Sponsor Robert Siciliano as he runs the Boston Marathon for Miles for Miracles, Children's Hospital Boston
ROBERT SICILIANO is fiercely committed to informing, educating, and empowering Americans so they can be protected from violence and crime in the physical and virtual worlds.

FREE EBOOK

Check here if you're human

Sponsors

Background Checks

Consumers Have Given Up on Security

…d “it is not the end of the world.” This is concerning to many, including security experts and survey authors. During this survey, approximately 40 people were interviewed in order to understand how those without a technical background feel about computer security. Though this isn’t a total significant sample size, it is a surprising look at how people feel about the information that experts are giving them. Each interview ran from 45 minutes to…

Hacking Humans is Painfully Easy

…ccess to someone’s digital life. Computers Are Gold Mines of Important Information When the team of ethical hackers gained access to Mrs. Walsh’s computer, they found a number of malicious programs running in the background. Examples include InstallBrain, a program that will download programs on demand, and programs such as SlimCleaner, SearchProtect and FunWebProducts, which can spy on Internet searches, change home pages and gather…

Child Predator screws up, gets caught

…The information on such a bottle is what helped pedophile Stephen Keating get 110 years in the slammer says a CNN article. But the amazing thing is that the bottle’s information was extracted from a blurry image of it in the background of a photo that Keating took of one of his 14 victims. Keating posted the photo online, not knowing that that innocent little prescription bottle would get him busted—along with the fingerprints that were…

Beware of the Jury Duty Scam

…ative Services for the U.S. District Court of Western Washington. She points out that a federal court will never call someone and make threats or demand payments. So if you hear what sounds like a bustling call center in the background of the call, assume this is staged to make the call sound official. So what is the federal court’s response when someone ignores a jury summons? The court clerk’s office will contact you. You may be required to…

Yes, Macs Can get Malware

…t least Apple will block it if it’s infected. Updates Never put off tomorrow what you can update today. Download updates the moment you are cued to do so. Go into the App Store, hit Updates and then Update All to make sure you’re caught up on updates. To avoid this hassle in the future, put your settings on automatic updates: System Preferences, App Store, Download newly available updates in the background. Robert Siciliano is an identity theft…

Posting Kids’ Photos online is illegal?

…d with. How does a year in prison and a fine of almost $50,000 sound for posting children’s photos? Wow, French parents really better watch out when posting that photo of the family reunion or company picnic with kids in the background. If you’re poo-pooing France right now, save your poo-poos for Germany as well. German police are urging parents to stop posting their kids’ images—especially because a lot of people are putting up images of their…

How to prevent IRS scams

…ted in “You’ve Won!” and inheritance scams. Of course, before the fraudster plays with emotions like a cat playing with a mouse, he first gains your trust, pretending to like the same things you do, whatever it takes so that you don’t question him. Scammers are adept at appearing credible, such as tricking your caller ID into showing “IRS” or the name of your bank in the ID field. They may have a snazzy website up, a “badge number,” noise in the…

Bank Tellers stealing Identities

…arily pay them with money. They may offer them luxuries that the teller can only dream of, such as flying in private jets and meeting famous athletes, says the nytimes.com report. And if you think that banks require rigorous background checks for new teller hires…think again. Furthermore, continues the article, savvy thief-tellers will keep their fraudulent withdrawals under $10,000, to keep below the detection radar. These sneaks can get away…

Beware of ALL these Scams

…ome for a future robbery. A legitimate company does not go door to door. Cyber Help A call from someone claiming to be from Microsoft or some other tech giant, claiming your computer has a virus, is a scam. The scam includes background noise that sounds like a busy call center. This scam is also conducted via e-mail. Dating Never give money to someone you met through an online dating service. If they sound and look too good to be true, they…

11 Ways to Mitigate Insider Security Threats

…me are malicious, and some are simply due to negligence. Malicious threats may be identified by employee behavior, such as attempting to hoard data. In this case, additional security controls can be an effective solution. Do background checks before hiringBefore you hire a new employee, make sure you are doing background checks. Not only will this show any suspicious history, it can stop you from hiring any criminals or those associated with…

5 In-Demand Cybersecurity Specialties

…and other digital threats, cybersecurity engineers defend organizations against crime online. Personality traits required for this role include being flexible, nimble and a do-it-yourselfer. Candidates also must have: A good background in penetration testing. Experience with additional online security measures. On-the-job experience, which is an absolute must for this position. Malware Analyst: If you choose to specialize, working as a malware…

Beware of these 10 Job Hunting Scams

…s the following signs of a fraudulent job advertisement: There are plenty of totally legitimate jobs that involve money out of your pocket. And in some cases, this may be described as an application fee, reference check fee, background check, cost of training materials or anything else. Only pay when the site itself has been vetted by you and everyone else. Do your research! The ad talks of “previously undisclosed” federal government positions….

