly discuss AFTER the attack. Read...
Read More
Cyber Security Expert Sileo on Check Fraud Scams
Social Engineering

Cyber Security Expert Sileo on Check Fraud Scams

Beware of a new check fraud scam where an unsolicited check arrives for you in the mail. If you cash...
Read More
Beware Cyber Security Grinches & Holiday Scams
Cybersecurity Identity Theft

Beware Cyber Security Grinches & Holiday Scams

Beware of holiday scams that come around this time of year. Let us teach you how to protect your information...
Read More
Cyber Espionage’s Latest Target?  Your Baby Cam!
Cybersecurity

Cyber Espionage’s Latest Target? Your Baby Cam!

A Russian website streaming footage from thousands of devices (such as baby monitors) reminds us of the steps we need...
Read More
USPS Breach Ironic, Moronic or Both?
Cybersecurity

USPS Breach Ironic, Moronic or Both?

USPS breach is a great example of why information is stolen that isn't going to be used for financial gain....
Read More
Android Flashlight App Shines Light on Your Data
Identity Theft

Android Flashlight App Shines Light on Your Data

Android flashlight apps collect unnecessary user data and accesses areas of the device completely unrelated to the purpose of the...
Read More
Ebola & Cybergeddon: Why the Novelty Could Kill You
Cybersecurity

Ebola & Cybergeddon: Why the Novelty Could Kill You

Ebola is a magnet for media attention, even in countries with few casualties. Is the prospect of cybergeddon informed by...
Read More
After Dropbox Breach, Is It Safe to Use? (Snowden Would Say No)
Cybersecurity Online Privacy

After Dropbox Breach, Is It Safe to Use? (Snowden Would Say No)

Is the Dropbox Breach something to worry about? Dropbox denies a breach, but even if it wasn't technically hacked, the...
Read More
GameOver Zeus Virus Test
Cybersecurity Identity Theft

GameOver Zeus Virus Test

The GameOver Zeus Virus can intercept and send out your bank account numbers and passwords. Here's how to test for...
Read More
Is Home Depot Data Breach an Example of the “New Normal”?
Cybersecurity Social Engineering

Is Home Depot Data Breach an Example of the “New Normal”?

The Home Depot Data Breach shows that retailers and consumer alike have given in to complacency - we lose interest...
Read More
Apple Pay Makes Mobile Payments Sexy; But Secure?
Cybersecurity

Apple Pay Makes Mobile Payments Sexy; But Secure?

Apple Pay has done what others who have tried mobile wallet concepts in the past have not: they’ve made it...
Read More
Anti-SPAM Software
Social Engineering

Anti-SPAM Software

Want to know one of the best ways to get rid of email scams? Get rid of the emails by...
Read More
iCloud Hacked for Nude Jennifer Lawrence Photos? How to Keep from Being Next
Cybersecurity

iCloud Hacked for Nude Jennifer Lawrence Photos? How to Keep from Being Next

Celebrity accounts being hacked is just the tip of the iceberg of cloud-based security hacks. Learn how to keep yourself...
Read More
US Companies Face Cyber Attacks; Live in a State of Cyberseige
Cybersecurity

US Companies Face Cyber Attacks; Live in a State of Cyberseige

Chase Bank is the latest in the cyber attack / cyberseige playing field. Why? A number of factors.
Read More
Data Breach Expert on UPS Breach (Same ol Same ol)
Cybersecurity

Data Breach Expert on UPS Breach (Same ol Same ol)

After UPS Breach, Homeland Security has warned US retailers that malicious software that allows hackers to steal customer financial data...
Read More
3 Steps to Stop Wallet / Purse Identity Theft
Identity Theft

3 Steps to Stop Wallet / Purse Identity Theft

Identity theft prevention starts with the IDs we carry with us every day in purses and wallets. Protect those and...
Read More
Inheritance Scam: Detection Questions You Should Ask!
Identity Theft News & Media

Inheritance Scam: Detection Questions You Should Ask!

We have developed five questions you should ask about any email or phone call you suspect might be a scam....
Read More
A Smarter Solution for Thief-Proof Passwords
Identity Theft Online Privacy Product Reviews

A Smarter Solution for Thief-Proof Passwords

One of the first recommendations I make to my corporate and individual clients alike is to utilize a password manager...
Read More
EMV Security is Coming, Ready or Not (And You’d Better Be!)
Identity Theft

EMV Security is Coming, Ready or Not (And You’d Better Be!)

