Posts

Protect Your Identity From Thieves

There are tried and true ways to protect yourself from identity theft—ways that you may not have even considered.

Evaluate your passwords. Does every online account have a different password or are you using the same one for multiple accounts? Fix this problem immediately by investing in a password manager software. Avoid using actual words or names, or keyboard sequences. Password managers facilitate the password creation process.

Never post anything personal on social media.This includes your pet’s name, name of your kids’ school or teacher, where you’re going on vacation, the town your parents live in, etc.

Ignore e-mails whose senders you don’t know. Never click links in e-mails or open attachments you’re not expecting.

Set your phone up with a password. If it’s lost or stolen, you’ll have no worries.

Shred everything. All your credit card offers, medical records and other personal information before tossing.

Never give it out your Social Security number unless it’s absolutely mandatory like a credit application. However, just because someone says they can’t process your request without your SSN doesn’t mean you must hand it over. The objective is to minimize how much your SSN is “out there.”

Request your free credit report every year from the three major credit reporting bureaus. Refute unauthorized accounts immediately.

Inspect your statements such as credit card and banking statements every month for suspicious activity.

Use a locking mailbox or have your mail delivered to the post office and pick up.

Stop mail delivery when taking long trips.

Get a credit freeze. This is a no brainer to protect you from new account fraud.

Invest in identity theft protection. There is no cure for identity theft. But with a protection plan in place, the restoration component will fix most of what goes wrong.

ROBERT SICILIANO CSP, is a #1 Best Selling Amazon author, CEO of CreditParent.com, the architect of the CSI Protection certification; a Cyber Social and Identity and Personal Protection security awareness training program and the home security expert for Porch.com

It’s Tax Time: Play it Safe or Lose Your Identity

Once again, tax time has rolled around, and though you technically have until April 15th, it’s always best to file a bit earlier…especially if you want to avoid setting yourself up for ID theft.

How Could Filing Taxes Compromise Your Identity?

Here’s how you could become a victim of ID theft just by filing your taxes: the first method is that a thief uses your Social Security number to file taxes, and then they steal your refund. The second method that they use is they take your Social Security number, get a job while using your Social Security number, and then their employer reports that income to the IRS. When that happens, the IRS gets your return, flags it as suspicious, and you could get a big tax bill in the process.

Of course, in either case, you could face some big problems. You could, for instance, be unable to file your own tax return or collect your refund…at least for a while until the IRS sorts it out. You also might find that the thief has used your Social Security number to get credit cards, loans, or other cash that will wreck your credit.

How do Thieves Get Your Information?

The big question here is this: how do the ID thieves get your Social Security number in the first place? Generally, they do it by hacking. For instance, do you remember the Equifax hack from 2017? Millions of people were affected, and you, too, could have been involved in that. It’s possible that thieves could get your Social Security info from hacks just like this one.

What to Do if You are a Victim

If you learn that you are a victim of tax ID theft, there are some things that you can do.

  • Fill out Letter 5071C – This is a form that the IRS sends if it feels like your tax return is suspicious.
  • Fill out Form 14039 – This form alerts the IRS that you believe you are a victim or potential victim of tax ID or regular ID theft.
  • Get an Identity Protection PIN – This is a number that the IRS can give you to confirm your identity on any future returns.
  • Report to the Federal Trade Commission – You should also file a report at IdentityTheft.gov to alert the FTC of the situation.
  • Contact your state’s tax office – Also, make sure to contact the tax office in your state. It might have other recommendations for you.

If you have tried to e-file and get a rejection, you should still file a paper return via mail. Also, call the IRS Identity Protection Unit for help. An agent can get you started on taking care of the issue and make sure your taxes are filed appropriately.

ROBERT SICILIANO CSP, is a #1 Best Selling Amazon author, CEO of CreditParent.com, the architect of the CSI Protection certification; a Cyber Social and Identity Protection security awareness training program.

What is Synthetic Identity Theft?

Identity theft is when a person steals another person’s private and personal information, generally to make money from it. You probably already knew this, but have you heard of synthetic identity theft? This is a bit different.

With synthetic identity theft, a person creates a new and very fake identity by combining the real information from a person with made-up information. You might not think this is a big deal, but it can be very bad for anyone who has their identity stolen.

