What is a Keylogger?

Whether it is called a keylogger, spyware or monitoring software, it can be the equivalent of digital surveillance, revealing every click and touch, every download and conversation.

A keylogger (short for keystroke logger) is software that tracks or logs the keys struck on your keyboard, typically in a covert manner so that you don’t know that your actions are being monitored. This is usually done with malicious intent to collect your account information, credit card numbers, user names, passwords, and other private data.

Legitimate uses do exist for keyloggers. Parents can monitor their children’s online activity or law enforcement may use it to analyze and track incidents linked to the use of personal computers, and employers can make sure their employees are working instead of surfing the web all day.

Nevertheless, keyloggers can pose a serious threat to users, as they can be used to intercept passwords and other confidential information entered via the keyboard. As a result, cybercriminals can get PIN codes and account numbers for your financial accounts, passwords to your email and social networking accounts and then use this information to take your money, steal your identity and possibly extort information and money from your friends and family.

How would I get a keylogger?

Keyloggers spread in much the same way that other malicious programs spread. Excluding cases where keyloggers are purchased and installed by a jealous spouse or partner, and the use of keyloggers by security services, keyloggers are installed on your system when you open a file attachment that you received via email, text message, P2P networks, instant message or social networks. Keyloggers can also be installed just by you visiting a website if that site is infected.

How do you detect a keylogger?
Keyloggers are tricky to detect. Some signs that you may have a keylogger on your device include: slower performance when web browsing, your mouse or keystrokes pause or don’t show up onscreen as what you are actually typing or if you receive error screens when loading graphics or web pages.

What can you do to protect yourself?

Just as you maintain your own health on a daily basis by eating well-balanced meals, getting plenty of rest and exercising, you must also maintain your computer or mobile device’s health. That means avoiding keyloggers by avoiding actions that could negatively affect your computer, smartphone or tablet, like visiting dangerous websites or downloading infected programs, videos or games. Here are some tips:

Use caution when opening attachments – files received via email, P2P networks, chat, social networks, or even text messages (for mobile devices) can be embedded with malicious software that has a keylogger.

Watch your passwords – Consider using one-time passwords and make sure key sites you log into offer two-step verification. You could also use a password manager like McAfee SafeKey that is available with McAfee LiveSafe™ service, which will automatically remember your user name and passwords, but also prevent keylogging since you are not typing in any information on the site as the password manager will do that for you.

Try an alternative keyboard layout – Most of the keylogger software available is based on the traditional QWERTY layout so if you use a keyboard layout such as DVORAK, the captured keystrokes does not make sense unless converted.

Use a comprehensive security solution – Protect all your devices—PCs, Macs, smartphones and tablets—with a solution like McAfee LiveSafe, that offers antivirus, firewall, as well as identity and data protection.

Robert Siciliano is an Online Security Evangelist to McAfee. Watch him discussing information he found on used electronic devices YouTube. (Disclosures)

Cheating and Bullying: It’s a Bigger Problem than You Think!

The whole purpose of your “youth” is to grow and learn. It’s time to take in lots of information, so ultimately they can evolve, accomplish, and get ahead. However the pressure to grow and climb the ladder of life often leads to unwanted behaviors and actions that lead to significant negative consequences. And with everyone being online these days, it only adds to these consequences.

Technology has really added fuel to the fire for two well-known tween-teenage activities: bullying and cheating. Bullying has moved from the playground to online and cheating has a whole new realm beyond writing information on your hand or arm.

According to McAfee’s 2013 Digital Deception: Exploring the Online Disconnect between Parents and Kids study, children are witnessing bullying online in great numbers and parents are not fully aware of the issues. Additionally, children are continuing to find ways to use technology to cheat, while only half of the parents of cheating kids believed they had done so.

Cyberbullying

Social media isn’t all fun and games – 89% of all youth (ages 10-23) surveyed say they witnessed mean behavior on Facebook and 40% on Twitter.

Kids don’t outgrow bullying – 17% of children ages 10-12 say they have witnessed mean behavior directed at a classmate or friend online, but that number jumps to 34% for young adults ages 18-23.

Parents don’t know the full extent of the problem – Only 9% of parents believe their child or children have witnessed cruel behavior online; even worse, only 6% think that their son or daughter has been a target of this cyber bullying, when in reality 13% of youth report they have been targeted online.

Peer pressure spreads to the Internet – 4% of youth said they’ve been pressured into bullying someone online.

