Work from Home isn’t the Scam It used to be

Many, including me, have reported for years about all the “work at home” scams. And frankly, there are still plenty out there, unless you know where to look. There has never been more opportunity to legitimately earn a living working at home, and NOT get scammed.

12DMothers with young kids aren’t the only ones working at home (telecommuting) these days. The “WAHMs” have lots of company.

The Internet has allowed people of all ages and educational levels to do this, including retirees. Many online jobs are linked to legitimate companies that have made provisions for the telecommuting.

  • More and more companies are recognizing the cost savings of setting up telecommuting positions.
  • Telecommuting boosts morale and thus, productivity, which includes increased work duration.
  • Positions involving 100 percent telecommuting often mean making up ones own schedule. There really is no limit to the flexibility telecommuting allows.
  • The definition of “telecommuter” traditionally has been that of someone employed full-time by a business but spends at least 50 percent of worktime at home. Nowadays it refers to even working just one day a week at home. Telecommuting also refers to the entrepreneur, such as the prolific blogger.
  • “Telecommuting” also encompasses working at home beyond the 40-hour work week onsite, such as making reports and answering e-mails in the living room.

Telecommuting may not be for everyone. But more and more people are finding it to be the only way they want to make a living.

Possible Drawbacks

  • Limitations in face-to-face contact with coworkers and clients, though Skype helps. For many, this is a non issue.
  • Lack of a centralized location for companies in which the entire workforce is remote. Who cares! You don’t want to leave your home and fight traffic anyway!
  • Inability to monitor activities of other personnel. It’s better to be your own boss and not have to manage people, trust me on that.
  • Fewer promotions. Just go into it knowing you can always change positions and still make more $$ with different job descriptions.
  • Loneliness. I’ve never found this to be an issue.

Additional Benefits

  • Significant savings in money: gas, repairs on car from wear and tear, parking fees, wardrobe, childcare, dog sitter or doggie daycare
  • Healthier eating (no vending machine runs)
  • Being able to help with sudden family matters
  • Not being exposed to workplace hostility or other problems such as the nearby coworker who keeps whistling or popping gum, or the employee with the foul body odor
  • The employer saves a lot of money (no office space).

Security Concerns

  • Telecommuters who allow other family members to use the work computer; this opens the door to infections or accidentally leaking company information.
  • The work computer should be off-limits to all other use, even if it seems harmless such as shopping or perusing Facebook.
  • The telecommuter’s household should have at least one other computer for all other use including e-mail accounts.
  • The computer should be located in a secure, private area of the house so that nosy family members or visitors don’t gain access to company information.
  • Storing work related data in a public cloud service; all data should be stored in a backup that’s part of the company network.
  • There may also be some risk in storing company data on a flash drive (it can be lost and eventually found by the wrong person).
  • The telecommuter takes the computer to a public Wi-Fi spot and uses it there, where data can be “seen” by snoops and hackers.
  • Using an unsecure Wi-Fi at home. The worker must make sure that the home Wi-Fi is secure.
  • The employee should never tinker with the company’s administrative and security settings.

All in all work at home is a viable and safe option for anyone who recognizes both the pros and cons, (mostly pros).

Robert Siciliano is a Personal privacy, security  and identity theft expert to Arise discussing identity theft prevention. Disclosures.

Opportunities in Government for Skilled Security Personnel

As recent data breaches have shown, cyber attacks are particularly threatening to government entities handling sensitive data like Social Security numbers. Unfortunately, state agencies struggle to hire cybersecurity professionals.

The cause of this staffing shortage? There simply aren’t enough qualified people for the job[i]. Thankfully, change is in the air.

To attract skilled cybersecurity experts, some state governments are expanding IT internships for high school and college students. Many are offering more money, telecommuting jobs and flexible hours in hopes of landing the right candidates.

Some challenges states face in the hiring of skilled IT staff include:

  • Recruiting new workers to fill vacant IT slots
  • Offering competitive salaries to entice skilled professionals from the private sector
  • Filling senior-level IT positions quickly
  • Retaining skilled employees and minimizing turnover

One novel approach is “cross-training” talent: state governments have begun rotating cybersecurity employees through different positions to improve skills quickly. Like an endurance athlete cross-training with weight lifts and short sprints, exposure to different kinds of threats, networks, technologies and security strategies rapidly builds expertise among IT professionals and provides meaningful training for young hires. Cross-training can help improve retention while bolstering a state’s digital security apparatus.