Here are three ways that ID thieves can create synthetic identities:

Creating a New Credit Profile

The most common way to create a synthetic identity is to create a new credit profile using the victims SSN but a different name. Basically, they apply for credit using these fake identities. Generally, the application will be denied, but in the process, it creates a credit profile. Then, they can apply to companies that cater to people with poor or no credit. Though the card limits are typically small, less than $500, it still gives them money.

The Piggyback

Another thing that people do to create a synthetic identity is the piggyback. Basically, they look for people who have good credit, and then add a fake person as an authorized user to the account. They do not use the account, however. Instead, they let it sit for a few months. The credit agencies create a report of the synthetic identity, who now has an excellent credit rating and can get high limit credit cards.

Data Furnishing

The third tactic is called data furnishing. This is quite effective and sophisticated and requires the participation of someone from some type of business. Basically, they need a small business owner or manager who is willing to help with this fraud. The company is already vetted and is then approved to offer information on customers. They allow fake IDs, or synthetic identities, for malicious duties. This generally takes several months to set up, but the thieves can make a ton of money.

Right now, it’s hard to really pinpoint the financial impact of what these synthetic identities have, though it is believed that it has caused billions in losses. That means, however, for an ID thief, there are billions to be made. Fortunately, there are some things you can do to protect yourself including being very careful about the information you are sharing, especially on social media. Also, make sure you have a credit freeze and identity theft protection and that you are regularly checking your credit report.

ROBERT SICILIANO CSP, is a #1 Best Selling Amazon author, CEO of CreditParent.com, the architect of the CSI Protection certification; a Cyber Social and Identity Protection security awareness training program.

Louisiana Woman Tries to Buy a Million Dollar Home with False Documents

Have you ever seen a house and thought…I wish I could afford that? Some people actually try it, but let this story be a lesson learned: if you can’t afford the cost of a house, you probably shouldn’t try to buy it.

Robert Siciliano Marriott Breach

Pamela Chandler was arrested and now faces forgery charges after she tried to purchase a home with a million-dollar price tag. How did she do it? She used false documents. Chandler, who also goes as Pamela Goldwyn, was arrested by a special Financial Crimes Task Force in Bossier City, LA. She also has several warrants out for her in Texas with crimes including fraud and the exploitation of certain groups of people including children, the elderly or the disabled. She was booked in jail and was not given a bond, as she is a flight risk.

According to court records, Chandler, who lists her age as 47, has a permanent address in Athens, Texas, but also has addresses in Maryland and Louisiana. A local Bossier City realtor reported her to local law officials after she tried to use illegitimate paperwork to buy the home. She claimed to have a trust fund, but the paperwork just didn’t add up. As the task force began to investigate the situation, it was found that she had also altered a letter from a layer to try to convince the realtor that she had enough in this fake trust fund to buy the home. It was also discovered that she had used a number of aliases over the years. It is believed that she uses an alias in a specific area until law enforcement catches on to her scams, and then changes her name and moves to a new area.

Much of the problem here can be blamed on easily obtained fake IDs. The fact is, our existing identification systems are insufficiently secure, and our identifying documents are easily copied. Anyone with a computer, scanner and printer can recreate an ID. Outdated systems exasperate the problem by making it too easy to obtain a real ID at the DMV, with either legitimate or falsified information.

Some of the department of multivehicle new requirements of improving facial recognition include not smiling for your picture or smile as long as you keep your lips together. Other requirements meant to aid the facial recognition software include keeping your head upright (not tilted), not wearing eyeglasses in the photo, not wearing head coverings, and keeping your hair from obscuring your forehead, eyebrows, eyes, or ears.

The fact is, identity theft is a big problem due to a systematic lack of effective identification and is going to continue to be a problem until further notice. In the meantime it is up to you to protect yourself. The best defense from new account fraud is identity theft protection.

ROBERT SICILIANO CSP, is a #1 Best Selling Amazon author, CEO of CreditParent.com, the architect of the CSI Protection certification; a Cyber Social and Identity Protection security awareness training program.

