How Much Do You Know About Identity Theft?

You would think with all of the attention on the news out there about hacking, data breaches, and identity theft, that people would be very focused on privacy and protecting their information from the bad guys.

Identity Theft Awareness Check

We all have a lot going on, and identity thieves know this. Always watching, these guys are betting on us being too focused with our day to day lives to notice who we are ultimately sharing our important information with. They literally are waiting for us to make one wrong move.

Are You a Victim of Identity Theft?

The shocking truth is that most of the people who become victims of identity theft don’t even realize it. You could be a victim right now and be none the wiser.

Why? Because generally, a person doesn’t know if they are a victim until they get a notification from their bank or other financial institution Each year, there are more than 16 million people who have their identity stolen.

How is it possible to share your information so easily? Well, there are a couple of ways to do it. For instance, you might have gotten married, you may give away too much information on your social media accounts, or you might have replied to a fake email, phone call, or text.

On top of this, a major life event can put you at a higher risk of becoming a victim, such as getting a new job or having a baby.

How Dangerous is Identity Theft?

Most of us consider identity theft to just be something like credit card fraud, but it is a lot more than that. Though this is common, an identity thief can do a lot more than simply open up a credit card in your name. They can also:

  • Open up a bank account and make changes to your billing address, meaning you would have no idea.
  • Taking out a big loan, such as an auto loan or mortgage, and not paying it off.
  • File a fake tax return, and then taking the money that comes from it.

If you are a victim of identity theft, you might be dealing with it for a number of years to come, and it is a big struggle to clear your name and fix your credit score.

How to Protect Yourself

Thankfully, there are a number of ways that you can protect yourself from being a victim of identity theft. Some of them include:

  • Don’t give your Social Security Number out unless it is totally necessary
  • Don’t allow mail to sit around
  • Don’t respond to any requests for information that seems suspicious
  • Don’t create simple passwords for online accounts

Written by Robert Siciliano, CEO of Credit Parent, Head of Training & Security Awareness Expert at Protect Now, #1 Best Selling Amazon author, Media Personality & Architect of CSI Protection Certification.

When its Tax Time, Protect Your Identity

Tax time comes around every year, and though you technically have until April 15th each year, if you can, file earlier. There is a good reason for this; you can avoid putting yourself in a position to get your identity stolen.

How Filing Your Taxes Can Compromise Your Identity

Robert Siciliano, CSP, SAFR.MEYou might be wondering how you can become a victim of an identity thief just by filing your taxes. There are a couple of ways scammers do this. First, the thief will use your Social Security number to file taxes, but plug in their mailing address and then when your refund comes around, they take your refund.

The second way that a scammer can steal your identity is that they take your Social Security number, get a job with it, and the employer will report their earnings to the IRS. When this happens, the IRS sees it as very suspicious, and you could get stuck paying a huge tax bill.

In both cases, there could be big problems ahead for you. For example, you might not be able to get a refund or even file your taxes. There is also the chance that they have used your Social Security number to get a loan, a credit card, or cash.

How Thieves Access Your Information

The main question you might be thinking here is this: how would an ID thief get your Social Security number in the first place? Typically, they would do this by hacking. For example, there was the huge Equifax hack. 145 plus million people were affected, and you could have been involved in it. It’s easy, when these breaches happen, hackers bathe in your information.

What Can You Do if You are a Victim?

If you are a victim of a scam like this, there are some things you can do:

  • Submit Letter 5071C to the IRS – This is a form that the IRS will send if your tax return looks suspicious.
  • Submit Form 14039 – This form alerts the IRS that you believe you are a potential victim of tax ID theft.
  • Ask for an Identity Protection PIN – The IRS will give you this number so that it can confirm your identity for your future tax returns.
  • Make a Report to the Federal Trade Commission – You also should file a report with the FTC by going to IdentityTheft.gov.
  • Contact the Tax Office in Your State – Your state’s tax office might have other recommendations based on your personal situation.

If you have tried to file your taxes electronically and get rejected, you should still file a return by mail. Additionally, call the IRS Identity Protection Unit for assistance. An agent can help you start the process of taking care of the problem and ensuring your return is filed correctly.

Written by Cyber Security Expert Robert Siciliano, CEO of Credit Parent, Head of Training & Security Awareness Expert at Protect Now#1 Best Selling Amazon author, Media Personality & Architect of CSI Protection Certification.