Almost half of the world’s credit card fraud now happens in the United States; EMV security measures aim to curtail...
Read More
Data Breach Expert’s Pragmatic View on PF Chang’s News
Cybersecurity

Data Breach Expert’s Pragmatic View on PF Chang’s News

Data breach expert John Sileo weighs in on what's bound to happen in the wake of the P.F. Chang's data...
Read More
Facebook Using Your Likes, Browsing History & Mood Manipulation
Online Privacy

Facebook Using Your Likes, Browsing History & Mood Manipulation

Facebook is using every tool in their arsenal to boost ad effectiveness, including your Likes, Apps and even mood manipulation.
Read More
5 Ways to Doom Your Next Cyber Security Summit (Cyber Security Speakers Like Ambien)
Cybersecurity

5 Ways to Doom Your Next Cyber Security Summit (Cyber Security Speakers Like Ambien)

Boring Cyber Security Speakers are a meeting pro's nightmare, an IT department’s budget-buster & an organization’s fast track to breach....
Read More
Security Keynote Speaker on Rachael Ray, 60 Minutes…
Cybersecurity

Security Keynote Speaker on Rachael Ray, 60 Minutes…

Tired of boring security keynote speakers? This is a sampling of national television shows that security keynote speaker John Sileo...
Read More
Facebook Privacy Settings Get Needed Update
Online Privacy

Facebook Privacy Settings Get Needed Update

It took losing customers to get a significant update to Facebook privacy settings. Lesson: serve your customers well and they...
Read More
Internet Privacy Expert Reviews DuckDuckGo Private Search Engine
Online Privacy

Internet Privacy Expert Reviews DuckDuckGo Private Search Engine

How an Internet privacy expert uses DuckDuckGo.com to foil Google's ability to track, aggregate and sell every term searched online.
Read More
Heartbleed: There’s Always a Fee Behind Free
Cybersecurity

Heartbleed: There’s Always a Fee Behind Free

Want a perfect example of the security maxim - "you get what you pay for"? The recent Heartbleed Bug incident...
Read More
3 C-Suite Lessons from Target CEO Resignation
Cybersecurity

3 C-Suite Lessons from Target CEO Resignation

The Target CEO Resignation of Gregg Steinhafel had better be a wakeup call to you and your organization. Learn from...
Read More
5 Steps to Stop Lost Wallet Identity Theft
Identity Theft

5 Steps to Stop Lost Wallet Identity Theft

Feeling the panic of a lost wallet or missing purse? Scared you might become a victim of identity theft? Take...
Read More
Microsoft Warns of Internet Explorer Security Gap
Identity Theft

Microsoft Warns of Internet Explorer Security Gap

Internet Explorer security gap allows attackers to gain the same user rights as the current user. Read recommendations of what...
Read More
Identity Theft Victim? YOUR NEXT 3 MOVES ARE ABSOLUTELY CRITICAL!
Identity Theft

Identity Theft Victim? YOUR NEXT 3 MOVES ARE ABSOLUTELY CRITICAL!

Are you an identity theft victim? Had your purse stolen or lost your wallet? Your next steps are critical, and...
Read More
How do I Get Businesses to Ask For Photo ID?
Identity Theft

How do I Get Businesses to Ask For Photo ID?

Having trouble getting businesses to ask for your photo ID even though you've written it on the back of your...
Read More
How to Keep the Heartbleed Bug from Hacking Your Bank Account
Identity Theft

How to Keep the Heartbleed Bug from Hacking Your Bank Account

Your banking passwords are likely at risk due to the Heartbleed Bug, which enders the little lock symbol in your...
Read More
Over 90% of Rachael Ray Show Audience Faces Identity Theft Risks
Identity Theft

Over 90% of Rachael Ray Show Audience Faces Identity Theft Risks

Do you face the same type of identity theft risks these audience members did on The Rachael Ray Show?
Read More
Jimmy Carter Exposes 1 of 2 Non-Secrets of World’s Most Powerful People
Online Privacy

Jimmy Carter Exposes 1 of 2 Non-Secrets of World’s Most Powerful People

How do the world's most powerful, wealthy and well connected people keep their lives more private than you? Ask Jimmy...
Read More
Latest Tax Scams "Target" Data Breach Victims
Identity Theft

Latest Tax Scams "Target" Data Breach Victims

Identity theft once again tops the “Dirty Dozen” tax scams put forth by the IRS for 2014. Data breach victims...
Read More
Facebook knows what you said, EVEN IF YOU DELETE B4 POSTING!
Online Privacy

Facebook knows what you said, EVEN IF YOU DELETE B4 POSTING!