Aspiring cybersecurity professionals should explore options in the public sector. Government employment offers a meaningful, multidisciplinary approach to continuing your cybersecurity journey.

I’m compensated by University of Phoenix for this blog. As always, all thoughts and opinions are my own.

[i]  http://www.bls.gov/opub/btn/volume-2/careers-in-growing-field-of-information-technology-services.htm

Work at Home Environment is a Safe, Secure Solution

There was a time when online dating was a novelty, perceived as unsafe. Today, 59 percent of people agree that online dating is a good way to meet others (Pew Research, 2015). In fact, it’s the preferred method of matchmaking. A different online environment with similar views from the public is working from home. People who want to work at home fear its safety and security, understandably. But working from home is already a safe and secure proposition as far as finding a job and creating a safe environment in your home.

12DStart with reputable “outsource” companies.

Avoid the potential of being scammed. Outsourcers are the companies that agents form partnerships. The big, well-known organizations that want the best people at its frontlines go to outsourcers that have already vetted work at home agents. Additionally, outsourcers that provide work at home opportunities often provide clients with secure platforms and the best tools necessary for both agents, clients and customers to be successful in their interactions. Outsourcers often provide the most legitimate telecommuting opportunities. One such provider is Arise Virtual Solutions.

Customer service jobs.

Think of companies that have big customer support departments. Many have opportunities for working at home because, as you may have guessed, this saves companies money. However, work at home opportunities also bring forth an agent who is highly motivated, has a specialized skillset, and provides enhanced customer experiences. Outsourcers work across industries from energy to credit card companies and everything in between that field customer inquiries all day (and night) long.

Do your research to find the right opportunity.

Work-at-Home Sites

These sites specialize in work-at-home listings or leads. Make sure that the site you use has an explicit screening policy to filter out scams. Read about the website itself before diving into the listings. Realize that the listings on these sites may simply be links to other legitimate sites that have listings, rather than a straight path to an opportunity.

Work-at-Home Forums

Here you’ll find what other telecommuters have to say, including their warnings. You may even create a thread to start a discussion or ask for help.

How to Ensure Your Home Workplace Is Safe, Sound and Efficient

Now that you’ve taken the leap and found that perfect work at home solution, it’s time to create a safe and productive environment in your home to get to work.

It is likely the outsourcer you partner with will make numerous recommendations in regards to a safe and comfortable working environment. And, they will want to make sure you are legitimate in regards to your credibility and commitment. Expect to learn and take courses to succeed; you may even pay for courses. Expect to pay for a background check.

To get started they will most likely request fundamentals like effective hardware (computers and telephones/headsets) and software (security software, VPNs, call center software) and basic requirements like a comfortable chair and quiet setting.

The following are a few things to consider:

  • Make the workstation quiet and free of distractions (internal and external). Think: young kids or baby, sick family member, new puppy, home construction, neighbor’s incessantly barking dog, party next door etc.
  • Make the room temperature comfortable considering windows may need to be closed.
  • Avoid tripping hazards by keeping cords under a desk or secured along the wall.
  • Establish an escape route from the work room should there be a fire or other disturbance.
  • Think home security. Never leave the window open if you’re gone from the room for extended periods. Consider installing a home security system.
  • Keep the work room clean, void of clutter and flammable substances. Don’t smoke in it.
  • Don’t eat at your computer. Keep liquids in spill resistant containers.
  • The computer should be connected to a surge protector.
  • Make sure the workstation is ergonomic including a great chair with good back support or a backless ergo chair.
  • Never be in your chair for longer than one hour at a time. Ideally, take five-minute movement breaks out of the chair for every 30 minutes spent sitting. Consider getting an alternate stand up desk.
  • Use a headset and a quality phone.

It’s really not that complicated. If the job doesn’t directly involve hands on work, tools, or face to face involvement, then for the environment and quality of life, work at home and telecommuting is the best option.

Robert Siciliano is a Personal privacy, security  and identity theft expert to Arise discussing identity theft prevention. Disclosures.