The Ultimate Guide to Spotting Fake News

Do you know when something is “fake news?” If you have half a brain, you should. However, when someone in authority makes a claim, the masses who elected that person into that authoritative position, automatically trust what has been said and spread that fake news. That needs to stop. My mother one said believe nothing of what you hear and half of what you see. And today no matter what, don’t automatically believe what you read.

fake newsThere has been a lot of talk about fake news since the 2016 presidential election, and a lot of controversy from those who spread fake stories for the purpose of influencing hearts and minds and of course the outcome of the election. This is dangerous for dozens of reasons, many of which threaten our democracy and in many cases can lead to people getting killed which has happened many times this year.

Keep in mind that not all people who spread or start fake news stories are propagandists, some are thieves and even more are advertisers. Some people just want you to come to their website so they can get clicks and traffic. Advertisers use fake news, as a way to get more clicks. This isn’t really dangerous to you, but someone is getting money because you are clicking on their site.

Other people use fake news, too, including those who want to facilitate identity theft. There are fake news sites that you click on, and then when you visit the site, you get a virus. From there, a hacker can get access to your personal information including your logins and passwords, bank account information, or even your Social Security number.

Here are some things to look out for:

  • Use common sense when looking at fake news stories. If it sounds too sensational, it probably is fake.
  • If a story is an obvious parody, it’s also obviously a fake news story.
  • If you already know some of the facts of the story, and something seems weird about the story you are reading, it’s very possible that the news is fake.
  • Look at the URL where the story is found. If it looks strange, the story is likely fake. For example, if you see a URL ending with “.com.co,” it’s a website from Colombia.
  • If there is a photo and the photo looks fake, the story is likely fake, too. But, this isn’t always the case.
  • Don’t just automatically trust.
  • The main stream media has been vilified over the past four years. And while their news is often “biased”, it’s not fake. It’s based on fact, but again those facts may be slanted in favor of the readership. Fake and biased are definitely not the same thing.

Look Closer at the Photos

Many fake news stories have photos that accompany them. Here’s how to test if a realistic photo is accompanying a fake news story.

  • Take a screenshot of the photo, making sure to exclude any graphics that are not relevant.
  • Open Google Images.
  • Upload or drag the screen shot to the search area in Google Images.
  • You will then see information about the “best guess” for the image. If the information doesn’t correlate to the story, you are probably reading a fake news story.

You can use this trick in other ways, too. For instance, if you do online dating, you can see if the person you are talking to is actually who they say they are. If not, they are a faker.

Additionally, you can do this with any image that you have. If the Google Image search gives you information that doesn’t correlate with what you think it does, it is likely a scam. Keep in mind that crooks like identity thieves often steal images and use them as their own.

When you are in doubt, it is always best to do a search on the item to see if other news sources are reporting on it, too. If the only place the story is seen is on a no-name site, you should suspect that it’s fake. If it’s not also being reported by the New York Times or Wall Street Journal, it’s probably fake.

ROBERT SICILIANO CSP, is a #1 Best Selling Amazon author, CEO of CreditParent.com, the architect of the CSI Protection certification; a Cyber Social and Identity and Personal Protection security awareness training program.

How to Protect Your Parents from ID Theft

According to research, people who are older than 50 years old, usually in the 65 to 85-year old range, are common targets of ID thieves. These criminals have no issue taking advantage of these people. They know that they are trustworthy, that they don’t know much about the internet, and that they are not savvy about scams. The bad guys also know that these people have more savings and retirement cash than others, and they are ready to take it. Here are some ways that these criminals scam your parents:

old parents

  • They often send emails to older people saying they are from their bank, the IRS, the FBI, or the CIA. The email claims that there is an issue that requires their attention. Then, they ask for information like their Social Security number or even their bank account numbers.
  • Another common scam is to toy with their emotions. In this case, the criminal calls the older person and says that they are someone the person knows, such as a grandchild, and claim that there is an emergency and they need money.
  • These scammers also try to take advantage of older people by using information about their homes. For instance, they can access a deed, and then use their Social Security numbers and bank account information to refinance, and then take the money.
  • The bad guys also take advantage of people who are in retirement homes. They start working there, and then manipulate the people living there to offer up personal info.
  • These criminals also seek out lonely people. If your parent is single, for instance, they can be a target because they are lonely and crave attention, resulting in a bank account draining romance scam.

