Do You Really Need Identity Theft Protection or is it a Waste of Money?

I see a ton of articles that say identity theft protection is not something you really need. These articles have titles like “ID Theft Protection Does Not Work,” or “The Poor Man’s Guide to ID Theft Protection.” Though some of these articles have a bit of merit, they totally miss the point.

Here’s the deal – You can’t protect yourself from every type of ID theft out there, and the types you can protect yourself against require a ton of focus. One way or the other, it will cost you money, time, and probably a bit of anxiety too.

Those who have elected not to invest in ID theft protection say they don’t need to pay for a service that they can take care of on their own. Why? Because they do the following:

Dispose of Their Mail, Securely – One thing that people do to protect their identity is to shred all of their mail. This is especially the case when it contains account information. However, this isn’t enough. Though you might do your part, there is no guarantee that your bank, mortgage company, or even electrical provider won’t toss paperwork with your information into a dumpster. At that point, it’s free for the taking.

Opt Out of Preapproved Credit Card Offers and Junk Mail – Yes, this is good advice. You can do it online at OptOutPrescreen.com. However, keep in mind that even if you do this, you will still get some offers.

Get a P.O. Box – I’m not sure why people think that getting and using a P.O. box will help to protect them from identity theft, but they do. Yes, this is a more secure way of getting your mail and in some cases will protect sensitive data. Unfortunately, this doesn’t help much.

Check Their Credit Report – Yes, you should always check your credit report. But, people who believe that checking their credit report can stop ID theft are mistaken. You can get a free credit report each year at AnnualCreditReport.com, but you really need to check more often than once every 12 months. Checking a credit report does not proactively protect your identity.

Set Up Fraud Alerts – People also set up fraud alerts and think they are fully protected from ID theft. Again, fraud alerts are great, but they expire after 90 days, and most people forget to renew the service. Additionally, these are only a guideline for your creditors, and they are not required to contact you if they issue credit.

Freeze Their Credit – These people also freeze their credit. This is a good thing to do, and I think it is fundamental to protecting your identity, but again, it doesn’t help to protect your ID from tax-related identity theft, criminal identity theft, account takeover or medical identity theft.

All of these things help, and are necessary in addition to a Protection Service, but people who stick with these and don’t get full service identity theft protection are putting themselves in a precarious position. Instead, it’s best to get a professional product, which offers better protection.

Robert Siciliano personal security and identity theft expert and speaker is the author of 99 Things You Wish You Knew Before Your Identity Was Stolen. See him knock’em dead in this identity theft prevention video.

Security is Layered – There is NO Home Security Magic Bullet

Is your home secure? You might believe it is, but if you aren’t using layered security, it’s probably not as secure as you think. What’s layered security? It means that you aren’t putting all of your eggs in one security basket. Instead, you are using multiple methods to ensure that you are as safe as possible. The reality is there is NO home security magic bullet. Home security requires a mix of layers Here are some ways to layer your home security:

Protection Dogs

Our furry friends, whether big or small, as long as they are territorial, can offer deterrence and defense. Barking dogs bring attention to the situation and also make burglars think twice. A dog that bites is enough to scare any burglar away.

Windows, Doors, and Locks

Have you changed your locks recently? If you are like most of us, probably not. However, locks are essential to keep the bad guys out. Change those locks to quality locks that cant be easily picked or “bumped” and make sure that you are locking your doors and windows at all times…especially when you leave or at night.

The Yard

Taking care of your yard is another important part of layering security. First, a yard that is neat and tidy shows a burglar that you are around. However, a burglar can also use your yard to their advantage. How? Trees, fences, and tall hedges make great hiding places, which allow burglars to move around unnoticed. So, make sure you keep your hedges and trees trimmed, and think about how any fencing you have can help a bugler hide.

Talk to Your Neighbors

Do you have a Neighborhood Watch? These organizations can also help to keep your home safe. The more people watching your house, the better. Plus, Neighborhood Watch signs are a good deterrent to keep burglars away.

Security Cameras

A security system with cameras is also an excellent way to deter criminals. There are different types on the market, and they are made for both indoors and outdoors. Many times, even a fake security camera can keep the bad guys away.

A Home Security System

Choosing a full-blown home security system is also important when layering security. This system should ideally include entry and motion sensors. You can also get glass break sensors. When you set up your security system, also make sure that you choose a good PIN. It should be one that you remember, but one that is not easy to guess, like an anniversary or birthdate. Ask for a panic button, too, as you never know when you might need it.