Cheating

It’s a bigger problem than you think – More than half of all 13-23 year olds surveyed admitted to looking up the answer to a test or assignment online; only 17% of parents believe their child has done so.

Smartphones are making us dumber – While only 10% of 10-12 year olds said they had cheated on at test using a cell phone, this percentage doubles when looking at 18-23 demographic.

The Internet is teaching kids things you don’t want them to know – Only 2% of parents believe their child has ever cheated on a test using a technique they found online when in reality more than 1 in every 10 youth surveyed admitted to doing so.

Growing up is hard to do – More than a quarter of young adults ages 18-23 cheated with help from technology as opposed to 14% of 10-12 year olds.

So what do we as parents do to help change this negative behaviors? We must stay in-the-know. Since your kids have grown up in an online world, they may be more online savvy than you, but you can’t give up. You must challenge yourselves to become familiar with the complexities of the teen online universe and stay educated on the various devices your teens are using to go online.

Make sure you talk to your kids about Internet safety and what is and is not appropriate behavior online.

Establish clear guidelines that you all agree on including time spent online, and what type of content is ok post online.

Teach your kids to recognize cyberbullying and encourage them to talk to you about it.

Learn what your kids are doing with their mobile devices while they are in and out of school. It may surprise you to know how much time they are spending on them.

Consider using tools to help keep your kids safe online and support family Internet rules. Parental control software such as McAfee Safe Eyes lets you protect your kids from inappropriate sites and stay informed about their online activities.

Robert Siciliano is an Online Security Expert to McAfee. He is the author of 99 Things You Wish You Knew Before Your Mobile was Hacked!  (Disclosures)

 

What is a Mobile Botnet?

The word botnet is short for robot network, a group of internet-connected computers that have been infected by a malicious application. The malware allows a hacker to control the infected computers without alerting the computers’ owners. Since the infected computers are controlled remotely, they are known as bots, robots or zombies.

When a virus recruits an infected computer and converts it into a botnet, a criminal hacker is able to remotely control that computer, install other malware and access all the data on that computer. For example, the so-called Zeus botnet malware can collect your banking and login credentials and use them to impersonate you or take money from your account.

Mobile botnets give criminals some advantages over PC-based botnets. First, the devices attach to many different networks, including business networks, making them a good carrier for infecting other devices. Second, the devices can be controlled using text messages, which are small, efficient and always get delivered.

McAfee Labs points out:

Due to their wide choice of hardware, botnets can initiate more types of attacks (voice, video, GPS) and serve as launch pads for infections of other computers via any connection (PC, WiFi, Bluetooth, SD card, USB, etc.).

Keep your device from becoming part of a mobile botnet:

  • Use antimalware, antivirus and antispyware on your mobile device.
  • Often, botnets’ malware comes as part of an app, so only install apps from reputable app stores.
  • Keep an eye on your monthly bill. If you start unexpectedly seeing a spike up in text messages received or data charges, call your carrier to investigate.
  • Install Hotspot Shield VPN. Hotspot Shield VPN is a versatile internet security and privacy solution. In addition to protecting you from dangerous online threats, it also protects your privacy and enables you to access any blocked websites and content.

Robert Siciliano is an Identity Theft Expert to Hotspot Shield VPN. He is the author of 99 Things You Wish You Knew Before Your Identity Was Stolen See him discussing internet and wireless security on Good Morning AmericaDisclosures.

The Benefits of Having Keyless Locks

You already know what a keyless lock is. It’s simply a “combination lock,” but much more advanced and sophisticated than the ones you had on your high school locker. The old combo locks required three turns in a clockwise/counterclockwise direction to open. Combo locks are cumbersome, confusing and sometimes don’t pass the “grandmother test”.

But today’s keyless locks are push button or touch pads numbered 0-9, like a telephone keypad or ATM. Newer-model automobiles have keyless locks too. Pressing “1276” is much easier for Grandma, and she doesn’t have to worry about fumbling around for or losing her keys. (And, just like combo locks and automobiles, keyless locks also have a key as a backup.)

When going keyless, there are no more keys to lose, hide, carry or forget, so you can secure your home while you run or walk around the neighborhood. I run and used to have to wear a small runner’s pouch just to keep my house key on my person, but not anymore.

Schlage’s Touchscreen Deadbolt is the best keyless lock out there. It’s a motorized bolt that automatically locks and unlocks when a four-digit user code is entered and its lock-and-leave functionality requires only one touch to instantly safeguard the home.