Human error is inevitable: Here are some ways to protect your business

National Preparedness Month is happening right now. It’s the perfect time to take action for you and your community. It’s all about making plans to remain safe, and when disasters do strike, to keep communications going. September 30th is the culmination of NPM, with the National PrepareAthon! Day.

3DIf a burglar sees your Facebook status that you are traveling on vacation and then enters your house, and takes $10,000 worth of valuables, it’s safe to say you as the homeowner facilitated the theft. This is no different than leaving your doors unlocked when you head to the store. This lack of attention to security is why crime often happens.

These lapses in judgement are akin to how human error enables data breaches. Even worse, for a small business, employee behavior accounts for a significant number of hacking incidents – and the costs of data breaches are tremendous.

A study from CompTIA says that human error is the foundation of 52 percent of data breaches. The CompTIA report also says that some of the human error is committed by IT staff. Funnily enough, it also points out that typically, businesses rank human error pretty low on the priority list of potential problems.

Some important things to remember:

  • Security awareness training is crucial for employees.
  • A strong incident response system must be in place.
  • Appointing a CISO (chief information security officer) will also help.

The high price of human error can include lost or stolen mobile devices, slow notification of a data breach, a weak security structure and response plan, and lack of a CISO. To avoid these and protect your business, you should:

  • Implement an aggressive security awareness training program for employees
  • Develop a data breach response plan
  • Implement strong authentication practices
  • Use encryption
  • Implement a data loss identification system

And all companies should take note of the following safeguards:

  • Vigorously train employees in safety awareness that pertains to the “bring your own device” policy. Many data breaches occur when someone conducts business on their personal mobile device.
  • Security awareness training isn’t just about telling employees the facts. It also should include staged attempts at a data breach (by hired white hackers) to see who takes the bait. This also includes staged attempts by people posing as vendors or other executives trying to gain access to sensitive information.
  • Back up all data on a frequent basis, ideally on a local drive in combination with a cloud service.
  • Computers should be replaced every two to three years. This will make it easier for businesses because the computers at this point will still be functioning.

The prevention tactics above apply to businesses and really, everyone. Employees should be rigorously trained on proactive security and tricks that cyber thieves use. To learn more about preparing your small business against the common accidents of everyday life, download Carbonite’s e-book, “5 Things Small Businesses Need to Know about Disaster Recovery.”

#1 Best Selling Author Robert Siciliano CSP, CEO of IDTheftSecurity.com is a United States Coast Guard Auxiliary Flotilla Staff Officer of the U.S. Department of Homeland Security whose motto is Semper Paratus (Always Ready). He is a four time Boston Marathoner, Private Investigator and is fiercely committed to informing, educating, and empowering people so they can be protected from violence and crime in the physical and virtual worlds. As a Certified Speaking Professional his “tell it like it is” style is sought after by major media outlets, executives in the C-Suite of leading corporations, meeting planners, and community leaders. Disclosures.

Ransomware Scammers get the Big Bucks

It sounds almost like science fiction, even in this cyber age: A thief hacks into your computer and encrypts your files, meaning, scrambles the information so you can’t make sense of any of it. He demands you pay him a big fat payment to “unlock” the encryption or to give you the “key,” which is contained on the thief’s remote server.

10DYou are being held ransom. The FBI’s Internet Crime Complaint Center has sent out a warning to both the common Internet user and businesspeople about this ransomware, says an article on arstechnica.com.

And if you think this is one helluva dirty trick, it can be worse: The thief gets your payment, but you don’t get the cyber key.

The article says that the biggest ransomware threat is the CryptoWall. The FBI’s IC3 has received reports from 992 victims of this ransomware, but it’s estimated that there are many more victims who have not notified the IC3 (would you or your friends necessarily know to do this?) and instead just paid the ransom—or didn’t, resigning to never being able to access their files again.

In addition to the ransom cost, there are also the costs associated with cleaning up the mess, and the fallout especially hits businesses, because they suffer lost productivity and having to pay IT services.

The arstechnica.com article quotes Stu Sjouwerman, CEO of KnowBe4, a security training company: “CryptoWall 3.0 is the most advanced crypto-ransom malware at the moment.”

According to the IC3, there are $18 million in losses associated with CryptoWall, but remember, that’s only what has been reported. Many businesses do not notify the FBI of breaches: the ransom payment as well as the heavy cost of impaired productivity.