Reinforced Doors

You should consider door reinforcement. There are a number of devices on the market including door bar jammers, frame reinforcements, door braces, and deadbolt and door knob wraps. Commercial door reinforcement kits like Door Devil also work well. Made of strong, heavy steel, these devices fit over the jamb of the door, and then is screwed into the door frame.

These are just a few of the things that you can do to layer security for your home. This way, if one method stops working, you have several backups to keep those burglars at bay.

Robert Siciliano is a home and personal security expert to DoorDevil.com. Disclosures.

Protect Your Company with This Social Media Security Advice

Social media is an excellent tool for small businesses, yet, the use of social media by small business staff can definitely put the company in danger. Many small business owners and managers don’t realize this.

Recently, I was talking to employees of a credit union about what to do in a robbery. Before this presentation, police officers had staged a robbery in the same credit union. The fake robbery was so real, some of the tellers were brought to tears, thinking they were really getting robbed.

After they were filled in on what was happening, everyone on the team discussed it. One of the most telling moments is when one of the tellers shared her story. During the mock robbery, one of the “robbers” handed a teller a note. It said this: “Your husband works at Pine Street Motors. We kidnapped him this morning. He is being held at another location. If you hit the alarm and notify police, he’s going to be killed.”

How did the bad guys know that her husband worked at Pine Street Motors? They simply looked online. They found the name of the bank, and then found out that the teller was listed as working at the bank on social media. Her social media account was connected to her husband’s, and his account said that he worked at Pine Street Motors.

Yes, it was that easy.

Here are some tips for social media that you might want to share with your staff:

Don’t Tell the Internet Where You Work

Tell employees that it’s not a good idea to share too many details about their work on social media pages. Though you can’t stop them from adding their employer on Facebook, you can tell them how this information can be used against them and the company. Make sure that they understand that this information could backfire and harm everyone involved.

Teach Your Staff How to Use Privacy Settings

You should also teach staff how to manage their social media privacy settings. Ideally, they should have maximum protection on every account. The default settings are lacking, and those put them at risk for hacking. You should also tell them that even the highest settings that social media sites have won’t keep everyone out. However, this level of protection is better than nothing.

Create a Workplace Policy for Social Media Use

Set up a policy in your workplace for social media use. Make sure this policy covers what employees associated with your company can say and what is totally prohibited.

Stop Banning the Use of Social Media in the Office

The moment you ban the use of social media at work, that’s the moment that someone will sneak around and do it anyway. This, of course, leads to dangerous things, as they can try getting around the firewall and other things that make your network vulnerable.

Train Your IT Team

 Finally, make sure that your IT team is up to date on the latest ways to combat online-security issues. These teams must also know about the security risks that your business faces due to social media.

Additionally, the policy for employee social media use should be examined and updated quite regularly, and make sure to enforce it, too. Invest in anti-virus protection and make sure that all operating systems and browsers are always kept up to date when updates become available.

15 Tips to Keep Your Home Safe During the Holidays

You and your family aren’t the only ones who love the holidays; burglars love them, too. Not only do they know that it gets dark earlier after the time change in November, they also know that you have a lot of newly purchased gifts in your home. It is the perfect storm.

Most homeowners take extra steps around the holiday season to protect their homes. For instance, they often take precautions with Christmas lights or candles as to not start a fire. However, most don’t take any extra security measures to prevent a home robbery. Yes, fire protection is very important, but your home is much more likely to be robbed than to go up in flames. So, here are 15 tips that you can use during this upcoming holiday season:

  1. Always keep your doors locked. This is true even in the daylight and even when you are home.
  2. Always keep your windows locked, even those that are on the second floor. Burglars can and do climb.
  3. Use high quality locks and door reinforcements.
  4. Keep all of your blinds and curtains closed. This keeps your valuables away from prying eyes.
  5. Install security film on all of your windows. These help to strengthen them and help them to hold up to things like crow bars, rocks and baseball bats.
  6. Try to make your home look “lived-in” even if you aren’t home. One way to do this is with home automation technology. These systems do things like turn on/off lights automatically, so that it looks like someone is there.
  7. Bring in your mail and newspaper as soon as they are delivered.
  8. Put a large dog bowl outside near your door. Try to make it look as realistic as possible with water inside it. Also, place a thick leash and chewed up dog toys around.
  9. Take a pair of worn men’s work boots and place them by the door. This makes it less likely that a burglar will enter because they don’t want to confront a man they can’t overpower.
  10. Clear out shrubbery around entry points. These are good hiding places for burglars.
  11. Do a Google news search with the name of your city, state, and the phrase “door kicked in.” What do you see? Likely several cases of the door getting kicked into people in your area. Use door reinforcement products.
  12. If you have a garage, use it to pack and unpack gifts into your car. If you do it outdoors, a burglar might be watching.
  13. Don’t advertise your gift purchases on your social media pages. Thieves are notorious for using social media to find victims.
  14. Invest in a security system for your home. Choose one that offers a view of what is happening in your home. You can access this via computer, tablet, or smart phone.
  15. If you park your car outside, place a pair of large men’s gloves in it. Most burglars won’t go into a house if they believe a large man lives there.