Ins and Outs of Call Center Security

…shoring will cost companies more, this will be offset by lower turnover rates, small learning curve and a higher rate of first-call resolution. Telecommuters (agents) should be screened vigorously, including (as a minimum) a background check for Social Security Number, criminal history and citizenship. Then, a contract should be drawn up that should include an agreement to customer confidentiality as well as learning specifications. A system…

Work at Home Environment is a safe, secure Solution

…mfortable working environment. And, they will want to make sure you are legitimate in regards to your credibility and commitment. Expect to learn and take courses to succeed; you may even pay for courses. Expect to pay for a background check. To get started they will most likely request fundamentals like effective hardware (computers and telephones/headsets) and software (security software, VPNs, call center software) and basic requirements like…

Signs You have Malware and what You can do

Not all computer viruses immediately crash your device in a dramatic display. A virus can run in the background, quietly creeping around on its tip-toes, stealing things and messing things up along the way. If your computer has a virus, here’s what may happen: Windows suddenly shuts down. Programs automatically start up. Some programs won’t start at your command. The hard disk can be heard constantly working. Things are running awfully slow….

Risks of Public WiFi

…you have the VPN. Using a VPN will encrypt all of your online activities, freeing you to use public Wi-Fi for anything. Hotspot Shield is a VPN provider that’s compatible with iOS, Android, PC and Mac. It runs quietly in the background. Robert Siciliano is an Identity Theft Expert to Hotspot Shield. He is the author of 99 Things You Wish You Knew Before Your Identity Was Stolen See him discussing internet and wireless security on Good Morning…

Things You should and shouldn’t do on Public Wi-Fi

…ether it’s login information, usernames, passwords or e-mail correspondence. Even your IP address will be concealed. Hotspot Shield is a VPN provider, and it’s compatible with Mac, PC, iOS and Android, quietly running in the background after it’s installed. Don’t’s at a Public Wi-Fi Don’t let your device connect with the first network that “takes.” Instead, select it. Do not keep your wireless card on if you’re not using it. Do not keep your…

How to identify Tax Scams

…e phone or email The initial communication about owed money is NOT through snail mail. The aforementioned three points should be enough for you to identify a scam, but to make identification even easier, here’s more: There’s background noise to make you think it’s a busy call center. The caller gives you his “badge number” to sound more official. The caller identifies himself with a common name (i.e., Michael Harris). The phone call coincides…

What is a Remote Administration Tool (RAT)?

…e. Here are some tips on how you can avoid a RAT. Be careful what links you click and what you download. Often times RATs are installed unknowingly by you after you’ve opened an email attachment or visited an software in the background. Beware of P2P file-sharing. Not only is a lot the content in these files pirated, criminals love to sneak in a few malware surprises in there too. Use comprehensive security software on all your devices. Make…

Background Checks aren’t as easy as you’d think

…nd checks should be conducted for people ranging from school officials, nannies and cafeteria workers to home health aides…you name it: all adult employees and volunteers. If you own a business, you’ll never regret getting a background check on your employees. As crucial as this practice is, however, it’s full of land mines. But don’t let that stop you from acquiring a professional-grade background check to screen for criminality. First off, the…

What is Criminal Identity Theft?

…g driver license, your state might flag your license number and in the event that another driver is pulled over by law enforcement and presents your license as their own they could be questioned for further information Get a background check on yourself. If you feel like someone may be impersonating you, get a background check done. This can be done via online services or by a private investigator. Check State and National criminal databases….