How does an individual or business avoid getting sucked into this trap? The FBI offers the following recommendations:

  • Back up all of your data on a regular basis.
  • Protect all of your devices with antivirus software and a firewall—from reputable companies.
  • Keep your security software updated.
  • Clicking on a malicious website could download ransomware; therefore, you should enable pop-up blockers that will prevent these dangerous clicks.
  • Do not visit suspicious websites.
  • Avoid clicking on links inside e-mails.
  • Protect your WiFi connection. A criminal can insert a virus on your device while on unencrypted WiFi. Use a VPN, a virtual private network encrypts your data over free WiFi.
  • Avoid opening attachments that come from strangers or people for whom it would be out of character for them to send you an attachment or who’d have absolutely no reason to. This includes the IRS, UPS, Microsoft, Walmart, etc.
  • CryptoWall can still make its way into your device if you’ve clicked on a malicious ad that’s on a legitimate website, says the arstechnica.com article. Here is where an updated antivirus software program would come into play to detect the malware.

Robert Siciliano is an Identity Theft Expert to Hotspot Shield. He is the author of 99 Things You Wish You Knew Before Your Identity Was Stolen See him discussing internet and wireless security on Good Morning America. Disclosures.

Big Bad Hackers taken down

Darkode anyone? Not anymore. This underground bad hackers’ forum was recently demolished by the FBI, says a report on www.justice.gov. The dozen hackers associated with Darkode are facing criminal charges.

4DThough there are about 800 of such forums, Darkode was among the worst (or shall I say “best”?), presenting a serious threat to worldwide computers. Gone is Darkode’s ventures of buying, selling and trading malware, and exchanging hacking strategies—to actually carry out crimes, not just fun brainstorming.

The dismantling of Darkode comes as a result of infiltration also by the efforts of law enforcement representing 20 countries including Australia, Colombia, Canada, Germany, Latvia, Denmark, Finland, Romania, Nigeria, Sweden and the UK. This is the biggest bust of a black hat forum to date.

Here is the cyber smut list from the www.justice.gov article:

  • J. Gudmunds, 27. He created a botnet that stole data on 200 million occasions.
  • M. Culbertson, 20. He’s the brains behind Dendroid, malware for sale on Darkode that was supposed to steal and control data from Google Android. Clever name, too: “Dend” refers to branching out (as in neuronal dendrites).
  • E. Crocker, 29. He’s the mastermind behind a Facebook spreader that infected the computers of FB users, converting them to bots.
  • N. Ahmed, P. Fleitz and D. Watts, 27, 31 and 28, respectively. They’re behind the spam that sent out millions of e-mails intended to bypass spam filters of cell phones.
  • M. Saifuddin, 29. He tried to transfer credit card numbers to other Darkode members.
  • D. Placek, 27. He allegedly created Darkode and sold malware on it.
  • M. Skorjanc, F. Ruiz and M. Leniqi, 28, 36 and 34, respectively. They’ve been charged with conspiracy to commit wire and bank fraud, racketeering conspiracy and conspiracy to commit computer fraud and extortion.
  • Rory Stephen Guidry. He reportedly sold botnets on Darkode.

The article points out that all of these wrongdoings are accusations at this point, and that these defendants are presumed innocent until proven guilty.

Robert Siciliano is an identity theft expert to TheBestCompanys.com discussing  identity theft prevention.

5 Auto Repair Scams

You take your car to the mechanic; it’s been making a funny grinding noise when you press on the gas pedal. The mechanic tells you what’s wrong and what needs to be fixed, then socks you with the estimate.

1SHow can you tell he’s not embellishing a lot of the “diagnosis”? You know nothing about cars. You have to take his word for it. What if the second opinion is also from a scammer and sounds a lot like the first opinion? You’re screwed.

An article at carbuying.jalopnik.com describes five auto repair scams.

Charging for repairs you don’t need.

  • The mechanic says he fixed the problem.
  • The problem still persists.
  • You take the car back and he “diagnoses” the “real” problem and fixes that.
  • The problem still exists.
  • The game repeats but finally the issue is corrected, but you get charged for the first two “repairs,” which never had to be made in the first place. The mechanic scammed you, and this is illegal.

Saying something is wrong when it’s not.