How to Prevent Scams Against Older People

It is likely that you want to do all you can to prevent this from happening to your loved ones. Here are some tips:

  • Become the main caretaker for your parents’ personal info and financial accounts. This way, if your parents are contacted by someone suspicious, they have to go through you to get information. Even info like your mom’s maiden name can be used to commit some type of scam in the future. Make sure your parents are aware that they should not ever share any personal info, and that any request for money should go through you.
  • Do not share any personal information on any social media site. Criminals look for this, and they can target your parents by doing things like posing as their grandchildren online.
  • Make sure your parents check bank accounts and credit cards with regularity. Also, set up on your email and phone push email and text alerts about their account activity.
  • Buy them a shredder to get rid of things like bank statements. Criminals love to go through the trash to look for old financial statements.
  • If they use Wi-Fi, set up a VPN for them. Hotspots are public, and criminals can use them to get information.
  • If your parent passes away, don’t include any personal information about them in their obituary. Crooks use this information in malicious ways.
  • Talk to them about being safe with email. A common scam is phishing, and even if an email looks legitimate and safe, no one should click any links in them.
  • Help them understand the difference between http and https. Make sure they know that only https sites are secure.
  • Also, help them opt out of offers that are unnecessary. You can sign them up at com.
  • Talk to your parents about freezing their credit.

Stay Away from Scams

Do your best to not allow your parents to be the next victim of a scammer. It is easy to prevent this, and your parents will not have to go through the stress associated with identity theft.

Protect Their Identity

Any of us can become victims of ID theft, and we cannot protect ourselves every minute of the day. However, by taking these tips to heart and signing your parents up for ID theft protection and doing a credit freeze, you can keep them safe.

ROBERT SICILIANO CSP, is a #1 Best Selling Amazon author, CEO of CreditParent.com, the architect of the CSI Protection certification; a Cyber Social and Identity and Personal Protection security awareness training program.

Is Identity Theft Protection Really Necessary or is it a Waste?

I am constantly seeing articles and blogs that ID protection is not a necessity. These might be called “The Poor Man’s Guide to Identity Theft Protection,” or “Identity Theft Protection Doesn’t Work.”  Though some of the things mentioned in these articles are true, overall, they are totally missing the point.

Identity TheftHere is the situation. You cannot possibly protect yourself from every type of identity theft out there, and when you can, it really requires a lot of work. No matter what, it’s going to be time-consuming, can cost you money, and even make you pretty anxious.

For those who have chosen not to make an investment into identity theft protection say that they don’t have to because they can do it themselves. Here is what they do:

Shred Your Mail, and Be Safe

One of the things that people do to make sure their identity is safe is to always shred their mail. This is especially important when the mail contains account info. However, this step isn’t enough. Yes, you might be doing your part, but how can you be sure that your mortgage company, bank, or even water company is not simply throwing paperwork with your account information in a dumpster. Once it’s there, anyone can take it.

Opt Out of Junk Mail and Pre-Approved Credit Card Offers

Opting out of pre-approved credit card offers and other junk mail is pretty easy to do. You can do it right online at OptOutPrescreen.com. Just keep in mind that some of them will still get through and end up in your mailbox and maybe get stolen.

Pay for a P.O. Box

I’m not totally sure why people believe that it is safer to use a P.O. box, but they do. Technically, your mail is more secure at the Post Office than in your mail box, but it really doesn’t help too much. Otherwise get a locking mailbox.

Check Credit Reports

You should always be checking your credit report, but those who think they can stop ID theft by checking their credit report are not quite correct. Once you see a problem on your credit report, the damage has already been done. Ideally, you should check your report more than once a year, but you can get a free credit report online at AnnualCreditReport.com.

Set Up a Fraud Alert

Another thing that people do because they think it protects them from ID theft is set up fraud alerts. Fraud alerts are good, but they are only valid for 1 year, and most people forget to renew them. On top of this, they are simply guidelines for creditors, and they don’t even have to contact you if they see a fraud alert.

Credit Freezes

People also believe that they are totally safe if they freeze their credit. This is a good thing, and I do think everyone should look into it, but it doesn’t protect you from all types of ID theft. This includes account takeovers, tax-related ID theft, and medical ID theft.

Though all of these things can help, and in some cases, can greatly help, they are no replacement for professional identity theft service. Instead, they can put you in a tough position.