Do you ever engage in self-censorship on Facebook? Most of us do, & Facebook is watching EXACTLY what you delete...
Read More
Netflix Users: Don’t Fall Hook, Line, & Sinker for Latest Phishing Scheme
Identity Theft

Netflix Users: Don’t Fall Hook, Line, & Sinker for Latest Phishing Scheme

Netflix users are being fooled by the same old phishing scam in new clothes.
Read More
Is the CIA Spying on the Senate?
Cybersecurity

Is the CIA Spying on the Senate?

What does it mean if we have the CIA spying on the Senate? In short, an erosion of democratic principles...
Read More
Target Breach Leaves Profits Down 50% – Proof Enough?
Cybersecurity

Target Breach Leaves Profits Down 50% – Proof Enough?

Will the Target Breach cost the company more than what it would have cost to prevent it? With earnings down...
Read More
Identity Theft Speaker Says Fraud from Target Breach is Your Fault (As of Today)
Cybersecurity

Identity Theft Speaker Says Fraud from Target Breach is Your Fault (As of Today)

The Target Data Breach was Target's Fault. But if you've done nothing to protect yourself, identity theft speaker John Sileo...
Read More
Sileo on Fox: Google + DeepMind Artificial Intelligence
News & Media Online Privacy

Sileo on Fox: Google + DeepMind Artificial Intelligence

Is Google spying on us even more than the NSA? https://192.241.219.145/google-big-brother/ Google spies on us in far more complex ways...
Read More
Biometrics are Like Passwords You Leave EVERYWHERE
Cybersecurity

Biometrics are Like Passwords You Leave EVERYWHERE

Biometrics seem like the silver bullet of identity theft prevention, right? They will replace passwords, no? Actually, they just might...
Read More
NSA Angry Birds Help the Government Spy on Your Intimate Details
Cybersecurity Online Privacy

NSA Angry Birds Help the Government Spy on Your Intimate Details

Guess who's been spying on you all along? NSA Angry Birds and other "leaky" apps on your mobile devices. And...
Read More
Identity Theft Expert John Sileo on The Rachael Ray Show
Cybersecurity News & Media

Identity Theft Expert John Sileo on The Rachael Ray Show

Identity Theft Expert John Sileo will be appearing on CBS's The Rachael Ray Show this Wednesday, January 29 to talk...
Read More
How do the RICH protect their Online Accounts?
Online Privacy

How do the RICH protect their Online Accounts?

Everyone should be able to protect their money like the wealthy. So here's a simple guide to two-step authentication, which...
Read More
Cybersecurity News & Media

Data Security Expert John Sileo on Fox Business (Target Data Breach)

Were you part of the Target data breach? Data Security Expert John Sileo goes on Fox Business to help you...
Read More
Identity Theft News & Media

Data Breach Expert John Sileo on Fox & Friends – Target Data Breach

http://www.youtube.com/watch?v=EY8S8Ssfzgw Data Breach Expert John Sileo goes on Fox & Friends to discuss the 110 million records breached at Target.
Read More
Identity Theft

Identity Theft Speaker Shares Latest Statistics on Cost of ID Theft

In the latest National Crime Victimization Survey, identity theft cost Americans more than all other property crimes combined; to be...
Read More
Top Tips for Tax ID Theft Prevention: Part 3
Identity Theft

Top Tips for Tax ID Theft Prevention: Part 3

Stop falling for IRS and tax-related scams that lead to tax ID theft. Because we are distracted during tax season,...
Read More
Snapchat Hacked? Duh! Of Course It Was.
Cybersecurity Online Privacy

Snapchat Hacked? Duh! Of Course It Was.

Snapchat hacked? Who would have ever thought that Snapchat would be the next huge breach victim? (Everyone paying attention)
Read More
Online Privacy

Do Fitness Apps Share Your Health w/ Others (Insurance Co's)?