6 More Places to Put Your Identity on Lock Down

If you have been thinking about a credit freeze, you probably should know that the process is designed so that a creditor cannot see your credit report unless you specifically allow it. This process blocks any potential creditors from viewing or pulling your file, which makes it much more difficult for an identity thief to apply for new credit using your name or information. For links to freeze your credit at the 3 major bureaus go to How to Freeze My Credit.  However, there have been reports of people complaining of having accounts opened in their name while having credit freezes. So, if you already have a credit freeze at Experian, Trans Union, and Equifax, you also might want to consider freezing at the following companies, too:

Innovis Credit Freeze

Innovis is the 4th credit bureau you need to freeze with. The process is similar to the big three and its free. Go here to freeze your Innovis Credit Freeze.

National Consumer Telecommunications and Utilities Exchange or NCTUE

One place you should contact to freeze your credit through is the National Consumer Telecommunications and Utilities Exchange, or NCTUE. Many mobile phone companies, for instance, get credit inquiries done through this organization, so hackers can still open mobile phone accounts in your name, even if your credit is locked down elsewhere via the 3 major bureaus.

In general, only mobile phone companies use NCTUE, but there are other companies, like water, power, and cable companies that also use it. You can contact NCTUE to freeze your credit by calling them and giving them your Social Security number. You will also have to verify a few other details, but the system is automated, so it’s very easy. If the system can verify your identity, your credit report through this organization will be frozen. You can also get your NCTUE credit report and risk score by calling their 800-number 1-866-349-5355 or try to do it online here NCTUE Freeze but some say this links form doesn’t work well.

ChexSystems

You should also place a security alert with ChexSystems. This is a system that is used by banks to verify the worthiness of customers who are requesting new savings and checking accounts. When you request a freeze through this organization, it is only applied to your ChexSystems consumer report. If you want to freeze your credit at other companies, you must do it directly through them. For ChexSystems, you can do it here: ChexSystems Security Freeze.

Opt-Out Prescreen

You can additionally opt out of any pre-approved credit offers by calling 1-888-5-OPT-OUT or you can go online and visit the website Optoutprescreen.com.

myE-Verify Self-Lock via the Department of Homeland Security

The fourth organization you should freeze your credit with is called Self Lockvia the Department of Homeland Security. This freeze helps to protect you from any employment-related fraud. When you lock your Social Security number through this tool, it will stop anyone from using your Social Security number to get a job, which is another scam. If a Social Security number that has been locked is entered into the system, it will result in a mismatch, which will flag the number as fake. It’s easy to lock and unlock your identity through Self Lock, and each time you do it, it remains locked for a year. Once that year is over, you can choose to renew the lock, too. You can learn more online at the Self-Lock Freeze.

Social Security Administration

Finally, if you want to prevent any type of Social Security fraud, you should set up an account at the Social Security Administration. There are a number of Social Security scams designed to siphon your benefits or sensitive information. Your telephone may ring followed by and automated message saying your Social Security number has been “suspended” because of some suspicious activity or be threatened with arrest if you don’t call the telephone number provided in the automated message. Simply by setting up the account you can prevent someone else from setting it up as you and posting as you. Also you can check in with then SSA should you received any calls, emails or mail to determine the communications legitimacy. You can do it online,Social Security Administration Set-up.

Here’s your Freeze to-do checklist.

  1. NCTUE Freeze
  2. ChexSystems Security Freeze.
  3. com.
  4. Self-Lock Freeze.
  5. Social Security Administration Set-up
  6. How to Freeze My Credit.
  7. Innovis Credit Freeze.

Robert Siciliano personal security and identity theft expert and speaker is the author of Identity Theft Privacy: Security Protection and Fraud Prevention: Your Guide to Protecting Yourself from Identity Theft and Computer Fraud. See him knock’em dead in this Security Awareness Training video.

How to Protect Your identity When Buying or Selling a Home

If you are in the process of buying or selling a home, at some point, you are going to have to disclose personal information when you go through the process. Because of this, a home buyer, especially, is much more likely to become a victim of identity theft.

Here are some ways to protect your identity when buying or selling a new home:

Ask if Communication is Secure

One thing to do is to make sure your mortgage and real estate professionals are using secure electronic communications. If they can’t articulate their security, such as they use two step verification, etc, then they aren’t generally secure. Otherwise, you should drop documents off in person.

Ask How Personal Info is Handled

Another thing to do is ask your lender how they will handle your personal info after the loan is complete. Are documents able to be stored securely? Will they be shredded when no longer needed?

Ask About Security Policies

You should also ask about the security policies of your lender and/or real estate professional. If they don’t have a security policy, they aren’t secure.