ROBERT SICILIANO CSP, is a #1 Best Selling Amazon author, CEO of CreditParent.com, the architect of the CSI Protection certification; a Cyber Social and Identity and Personal Protection security awareness training program.

Prevent Bitcoin Fraud by Securing Your Identity

Are you thinking about jumping onto the Bitcoin train? If so, you might be worried about security. The truth is, Bitcoin is definitely secure, but as with anything, there are bad guys out there who are ruining it for many. Bitcoin identity theft is when a criminal steals your identity and poses as you by phishing your passwords or hacking your computer. Here are some common cryptocurrency scams that can be prevented and some tips to protect yourself:

Bitcoin Private Security Keys:

What are they? A Bitcoin private key is a number only you should know, a secret number which allows bitcoins to be used in commerce, traded, exchanged etc. Bitcoin wallets contains the private keys and are mathematically related to all Bitcoin addresses generated for the wallet.

How do they work?

When a private key is entered in a wallets “transaction” window meant to move your funds from one wallet to another, the transaction is broadcast and sends the balance to a new address in another wallet. Simply, they are for spending and sending your bitcoins to anyone and anywhere.

How to get one?

This secret, alphanumeric password/number that is designed to spend and send your bitcoins to another Bitcoin address. Is a 256-bit long number which is picked randomly as soon as you make a wallet.

Protect Your Security Keys

The private key “ticket” allowing its owner spend bitcoins and like cash, they must kept secure. Private keys are usually stored on computers, and can be printed on paper.

Again, it’s so important that you protect your private security key. Remember, if someone gets this key, they can spend your currency.

Backup All Security Keys

If you are using private keys for your cyber currency, make sure that they are backed up on a offline

You Give Up Your Private Key

Another mistake that people often make is to give up your private key. Again, cyber criminals can get this information through your email or maybe over the phone. They also can hack into your computer and access your key if you have it stored there.

Preventing It

Keep your devices as secure as possible using security software and keeping your operating system updated. Maybe always store your private key off of your computer. You can write it on paper or store it on a USB drive. Make sure to keep this information locked up somewhere, like a safe or safety deposit box.

Cyber Thieves Steal Passwords

Many people use services to store their currency. However, to access these, you must have a password, and cyber thieves know this. So, they break into your email, ask your chose storage service to reset the password, and this gives them access to your currency.

Preventing It

To prevent this, make sure to use two-factor authentication for both your email account and your cyber currency storage account.  And don’t use the same password (password re-use) for any critical accounts.

The Bad Guys Start Impersonating

You also must make sure that you don’t get scammed by a bad guy impersonating a cyber currency employee. They might, for instance, contact you over the phone of via email about initial coin offerings. They ask you to send Bitcoins to them for fundraising purposes, but then promise that you will get that back with a return on that investment. Wrong. They just steal it.

Preventing It

Always confirm that you are investing in legitimate companies. Contact them directly

Keeping Your Bitcoins Safe

There are other things that you can do to keep your cyber currency safe, too:

Use a VPN for Your Transactions

When trading cryptocurrency, make sure to use a virtual private network, or VPN. These networks scramble your data so hackers, even if they access it, can’t read it.

Keep Separate Wallets

Instead of using a single wallet for all of your currency, it’s best to have at least two; a “hot” wallet, which is used for your various day to day transactions, and a “cold” wallet, which is where you store your currency. Think of it like a checking account (hot) and savings account (cold.)

Additional Security Tips

Finally, here are some additional security tips to keep all of your accounts safe:

Password Tips

  • Make sure every online account you have has a long, strong password. This should be a combination of letters, numbers, and symbols. Also, make sure that you have a unique password for every account.
  • All passwords should be 8 to 12 characters. Use both upper-case and lower-case letters, and make sure that you aren’t making it easy to guess. For instance, “hwR7os$9*” is a much better password than “IL0veD0gz.”
  • Use two-factor authentication on all of your accounts. This way, even if someone gets your password, they can’t get into your accounts unless they also have access to your cell phone.

Antivirus Tips

  • Antivirus software is required, but it’s not going to keep your devices completely safe. Yes, this software will keep the vast majority of viruses and bugs out of your system, but not all of them.
  • Make the investment and buy your antivirus software instead of using a free one. The paid versions come with other services like firewalls and antispyware. This helps to keep your information even safer.