There are considerable privacy risks for users of mobile health & fitness apps. Assume that your health data is being...
Read More
Data Privacy Expert on the Irony of Dictionary.com’s Word of the Year
Cybersecurity Online Privacy

Data Privacy Expert on the Irony of Dictionary.com’s Word of the Year

Data Privacy Expert finds it ironic that Dictionary.com's word of the year is something they fail to practice.
Read More
Online Privacy

Facebook Privacy and Security Info Graphic

Facebook Privacy and security cannot be taken for granted. Check out this amazing info graphic to learn how to keep...
Read More
Identity Theft News & Media Social Engineering

Target Data Breach Touches 40 Million In-Store Shoppers

40 million customers who have used a credit or debit card at Target stores in the US between11/27 and 12/15...
Read More
Identity Theft Social Engineering

10 Times NOT To Use Your Debit Cards this Holiday Season!

This holiday season, consider leaving your debit card at home for safety reasons. If you can't here are some tips...
Read More
Cybersecurity

Finland, Vodka & the Allure of Introversion

There I was, an extrovert taken in by one of the world’s “quietest” cities, staring at my shoes until Finn...
Read More
Social Engineering

Elder Fraud Expert Answers: How do I prevent & resolve it?

Elder fraud expert John Sileo talks about how to prevent elder fraud from happening and what to do if it...
Read More
Social Engineering

Elder Fraud Expert Answers: What are the Most Common Schemes?

There are a variety of schemes out there for con artists and unscrupulous relatives to commit elder fraud against senior...
Read More
Social Engineering

Elder Fraud Expert Answers: Why Are Senior Citizens Targeted?

Seniors lose approximately $2.6 billion per year to elder fraud, meaning fraud by outside scammers or theft by family members...
Read More
Online Privacy

Does the NSA or Google Spy More on You? [Burning Questions Ep. 4]

Google's chairman says we need to do a better job defending our privacy against the NSA. Interesting coming from a...
Read More
Uncategorized

Mobile Device Statistics on Our Children

Do you let your 2 year old play with a mobile device? See how many other parents do in these...
Read More
CryptoLocker Alert: A Virus You Need to Understand
Uncategorized

CryptoLocker Alert: A Virus You Need to Understand

CryptoLocker - undetectable by most anti-virus programs, will lock all of your files and demand a ransom before you have...
Read More
HoGo Document Protection: 10 Questions w/ Digital Privacy Expert John Sileo
Identity Theft

HoGo Document Protection: 10 Questions w/ Digital Privacy Expert John Sileo

Mike Spinney and HoGo Data Protection took a few minutes out of their day to interview me for their blog...
Read More
Online Privacy

Privacy Expert: NSA Intercepting Your Address Books, Buddy Lists

What makes a privacy expert nervous? To glimpse the magnitude of our personal information being collected by our government beneath...
Read More
Engaging Keynote Speaker / Healthcare Speaker for Hospital Associations
Cybersecurity Identity Theft Online Privacy

Engaging Keynote Speaker / Healthcare Speaker for Hospital Associations

Engaging Keynote Speaker John Sileo is frequently brought in for hospital associations, healthcare conference and medical events. Watch him at...
Read More
Online Privacy

Digital Footprint: Exposing Your Secrets, Eroding Your Privacy

NPR hosted a 4 part series on how you are being digitally tracked. This summary shows the implications for the...
Read More
News & Media Online Privacy

Welcome to the Surveillance Economy!

The Surveillance Economy is upon us! Automatic license plate readers use small, high-speed cameras to photograph thousands of license plates...
Read More
Identity Theft Video Tips

How Do I Stop Obamacare Identity Theft? [Burning Questions Ep. 3]

Health Exchanges anchor Obamacare. But do they increase your chances of becoming a victim of "Obamacare identity theft"? Here's how...
Read More
Cyber Security Webinar: What You Absolutely, Positively Need to Know (10/3/13)
Cybersecurity Identity Theft Social Engineering

Cyber Security Webinar: What You Absolutely, Positively Need to Know (10/3/13)

In this FREE Deluxe Webinar, Cyber Security: What You Absolutely, Positively Need to Know, you will learn changes you must...
Read More
Identity Theft News & Media

Medical Identity Theft Expert John Sileo on Fox

Medical identity theft expert John Sileo joins Fox and Friends to talk about whether Medical ID theft can actually kill...
Read More
Identity Theft Video Tips

Can Medical Identity Theft Really Kill You? [Burning Questions Ep. 2]

There has been a great deal in the news about medical identity theft leading to death. Is it possible? Yes....
Read More
Cybersecurity News & Media

Does Homeland Security’s Seizure of Electronic Devices Cross the Border?