Malware and Phishing Warnings in Chrome Browser to be changed by Google

Google normally displays a malware and phishing warning in the Chrome browser. There are plans, though, to alter the display. Currently it’s a white warning against a red background. The new display will be an entirely red page, with a big X at the display’s top. These warnings tell the user that the site they’re about to visit may try to install malware or con you into giving up personal information. The new warning, like the current one,…

Beware of 5 Summertime Scams

…igh school and college students especially. Be careful about job ads stating that no experience is needed, though these can be legit. However, be extra cautious if the company requires you to pay for training or to pay for a background check. Concert tickets. Con artists will attempt to resell the same ticket over and over, as the ticket can be printed out when a concert venue sells it directly from their website. Be suspicious of someone giving…

6 Tools to protect your Privacy Online

…ture, protecting you from non-secure Wi-Fi such as at airports and hotels. VPN will mask your IP address from tracking cookies. Hotspot Shield is a VPN provider that’s compatible with Android, iOS, Mac and PC, running in the background once installed. Robert Siciliano is an Identity Theft Expert to Hotspot Shield VPN. He is the author of 99 Things You Wish You Knew Before Your Identity Was Stolen See him discussing internet and wireless security…

What is a Backdoor Threat?

…your personal belongings. The same is true for a backdoor in the computer world. It is a vulnerability that gives an attacker unauthorized access to a system by bypassing normal security mechanisms. This threat works in the background, hiding itself from the user, and it’s very difficult to detect and remove. Cybercriminals commonly use malware to install backdoors, giving them remote administrative access to a system. Once an attacker has…

Data Brokers: What Are They; How to Get Control of Your Name

…lled a consumer data company. They snatch huge amounts of data from individuals all over the planet and sell it. And who wants your personal information? Your information is of significant value to marketers, companies doing background checks and in some cases, your government. They want to know what you like to buy, what you’re most likely to buy, if you want to lose weight, build muscle, what kind of cars you like, where you vacation, what you…

Meeting a Stranger: Safety Tips for Online and In-Person

…ct to pay for an item. Keep extra cash (for haggling) separate and unseen by the stranger. If the stranger must come to your home to view an item you’re selling, leave your front door open. Try to have someone with you. Do a background check on anyone whose house you’re going to (such as to clean or babysit). Safe Strategies with Strangers Never get into a car with a stranger. Arrange a nearby meeting place for you and trusted friends, after…

VPN for Online Security: Hotspot Shield

…otection as a steel tunnel through which you access the Internet. Privacy. Your IP address is masked, and so is your identity, from tracking cookies. Hotspot Shield is compatible with iOS, Android, Mac and PC. It runs in the background once it’s installed and guards all of your applications. Robert Siciliano is an Identity Theft Expert to Hotspot Shield VPN. He is the author of 99 Things You Wish You Knew Before Your Identity Was Stolen See him…

Catphishing is a loveless Nightmare

…to shove on your end, this person will finally agree to visit you, but then some excuse will surface, preventing the visit. You’ll find it impossible to get a legit physical address. Phone calls will have dead silence in the background since they’re made with a lot of caution. Catphishers use photos that really aren’t of them: sites showing off the most commonly used photos. Catphishing isn’t always a romance-based scam. Someone may create a…

6 Ways to erase your Digital Life

…id in tracking everything down, use: Account Killer. This tool provides direct links to every account deletion page. Knowem. This tool does a username search on hundreds of social sites. Then remove personal information from background check sites. This involves more complicated procedures. #6. Hotspot Shield VPN is a free VPN service that protects your device’s data by ensuring that all web transactions (such as filling out forms, shopping,…

6 Tips on Securing Your Home From Those You ‘Trust’

…has a drug and gambling problem.” Well, there you go. Drugs make nice people bad people. Drugs make honest people liars. And some people just come out of their mamas as liars and bad guys. So what does a trusting person do? Background checks: Before letting anyone into your home, make sure the employer has done a background check and you do one on a roommate or nanny. But just because the person has a clean record doesn’t mean his or she isn’t…

Data brokers hacked and used for identity theft

…e who has an internet connection can make a purchase. Information brokers or data brokers, as they are known, sell this information in the form of background checks. In some instances, the SSN needs to be provided to get the background check; in other instances, the SSN is available as part of an information package. There are plenty of legitimate reasons one would have to procure this information. Recently, researchers discovered a few of the…

