Entries by Robert Siciliano

Protect Your Home without a Gun: Effective Ways

Yes, you can protect your home without a gun. Having been in the security industry for many years, I have instructed homeowners on proven ways to protect their home without using a firearm. Here are proven ways to protect your home without a gun. Pepper Spray This stuff works. Just getting the mist in your…

Mortgage Brokers put Client Data at risk

Your private information may not be safe with your own mortgage lender, even a small one, says cybersecurity firm HALOCK Security Labs. The leak may occur when data goes from applicant to lender. Seventy percent of the 63 U.S. mortgage lenders that HALOCK investigated allowed applicants to send private and financial data (like tax documents)…

10 Easy Ways to hide from spies

Who would have ever thought that that marvelous invention, the smartphone, as well as your tablet and PC, would give you cause for concern about hiding from spies? And when I say spies I mean anyone who has a vested interest in your information whether that is governments foreign or domestic or a spouse, employer,…

DIY Home Security Automation is easy

Take home security seriously—before the break-in. If you’re up for a great DIY project, get going with home security. Reinforce doors. What you see in cops and robbers TV shows is true: Doors really can be kicked in. But not if they’re reinforced with easy screw-on upgrades that can resist even a kung fu master.…

Dumb and Dead Criminals making news

Crime doesn’t pay—especially when you can’t read. A man in Chicago spent seven minutes disabling a lock on a local bars door, then kept trying to pull the door open even though a sticker on it said “PUSH.” Now that’s a dumb criminal, because even if he couldn’t read or didn’t notice the sticker, you’d…

Skimming Big Business targeting Big Business

Skimming means more than just cutting fat off steak; it’s also when a thief obtains data from that magnetic strip on the back of your credit card (or debit or ATM card). The thief records and copies this data with a counterfeit card reader onto a blank card’s strip, and then makes purchases or cash…

Connected Home Security is Smart

How would you like to carry on a conversation with your home while you’re away? Get the latest scoop is on its safety and security? Schlage, America’s most trusted lock brand, wants you to get connected to your home. With today’s home security technology, the internet and your smartphone, you can do just that. Don’t…

7 Laptop Security tips for the Traveler

Here are nine ways you can add a lot of security to your laptop when traveling. Bag it. Keep the laptop in a sturdy bag that’s specially designed for laptops. The sleeve should be well-padded and the bag TSA-compliant. The bag should be collapsible and expandable (depending on contents), and easy to wear near your…

The Definitive Guide to Facebook Security

Social media is permeating every facet of our lives. It is extremely important to understand security and privacy settings with so much personal information becoming so accessible. Here is the definitive guide to security on Facebook: Step One Logging In Social Authentication: Facebook uses social authentication to verify your account. This system asks you to…

Evaluating Physical and Information Security Risks

When it comes to protecting an organization’s information, flaws with this can involve either implementing strong technology to protect too much trivial data, or inadequate protection of important and sensitive data. In short, not enough attention is cast upon a company’s most important information; there’s a gap between the IT department and the operational units…