When you cross international borders, your digital devices can be confiscated, scanned and analyzed without a search warrant? Why should...
Read More
Online Privacy

How Do I Delete My Facebook Account? [Burning Questions Ep. 1]

It's amazing how many people ask me at the end of a speech or TV interview, "How do I delete...
Read More
Cybersecurity

Sileo Speaking at NAFCU Technology and Security Conference

John Sileo is speaking at NAFCU Technology &Security Conference. Join us in Vegas for some fun and really get into...
Read More
Uncategorized

Internet Privacy & Kids: Social Network Monitoring in Schools

Whose job is it to provide social network monitoring of our kids’ posts? It's easy to blame the schools and...
Read More
Identity Theft

Higher Education Features Cyber Security Expert John Sileo

Higher Ed is getting much more savvy about training it's students, faculty, alumni & administration on data security, information privacy...
Read More
Online Privacy

Facebook Privacy: New Data Use Policy Banks on User Laziness

Facebook's proposed data use policy flaunts your addiction to their site, knowing you will likely do nothing about it. They'll...
Read More
Uncategorized

Interview with Reputation.com on Business Identity Fraud and Online Reputation

Learn the answers to questions businesses have about protecting their online reputation and preventing business fraud in this interview with...
Read More
Uncategorized

Financial Planners: Give Your Clients Mobile Security this Holiday Season

Protect your clients during the holidays! Host an event on their behalf to help them lock down their online privacy,...
Read More
Baby Cam Hacked: What You Can Do To Protect Yourself and Your Children
Cybersecurity

Baby Cam Hacked: What You Can Do To Protect Yourself and Your Children

Just like with any device, an iPhone, laptop, home Wi-Fi, it's only as secure as you make it. If you've...
Read More
Cybersecurity Identity Theft

Mobile Security Webinar: Defending Your Digital Devices (8/15/13)

Mobile Security Webinar: Defending the Devices that Power Your Productivity Admit it. You compute almost as much on mobile devices...
Read More
Congress Fails to Limit NSA Surveillance Using Patriot Act Loophole
Cybersecurity Identity Theft

Congress Fails to Limit NSA Surveillance Using Patriot Act Loophole

Are you comfortable with the NSA Surveillance program that allows the government to snoop through your phone call & email...
Read More
Cybersecurity Online Privacy

Hacking Google Glass Privacy – the Tip of the Iceberg (with SNL video)

Is there such a thing as Google Glass Privacy? How do you feel about someone else being able to film...
Read More
Cybersecurity Identity Theft

ID Experts Infographic on Data Breach Trends

Data breaches are expected to escalate with the looming threats of organized crime, corporate espionage and cyberterrorism: learn who and...
Read More
Online Privacy

How To Turn Off Facebook Graph Search

Facebook Graph Search is the Google-like search engine that indexes and shares all of your public posts, photos and Likes....
Read More
Cybersecurity News & Media

Is Your Privacy Being Threatened by Drone Use?

The United States has used drones over US airspace to help track terrorist plots. Should we be afraid of drones...
Read More
Cybersecurity News & Media Online Privacy Uncategorized

Keeping Grounded When the Surveillance Accusations Start to Fly

Should you quit the big Internet companies in light of the NSA surveillance scandal? We encourage you to research all...
Read More
Cybersecurity Identity Theft Online Privacy Uncategorized

Talking Surveillance Once Again–Know Your Phone Carrier More Precisely

Mobile phone companies, scrambling to stay relevant, are hoping to generate new sources of revenue by selling your confidential data....
Read More
Cybersecurity Online Privacy

Snowden chills in Hong Kong as we boil like frogs in a stew of NSA surveillance

Is Snowden’s exposure of NSA surveillance the action of a traitor, or those of a sacrificial frog willing to take...
Read More
Online Privacy

Online Privacy and Teens: Help Them Care if They Don't

Teens are sharing more online than ever, but don't always think about their online privacy.
Read More
Online Privacy Uncategorized

Summer School for Parents: Protecting Your Kids' Social Media Privacy

School is out for the summer and the tasks that often fall upon the shoulders of your local schools are...
Read More
Cybersecurity Identity Theft Social Engineering

WWBD? (What Would Bond Do?) Five Steps to Secure Your Business Data

Data thieves are on the lookout for valuable business data. Take these 5 steps to secure your business data.
Read More
Will breach-proof internet eliminate need for data security training?
Cybersecurity

Will breach-proof internet eliminate need for data security training?

Although there is a great deal of excitement over the concept of a breach-proof internet, for now Data security training...
Read More