Know the 10 Warning Signs of Identity Theft

…may discover that it is a result of your credit being damaged by fraud. Accounts may have been opened without your authorization, and the resulting bills would never have been paid. You are denied employment as a result of a background check. Some people learn that their identity has been stolen when they are denied employment. An employer may check an applicant’s credit history to determine whether he or she is financially responsible. If the…

6 More Tips for Apartment Security

…rty is secured. Neighborhood watch-type programs: If a stranger is in the area or paying unwanted attention to us or the property, we call one another to decide what we may do in response. There’s always strength in numbers. Background checks: Does the landlord do anything in regard to background checks? Neighborhood crime: What is the immediate neighborhood like? Are there drug houses, etc., nearby? Contact local law enforcement and ask for a…

10 Million Mobile VPN Users Can’t Be Wrong

…presses all traffic on the server side before sending it to a user’s phone, allowing users to stretch their data plans. Hotspot Shield is available for PC, Mac, iOS and Android. Once installed, Hotspot Shield will run in the background, protecting all applications, email and web browsing. Robert Siciliano is an Identity Theft Expert to Hotspot Shield VPN. He is the author of 99 Things You Wish You Knew Before Your Identity Was Stolen See him…

Your Strong Password Isn’t so Strong

…eck your password strength. If the site you are signing up for offers a password strength analyzer, pay attention to it and heed its advice. While you must do your part to manage effective passwords, banks are working in the background to add additional layers of security to protect you. For example, financial institutions are incorporating complex device identification, which looks at numerous characteristics of the online transaction including…

How Your Smartphone Will Identify You Privately

…eck your password strength. If the site you are signing up for offers a password strength analyzer, pay attention to it and heed its advice. While you must do your part to manage effective passwords, banks are working in the background to add additional layers of security to protect you. For example, financial institutions are incorporating complex device identification, which looks at numerous characteristics of the online transaction including…

What is a “Drive-By” Download?

…ening a compromised web page could allow dangerous code to install on your device. You just need to visit or “drive by” a web page, without stopping to click or accept any software, and the malicious code can download in the background to your device. A drive-by download refers to the unintentional download of a virus or malicious software (malware) onto your computer or mobile device. A drive-by download will usually take advantage of (or…

Self-checking Your Online Identity

…re. However, egosurfing really should be called “reputation surfing” because it’s extremely important to check your online reputation for any errors, inaccuracies, slander or unwanted exposure. Think about background checks. Background checks are a necessary tool in today’s sometimes violent and certainly litigious society. It’s common sense to require employment background checks for school volunteers, coaches, teachers, janitorial…

Understanding Your BYOD Policy

…This is one that is governed by the company’s CIO and others basically telling you what you can and can’t do. Read it carefully because once you sign it, your job will be on the line of you don’t abide by it. Running in the background will be an application that you will be required to download and install. This app may have a certificate authenticating you and the device to connect to the company network and run company programs. The installed…

Top 10 Warning Signs of Employee Theft

…lows for plenty of time to toss items in their car with no one watching. #8 Cooked books: The moment a discrepancy is recognized a deep investigation into the numbers must be performed. #9 Protect your business by performing background checks as they are the best defense against internal theft. Screen all employees before hiring them. Limit the number of employees authorized to ring up other employees’ sales, reducing the opportunities for…

15 Screening Tips for Hiring Honest Employees

…ieds: Place and ad that says what you want: “Seeking HONEST employees with high moral integrity who seek to thrive to in a motivating environment with many opportunities for advancement and higher pay. Applicants will have a background check and psychological test, reference checks, drug testing and additional screening to determine eligibility.” #2 Look for incongruence. Resume are often “false advertising” and outright lies, look for red-flags…

Hiring Employees: How to Perform a Criminal Background Check

…minal histories, driving records and credit. There is also a litany of other information that may or may not be 100% correct. These pre-employment background checks are generally a guide, but not absolute. A quick search on “Background Check” will provide dozens of resources. #2 FBI Criminal Background Check: A true criminal record comes directly from the FBI or an FBI-approved Channeler, An FBI Identification Record—often referred to as a…

