2017 Was the Worst year for Data Breaches EVER!

It seems like 2017 broke records for all the wrong reasons…one of them being the worst year for data breaches in history.

According to reports, hacking was the most common way to collect this data, but almost 70% of exposures occurred due to accidental leaks or human error. This came down to more than 5 billion records. There were several well-known public leaks, too, including the Amazon Web Services misconfiguration. More than half of the businesses using this service were affected, including companies like Verizon, Accenture, and Booz Allen Hamilton. The scariest part of this, however, is the fact that the number of breaches and the number of exposed records were both more than 24% higher than in 2016.

Big Breaches of Big Data

Another interesting thing to note is that eight of the big breaches that occurred in 2017 were in the Top 20 list of the largest breaches of all time. The top five biggest breaches in 2017 exposed almost 6 billion records.

Part of the reason for the big numbers is because huge amounts of data were exposed from huge companies, like Equifax. There was also a huge breach at Sabre, a travel systems provider, and the full extent of the breach isn’t even known at this point. All we do know is that it was big.

When looking at all of the known 2017 data breaches, almost 40% of the breaches involved businesses. About 8% involved medical companies, 7.2% involved government entities, and just over 5% were educational entities. In the US, there were more than 2,300 breaches. The UK had only 184, while Canada had only 116. However, until now, companies in Europe were not forced to report breaches, so things could change now that reporting is mandatory.

What were the biggest breaches of all time?  Here they are, in order:

  • Yahoo (US company) – 3 billion records
  • DU Caller Group (Chinese company) – 2 billion records
  • River City Media (US company) – 1.3 billion records
  • NetEase (Chinese company) – 1.2 billion records
  • Undisclosed Dutch company – 711 million records

Though none of this is great news, there is a silver lining here: none of the breaches of 2017 were more severe than any other breach in history, and overall, the occurrence of breaches dropped in the fourth quarter.

Because of so many breaches occurring due to human error, it’s very important that businesses of all sizes enact security awareness training, including helping staff understand what makes a business a target and what type of info the hackers want.

Robert Siciliano personal security and identity theft expert and speaker is the author of Identity Theft Privacy: Security Protection and Fraud Prevention: Your Guide to Protecting Yourself from Identity Theft and Computer Fraud. See him knock’em dead in this Security Awareness Training video.

Mainstream Email and Data Services Might Be Spying on You

The Internet nowadays flourishes on personal data. Many of the world’s largest companies rely on this intangible commodity that users have been too willing ‘donating’ as an exchange for a ‘free’ service.

As data replaces oil as the new premium commodity, buying and selling data is big business. While some companies do it legitimately, some entities do it illicit.

Let’s look at some stats:

  • Every day, there are more than 10 million hacker attacks
  • Every hour, more than 228,000 data records are lost or stolen
  • In 2017, thousands of data breaches exposed most everything from log-in names and passwords to Social Security numbers

But what is even more alarming, mainstream email and data services collect and then sell the data, such as: location, Internet search history, photos, files, and of course, more sensitive personal information. Sometimes they are compelled to give this information to the authorities without informing the owner of the data.

So, everyone is at risk of being monitored and lose valuable personal data.

However, there are ways to protect your data online.  One of the ways of doing it is by using Secure Swiss Data free encrypted email. This company has created easy-to-use secure email which has the following benefits:

  • End-to-end encryption – data is always encrypted, encryption is happening on a user’s device and data is stored encrypted on the Secure Swiss Data servers.
  • Swiss protection of the data – The servers are located in Switzerland under 320m of granite in the Swiss Alps. In addition, users’ data is protected by Swiss laws. In fact, Switzerland has some of the most stringent privacy laws in the world.
  • No Ads – another benefit is that they never display ads. This means the company has no reason to collect your data. They are not able to reador scan emails nor tracks any location information.
  • Privacy by Design – They use this approach which ensures that privacy is considered throughout the engineering process.

You can download Secure Swiss Data an Android or iOS app, and register a FREE account. With all the updates, so far, you can:

  • Send encrypted emails with attachmentsnot only to Secure Swiss Data users, but also to other third party email users.
  • Set expiration timer for emails so that they are automatically deleted from your and your recipients’ mailboxes after a set period of time.