Robert Siciliano personal security and identity theft expert and speaker is the author of 99 Things You Wish You Knew Before Your Identity Was Stolen. See him knock’em dead in this identity theft prevention video.

Securing Your Home’s Door: Secrets Your Locksmith Won’t Tell You

Are you making a big home security mistake? If you are leaving your doors unlocked, or if you are using low quality lock systems, you are putting yourself…and your home…at risk.

However, just because your door is locked, it doesn’t mean that a burglar can’t kick the door down. But, having the door locked can make it more difficult. This is only one secret that your local locksmith won’t tell you, but there are several more. Here are a few:

Securing Your Doors

  • Reinforce the door frame around the hinge and lock. Consider door reinforcement kits, such as Door Devil.
  • Install a peephole.
  • Don’t answer the door unless you are expecting a visitor. Tell the same to your kids.
  • Install hardened steel deadbolts. These are highly encouraged. Make sure they have a five-pin tumbler, too.
  • Consider multi-lock deadbolts or vertical deadbolts.

Accessories for Your Door to Make it More Secure

  • Consider a door brace. These will help to prevent a burglar from opening the door.
  • A wedge or door stop will likely not totally stop a burglar, but if you choose one with an alarm, anyone in the home will definitely hear it.
  • A door chain will not protect you. It doesn’t take a lot of pressure to break them.

Additional Tips for Door Security

  • Replace your hollow wood door with a metal or solid wood door.
  • Choose a door that does NOT have a window. An intruder can easily break a window and access the lock.
  • If you have a current door that DOES have a window, install attractive metal bars over the glass.
  • Make sure the hinges of the door are not visible on the outside of the door.
  • Consider installing a cross bar. This is a heavy steel bar that you can place across the inside of the door.
  • Inspect deadbolts. Any deadbolt that is low quality should be replaced. If you want to have even more security, install a second deadbolt.
  • Use door braces when you can. Take one of these braces and stick it under the knob of the door. The other end will remain on the floor at an angle to the doorknob. These are great devices, but too many people forget to put the brace up before they go to bed or leave the home. It is useless if it is just leaning against the wall, and it only takes a couple of seconds to put into place.
  • For the best door security, think about installing some type of door reinforcement kit. Imagine how secure your door would be with 1/16-inch of heavy steel. No one could kick through that! Also, imagine a four-foot metal bar that you install right over the strike plates and screw directly into the frame of the door. This will give you one tough security system on your door, and it’s exactly what the door jamb security kit from Door Devil offers. See here on YouTube.

Robert Siciliano is a home and personal security expert to DoorDevil.com. Disclosures.

The Equifax 2017 Exposed: What Half of America Needs to Do Right Now

Equifax has been hacked. As one of the three major credit bureaus in the United States, this is seriously bad. It is considered by many to be the worst security breach in the history of the internet. The extent (about 143 million Americans) and the sensitivity of the data is a rude awakening in a year when cyber has been in the center of the news.

What does this mean for you? It means that your Social Security number, and possibly even your driver’s license information, could be in the hands of hackers. Some are already calling this the worst breach of data in history.   

How Did This Happen?

On September 7th, Equifax announced that a security breach occurred that could impact as many as 143 million people. Though this isn’t the largest breach to occur, it could be the most devastating. The data that was accessed included Social Security numbers, address, birth dates, and driver’s license numbers. All of these can be used for identity theft.

Equifax also announced that the credit card numbers of more than 200,000 people were accessed, as were documents containing personal identifying information for more than 180,000 people. With this information, the hackers can commit credit card fraud. This isn’t as bad as identity theft, as credit card fraud is usually simple to fix, but these thieves could still open new credit card accounts in your name with your Social.