5 Hiring Tips on How to Spot Resume Fraud

…to know they worked there. You want to know that in-fact they did and why they aren’t. #4 Inquire about resume gaps. Extensive gaps in employment might be a sign they left a job on bad terms and didn’t notate it on a resume. Background checks may show those previous non-listed jobs. #5 Google them. Look on LinkedIn, Facebook and elsewhere. An exhaustive search of their given name, nicknames and social media handles/monikers might bring up…

Free Mobile Apps = Drained Battery

…uld be about you, gleaned from your mobile use, or it could be new advertising. The most effective way to deal with this is to either delete the app, or in some cases you are given an option to prevent it from running in the background. But don’t stop there. There are numerous other battery drains affecting your smartphone. To preserve battery life: Set your phone to lock automatically after being idle for one minute Disable Wi-Fi and Bluetooth…

IT Security: Preventing Insider Threat

…Insider Threat 1. Limited Sources; only grant access to a few trusted sources. Minimize the amount of staff that has access to whatever systems in place. 2. Due Diligence; in the information age, our lives are an open book. Background checks from information brokers are very necessary. Not doing a background check increases your liability. A person previously convicted of a crime just might do it again. 3. Limit Access; even a good apple…

5 More Online Security Tips for Valentine’s Day

…et their name, address, previous address, home phone, cell phone, place of birth, birth date, where they work, license plate and if you can squeeze it out of them, and I kid you not, get their Social Security number and do a background check. #4 Go online and Google search every bit of information about them you have acquired. You want to know as much about this person as possible. Search name, phone, email and screen name. The goal is to look…

How to encrypt your email with PGP

…hat looks a lot like a public key and include the password. Find here a cool free online tool that generates PGP keys for fun and lets you see how PGP email encryption is done. Caution: I’m not sure of what’s going on in the background of this site so I can’t recommend using this key generator for ongoing secure use. Robert Siciliano personal and small business security specialist toADT Small Business Security discussingADT Pulse on Fox News….

6 Tips for Cyber Monday

…t your identity and credit card information is most at risk.” Whether you are buying electronics as gifts this holiday season, or sports and entertainment tickets for friends and family, iovation is working hard in the background of these sites to keep the bad guys out so you can have a safe and fun experience. Robert Siciliano, personal security and identity theft expert contributor to iovation, discusses credit card fraud on NBC Boston….

Sex Offender Checks Won’t Stop Assaults

…ous address, home phone number, cell phone, place of birth, birth date, workplace, license plate, and if you can squeeze it out of them, I kid you not, get their Social Security number. 6. Do your own sex offender checks. Do background checks, Use Google and Facebook. Vet your potential mate thoroughly, since determining who you might marry is about as important as any life decision can be. Online dating services must also take on a certain…

Job Scams Up As Economy Downs

…e or printout of employers looking for talent are attractive offers that often come with a full money back warranty. The problem is the lists are often spotty or even non-existent and the warranty is bogus as you will never get your money back. Some job scams are designed simply to get your personal information including social security number and credit card numbers. Never provide your information over the phone or online. If they insist on a…

Operation Empty Promises Targets Job Scams

…d to help workers start their own Internet business and earn up to $10,000 a month, ultimately defrauding victims out of $40 million in fees. Another advertised fake sales jobs on CareerBuilder.com and charged applicants for background checks. In another instance, scammers made false claims about the earnings potential of stuffing circulars into envelopes. Another scam advertised an angel pin assembly kit, with which one could supposedly earn up…

Remote Control Home Alarm Provides Additional Security

Some painters were recommended to me by referral. By all accounts, they were hard workers and reputable. Because of my normal home security obsessed nature, I’d generally do some type of background check on the owner and get something of a background check from him on his employees. However, because of the time crunch of the project, and the fact I was away while my interior was being painted, that wasn’t an option here. Fortunately, I have the…

Should Dating Sites Require Background Checks?