  • What an easy way for a mechanic to make money and get away with it, especially if the “something wrong” is a small repair. He can really clean up if he pulls this stunt on dozens of customers.
  • A version of this is to find something out of place or not working optimally and tell you it needs to be replaced—even though a repair will fix the problem.
  • This is illegal in many states.

Overcharging for parts or labor. 

  • It’s so easy for a mechanic to do this. How do you know that the four-hour job wasn’t really a two-hour job?
  • Do you know how much a shock absorber or new brakes should cost?
  • Though prices for the same product vary from one shop to the next, consider yourself scammed when the charge is way over the norm.
  • You also shouldn’t pay a mechanic for his inexperience. If he honestly took four hours to do a job that should have taken two hours, you should not be charged for the extra two hours.
  • Get a price and labor estimate before authorizing the work. AND GET IT IN WRITING.

Theft

  • Yes, mechanics have been known to steal valuables including performance features of the vehicle. Even taking a candy bar is illegal.
  • The shop may tell you to file an insurance claim. They’re scamming you because this isn’t how it should work. Since they had possession of your car, the onus is on them that something is missing.
  • Don’t leave valuables in your car.

Joyriding

  • In your car, that is.
  • After the work is completed, the mechanic takes your wheels for a spin.

Damaging your car by accident.

  • They owe you to fix the damage.

If you believe you were scammed, call your lawyer, not your insurance company.

Robert Siciliano is an identity theft expert to BestIDTheftCompanys.com discussing identity theft prevention.

Protect your small business against viruses with these tips

It is September and it’s National Preparedness Month—a great time to get involved in the safety of your community. Make plans to stay safe, and this includes maintaining ongoing communications. National Preparedness Month culminates September 30th with National PrepareAthon! Day.

6DI learned in high school biology class that one of the things that distinguishes life forms from inanimate objects is that living things replicate. Therefore, a computer virus is, well, alive; it replicates itself. It’s alive enough to cause billions of dollars of destruction from the time it attacks a computer network until the disaster is cleaned up.

But just what is a computer virus?

Not only does this nasty program file duplicate itself, but it can spread to other computers without human involvement.

Unlike a virus with DNA, a tech virus usually doesn’t produce symptoms to give you an early warning. But it’s hell-bent on harming your network for financial gain.

Though a virus is malicious, it may impersonate something harmless, which is why the user lets it in. One type of virus is spyware— which allows your computer to run smoothly as always, while the spyware enables criminals to watch your login activities.

Though viruses often corrupt in secret, others can produce symptoms including:

  • Computer programs and smartphone applications open and close spontaneously.
  • Computer runs very slowly for no apparent reason.
  • Someone you know emails you about the global email you recently sent out promoting a product you have nothing to do with.

You can protect yourself or your business from a virus in the following ways:

  • A malment is a common way to let a virus into your computer. This is a malicious attachment that, when clicked, downloads the virus. The email message tricks employees into clicking that attachment. Unless it’s been confirmed by the sender that you’ll be receiving an attachment shortly, never open attachments. Or at a minimum, scan them with antivirus software.
  • Never open an attachment sent out of the blue by the IRS, company bank, credit union, medical carrier, etc.
  • Apply the above rules to links inside emails. A “phishing” email is designed to look legitimate, like it came from the bank. Click on the link and a virus is released. Or, the link takes you to a site that convinces you to update some login credentials—letting the hacker know your personal information.
  • Never use public Wi-Fi unless you have a VPN (virtual private network) encryption software.
  • All devices should have continually updated security software including a firewall.
  • Browser and operating system as well should be updated with the latest versions.
  • Prevent unauthorized installations by setting up administrative rights.
  • Employees, from the ground to the top, should be aggressively trained in these measures as well as bring-your-own-device protocols.
  • Back up your data. Why? Because when all else fails and your data and devices have been destroyed by malware, a cloud backup allows you to not only recover all your data, but it helps you sleep at night.

The prevention tactics above apply to businesses and really, everyone. Employees should be rigorously trained in how malware works and other tricks that cyber thieves use. To learn more about preparing your small business against viruses, download Carbonite’s e-book, “5 Things Small Businesses Need to Know about Disaster Recovery.”