Every aspect of the Touchscreen Deadbolt has been designed with homeowners’ security in mind. Backed by more than 90 years of inventive Schlage design, the Touchscreen Deadbolt delivers an American National Standards Institute (ANSI) grade 1 security rating, the highest residential rating awarded on the market, as certified by Builders Hardware Manufacturers Association (BHMA).

The Touchscreen Deadbolt can hold up to 30 unique access codes and is designed to support temporary codes for homeowner convenience. For example, codes can be tailored to specific days and times of the week to provide home access only when scheduled, such as for cleaning service personnel.

Built-in Alarm Lock Technology

Keeping families safe, the Touchscreen Deadbolt is armed with built-in alarm technology, sensing a range of activity and alerting homeowners with three different automated sounds for three different situations. For example, the Activity Alert sounds when it detects that someone is leaving or entering the house; the Tamper Alert sounds when the lock is being disturbed; and the Forced Entry Alert sounds after identifying significant pressure, such as a kick to the door or a shove to the lock.

It’s a battery-operated lock, so if the power goes out you’re still covered. The battery lasts approximately one year,

What happens when the battery is dead? Well, you’d need to use your key. However, keyless locks are pretty much idiot-proof—meaning there are numerous warning lights and alarm sounds telling you to change the battery when it’s low. My recommendation is to change your keyless locks’ batteries when you change your smoke alarm batteries which is supposed to be with Daylight Saving Time, but January 1 and July 1 are the dates I use to make my changes. Learn how to change the battery here.

Robert Siciliano home security expert to Schlage discussinghome security and identity theft on TBS Movie and a Makeover. Disclosures. For Roberts FREE ebook text- SECURE Your@emailaddress -to 411247.

5 No-brainers for Keeping Your Email Safe

It’s time to face the fact that for most of us, email is the single most important digital asset we own: more than anything else, it is our digital DNA. To some degree, email is connected to every online account we have; it contains the username, password reset, and an archive of most of our digital doings. It’s been said that if a criminal owns a person’s email, he owns the person.

With more and more people keeping tabs on their financial statements, contact information and other sensitive data via email, it’s time to double-check your email habits to see if you’re putting yourself at risk.

#1 Never use public PCs. A public computer can be likened to a public toilet. You don’t really know who’s used it before you and you don’t know what kind of virus you can catch from it. PCs in libraries, hotel business centers or internet cafés can easily have keyloggers or keycatchers installed that can steal your usernames and passwords. Checking email on an unsecured computer that you don’t have any control over is risky and, frankly, irresponsible.

#2 Use a VPN over wireless. Wireless was born to be convenient, not secure. Sniffers can read wireless communications over free public WiFi and get usernames and passwords. Always use a wireless VPN, such as Hotspot Shield, that encrypts your wireless access.

#3 Log out of your device when not in use. Staying logged in 24/7/365 is risky. Anyone that has access to your computer or mobile device at home or work can own your email. Contractors, cleaners, vendors, burglars and even a spouse can put you at risk.

#4 Delete phishing emails. Any emails you receive that request you to click links to updating accounts, shipped packages, problems with accounts or for special offers are suspect. Phishing leads to keyloggers or compromised username/passwords. If these emails end up in your spam folder, leave them there.

#5 Never click links. I only click links in emails when it’s a “confirmation” email from signing into a new account or when I’m communicating with a friend, family member, colleague or known contact who then sends me a link. Otherwise, I never click links in emails, including in online statements. I always use my favorites menu or a password manager to get where I need to go.

Robert Siciliano, is a personal security expert contributor to Just Ask Gemalto and author of 99 Things You Wish You Knew Before Your Mobile was Hacked! . Disclosures

How the Government (and Bad Guys) Intercept Electronic Data

The news of the NSA spying using PRISM should not come as a surprise to anyone in the intelligence community. Electronic spying is as normal as breathing. And when a 27-year-old American traitor with little life experience (he was 15 when 9/11 hit) blows the lid off of a current spy program, it’s time to define why and what needs protecting.

