Entries by Robert Siciliano

How To Stop Criminal Hackers In Their Tracks

Do you offer free WiFi? Put these three safeguards in place to protect your customers and your business. On a recent trip from Boston to New York on an Acela Express train, I was writing blogs and doing some research using Amtrak’s free wireless Internet. “Free” usually translates to “unsecured,” which means a criminal hacker…

What is a Denial-of-Service Attack?

You may have heard news reports about popular websites such as CNN, Amazon and Yahoo! being taken down by a DoS attack, but have you ever wondered what DoS means? This common tech term stands for “denial-of-service,” where an attacker attempts to prevent legitimate users from accessing a website entirely or slowing it down to…

10 Simple Tips to Bank Safely Online

One of the issues I’m passionate about, as an online-security analyst, is that of banking safely online; so I recommend the following simple tips to help ensure your security in cyberspace. Wired ethernet link. This offers more security than does a powerline or Wi-Fi network. In fact, the powerline carries your data via electrical wires—not…

Health Care Information Breaches rise

Medical errors can also mean medical identity theft—accounting for 43 percent of all 2013 identity theft in the U.S., says the Identity Theft Resource Center. Medical identity theft kicks other forms of ID theft to the curb: banking, finance, government, military and education. Fraudsters invade health data to illegally obtain prescription drugs, services or devices…

Prowler Alert issued

Two men, impersonating San Jose police officers, waltzed through the unlocked door of a woman’s home and told her they were there to check on her welfare. This happened in the early evening, and the men were described as being Hispanic and 5-7 and 155 pounds. They presented the woman with identification but she smelled…

Kidnapping’s 3 Stages: Lure, Induction, Captivity

As a security and safety expert, I often lecture about all the facets of a kidnapping. There are three basic stages or phases of the kidnapping experience.  The Lure Kidnappers premeditate and precalculate every move. Months of planning could go into an abduction that takes only seconds. The circumstances have to be perfect, like a…

Data Breach Notification Bill goes to the House

H.B. 224, a newly introduced data breach notification bill for New Mexico, would mandate that organizations notify breached individuals within 10 days of breach discovery (unencrypted credit card data); and within 10 business days notifying the state attorney general if more than 50 NM residents are affected. The bill allows for a shorter notification deadline…

7 Social Media Security Tips To Protect Your Business

Your employee’s online life could open your business to some serious dangers. Many small businesses recognize the benefits of having a social media presence for customer service and long-term marketing purposes. However, many are slow to recognize social media’s security issues and how employees’ own social presence can add to the company’s security issues. Some…