According to Equifax, the company discovered the data breach on July 29. Apparently, the hackers accessed the files from around mid-May all the way through July.

Richard F. Smith, the chairman and CEO of Equifax, admits that this is a “disappointing event” and that it “strikes at the heart” of the goals of the company. He also apologized to customers who work with Equifax and consumers. Boo hoo. I cry for you.

Why Did It Take So Long to Announce This?

You might be wondering why it took so long to announce that there was a data breach at Equifax. After all, the company discovered it on July 29, and didn’t announce it until September 7. Their Director of Social Media, has an answer. She said that as soon as the company discovered the breach, they stopped the intrusion. The company also hired a cybersecurity firm, which did a full investigation. This investigation was time consuming, and they wanted to have all of the information available before informing the public. Makes sense.

But Wait…There’s More

To add to this story, Bloomberg News announced that three executives from Equifax sold shares worth about $1.8 million. What’s shocking is that they did this AFTER the company discovered the breach. This will come back to bite them.

You can check to see if you are affected by the breach by using an online tool that Equifax has set up. FYI, I checked out my info, I’m a victim.

You should go there, enter your last name and the last six digits of your Social Security number, and the system will tell you if your information has been compromised. If it has, Equifax is offering a complimentary enrollment into the TrustedID program. However, there is language in the terms of service that may restrict your ability to have your day in court if you were to join a class action and the NY Attorney General is pissed. According to USA Today, a class action lawsuit has already been filed against Equifax. This class action suit seeks to secure all records associated with the breach and fair compensation for those who were affected.

Read the NYT.

You don’t have to have done any type of business with Equifax to be affected by this. If you have ever applied for a mortgage, loan, or credit card, the company likely has your information. The TrustedID program is going to be free for an entire year for anyone affected. It gives consumers the ability to lock and unlock their credit reports. They also get internet scans for their Social Security numbers and identity-theft insurance. You can also call Equifax at 866-447-7559.

Robert Siciliano personal security and identity theft expert and speaker is the author of 99 Things You Wish You Knew Before Your Identity Was Stolen. See him knock’em dead in this identity theft prevention video.

What Was Scary About Blackhat 2017?

As you might know, at the end of July, all types of hackers came to Las Vegas to attend Blackhat 2017. During the conference, some pretty scary hacks were exposed, and we can all take this as a lesson on what we are up against in this technology-heavy world. Here are some of the scariest hacks we learned about during Blackhat 2017:

Carwash Hijacking

Nothing is safe from technology, and these days, carwashes are an unexpected target for hackers. It is perfectly possible that a car wash could be hacked, controlled remotely, and used to destroy vehicles. Scary.

Hacking Cars

Speaking of vehicles, it was also revealed how easy it is for a pro to hack automobiles. Just last year, Chinese hackers were successful in hacking a Tesla S. The hackers disabled the brakes, so Tesla updated security in its cars. However, recently, the car company was hacked again, showing that hackers always find a way.

Oculus Headsets and Hoverboards

Another scary hack participants learned about was that hackers can access hoverboards and the Oculus Rift headsets. These hacks could cause the devices to shake uncontrollably, bringing harm to those who are using them.

Printer Hacking

Michael Howard Chief Security Advisor of HP and painfully demonstrated that only 18% of IT security managers are concerned about printer security where as 90% are concerned about PC’s. That stat is one reason why ?92% of Forbes Global 2000 companies experienced a breach in 2016 which in part resulted in 4 billion records breached worldwide. According to the Ponemon Institute, 60% of data breaches reported by companies involve printers. Very scary.

The Motivation of Adversaries

We also learned that hackers wanting money, data, or intelligence aren’t their only motivation. More and more, they are motivated by the ability to manipulate people, to undermine democracy, and to wreak havoc for journalists and activists.

Wind Hacking

Wait, what? Participants at Blackhat 2017 also learned about how the bad guys are hacking the wind. Well, not actually the wind, but the systems that create wind energy. The main motivation here is money. Just one hacked turbine can cost anywhere from $10,000 to $30,000 per hour. That’s a lot of leverage for hackers who only need to hack a single turbine to demand ransom to set the turbine free.

Hacker Masquerade

Hackers are also using a savvy technique to hack phones. Chinese hackers are switching from targeting high tech LTE networks to slow 2G technology. This means, when our phone switch to a slower network, which happens if the signal isn’t strong, even if you have great security, your phone can still be hacked.