  • PRISM: This is a clandestine national security electronic surveillance program operated by the United States National Security Agency (NSA) since 2007. Much of the information collected by PRISM is done via warranted tapping into servers here in the U.S. that route lots of data overseas. Its purpose is to discover “chatter” and prevent manmade disasters.
  • ECHELON: ECHELON is a name used in global media and popular culture to describe a signals intelligence (SIGINT) collection and analysis network created to monitor the military and diplomatic communications of the Soviet Union and its Eastern Bloc allies during the Cold War in the early 1960s. The ability to intercept communications depends on the medium used, be it radio, satellite, microwave, cellular or fiber optic.
  • Cell site simulators: Slate.com reports this “equipment is designed to send out a powerful signal that covertly dupes phones within a specific area into hopping onto a fake network. The feds say they use them to target specific groups or individuals and help track the movements of suspects in real time, not to intercept communications. But by design, Stingrays, sometimes called ‘IMSI catchers,’ collaterally gather data from innocent bystanders’ phones and can interrupt phone users’ service.”
  • Remote-access Trojans: A remote-access Trojan (RAT) is a malware program that includes a back door for administrative control over the target computer. RATs are usually downloaded invisibly with a user-requested program—such as a game—or sent as an email attachment.

These are just a few of the ways data is collected/gathered/stolen. So should you be worried? If you are up to no good, yes. If you have personal information on your devices that can be used to steal your identity, yes.

However, I’m personally not concerned about data being collected by my government. I’m well aware of what I’m electronically communicating and nothing incriminates me. But what does worry me is when bad guys get hold of data via RATs and use it to take over accounts or open new accounts. Using antivirus, antispyware and a firewall is your best defense.

We can’t do much to protect ourselves from government surveillance other than simply not communicating digitally or using less popular search engines, social sites and email programs. But there are tools such as TOR and Hotspot Shield VPN that mask IP addresses and can be used to anonymize communications.

If you want to seriously hide, then using anonymizers to create accounts and then continuously communicate using them is the most effective way to go.

Robert Siciliano is an Identity Theft Expert to Hotspot Shield VPN. He is the author of 99 Things You Wish You Knew Before Your Identity Was Stolen See him discussing internet and wireless security on Good Morning AmericaDisclosures.

How the Proliferation of Mobile Devices is Impacting Consumer Security

Mobile technology is the new frontier for fraudsters.

Most of us don’t protect our smartphones or tablets—and the private information they contain—anywhere near as well as we do our wallets and PCs (even though most us would rather lose our wallets vs. our smartphones). Even the simple safeguard of a four-digit password is too much work for 62% of smartphone users, and 32% of users save their login information on their device.* It’s a simple formula for crime: no password + instant access to online accounts = fraud, identity theft and privacy loss. Maybe that’s why mobile phones were targeted in more than 40% of all robberies in New York City and 38% of all robberies in Washington, D.C. last year.**

Even without getting their hands on your device, hackers can get into and remotely control almost any mobile device, and it is frighteningly easy. Malicious software can be disguised as a picture or audio clip. When you click a link or open an attachment, malware installs on your device. Unlike early PC malware, it doesn’t ask your permission, and your device is figuratively in their hands.

How are mobile devices changing the game?

Criminals know that your mobile device is an indispensable extension of your life. Your smartphone or tablet stores some of your most private conversations and confidential information. It is your phonebook, email account, family photo album, social media connection and even your wallet, all rolled into one device. Chances are, if you own a smartphone, it is connected to your money or financial accounts in some way. For many, it’s like your right hand (or, in my case, left hand).

That smartphone is always on and always with you—connecting you to, creating, and storing important and often confidential information. That information has value to other people. Just like on your PC, software can track and record social network activities, online search behavior, chats, instant messages, emails, websites, keystrokes and program usage. It can also record bank account numbers, passwords, answers to security questions, text messages, GPS locations and more.

While it builds on the experiences of the PC, the mobile game is different. It’s more sophisticated because there is more information, and it is more fast-paced and dynamic. Things change, and they aren’t what they appear to be. You need to get out some new tools and learn some new tricks to win this one.

Protecting your devices is essential to protecting your identity. But no longer is it enough to just protect your PC with antivirus; you need to protect all your devices. Invest in a comprehensive security solution like McAfee LiveSafe™ service that includes antivirus but also protects the identity and data of you and your kids on ALL your devices.

* Javelin Strategy and Research, “Identity Fraud Rose 13 Percent in 2011 According to New Javelin Strategy & Research Report”
** http://www.informationweek.com/news/government/mobile/232900070

 

Robert Siciliano is an Online Security Expert to McAfee. He is the author of 99 Things You Wish You Knew Before Your Mobile was Hacked!  (Disclosures)

Before You Share, Ask Yourself “Is This TMI?”

Social networks and new online services make it easy to share the details of our lives, perhaps too easily. With just a few clicks, posts and messages, you can give away enough personal information to compromise your privacy and even open yourself up to identity theft.