One system to protect communications online with integrated blockchain

However, it seems that Secure Swiss Data team don’t want to stop there. They want to do more to secure communications and protect privacy online. At the same time they don’t want to depend on any third party or government investment. So, they are now starting a crowdfunding campaign:

To provide the world with a unique single encrypted communications and collaboration system that will include the following features: end-to-end encrypted email, calendar, notes, tasks, file storage, collaboration in encrypted files, and end-to-end encrypted messenger. 

On top of the end-to-end encryption, the Secure Swiss Data team will integrate blockchain in the system and therefore add another layer of security, which would increase customer convenience and quality of data protection online.

The cause – Take control over your data, and protect your Online Privacy

One of the best parts of using the Secure Swiss Data services is that you know where the company stands. They have clearly stated that they believe in privacy as a human right and civil liberty. User’s data should be kept private, and no one should be able to get into those personal accounts unsolicited.

Furthermore, they say: “Privacy is not about having something to hide, it’s about the right to control what you want to share and what you want to keep to yourself.”

So, have an opportunity to make the decision on what to share and what not.

And using services like the one from Secure Swiss Data, you can do just that: have control over your online data and communications.

Robert Siciliano personal security and identity theft expert and speaker is the author of Identity Theft Privacy: Security Protection and Fraud Prevention: Your Guide to Protecting Yourself from Identity Theft and Computer Fraud. See him knock’em dead in this Security Awareness Training video.

10 Tips on Discussing a Screwed Up World with Kids

Do you have children? How do you talk to them when something like a mass shooting happens? What about a robbery in your neighborhood? Do you talk about nuclear weapons? If you are like most parents, you don’t know where to start. Here’s 10 tips that you can use to talk to your kids about our screwed up world:

Young Kids – Ages 2 to 6

Parents Are in Charge – We control the “information flow” which means we can restrict what information they have access to. No mobile phones, no tablets, no TV news or conversations in the house or others homes on topics to intense for young kids. We ask questions before we send them to others homes and tell them our requirements.

Don’t Expose Them – Don’t watch adult-themed shows until they are in bed.

Don’t Bring it Up – It’s also recommended that you don’t even bring it up…unless, for some reason, they bring it up to you. If you do have to talk to them about it, keep it simple.

Tell Them You are Safe – If you do have to address a situation like this, make sure that you tell your kids that they are safe. Give them a hug and assure them.

Older Children – Age 7 to 12

Parents Are in Charge – We control the “information flow”. Don’t give me a BS excuse “I already gave my 11 year old a mobile phone and he has a TV in his bedroom. Stop the madness and start parenting.

Talk to Them if They Talk to You – For older kids, you should talk to them about these incidents, but only if they know about the event. Tell them that you would love to talk about it with them.

Listen – Talking it out is only one part of this. You also have to be a good listener. Ask them questions, too, such as what they heard, how they know about the incident, and how they feel about it.

Be Honest – When dealing with tweens, you should make sure that the truth comes from you, not from their friends nor the television or internet. You don’t have to go into great detail, and you should explain it in a way they will understand, i.e. explaining that the mass shooter/terrorist/predator etc likely is mentally ill.

Discuss the Media – It’s likely that kids this age will get information from the media, but make sure they know that the media likes to sensationalize things to get people’s attention.

Teenagers

Assume They Know – Teens likely know that an event has happened, but don’t assume that they have the whole story. They often get their news from friends or social media, and that information is often incomplete.

Engage Them in Conversation – Talking it out can help teens come to terms with these incidents.  

Give Them Hope – Finally, give your teenager hope that things will be alright. A lot of teens are focused on the dark side of things, so make sure to bring in a bright light.

No matter their age, engage their schools administration. Most schools have systems in place to deal with and discuss tragic events based on the age and grades of the students. Often, parents will feel better that their schools have a good handle on these discussions. But it’s also up to the parents to put it out there, to let the schools know what the parents expect.

Robert Siciliano personal security and identity theft expert and speaker is the author of Identity Theft Privacy: Security Protection and Fraud Prevention: Your Guide to Protecting Yourself from Identity Theft and Computer Fraud. See him knock’em dead in this Security Awareness Training video.

Phishing is Getting Fishier

If you are like most people, you have undoubtedly received an email that has asked you to click on a link. Did you click it?

If you did, no worries, you are just like 99% of internet users – everyone has clicked a link before, it is pretty normal. But, in some situations, you may have found that the link took you to a new or maybe spoofed website where you might be asked to do “something”, i.e. enter some information or even login to an account. Once you entered your username and password, they have it…

If you have ever done so, you were likely a victim of what is known as a phishing attack, and these attacks are getting fishier all of the time.