Facebook Bounties

These are some of the scariest hacks we saw at Blackhat 2017, but never fear, white hat hackers are on it. In fact, companies like Facebook are offering cash, up to $1 million, for developers who create software to keep users safe. OK, not scary. But good.

Robert Siciliano personal security and identity theft expert and speaker is the author of 99 Things You Wish You Knew Before Your Identity Was Stolen. See him knock’em dead in this identity theft prevention video.

Black Hat 2017 was an Amazing Event

In July, more than 15,000 security pros, hackers, hobbyists, and researchers met in Las Vegas for the Black Hat Conference 2017 at Mandalay Bay in Las Vegas. This was the 20th year that the security conference was held, and both black and white hat hackers joined together to discuss security.

For two decades, Black Hat has gained a reputation for demonstrations of some of the most cutting-edge research in information security as well as development and industry trends. The event has also had its share of controversy – sometimes enough to cause last-minute cancelations.

Launched in 1997 as a single conference in Las Vegas, Black Hat has gone international with annual events in the U.S., Europe and Asia.

Black Hat 2017 was almost a full week of everything having to do with IT security. There were hands-on training sessions, a full business hall where vendors gathered with swag and products, and of course, parties. I hit 5 parties in 3 nights. I’m totally spent.

This is a conference that attracted some of the brightest people in the world of security, and has a reputation for bringing together all types of professionals and amateurs interested in hacking, security, or the latest in encryption.

What’s interesting about Black Hat 2017 is that there is something for everyone. From hackers trying to hack hackers to remaining “off the grid,” you never know what you might find. In fact, most people who attended this conference decided to stay away from electronic communication all together. Let’s just say leaving devices in airplane mode, shutting off Wi-Fi, using VPNs, and always utilizing two-factor authentication for critical accounts is the norm during the conference for veteran attendees.

One of the most popular parts of Black Hat 2017 was the briefing on business protection. It’s important to note that many companies have employees that simply don’t comply with security policies. Additionally, these policies aren’t governed enough, and it is costing millions. In her presentation Governance, Compliance and Security: Three Keys to Protecting Your Business, the speaker from HP, Sr Security Advisor, Dr. Kimberlee Brannock, during her 16-year tenure at HP, Dr. Kimberlee Brannock has used her extensive education and experience in compliance and governance to shape HP’s security standards. shared why it’s not always enough to secure business networks and why governance and compliance really matters. With 25 billion connect devices by 2020, maintaining proper network and data security compliance is an important concern for any business, as noncompliance costs businesses an average $9.5 million annually through fines, lost business and lawsuits.

Another very popular briefing at Black Hat 2017 was Staying One Step Ahead of Evolving Threats demonstrated on average, an organization has more than 600 security alerts each week, and over 27,000 endpoints leading to 71% of data breaches starting from the endpoint.

Most put in thousands of hours, and dollars, for that matter, on securing servers, laptops, and data centers, but many companies are ignoring other areas of security vulnerability. One of the best things about this briefing was that the leader, Michael Howard from HP, Chief Security Advisor, as Worldwide Security Practice Lead, Mr Howard is responsible for evolving the strategy for security solutions and services in Managed Services. He gave a lot of information on printer security, something that most businesses fail to address. He used real-world examples of how some of the most secure organizations are still lagging in their print security and share how he uses a proven framework to secure the print infrastructure.

Overall, Black Hat 2017 was an eye-opening experience, and with the world of network security changing all of the time, all in attendance surely learned something new. I met a ton of very cool characters, partied hard, drank too much, ate too much, slept none and to keep my data secure, I’m considering moving off grid to a cave in the Outback of Australia.

Robert Siciliano personal security and identity theft expert and speaker is the author of 99 Things You Wish You Knew Before Your Identity Was Stolen. See him knock’em dead in this identity theft prevention video.

Blackhat Hackers Love Office Printers

The term, or in this case the word “blackhat” in tech generally refers to a criminal hacker. The opposite of black is white and a “whitehat” is a security professional. These terms originate from the “spaghetti western” movies when the bad guy cowboy wore a black hat and the law wore white hats. Fun huh?! Blackhat is also the name of the largest conference on the planet for information security. The conference itself is 20 years old and as Alex Stamos who is the CSO for Facebook and also Blackhat 2017’s keynote speaker said “Blackhat isn’t even old enough to drink” That statement reflects just how far we’ve come in information security and also how much more there is to do.