Get a Referral

Ask people you know for referrals for mortgage and real estate professionals. Verify that their licenses are current. Do business with those who others know, like and trust.

Choose a Real Estate Team That You Trust

Buying a new home takes a full team on both the sides of the buyer and the seller. So, you have to make sure that you trust them and that all of their credentials are up to date. You should also do your best to read reviews online.

Be Aware of Frauds

Fraudsters are always out there, and they take advantage of people looking to buy a home. For example, according to investigators, a California woman would offer to buy a home on behalf of the buyer because the buyer was under funded or an illegal immigrant. After the buyer provided the deposit, she would never be heard from again.So keep your eyes open as you go through the process.

Recognize Money Wire Scams

When looking at the home buying process, a report by the FBI’s Internet Crime Complaint Center said email fraud involving real estate transactions rose 1,110 percent in the years 2015 to 2017 and fraud dollars lost rose almost 2,200 percent.

Nearly 10,000 people reported being victims of this kind of fraud in When looking at the home buying process, a report by the FBI’s Internet Crime Complaint Center said email fraud involving real estate transactions rose 1,110 percent in the years 2015 to 2017 and fraud dollars lost rose almost 2,200 percent.

Nearly 10,000 people reported being victims of this kind of fraud in 2017 with losses over $56 million, the FBI report said. Real estate is only now tightening its belt and fighting back., the FBI report said. Real estate is only now tightening its belt and fighting back. The moment a wire transfer is requested via email, tell your agent or broker you want to meet them at the office to discuss. End of story.

Be Cautious on the Internet

During this process, you will be filling out a lot of forms and giving out a lot of your personal information. So, to help prevent any identity theft, you should only use a secure device on a secure network. You also have to make sure that you are using strong, varied passwords, and if you have to print out copies of documents, you should hide any account numbers or Social Security numbers.

Use Credit Monitoring or ID Theft Protection

When making a large purchase like a new home, you should make sure to have real time credit monitoring and identity theft protection.

Freeze or Lock Your Credit Until Making an Offer

You also might want to consider freezing or locking your credit until you are required to have your credit checked. Both options prevent a creditor from accessing your credit report, which stops a criminal from opening a new account.

Credit locks are available from consumer credit bureaus for a small fee, and you can lock or unlock your credit whenever you want. A credit freeze is free but slightly cumbersome. Go free and learn it.

Get a Copy of Your Credit Report

It’s also a good idea to get a credit report if you are going to finance a home. Checking this report will give you a good idea of what you can afford each month, and it will allow you to see if there are any mistakes or unusual behavior on the reports.

Stay Safe During the Closing Process Finally, remember that fraudsters are always out there, especially when people are using large sums of money. The Federal Trade Commission estimates that people lost about $1.48 billion to fraud last year, alone. So, it’s imperative that you keep yourself safe by avoiding things like phishing schemes, and if something sounds too good to be true, it probably is.

Robert Siciliano personal security and identity theft expert and speaker is the author of Identity Theft Privacy: Security Protection and Fraud Prevention: Your Guide to Protecting Yourself from Identity Theft and Computer Fraud. See him knock’em dead in this Security Awareness Training video.

Scammers are Targeting Your Venmo and P2P Accounts

Do you use Venmo or other P2P accounts? If so, you definitely could be a target of scammers. Across the county, people are losing their cash, and it often happens so quickly that they don’t even know what’s happening.

You might think that you couldn’t be a victim, but scammers are often smarter and trickier, and they won’t hesitate to take advantage of you.

Here’s how they are doing it:

A stranger approaches you to use your phone. They have a sob story to make this scam more credible. You hand your phone over, they make it look like they are dialing, but instead, they are doing something else: swiping and searching your phone for “Venmo” and easily getting into your Venmo account and transferring money to themselves. People are losing thousands of dollars simply for being kind to a stranger.

Tips to Keep Yourself Safe

When using a P2P payment system, you should know that they all require access to your financial info. So, when you use them, make sure that your account settings are set in a way to ensure all of the security measures that you can set. In order to keep yourself safe from scams like this, there are some tips that can keep you safe.