A What? Phish? Fish?

It’s called a phishing attack, and yes, it’s a play on words. When you fish, you throw a hook and worm into the water and hope you catch something. Hackers do the same when they phish.

Except, their hook and worm, in this case, is an carefully crafted email – designed to look like something you should get – which hackers hope you are going open…its then, that they can reel you in.

There are a few different types of phishing:

  • Spoofed websites – Hackers phish by using social engineering. Basically, they will send a scam email that leads to a website that looks very familiar. However, it’s actually a spoof, or imitation, that is designed to collect credit card data, usernames and passwords.
  • Phishing “in the middle” – With this type of phishing, a cybercriminal will create a place on the internet that will essentially collect, or capture, the information you are sending to a legitimate website.
  • Phishing by Pharming – With phishing by pharming, the bad guys set up a spoof website, and redirect traffic from other legitimate sites to the spoof site.
  • Phishing leading to a virus – This is probably the worst phish as it can give a criminal full control over your device. The socially engineered phish is designed to get you to click a link to infect your device.

Can You Protect Yourself from Phishing?

Yes, the standard rule is “don’t click links in the body of emails”. That being said, there are emails you can click the link and others you shouldn’t. For example, if I’ve just just signed up for a new website and a confirmation email is then sent to me, I’ll click that link. Or if I’m in ongoing dialog with a trusted colleague who needs me to click a link, I will. Otherwise, I don’t click links in email promotions, ads or even e-statements. I’ll go directly to the website via my password manager or a Google search.

Robert Siciliano personal security and identity theft expert and speaker is the author of Identity Theft Privacy: Security Protection and Fraud Prevention: Your Guide to Protecting Yourself from Identity Theft and Computer Fraud. See him knock’em dead in this Security Awareness Training video

Be aware of all these Confidence Crimes

Criminals have a reliance on tricking victims to get access to account information, like passwords. This is known as social engineering, and is also called a “confidence crime.” These come in many forms:

Do Not Take the Bait of These Phishermen

  • A phishing email that targets a specific person is known as spear-phishing. A spear-phishing email looks like an email that might come from a legitimate company to a specific person. For example, a thief might send a fake email to a company’s employee who handles money or IT. It looks like the email is from the CEO of the company, and it asks the employee for sensitive information, such as the password for a financial account or to transfer funds somewhere.
  • Telephones are used for phishing, too, also called “vishing,” which is a combination of phishing and voicemail.
  • Fake invoices are also popular among hackers and scammers. In this case, a fake invoice is sent to a company that looks like one from a legitimate vendor. Accounting pays the invoice, but the payment actually goes to a hacker.
  • Another scam is when a bad guy leaves a random USB drive around the office or in a parking lot. His hope is that someone will find it, get nosy, and insert it into their computer. When they do, it releases malware onto the network.
  • Cyber criminals also might try to impersonate a vendor or company employee to get access to business information.
  • If someone calls, if you get an email, if the doorbell rings, or if someone enters your office, always look at it with suspicion.

Be thoughtful about security:

  • Set up all bank accounts with two-factor authentication. All web-based email accounts should have two factor authentication. This way, even if a hacker gets your password, they still can’t access your accounts.
  • Train staff to be careful about what they post on social media, such as the nickname the CEO goes by in the office.
  • Do not click any link inside of an email. These often contain viruses that can install themselves on your network.
  • Any requests for money or other sensitive data should be verified over the phone or in-person. Never just give the information in an email.
  • All money transfers should require not one, but two signatures.
  • Make sure all employees are fully trained to recognize a phishing attempt. Also, make sure to stage phishing simulation attempts to make sure they are following protocol.
  • Help people understand the importance of looking out for things like a new email address for the CEO or Kathy in accounting suddenly signing her name Kathi.
  • Also, teach staff to report any uncharacteristic behaviors with long-time vendors or even fellow coworkers.

I once presented a security awareness program to a company that was almost defrauded. They hired me because of an email accounting had received from the CEO. The CEO sent a nice proper letter to accounting requesting payment be made to a specific known vendor.

A number of things were wrong with the email. First and foremost, like I mentioned, the email was nice and proper. Apparently the CEO isn’t all that nice, is somewhat of a bully, and all his communications are laden with profanity. So the red flags, where the fact that the email was nice. Imagine.