…sites be required to disclose to members whether or not background checks are done, which she believes would make online dating safer. Online dating sites argue that people should use common sense, and point out that not all background checks are entirely accurate. What if the person’s profile is made from stolen information in the first place? The fact is, online dating sites are selling a lot more than an opportunity to connect. They market to…

Skype App Adds Video Calling

…siness, I often use Skype to video chat with my family at home. This is a comforting way to connect while sitting in a hotel. I’ll even leave the call on for hours at a time, just to watch what they do and hear the homestead background noise, which often includes the screaming of little ones. The coolest thing about the Skype application for my iPhone has always been the ability to make calls from other countries to any phone number the USA for…

Online Shoppers Concerned About Identity Theft

…dy sites is do business only with trusted web merchants. It’s also a good idea to do an online search for the website or company’s name prior to making a purchase, since in many cases, review or opinion websites will provide background on a business’s reputation. McAfee Identity Protection includes proactive identity surveillance to monitor subscribers’ credit and personal information, as well as access to live fraud resolution agents who can…

Are You Protected From Zeus?

…hout users having noticed. Zeus behaves like many other viruses in that it may lure the PC user into clicking an infected link in the body of an email, then instantly downloads the virus, which quietly installs itself in the background. Sometimes that link may point to an infected website, which injects the virus in the form of a “drive-by download.” Once Zeus has been installed, it works as spyware, recording keystrokes as the user types. Last…

15 Facebook Fiascos to Watch Out For

…nline profiles to communicate with suspects.” Just don’t be a “suspect.” 12. Sex offenders. Facebook is perfect for sex offenders, who pose as real nice people until they gain their victims’ trust. Always be on guard, and do background checks, at least. 13. Scams. It’s just a matter of setting up a fake Facebook page and marketing it to a few people, who then send it to their friends, who send it to their friends. An Ikea scam hooked 40,000…

Background Checks

School Directors Face Background Checks

…ecome a school board official! Fortunately the bill was unanimously passed. Citizens cannot rely on their governments to effectively police their officials. It is essential to all those concerned to always check up on someone history. Especially those in positions of trust. Robert Siciliano is a Personal Security Expert and Adviser to Intelius.com. For more information see Intelius background checks to learn more. See him discussing background

Should Background Checks Be Required for Dating Sites?

It’s no secret that there are kooky people both online and on the ground. The problem with the online part is kooky people seem to gravitate there. My theory is that those who have ulterior motives, an agenda of sorts, may believe they can lure in their victims easier online. I can see why they’d think that. It’s easier to lie online. There’s no body language, no intonation in ones voice, and no emotional connection to the real person. Simply…

Sex Offender Volunteered For High Football Team

…Seattle a Level III sex offender was allowed to work as a volunteer with the Evergreen High School football team, according to school officials. It was the head coach’s responsibility to see that the volunteer passed a background check before having contact with students. Two female students who serve as managers with the football team alerted authorities after the volunteer made comments that made them feel uncomfortable. He was…

Auditioning For The Bachelorette

…ns out the auditioning for the bachelorette meets similar standards I’d probably put in place when little predators start swarming my house. Contestants for the popular ABC show The Bachelorette have to go through a grueling background check that includes a six-hour test with 1200 questions, a session with a psychologist, blood and alcohol testing. I LOVE THAT!!!!!!!! I’m sure the motivations of the producers are more in line with good TV and…

Baseball Coach Listed as A Sex Offender

…nt telling the school shows a flaw in the schools system of effectively vetting out someone who has a past of inappropriate behavior with children. The school district went on to say they screen volunteers in the hundreds of background checks they do his may have been overlooked. What is also a possibility is he lied on his application which skewered the results. Officials point to the sex offender putting his name alongside his father’s name on…

Identity Theft – Common Consumer Errors

…Do you put your name on a “stop delivery list” when you travel? Do you know how to update the critical security patches in your computer’s operating system? Do you know if the doctor’s office your child just went to has done background checks on all the employees who handled your and your child’s Social Security number? Most people struggle to answer questions like these. We live in a technologically dependant time and we rely on all these tools…

School volunteers face background checks

…y would be alone with students. School principals would also have the authority to request the screening of any volunteer.” As stated in the article policies like this are designed to identify the criminal and sexual offense background of potential volunteers. When a lion is hungry it seeks out a smaller, weaker and slower animals that it feels it has the power to capture and kill. This is a normal and natural evolution of life. Sadly, as with…

Online Dating Liar Liar is 5’4, not 5’10

…t is essential that you do your homework and find out as much about this person as possible to head off any potential heartaches . Much of what you need to know about your new encounter can be found by doing a quick and easy background check. But don’t stop there. Google them, check out their Facebook page and dig as deep as you need to verify as much as possible to determine if their nose is growing. R obert Siciliano is a Personal Security…