Updates to Your System

Finally, make sure that you are always updating your computers, tablets, and smart phones. Yes, those pop-ups are annoying, but try to resist clicking the “remind me later” option. Many times, these updates contain important security updates that protect your device and data from becoming vulnerable. It’s also a good idea to set up automatic installation of these, so you never have to worry about it.

ROBERT SICILIANO CSP, is a #1 Best Selling Amazon author, CEO of CreditParent.com, the architect of the CSI Protection certification; a Cyber Social and Identity and Personal Protection security awareness training program.

Protect Your Identity From Thieves

There are tried and true ways to protect yourself from identity theft—ways that you may not have even considered.

Evaluate your passwords. Does every online account have a different password or are you using the same one for multiple accounts? Fix this problem immediately by investing in a password manager software. Avoid using actual words or names, or keyboard sequences. Password managers facilitate the password creation process.

Never post anything personal on social media.This includes your pet’s name, name of your kids’ school or teacher, where you’re going on vacation, the town your parents live in, etc.

Ignore e-mails whose senders you don’t know. Never click links in e-mails or open attachments you’re not expecting.

Set your phone up with a password. If it’s lost or stolen, you’ll have no worries.

Shred everything. All your credit card offers, medical records and other personal information before tossing.

Never give it out your Social Security number unless it’s absolutely mandatory like a credit application. However, just because someone says they can’t process your request without your SSN doesn’t mean you must hand it over. The objective is to minimize how much your SSN is “out there.”

Request your free credit report every year from the three major credit reporting bureaus. Refute unauthorized accounts immediately.

Inspect your statements such as credit card and banking statements every month for suspicious activity.

Use a locking mailbox or have your mail delivered to the post office and pick up.

Stop mail delivery when taking long trips.

Get a credit freeze. This is a no brainer to protect you from new account fraud.

Invest in identity theft protection. There is no cure for identity theft. But with a protection plan in place, the restoration component will fix most of what goes wrong.

ROBERT SICILIANO CSP, is a #1 Best Selling Amazon author, CEO of CreditParent.com, the architect of the CSI Protection certification; a Cyber Social and Identity and Personal Protection security awareness training program and the home security expert for Porch.com

Covid-19 Remote Desktop Has Significant Risks

Are you newly working from home? Or are you an old pro? Either way, it is likely you are using some form of remote desktop protocol. Those of us who have been working home as our primary means of earning a living, know these tools very well and are accustomed to eliminating the various distractions in our home environment in order to get the job done. There are some precautions to be aware of.

None of us think that we are going to get hacked, even though we have seen time and time again that it is very possible. Even the largest companies in existence have been hacked, and small businesses are even more at risk. You can add even more to this risk if you use a software called Remote Desktop.

Basically, Remote Desktop allows you to access computers remotely in your home or office and give network access to employees who are working remotely. However, when you give or have this access, you are opening up your network to hackers. Thousands of companies and individuals have fallen victim to this, and just one successful hack can be devastating to a small business.

Remote Desktop: What is It?

Remote Desktop, or RDP, is a very common software. In fact, if you have Microsoft Windows, you probably have this software and don’t even realize it. Though it is a very powerful tool for businesses, it is also not very secure.

Criminals know this, of course, and they have created a huge variety of tools to hack into this software. When they get access to the network, criminals can access company information and then take things like log-ins and passwords. Once they have this, they can buy and sell them so that other criminals can use them to access your network. Once they are in, they can do almost anything.

Are You at Risk?

There are estimates that there are over three million companies that theoretically have access to Remote Desktop. Most of them are small businesses and many manage their own IT services in house. If you are a small business and you have an in-house IT department, you could definitely fit into this category. What’s more is that hackers tend to target these businesses, too. Any company that has RDP access enabled is a target of hackers.

What Can You Do About It?

Hopefully at this point you are wondering what you can do to protect your business from hackers who like to access networks through RDP.

  • If you aren’t using remote desktop, then the first thing you should do is to remove Remote Desktop from your network.
  • Make sure to update your operating systems critical security patches which will inevitably update any software around remote desktop protocol.
  • Update all software that could allow remote desktop to be vulnerable
  • Make sure your wireless connections are encrypted which generally means password-protected.
  • If you have a good reason for keeping it, you can also choose to restrict access by setting up a virtual private network, or VPN.
  • Additionally, you can create a firewall to restrict its access
  • Setting up multi-factor authentication is also a good idea if you want to keep this software.
  • Just be aware that none of these solutions are fool proof except totally deleting the software.