Robert Siciliano personal security and identity theft expert and speaker is the author of Identity Theft Privacy: Security Protection and Fraud Prevention: Your Guide to Protecting Yourself from Identity Theft and Computer Fraud. See him knock’em dead in this Security Awareness Training video.

10 Huge Home Security Mistakes

Though it would be nice to think that you can fix something if you make a mistake, there are some where there is just no going back. And in some cases, these mistakes can be tragic. Here are some of the biggest mistakes that people make with their home security:

  1. Leaving Doors Unlocked – It only takes two seconds to lock your door. It should be a habit. It doesn’t matter if you are just gardening in the backyard or running to the store for 5 minutes in the middle of the afternoon, lock the door. Often, a burglar rings the doorbell. If there is no answer, they jiggle the knob. If the door opens, he lets himself in and starts ransacking the place. They can do the same thing with windows.
  2. Not Setting Alarms – You shouldn’t assume that a break in only occurs when you are gone. A guy high on crack won’t care if you are home or not. So, keep your alarm on when you are home, and only disable it when you have to go out momentarily.
  3. Being Too Cheap – Don’t settle for a cheap lock. Locks can be easily picked by using what’s called a “bump key”. Remember, you get what you pay for. So, spend the cash on a good lock. There is a dramatic difference between a lock that costs $20 and one that costs $60.
  4. Keeping a Ladder in the Yard – Keeping a ladder in your yard is almost the exact same thing as leaving your door right open with a “Welcome Burglar” sign on your home. A bad guy can easily use that ladder to get into your home. At least lock up the ladder.
  5. Hiding Keys – Even the dumbest criminals know that people hide house keys under fake rocks, flower pots, and welcome mats. Instead, make the small investment into a keyless lock. Or buy a lock box.
  6. Putting Your Valuables on Display – Use caution when you display expensive items. This is especially the case if you can see them from the window. If you can’t move these items, make sure to keep the shades down.
  7. Keeping Your Garage Unlocked – Don’t just leave your garage open or unlocked. There is a lot of valuable stuff in there, and a burglar might even gain access to your house via the garage.
  8. Not Using Lights at Night – A dark yard or home is a sign that no one is home. In other words, the perfect time for a thief to get into your house. So, set up timed and motion sensitive lighting on the exterior and interior of the home. Also, leave a radio or television on when you are gone.
  9. Leaving Deliveries Out or Not Cleaning the Yard – A sure sign that you are gone, and your home is open for burglars, is a pile of mail or newspapers. It’s also a sign if your lawn is overgrown. So, ask someone to grab your mail, park in your driveway and mow your lawn when you are on vacation.
  10. Displaying Their Good Trash – If you see a neighbor place a large Sony box with a television printed on it or a Dell cardboard box on the curb, you can easily deduce that they just got high end electronics. Robbers know this, and they know that something very valuable is in the home they can sell for drugs.

Bonus…#11…Putting their Life on Social Media – Do not post on social media when you are on a trip. Save it for when you are home. Why? Because burglars are looking for those posts, too.

Robert Siciliano personal security and identity theft expert and speaker is the author of Identity Theft Privacy: Security Protection and Fraud Prevention: Your Guide to Protecting Yourself from Identity Theft and Computer Fraud. See him knock’em dead in this Security Awareness Training video.

5 Digital Security Tips That You Should Always Beware Of

Hackers are out there, and they have their eyes on YOU! So, you are the first line of defense against them. Do you know how to make your smart phone or computer more difficult for hackers to access? Here’s five tips to help:

Password Information

  • You would think that these days, everyone would know how to create and use a strong password, but people don’t. Every online account you have should have a strong, long password made of a combination of symbols, letters, and numbers. You should also use a different password for each account.
  • A good, strong password is at least 8-12 characters in length. It is also made up of both upper case and lower-case letters, symbols and numbers. Make sure it doesn’t spell anything, either. Example: “yi&H3bL*f#2S” However a phrase will do to. Such as iLike1ceCream!
  • Activate two-factor authentication on every account you can. This way, even if your password gets into the wrong hands, the hacker can’t get in unless they also have access to your smartphone.