Published Articles

…tp://www.wsmv.com/news/15080086/detail.html?subid=10106691 (January 17, 2008 appearance on NBC Nashville to discuss Hard Drive Containing Voter Info Recovered) http://www.wcnc.com/news/topstories/stories/wcnc-100807-jmn-DBAV-background-tc.14eaefc76.html (October 8, 2006 appearance on NBC Charlotte NC to discuss Don’t Be A Victim: Background checks) http://www.mandjshow.com/category/videos/web-exclusive/ (October 2007 appearance on Foxes…

Executive Security

…lunteers would undergo screening through the Wyoming Department of Family Services and School Directors Face Background Checks When I see headlines like this I wonder what century we are in. You’d think in the year 2010 that background checks of school officials would have been implemented 20 years ago. In New Jersey background checks for school employees have been in place since 1986. But not for school officials. Still to this day…

Renting and Securing an Apartment

…d the best and the worst roommates of all times. Some , I am friends with today and others , I wish I never met. There are numerous considerations to be made. The most important consideration is your personal security . Do a background check before signing a lease with a potential roommate. Determine if they have any type of a criminal history. A background check may also determine if they have even been bankrupt. Ask the landlord about options…

Apartment Security 101

…rview the landlord. Find out what his/her processes are for security. What is their annual investment? What is their philosophy regarding apartment security? Do they even have one? Does the landlord do anything in regards to background checks? What is the existing security at the property? Ask about lighting, cameras, locks on doors and windows and has he even changed the keys since the last tenant. What is the immediate neighborhood like? Are…

Meet Raoul Chiesa: UN Interregional Crime & Justice Research Inst.

…re the “politics” with it world wide? Politics – especially USA and EU – are driving towards issues related to privacy, Lawful Interception, copyright, etc. I’m a technical guy, with a technical background: I don’t like politics, though it’s clear to me that it’s something we need, somehow. In my humble opinion, the common mistake when politics meet IT, is that politicians are obviously not IT people,…

Craigslist ATM I bought Causes Industry Stir

…by the way. Works nice off a 12-volt car battery, too. Wendy Amaral, an account manager at Nationwide Money Services, says that while it’s possible that some companies could provide processing without collecting the required background information about the ATM owner, Visa, MasterCard, and other financial institutions are firm about the rules, and that audits are unlikely but possible. I think “possible audits” sounds like another cop out. For…

Holiday Temps Make The Best Identity Thieves

…and unkempt at an interview is a reflection of one’s character. Interviewees who are well-spoken and ace the interview process may have had lots and lots of jobs. Use employment applications, and check and verify everything. Background checks are only one small, but necessary, element of the screening process. Criminal records checks are insufficient and do not detect employee theft unless prosecuted and convicted. Juvenile convictions do not…

Insider Identity Theft Can Be Most Damaging

…ultiple layers of authorization. If one person is always watching over another person’s shoulder, bad apples can’t hide or execute scams. Perform due diligence. In the information age, our lives are an open book. Background checks from information brokers are crucial. Failing to do background checks increases your liability. Someone who has been previously convicted of a crime just might do it again. And if a breach of trust does…

New Identity Theft Virus Steals from Online Banking

…infected site. Once the virus is installed, it waits for the user to access an online banking website. That’s when it goes to work. While the user is banking online, the virus communicates with the bank’s server in the background. Transactions are being processed and the user doesn’t see any of it happening. Frankly, this doesn’t even sound possible to me. But it’s happening. The virus then erases its tracks by displaying a bank balance on…

New iPhone App Helps Vet a Potential Mate

…is to “Look Up Before You Hookup”. Sound crazy? Not as crazy as some of the people I’m sure you’ve met on the scene. It’s easy enough to enter a person’s name, phone number or e-mail address, and the application does a basic background check. Saving you lots of possible wasted time or possibly compromising your personal security. The application has a few handy features to help you narrow down what may be potential issues about your potential…

Liars Cons and Scammers: How to Recognize Them

…hieves. There are numerous tools to protect you too. Intelius offers a Background Report and a DateCheck. Its unfortunately not enough to simply “trust” or even trust your gut. Its often necessary to make a small investment. Background reports include, when available, a criminal and sex offender check, lawsuits, judgments, liens, bankruptcies, home value & property ownership, address history, phone numbers, relatives & associates,…