#1 Best Selling Author Robert Siciliano CSP, CEO of IDTheftSecurity.com is a United States Coast Guard Auxiliary Flotilla Staff Officer of the U.S. Department of Homeland Security whose motto is Semper Paratus (Always Ready). He is a four time Boston Marathoner, Private Investigator and is fiercely committed to informing, educating, and empowering people so they can be protected from violence and crime in the physical and virtual worlds. As a Certified Speaking Professional his “tell it like it is” style is sought after by major media outlets, executives in the C-Suite of leading corporations, meeting planners, and community leaders. Disclosures.

Back to school Tech Security Tips for College Students

Some of us remember college dorm days, when students were envied if they had their own typewriter. These days, college students must have a personal laptop computer, and a smartphone, and their lives revolve around these connected devices.  Such dependency should be proactively protected from loss or theft.  Campus security now means more than just being beware of who might be hiding in the bushes at night.

1SWhen you send your college kid off into the world, you want them to be prepared for life’s curveballs, and unfortunately, the occasional criminal too. How prepared are they? How prepared are you? Do you or they know that if they leave their GPS service on, some creep could be “following” them? Are they aware of how to lock down their devices to prevent identity theft?

For cybersecurity and personal security, college students should:

How might students get hacked and how can they prevent it?

  • They can fall for a scam via a campus job board, the institution’s e-mail system, off-campus public Wi-Fi or on social media. Be aware of what you click on.
  • It’s easy for devices to be stolen; never leave devices alone whether it’s in the library or a café.
  • Shoulder surfing: Someone peers over their shoulder in the study lounge or outside on a bench to see what’s on their computer screen. A privacy filter will make shoulder surfing difficult.
  • Be careful when buying a used device (which can be infected) and simply taking it as is. Wipe it clean and start fresh with the installation of a new operating systems.
  • If you’re not using your devices, consider keeping them in a lockbox or a hidden place instead of exposed in a shared living space like a dorm.
  • All devices should have a password protected screen lock.
  • Data should be backed up every day. Imagine how you’d feel if you lost that term paper you’ve been slaving over!
  • Get a password manager, which will create strong, complex passwords unique to every account. And you won’t have to remember them.
  • Avoid jailbreaking your smartphone, as this increases its hackability.
  • Avoid using public Wi-Fi for transactions involving money or sensitive information, since hackers could easily snoop on the data transmissions. A virtual private network (VPN) will prevent snooping by encrypting transactions.

All devices should have security software that should be updated automatically. Virus scans should be done every day, or at least no less frequently than once a week.

Robert Siciliano is an Online Safety Expert to Intel Security. He is the author of 99 Things You Wish You Knew Before Your Mobile was Hacked! Disclosures.

Man Breaks into Home, hides under Bed for Days

Wow, it’s true: The monster under the bed really does exist!

5HRecently in New Jersey a man broke into a home and hid under a bed in a spare room for possibly five days before being arrested. Margaret Adamcewicz reportedly stated that the man, Jason Hubbard, had dated her daughter five years ago, and it didn’t end well, and he decided to live under her bed.

Hubbard slithered his way into the home when one of its residents left a door open to take out the garbage. He slipped his way upstairs to the spare bedroom and made camp under the bed, even charging several cell phones using an outlet under the bed.

He was discovered when Adamcewicz’ husband heard a noise in the room, peeked under the bed and saw the freeloader. An adult son restrained him until the police arrived.

Not only was Hubbard charged with burglary, but he was also charged with stealing electricity.

How can you prevent a person from sneaking into your house and “living” under a bed? The same way you can help prevent someone from breaking in and stealing your valuables or abducting your child:

  • Keep doors locked at all times. If you can’t keep an eye on the door that you go through to get outside to take out the garbage or collect the mail, then lock it, even though you’ll be back in less than a minute.
  • Use “door reinforcement technology” (google it) for your door or some other beefed-up device to reinforce door security and prevent kick-throughs.
  • Never leave a note on your door that indicates you’re not home.
  • Keep windows locked, at least overnight and when you’re not home, and use a bar or special device that’s placed in the track to prevent horizontal-sliding windows from being slid open by intruders.
  • Keep your shades and curtains lowered and closed as much as possible so nobody can peer inside.
  • Before leaving the house for even short errands, turn the phone’s ringer to mute so prowlers don’t hear an unanswered phone.

Robert Siciliano personal and home security specialist to BestHomeSecurityCompanys.com discussing burglar proofing your home on Fox Boston. Disclosures.