  • Two step authentication. Access the menu, turn it on. This might include using PIN, a biometric log in, like a fingerprint.
  • Get the money out of your account. In most P2P apps, when you get a payment, the money is generally added to the balance held in the app. It doesn’t appear in your bank account until you transfer it or use it in another way. If you want to transfer money to your bank account, you should definitely make sure that the deposit went through. Just keep in mind that it could take a couple of days to transfer.
  • Pay only those you know well. Scammers know a lot of tricks, and they will find methods to trick you into paying them in ways you would never expect. So, if you are sending money from one of these apps or sites, make sure that you know the person you are sending money to. If you are using the app or site to get money from someone else, transfer the payment into your bank account and make sure it transfers before you send any goods.
  • Disconnect from Social Media: Finally, keep in mind that there are apps or sites might share your transaction information on social media. Check your social media settings because some of these settings might be set to share this info. Just make sure you are comfortable with what is going out on social media.

How to be a Grandma Identity Thief Murderer

Lois Riess is a woman from Minnesota who police say shot her husband, went on the run, and then killed a woman in order to take on her identity.  Here are some shocking facts about her:

Riess Looked Like her Victim 

The woman Lois Riess killed, Pamela Hutchinson, looked like her. This is why Pamela lost her life. When the body was found, police said her ID, credit cards, cash, and car was gone. Police put out an arrest warrant for Riess, and then started hunting for her. Police say the women did not know each other.

Lois Riess Allegedly Killed Her Husband, Too

Pamela Hutchinson wasn’t the only one who has allegedly died at Riess’ hand. Lois’ husband, David Riess, is also dead. He was found in the couple’s Minnesota home with several gunshot wounds after two weeks of not showing up at work. David’s car was missing, as was $11,000 out of his business account. It is believed that Lois used the same gun to kill both of her victims. Though Lois originally took the couple’s Cadillac, it was found abandoned in Florida several days later.

Pamela Hutchinson and David Riess

Though she was killed in Fort Myers, Pamela Hutchinson didn’t live there; she lived in Bradenton, FL. She was in Fort Myers to spread the ashes of her husband who had recently passed away.

David, Lois’ husband, owned a commercial worm farm. He was a Navy veteran and loved boating, fishing, hunting, and spending time with his grandkids.

Lois Riess was a Gambler, and She Had an Interesting Nickname

According to reports, Lois Riess was a gambler, and had an addiction to gambling that eventually destroyed her family. It is said that she stole more than $100,000 from her sister, and had the nickname, “Losing Streak Lois.”

Lois Took a Road Trip After the Killings

After killing Pamela, detective believe that Lois left Florida and traveled through Alabama, Mississippi, Louisiana, and Texas. She was driving Pamela’s car, which she took after shooting the woman.

Before Lois was even captured, she was charged with the murder of both her husband, David, and Hutchinson. She is facing a first degree murder charge in Florida along with grand theft auto, grand theft, and criminal use of personal identification. She faces the death penalty if found guilty. As for the alleged murder of her husband, David, in Minnesota, murder charges are pending, so it’s likely that she will face two counts of first degree murder when all is said and done in this case.

Robert Siciliano personal security and identity theft expert and speaker is the author of Identity Theft Privacy: Security Protection and Fraud Prevention: Your Guide to Protecting Yourself from Identity Theft and Computer Fraud. See him knock’em dead in this Security Awareness Training video.

Industry Leader & Best-Selling Author Releasing Highly Anticipated Book for Cybersecurity Awareness Month 2018

Press Release | New Book | Identity Theft Privacy By Robert Siciliano, CSP

Basil Ghafoor
Tempe, AZ
Basil@trossconsulting.com
www.Safr.me

Tempe, Arizona, 10/10/2018 – In 2018, Under Armour disclosed that 150 million of their customer records had been stolen. Equifax filed a similar claim for 143 million customer records breached in 2017. Uber, the popular ride-sharing app, admitted to 20 million customer records being compromised in 2016.

If multi-billion dollar corporations are susceptible to data theft, what is stopping a criminal from targeting you? Your business? Your kids?

Identity Theft Privacy: Security Protection and Fraud Prevention will be released this October. This is the latest of five books written by personal security expert Robert Siciliano, CSP. Robert is certified in professional speaking, identity theft risk management, and public investigation. He is also the author of the Amazon #1 Best Seller, 99 Things You Wish You Knew Before…Your Identity Was Stolen.