Hackers use information you post online to try and trick you into giving up access to your email, social networking and financial accounts. And sometimes they can use the information you post online to reset your account passwords so you no longer have access to them as your pet’s name, mother’s maiden name are often the security challenge questions for online sites.

Where you went to elementary school, your favorite food, where you honeymooned, your first grade teacher, father’s middle name, mother’s maiden name, kids names, birth dates, where you vacation, your high school sweetheart, your home phone number, mobile number and even your email address: All this information, believe it or not, unfortunately, is way, way, Too Much Information (TMI).

Not sure if you are guilty of online TMI? Take a look at some of these numbers:

Consumer Reports found that 52% of social network users have posted personal information online that can increase their risk of becoming victim of a cybercrime.

McAfee’s recent study found that 95% of 18-23 year olds believe it is dangerous to post personal or intimate information (social security number, banking information about yourself, who you date, personal activities, etc.) yet 47% of them post this type of information online.1

80% of 18-24 year olds have used their smartphone to send personal or intimate text messages, emails or photos and 40% of them have asked their ex to delete intimate photos or messages and later regret sending those photos or videos.2

78%  of recently jailed burglars admitted they used social networks like Facebook, Twitter, and Foursquare to plan burglaries around their victims’ posted vacation times.3

1 in 3 employers reject applicants based on Facebook posts, according to a survey of 2,300 hiring managers released by CareerBuilder.com.

McAfee found that 20% of 18-24 year olds know someone who has been fired or they themselves were fired because of personal images or messages posted online.

Here are some tips to remember:

Don’t reveal personal information—Seriously consider why it’s needed before you post your address, phone number, Social Security number, or other personal information online.

Manage your privacy settings—At most, only friends you know in real life should be able to see details of your profile.

Change your passwords frequently—In addition to choosing passwords that are difficult to guess (try to make them at least eight characters long and a combination of letters, numbers, and symbols), remember to regularly change your passwords.

Only send personal data over a secure connection—Never shop, bank, or enter passwords or credit card numbers over public Wi-Fi or free hotspots, like in cafes or airports.

Turn off the GPS (Global Positioning Service) function on your smartphone camera—If you are going to be sharing your images online, you don’t want people to know the exact location of where you are.

Consider sharing vacation photos when you’re back home—Sharing photos of your trip and announcing you’re on vacation is fun, but it’s also announcing to would-be thieves that it’s a good time to rob your home.

Remember the Internet is forever—Even if you have the highest privacy settings, it’s good practice to consider anything you do on the Internet as public knowledge, so keep it positive.

Posting personal information and photos on networking sites can be fun and convenient, but it can also lead to identity theft, cyberbullying, or hurtful gossip. What’s more, mistakes and triumphs that used to fade over time in the real world are now archived on online for all to see. In an age when smartphones double as shopping carts, photo albums, and even personal assistants, knowing what personal information you share matters more than ever. Before you post, remember to: Stop. Think. Is this TMI?”

To join the conversation use #IsThisTMI or follow McAfee on Twitter @McAfeeConsumer or Facebook. And help spread the word about TMI by going to www.mcafee.com/TMI and learn how you can be entered to win an Intel-inspired Ultrabook™ or subscriptions to McAfee LiveSafe™ service.

1 TRU and McAfee, Online Safety survey, April 2013

2 MSI and McAfee, Love, Relationships and Technology survey, January 2013
3 http://www.friedland.co.uk/EN-GB/NEWS/Pages/Whats-your-status.aspx
4 MSI and McAfee, Love, Relationships and Technology survey, January 2013

 

Robert Siciliano is an Online Security Expert to McAfee. He is the author of 99 Things You Wish You Knew Before Your Mobile was Hacked!  (Disclosures)

Securing Your Mobile in Public Places

What would cause you more grief: your wallet being lost or stolen, or your mobile phone? I’ve read studies that showed that more people would be at a loss without their mobile device. This makes sense for a number of reasons. Your wallet itself might cost 20 bucks and the cards and IDs are free to under $50 to replace. If you have cash, well, that’s a direct loss.

But a mobile phone can cost as much as of $800 and has all your contacts and, in many cases, personal information and access to all your critical accounts such as banking and social media.

Bad guys are everywhere, and they are targeting your mobile devices to turn the information on them into cash and resell the hardware to the highest bidder.