Understand the Cloud

  • Yes, the cloud is pretty cool, but it is still vulnerable. The cloud, essentially is just internet connected servers that sit in climate controlled secure facilities. These are generally secure. However, if your device doesn’t have the best security, the data in the cloud becomes vulnerable through your device. Example: your bank which is cloud based, is unlikely to get hacked, but your PC is. If you don’t use security software, or if you don’t update your software, cloud security doesn’t matter much.
  • Since the cloud is a huge source of data, a lot can go wrong. So, should you rely on the cloud to protect you or should you protect yourself? Feel good that in general whatever cloud serve you are using is secure. But if you are downloading pirated content and shady software, then cloud security will not protect you.

New Devices Don’t Mean Safe Devices

  • Many believe that if they have a new device that it is perfectly safe. This isn’t true. Androids and Macs need antivirus just like PCs need antivirus. And right out of the box, all devices operating systems, browsers and software should be updated.

Antivirus Software is Great, But Not Perfect

  • Yes, it’s awesome to have good antivirus software, but it’s not the only thing you have to do to keep your device safe. Think of your antivirus software as an exterminator. Like a pest control expert in your home, they get out the vast majority of insects when you call them. However, they can’t 100% eradicate every single egg, larvae, and bug. Free antivirus software is the same. It does a great job for the most part, but it won’t get everything. Free antivirus doesn’t come with a firewall, antispyware, antiphishing or other fundamental security tools. A paid service will generally accomplish this.
  • Ask yourself this: would you want your bank using free antivirus software? Then why do you?

Updating Your System

 It can get annoying when your system alerts you with a pop-up to update your software, but don’t hit “remind me later.” In most cases, this update contains important security patches that you need to install to be safe. It’s best to allow automatic updates on every device.

Robert Siciliano personal security and identity theft expert and speaker is the author of Identity Theft Privacy: Security Protection and Fraud Prevention: Your Guide to Protecting Yourself from Identity Theft and Computer Fraud. See him knock’em dead in this Security Awareness Training video.

Are You Taking Responsibility for Your Personal Safety?

For the most part, the local police department does not prevent most assaults or burglaries. That would require a cop to be everywhere all at once. Not happening. However, they do their best to capture and arrest those who commit these crimes. And, preventing crimes goes way beyond getting a home security system or making sure your doors are locked and your lights are on timers. But this is a start. The truth is, your personal security and preventing crimes starts with you. It begins with taking responsibility for your property and your personal safety.

Civilized Conditioning

You might have heard of civilized conditioning. Civilized conditioning is what mom and dad teach you about being a civilized human in a civilized society. That means not hitting, harming, biting etc. Just be nice and in general, respect authority.

You have probably (hopefully) been taught that it’s not okay to hurt other people, and this, of course, is a great thing. Most of us have been taught this from the time we were small children. This type of conditioning allows each of us to successfully get along with others in a society, but it also causes us to do nothing when we need to.

Civilized conditioning has had a negative impact on our ability to take responsibility for our personal security. This is really a double-edged sword. Sure, it helps to keep us under control when we are tempted to get violent with another person. But, it also prevents us from using a violent stance when we need to.

We are all aware that there are people out there who we could say are uncivilized. These people don’t have the same boundaries as the rest of us. When we come across those people, we have to take responsibility for our own safety. That might mean being violent.

You Are On Your Own

Bad things happen all of the time. Consider, for instance, installing a home security system. This is a great start and helps you to take responsibility for the safety of your property, your family, and yourself. Also, consider a self-defense class. There are several options for these classes from local courses and books to videos and online training. Additionally, teach your children self-defense skills. Even children as young as 5-years- old are definitely capable of learning techniques that can protect them. Finally, teach responsibility. You can’t always rely on the government or the police to protect you. Instead, rely on yourself.

Robert Siciliano personal security and identity theft expert and speaker is the author of Identity Theft Privacy: Security Protection and Fraud Prevention: Your Guide to Protecting Yourself from Identity Theft and Computer Fraud. See him knock’em dead in this Security Awareness Training video.

Tips for Keeping Your Home Safe This Summer When You are Away

We all love our summer vacations, but while you are at the beach or the amusement park, burglars are planning an assault on your home. The fact is this: burglaries rise in the summer months because people are home less often than they are at other times of the year. Here are some tips to keep your home safe while you are enjoying the warmth and sunshine:

Put Thought into Your Home Security

Make sure you are being thoughtful about your home. Go outside, lock the door, and pretend that you are trying to break in. What do you see? Do you see any tools or items like ladders that would make it easy to get to the second floor? Could you use anything to pry open a window or door? If you see anything like this, put it away.