“Practical advice, and to the point with no fluff, just great information and advice. Really enjoyed the book and recommend it! ”

“Saw him on Anderson Cooper, and I knew I had to buy this book. Gives you sound advise on how to avoid ID problems and how to protect your kid’s ID”

“It is a fast and easy book to read and worth buying to protect yourself and family!”

– Amazon Customers

Robert believes that, when it comes to preventing cybercrime victimization, awareness and knowledge are king. Robert’s new book provides readers with content explaining how to protect your personal and professional privacy. Privacy protection applies to anyone who uses social media, telecommunication apps (e.g. Skype, Facetime, and Snapchat), online banking, and email among other technologies.

Even if you do not use technology, someone you care about does such as clients, family, or friends. Robert’s goal is to ensure that everyone has the proper tools to prevent cybercrime.

As you progress through different stages in life, there will be times when you are exposed to fraud and theft. How do you protect your identity today? How are people trying to steal your identity as you read this?

These two important questions are the tip of the iceberg when it comes to securing your personal identity.  Whether you are concerned about your individual identity, your small business, or a large corporation, this book provides ways to protect yourself online and out in the tangible world.

Identity Theft Privacy: Security Protection and Fraud Prevention does not promote anti-virus software or products based on scare tactics. Robert is not selling insurance; his philosophy is based on prevention.

Robert has helped over 50,000 readers by increasing their level of personal security through strategies you can apply immediately from home. Now, you can find everything you need to know about your identity privacy in one complete book! Get your copy today!

Identity Theft Privacy can be purchased here.

For a limited time only, Robert is offering 25% off all Safr.me educational courses.

A coupon code will be provided through email with the book purchase receipt.

Robert Siciliano is the CEO of Safr.me—an online resource created to help individuals who couldn’t see him speak. Safr.me’s mission is to help others by educating them on the reality of cybercrime as well as the most effective human-based practices to secure oneself in the digital and physical world. Safr.me empowers, supporting users to take charge of their own personal information and data before something bad happens.

[/av_textblock]

DNA Tech is Catching Bad Guys and its Great and Scary

In 1996, a 12-year-old Washington state girl was raped and murdered. However, it wasn’t until June 2018, that an arrest was made in the case. How did this happen? DNA technology.

The man arrested is Gary Hartman, and he is accused of killing and raping 12-year old Michella Welch. Donald Ramsdell, the Tacoma Police Chief, has said that computer modeling, police techniques, and advances in DNA identification has led his team to arresting Hartman on June 20th.

This case goes all the way back to March 26th, 1986. Welch and her sisters were in Tacoma’s Puget Park. She left her sisters there and went home to make lunch. About three hours later, Michella’s sisters noticed that her bike and lunch were at the park, but she was nowhere to be found. Just before 11pm that night, the body of Michella was found. DNA was recovered, but police were unable to solve the case…until now.

Before the arrest of Gary Hartman was made, police tried a number of methods to solve this case. For instance, in 2006, they were able to create a DNA profile of the person whose DNA was found at the crime scene. However, they were unable to match that DNA with what was in their database. It wasn’t until 12 years after that, in 2018, that detectives from the Tacoma Police department was able to work with genetic genealogists and track the DNA to family members of the, at the time, unknown suspect. The researchers then used that information, along with public records, to create a family tree. There were two members of the family, brothers, who lived in Tacoma in 1986. Both immediately became possible suspects.

On June 4, detectives began monitoring Gary Hartman. Nothing of note happened that day, but the next day, June 5, Hartman went to breakfast with a co-worker. Detectives took the napkin that Hartman used at the restaurant and sent it in for DNA testing. The DNA that was on the napkin was the same DNA found at the rape and murder scene of Michella Welch. He was arrested for the crime on June 20 after a traffic stop.

Michella’s mother is thrilled by the arrest, and Michella’s younger sister, Nicole, who was only 9-years old in 1986, described her sister like a “second mother,” and said that Hartman cut her sister’s “precious life” short.

This is all wonderful. And right out of a sci-fi movie. OK, so you have nothing to hide right? I have nothing to hide either. But I’m never throwing a napkin away again!

Robert Siciliano personal security and identity theft expert and speaker is the author of Identity Theft Privacy: Security Protection and Fraud Prevention: Your Guide to Protecting Yourself from Identity Theft and Computer Fraud. See him knock’em dead in this Security Awareness Training video.