Keep your device close

Criminals look for devices sitting on counters and tables in coffee shops, on park benches, on car consoles, sticking out of a pocket or purse, and they even steal them right from your hands as the phone is to your ear. Keep your mobile as discreet as possible and use an earbud when talking.

Lock it down with a password

Its simply irresponsible for anyone to not password protect his or her mobile devices. Thousands of devices are lost or stolen every day, and if the device isn’t password protected, then all the contacts, information and open apps can be taken over.

Use lock/locate/wipe software

Some operating systems come with software that, when the device is lost or stolen, the user can remotely lock the device, locate it with GPS and even wipe the data. There are also third-party programs that do the same thing and are often bundled with antivirus.

Install mobile security software

There was a day when PCs didn’t need antivirus; now there are millions of viruses targeting PCs. Mobile devices didn’t need antivirus either, but today there are thousands of viruses targeting mobiles.

Use a private VPN

Logging into public WiFi without any encryption puts all your information at risk. Install a wireless VPN such as Hotspot Shield. Hotspot Shield VPN is a great option that protects your entire web surfing session, securing your connection on both your home internet network and on public internet networks (both wired and wireless). Hotspot Shield’s internet security solution protects your identity by ensuring that all web transactions (shopping, filling out forms, downloads, etc.) are secured through HTTPS—the protected internet protocol.

Robert Siciliano is an Identity Theft Expert to Hotspot Shield VPN. He is the author of 99 Things You Wish You Knew Before Your Identity Was Stolen See him discussing internet and wireless security on Good Morning AmericaDisclosures.

Cops Say: ‘Check Your Locks’

Burglaries happen everywhere. But sometimes, in some places, due to numerous reasons, burglaries become more frequent and sometimes by a lot. It doesn’t matter how high or low the crime rate is in your town; it is essential to keep your home as secure as possible. Just outside of Seattle, the Quincy police department recently stated, “To help with the recent burglaries, we have compiled a list of tips to help you protect your home from being targeted.”

One thing is clear about their tips: They recommend good, strong locks on all doors.

  • Make your home look occupied and make it difficult to break in.
  • Lock all outside doors and windows before you leave the house or go to bed. Even if it is for a short time, lock your doors.
  • Keep your garage door closed and locked.
  • Don’t allow daily deliveries of mail, newspapers or flyers to build up while you are away. Arrange with the post office to hold your mail, or arrange for a friend or neighbor to take it in regularly.
  • Check your locks on doors and windows and replace them with secure devices as necessary.
  • Push-button locks on doorknobs are easy for burglars to open. Install deadbolt locks on all your outside doors like the Schlage Touchscreen Deadbolt.
  • Sliding glass doors are vulnerable. Special locks are available for better security.
  • Always lock your garden shed and garage.  
  • Use curtains on garage and basement windows.
  • Never leave notes on your door such as “Gone shopping.”
  • Change locks immediately if your keys are lost or stolen. 
  • When moving into a new home, have all locks changed. Stores like Home Depot and Lowes have great residential brands, such as Schlage.
  • Have adequate exterior lighting. A motion-sensitive light is recommended for backyards.
  • Trim trees and shrubs so that they cannot be used as hiding places for intruders.
  • An alarm system is excellent for home security. It provides peace of mind to homeowners, especially while on vacation. There are a wide variety of alarm systems on the market.
  • Never leave keys under doormats, flowerpots, mailboxes or other “secret” hiding places. Burglars know where to look for hidden keys.  
  • Keep a detailed inventory of your valuable possessions, including a description of the items, date of purchase and original value, and serial numbers, and keep a copy in a safe place away from home. This is a good precaution in case of fires or other disasters as well as burglaries. Make a photographic or video record of valuable objects, heirlooms and antiques. Your insurance company can provide assistance in making and keeping your inventory.
  • Be a good neighbor. If you notice anything suspicious in your neighborhood, call 911 immediately.
  • Join the block watch. Work with your neighbors to improve security and reduce risk of burglary.

For residents who arrive home to find an unexplained open/broken window or door:

  • Do not enter—the perpetrator may still be inside.
  • Use a cell phone (or a neighbor’s phone) to call police.
  • Do not touch anything or clean up until the police have inspected for evidence.
  • Write down the license plate numbers of any suspicious vehicles.
  • Note the descriptions of any suspicious persons.

Robert Siciliano home security expert to Schlage discussing home security and identity theft on TBS Movie and a Makeover. Disclosures. For Roberts FREE ebook text- SECURE Your@emailaddress -to 411247.