ROBERT SICILIANO CSP, is a #1 Best Selling Amazon author, CEO of CreditParent.com, the architect of the CSI Protection certification; a Cyber Social and Identity Protection security awareness training program.

What is Synthetic Identity Theft?

Identity theft is when a person steals another person’s private and personal information, generally to make money from it. You probably already knew this, but have you heard of synthetic identity theft? This is a bit different.

With synthetic identity theft, a person creates a new and very fake identity by combining the real information from a person with made-up information. You might not think this is a big deal, but it can be very bad for anyone who has their identity stolen.

Here are three ways that ID thieves can create synthetic identities:

Creating a New Credit Profile

The most common way to create a synthetic identity is to create a new credit profile using the victims SSN but a different name. Basically, they apply for credit using these fake identities. Generally, the application will be denied, but in the process, it creates a credit profile. Then, they can apply to companies that cater to people with poor or no credit. Though the card limits are typically small, less than $500, it still gives them money.

The Piggyback

Another thing that people do to create a synthetic identity is the piggyback. Basically, they look for people who have good credit, and then add a fake person as an authorized user to the account. They do not use the account, however. Instead, they let it sit for a few months. The credit agencies create a report of the synthetic identity, who now has an excellent credit rating and can get high limit credit cards.

Data Furnishing

The third tactic is called data furnishing. This is quite effective and sophisticated and requires the participation of someone from some type of business. Basically, they need a small business owner or manager who is willing to help with this fraud. The company is already vetted and is then approved to offer information on customers. They allow fake IDs, or synthetic identities, for malicious duties. This generally takes several months to set up, but the thieves can make a ton of money.

Right now, it’s hard to really pinpoint the financial impact of what these synthetic identities have, though it is believed that it has caused billions in losses. That means, however, for an ID thief, there are billions to be made. Fortunately, there are some things you can do to protect yourself including being very careful about the information you are sharing, especially on social media. Also, make sure you have a credit freeze and identity theft protection and that you are regularly checking your credit report.

ROBERT SICILIANO CSP, is a #1 Best Selling Amazon author, CEO of CreditParent.com, the architect of the CSI Protection certification; a Cyber Social and Identity Protection security awareness training program.

Your Uber Driver May be a Criminal

Do you Uber? If you do, you probably feel pretty safe getting into the car of a stranger. However, you might not be as safe as you think.

Most people take for granted that Uber does background checks on its drivers, but there are actually a number of shady drivers who have recently been accused of crime, and it’s definitely not the first time they have had run ins with law enforcement. Some of these people are accused of committing crimes against their passengers, and that’s where things really get scary.

CNN recently took a look at both Uber and Lyft and found that both companies approved hiring thousands of drivers who have criminal records. Uber responded to this report by saying it knows that there were some hiring mistakes in the past, but they have improved the way they hire, and in 2017, rejected more than 200,000 people because of issues on the background check. However, both companies are not keen to adopt more scrutiny in the screening process.

Several state and local law enforcement agencies are pushing the companies to put more focus on potential drivers. Right now, for instance, they don’t do any fingerprinting nor federal background checks. Instead, both Uber and Lyft use a third-party background check company. It uses the name and Social Security number of potential drivers to check the national sex offender database, local court records, and suspected terrorist databases. The goal is to get drivers on the road as soon as possible, and many of these checks are instant.

Currently, there are 43 states that require screening for rideshare services, but these laws don’t say that the companies have to use a specific company or screen in a certain way. Instead, 42 of these states allow rideshare companies to take responsibility for the screening. Only Massachusetts requires a company background check and an additional check, which is done by the state. Only New York City requires rideshare drivers to have fingerprinting done.

It’s also worth mentioning that just because a company does background checks that include fingerprinting, it isn’t always fool proof. The FBI system that is used for this has incomplete records and it is not meant to be used in this way.

As someone who uses Uber, it’s important that you keep all of this on the back of your mind before you take your next ride. Yes, there is some type of background check done, but don’t let that fool you; your Uber driver could still be a criminal.

ROBERT SICILIANO CSP, is a #1 Best Selling Amazon author, CEO of CreditParent.com, the architect of the CSI Protection certification; a Cyber Social and Identity Protection security awareness training program.