Entries by Robert Siciliano

How to store Water for long term Survival

Here’s what everyone should know about how to efficiently store water to be prepared for a catastrophe. Ever thought about the possibility that your water service could cease in the event of some kind of catastrophe? Would you have enough for your children to drink for a week? If you live in the Southwest, what…

What is a Man-in-the-Middle Attack?

There’s a reason why most people feel uncomfortable about the idea of someone eavesdropping on them—the eavesdropper could possibly overhear sensitive or private information. This is exactly the risk that computer users face with a common threat called a “Man-in-the-Middle” (MITM) attack, where an attacker uses technological tools, such as malware, to intercept the information…

How to Respond in an active Shooter Scenario

Here’s how to respond if a shooting breaks out. There’s no such thing as a perfect world in which guns and bullets don’t exist. Would you know what to do in the event of an unexpected shooting situation? The first thing you should do in a shooting crisis is to remain calm, even though your…

Risk Reduction: #1 Concern of Bank Boards

The Bank Director’s 2014 Risk Practices Survey reveals some very interesting information about the risk management programs that bank boards have in place. It’s classically challenging for many banks to assess how risk management practices affect the institution. However, banks that have worked at measuring the impact of a risk management program report favorable outcomes…

Home Invasion ends in Death

A man died at the hands of two intruders who invaded his home in Sacramento County recently. The 30-year-old victim had been shot. According to witnesses, two intruders barged into the apartment, then shot the man, but not before stealing some of his belongings. Can something like this be prevented? Most likely, even though we…

How to safely and securely recycles Devices

Don’t just throw out your old devices; take measures to protect your personal information. Back Up Before ridding your device, back up everything on it—everything. Use an automated PC service and/or a flash drive. For the iOS and Android, activate Apple’s iCloud or the Google Auto Backup service. Wipe Wiping refers to removing all your…

Spring Clean Your Online Reputation

Spring is fast approaching, which means that spring break and college graduation are not too far away. Things could get ugly if your friends take photos of you acting foolish and then post them online for everyone to see. Whether you’re searching for your next career move or are on the verge of graduation and…

Ransomware Attacks Small Businesses

The rate of malware (ransomware) attacks on small businesses climbs at an alarming rate. The security firm McAfee warns that soon, attacks that come through social platforms will be “ubiquitous.” Small businesses are typically not able to subsidize the internal security placements to fend off these attacks, which mostly come from abroad. Ransomware blocks your…

Medical Identity Theft Protection And Prevention

Identity theft can be fatal to the victim — if it’s of the medical kind. Medical ID theft can result in getting the wrong blood type during a transfusion, the wrong diagnosis or the wrong prescription — all because the thief’s medical history gets integrated with the victim’s. I hope you’re scared, because that’s my…