Take a look at your yard, too. Is there anywhere a burglar could hide, such as behind an overgrown shrub? Are there any trees that a burglar could climb to gain access to second floor windows? If ‘yes,’ make sure you trim these down.

Burglar-Proof Your Home

You also want to make sure that your home is as burglar-proof as you can get it. Think smart. For instance, on a warm spring or summer day, you might leave a window open to bring in some fresh air, and then go out for a bit. This is just an open invitation to a burglar to come right in. So, make it a habit to check all windows and doors before you leave.

Burglar-Proof Your Doors

Also, make sure that your doors are burglar-proof. The best doors are solid, not hollow. Hollow doors are easy to kick in. Then walk up to your front door and with all your might try to kick it in. I’M KIDDING! Seriously, do not kick in your door! But, I’ll bet you could if you tried. Know why? Because the door frame and molding is made of one half inch thin pine wood. Check out this video on how easy it is to kick in a door. The actual “kicking” starts right at the 10:00 minute mark where it shows the Door Devil door reinforcement kit doing its job then at 12:00 minutes without the kit and with a swift “donkey” kick, the door smashes right in.

Also, make sure you have a good lock on the doors…and always use them.

Don’t Let Burglars Know You are Away

Burglars can usually tell which homes have people in them and which don’t. Some of the signs that the owners are gone include empty driveways, mail or newspapers piling up, or grass that is in need of mowing. So, before going on vacation, put a hold on your mail and newspaper and talk to a neighbor, friend, or family member about mowing your lawn while you are gone.

Finally, try to resist posting about your vacation on social media until you get home. You don’t want to publically announce to everyone that you are gone and that your home is sitting empty. Save your photos and posts until you get home.

Robert Siciliano personal security and identity theft expert and speaker is the author of Identity Theft Privacy: Security Protection and Fraud Prevention: Your Guide to Protecting Yourself from Identity Theft and Computer Fraud. See him knock’em dead in this Security Awareness Training video.

15 Tips to Ensure the Safety and Security of Your Home

When is the last time you thought about the safety and security of your home? How about thinking about it right now? Do you do the following? If not, start, today:

  1. Do you have propane tanks for a gas grill? Or gasoline cans with gas in them? They aren’t supposed to be stored inside. Put them is a safe secure place where kids can’t access them.
  2. Do you have both smoke and carbon monoxide detectors? When is the last time you inspected them? Check the batteries and make sure they are not collecting lint and dust. If you can, integrate them, too. This way, if one goes off in the kitchen, the detectors throughout the house will also get triggered. Set a note in your calendar to replace the battery’s every 6 months.
  3. Does your mailbox lock? If not, consider upgrading to one that does. This way, mail that contains sensitive information won’t just sit out there for the taking.
  4. If you are using an extension cord outside, make sure that it is made for outdoor appliances. Others can cause fires or trip causing other issues.
  5. Don’t leave any notes on your door claiming that you will be home later. This is the case even if you are expecting a package.
  6. Understand that if there is a power outage, your food in the freezer should last for up to 48 hours. Use a generator or stock up on non-perishable food.
  7. When you use an oily rag, put it outside to dry. Then, store it in a metal can with a secure lid. Even if it looks dry, an oily rag is still flammable even if it isn’t in contact with flames.
  8. Don’t try to charge a non-rechargeable battery. This could make it explode.
  9. To dissuade burglars from getting into windows, plant thorny shrubs and bushes around them.
  10. If you have a home security system, make sure everyone knows. Place the company’s decals and signs around your home and yard. If you don’t have one, buy and place signs up anyway. It will still dissuade burglars.
  11. When it snows, shovel the driveway and create a path to your home. This shows the bad guys that someone is home. And various town and city ordinances require this or you’ll get fined.
  12. Before you leave on vacation, set your home phone’s ringer on mute. This way, if a burglar is staking out your home, your phone won’t be a dead giveaway.
  13. Before you leave town, put a hold on your mail and newspaper. Don’t let it pile up.
  14. Also, ask a friend or neighbor to park their car in your driveway if you are away. This way, a burglar will always think someone is home.

While away on vacation, don’t post about it on social media. Burglars often search social media sites to see who in the neighborhood is away.

Robert Siciliano personal security and identity theft expert and speaker is the author of Identity Theft Privacy: Security Protection and Fraud Prevention: Your Guide to Protecting Yourself from Identity Theft and Computer Fraud. See him knock’em dead in this Security Awareness Training video.