One of the presentations at Blackhat discussed printer security called “Staying One Step Ahead of Evolving Threats” by Michael Howard Chief Security Advisor of HP and painfully demonstrated just how much more there is to do.

Do you ever feel as if your office printer is dangerous? Most of us don’t. In fact, more than half of businesses don’t even bother adding printers to their security strategies. Mr Howard stated only 18% of IT security managers are concerned about printer security where as 90% are concerned about PC’s. That stat is one reason why ?92% of Forbes Global 2000 companies experienced a breach in 2016 which in part resulted in 4 billion records breached worldwide.

Hackers know this, so office printers are the perfect target for them. Remember, printers are connected to the network, and if unprotected, they are easily hacked. According to the Ponemon Institute, 60% of data breaches reported by companies involve printers. So, why do hackers love printers? Here are a bunch of reasons:

Networks are Vulnerable

Even if you have a firewall, there are several devices that might be on a network that are access points to that network. When you don’t add your printer to your security plan, it becomes a welcome access point to hackers. Once they get in, the consequences could be terrible for a business.

Hackers Can Get Useful Data

The data that hackers can get from printers that are not protected is unencrypted. If one of your staff members sends sensitive information to the printer, yet it is unencrypted, the hackers can read it. Mr Howard shared how one universitys unsecured printers led to students hacking tests days before they were taken, giving the students a significant advantage. Do you really want your company’s data to be open like that? All hackers have to do is take it if the printer isn’t protected.

They Know They Can Access Other Devices

Hackers also love office printers because they know that once they are in, they can access other unprotected endpoints on the network. Mobile devices are an excellent example of this. It is quite challenging to secure access to all of these devices. The more devices that are connected to the network, the easier it is to access it.

Information Leaks

How many times have you printed something at the office and let it sit in the tray for a while? This happens often. Hackers know this, too, and they can essentially print anything once they have access to the printer and retrieve it at any time. This easily opens up the business to compliance issues.

Finally, hackers love office printers because they get inside access. ?Once the printer is compromised, so is the rest of the network.

  • Change the printers default passwords.
  • All computing devices including printers need encryption.
  • Printer hard drives have lots of data. Destroy hard drives prior to recycling or reselling.
  • Printer firmware and software needs to be regularly patched and updated.
  • Use “fleet management” tools to ensure all of the companies devices are protected.

When businesses implement security policies and procedures that directly address endpoints, including printers, they significantly reduce risk and maintain proper network and data security compliance.

Robert Siciliano personal security and identity theft expert and speaker is the author of 99 Things You Wish You Knew Before Your Identity Was Stolen. See him knock’em dead in this identity theft prevention video.

ISPs invading Subscriber’s Privacy

It’s hard to keep track of the news of politics these days, and even if you can, how do you know it’s even real? The political landscape has greatly changed since January, and there have been a lot of laws passed that will affect us all, including the repeal of a law that protected your privacy on the internet. Basically, with this repeal, your internet service provider, or ISP, can sell your browsing history to anyone.

If you use the internet, you will be affected by this law. Not only will this change allow your ISP sell your browsing history to the highest bidder, it could also make it easier than ever before to access information about your family, your finances, and your health. Your ISP can now sell this information to companies, and they don’t need your permission to do so.

So, what does this mean for you? After all, you might not think it really matters that much. In simple terms, it means that your ISP can collect data about your browsing habits, create a record of this, and then sell it to advertisers. Think about your browsing history yesterday. If you want, open it up right now from your browser. One minute, you might have been buying dog food on Amazon, and then next, reading the latest news from the Kardashians. Regardless of if you want advertisers to know that you are a Kardashian fan, or not, to them, your data is a gold mine.

Now, think about your browsing history over the past few weeks or months, and then consider that your ISP knows each and everything you have searched for. It knows about that weird smell coming from your laundry room that you checked out online, and it knows that you have listened to that catchy new pop song a few times. It also knows your deepest worries, your sexual preferences, your political leanings, and what you are feeding your family. This information is invaluable to advertisers, but do you really want it getting out?

Luckily, you have options, one of which is called a VPN, or Virtual Private Network, which will encrypt data. Some of these, such as Hotspot Shield VPN, a client, is a good option. Also, start paying attention to those cookies and delete them.

Robert Siciliano personal security and identity theft expert and speaker is the author of 99 Things You Wish You Knew Before Your Identity Was Stolen. See him knock’em dead in this identity theft prevention video.