10 Tips to Safety and Security in Online Matchmaking

…ok for truth and lies. If you see inconsistencies, or red flags that can’t be easily explained, run really fast. 10. Go online to Intelius.com and perform a “Date Check”. With a name and birth date you can do a comprehensive background check that will tell you if they have been convicted of a crime, gone bankrupt, are being sued and if they are married. A background check is an entirely necessary tool that alerts you to any red flags or…

One in eight applicants denied positions because of criminal history

…the animals actions. This example is one that happens all to often. A background check may solve this problem in many situations. Withjust a name and address a company can vet a new hire to see of that person has a criminal background and has ever committed a violent crime. Church Executive Magazine reports one in eight background checks conducted on volunteers or prospective employees through LifeWay Christian Resources found a criminal…

Courts Force Tech Giant to Handover Bloggers ID

…when meeting online or when considering hiring a nanny to watch your kids. These are the same steps a potential employer takes before hiring someone. Once you find out enough data about them, all one needs to perform a full background check is a name and an address and then you have enough data to take the troll to court for any disparaging things they may say. You may not win in court, but the costs associated with going to court are enough to…

A Glorious Week of Identity Theft

…ail or social network message, says Marc Fossi research and development manager at Symantec Security Response. Protect yourself; Don’t just sit back and get hacked. Arm yourself with anti-virus that runs automatically in the background and prevents “Courtney, Marsha and SoupNazi” from stealing your identity. Pick up McAfee’s Total Protection software and take control of your PC security. Get a credit freeze. Go to ConsumersUnion.org and follow…

Check Fraud Identity Theft is Rising

…ashed and merchandise can be purchased even when there is no money in the checking account. I presented a program on motivation and self-improvement at a women’s prison in Massachusetts a few years back. I requested a little background on the women I was speaking to, just because I watch too many movies and I wanted to know if there was any possibility I’d get shanked. The case worker informed me that about 80% of the women were incarcerated for…

Privacy Is Dead, Identity Theft Prospers

…vest in identity theft protection and make sure your PC is up to date with Internet security software. For more information, I recommend You Have Zero Privacy – Enjoy It! by Mike Spinny, and Cyberwar’s First Casualty: Your Privacy by Preston Gralla and Why give up Privacy? by Bob Sullivan Robert Siciliano, identity theft expert, discusses background checks….

Perez Hilton is a Hater and Social Media Suffers

…g to help save you time and money by preventing criminals and scammers from trying to take it. I got my legs in personal security as it pertains to violence prevention. I started doing this in 1992, teaching self defense. My background as a scrawny, greasy Italian kid growing up in the Boston area, fighting my way though life and meeting other victims along the way brought me to a place where teaching others how to protect themselves gave my…

Preventing Inside Jobs, Keeping Inside Hackers – Out

…ces. Minimize the amount of staff that has access to whatever systems in place. 2. Due Diligence; in the information age, our lives are an open book. Background checks from information brokers are very necessary. Not doing a background check increases your liability. A person previously convicted of a crime just might do it again. 3. Limit Access; even a good apple eventually can go bad. By restricting the access to even those who are in a…

Identity Theft Protection Expert from One You Security Scheduled to Appear on "The Morning Show with Mike and Juliet"

…ers useless to thieves who try to use the numbers in order to steal financial identities. “The scope of identity theft is overwhelming,” said Siciliano. “Furthermore, identity theft often takes place in the background, unseen until much too late. Consumers can benefit from a service that monitors that background for them and incapacitates thieves’ ability to use stolen Social Security numbers to steal financial…

Identity Theft: Military Personnel and Their Relatives Are at a Unique Risk—Identity Theft Expert and Speaker on Personal Security

…mpany based in Arlington, VA, helped citizens potentially hit by the massive data breaches at the Veterans Affairs Administration. The product, MPI’s Public Information Profile, allows anyone using it to self-perform a background check—one that obtains, aggregates, and formats consumer background information not found in credit reports. In a June 19th press release, Denver, Colo–based ID Watchdog announced that the company would provide…

 

Xtreme School

Featured in

Anderson Cooper John Stossel Robert Siciliano Featured in