Medical Identity Theft: How to Protect Against Fraud

Available for Interviews:  Paul Tracey

Paul Tracey is the Founder & CEO of Innovative Technologies, a Managed Security Service Provider in New York, and is a national speaker, cyber security educator, small business advocate, and author of Delete The Hacker Playbook and Cyber Storm.

What Paul Tracey can say in an interview on
Medical Identity Theft:

Medical Identity Theft is when a criminal obtains your personal information to commit fraud and we classify that fraud as medical when health care services were the target of that fraudulent activity. The US Dept of Health and Human Services Office of Inspector General defines Medical Identity theft as the use of personal information Like your name, social security number, insurance, or other medical numbers to submit fraudulent claims on a victim’s behalf to Medicaid and other health insurers without your authorization.

Continue reading “Medical Identity Theft: How to Protect Against Fraud”

6 Paramount Points When It Comes to Cybersecurity Today

Available for Interviews:  Paul Tracey

Paul Tracey is the Founder & CEO of Innovative Technologies, a Managed Security Service Provider in New York, and is a national speaker, cyber security educator, small business advocate, and author of Delete The Hacker Playbook and Cyber Storm.

What Paul Tracey can say in an interview on
Doorbell Cameras:

1) It is more important to ensure your business is protected from cyber criminals now than ever.

The probability that a business will be attacked is 100% if the business has any device PC, laptop, cell phone, or IoT device that connects to the internet.

Continue reading “6 Paramount Points When It Comes to Cybersecurity Today”

Money: Avoid Getting Scammed

Available for Interviews: Suzanne Powell

Suzanne Powell Suzanne is the founder of Capital Strategies Group, and acting Vice-President of Meridian Wealth Management. She is also the author of the newly released book, The Ultimate Money Moves for Women Over 50.

What Suzanne Powell could say on
How to Avoid Getting Scammed:

    • Keep one credit card with fraud protection at a low balance and use it for any internet purchases that are not a major retailer. 
    • Do not use your debit card for any internet purchases ever.

Continue reading “Money: Avoid Getting Scammed”

The Ubiquity of Hacking and Getting at the Root of the Problem

Available for Interviews:  Paul Tracey

Paul Tracey is the Founder & CEO of Innovative Technologies, a Managed Security Service Provider in New York, and is a national speaker, cyber security educator, small business advocate, and author of Delete The Hacker Playbook and Cyber Storm.

What Paul Tracey can say in an interview on
Cybersecurity and Hacking:

Hacking involves the misuse of devices like computers, smartphones, tablets, and networks to cause damage to or corrupt systems, gather information on users, steal data and documents, or disrupt data-related activity. They can also trick users into opening malicious attachments or links which further compromise sensitive personal data.

Unfortunately, hackers are increasingly growing in size and sophistication, and are using strong and malicious methods of attack that are designed to fly under the radar of cybersecurity software and IT teams.

Continue reading “The Ubiquity of Hacking and Getting at the Root of the Problem”

Is Someone Spying on Your iPhone?

Available for Interviews:  Paul Tracey

Paul Tracey is the Founder & CEO of Innovative Technologies, a Managed Security Service Provider in New York, and is a national speaker, cyber security educator, small business advocate, and author of Delete The Hacker Playbook and Cyber Storm.

What Paul Tracey can say in an interview on
Protecting Against Stalkerware & Spyware:

    • Stalkerware is a subset of spyware, It is specifically designed to spy on the personal habits of someone. The stalkerware is designed to gain access to GPS location, microphones, and call and text records. 
    • Stalkerware is a type of spyware that usually is in the context of an abusive or controlling relationship and is meant to terrorize.

Continue reading “Is Someone Spying on Your iPhone?”

QR Codes: Scanners Beware! Here’s How to Protect Yourself

Available for Interviews:  Paul Tracey

Paul Tracey is the Founder & CEO of Innovative Technologies, a Managed Security Service Provider in New York, and is a national speaker, cyber security educator, small business advocate, and author of Delete The Hacker Playbook and Cyber Storm.

What Paul Tracey can say in an interview on
QR Codes:

 

      • QR codes can be extremely dangerous if we are not vigilant about checking where they resolve to.
      • QR codes can and are used repeatedly at every stage of attacks. They have proven to be quite effective with phishing attacks.

Continue reading “QR Codes: Scanners Beware! Here’s How to Protect Yourself”

Multifactor Authentification: How secure is it? (The Real Dangers in the APP Store)

Available for Interviews:  Paul Tracey

Paul Tracey is the Founder & CEO of Innovative Technologies, a Managed Security Service Provider in New York, and is a national speaker, cyber security educator, small business advocate, and author of Delete The Hacker Playbook and Cyber Storm.

What Paul Tracey can say in an interview on
Multifactor Authentification:

We all know that we are encouraged to use multifactor authentication, which we recommend as well but how good is it really? Can it be compromised? The answer can come as a shock when we look at the security of cell phones. 

Continue reading “Multifactor Authentification: How secure is it? (The Real Dangers in the APP Store)”

President Biden Warns of Russian Cyber Attacks. Here’s What to Do

Available for Interviews:  Paul Tracey

Paul Tracey is the Founder & CEO of Innovative Technologies, a Managed Security Service Provider in New York, and is a national speaker, cyber security educator, small business advocate, and author of Delete The Hacker Playbook and Cyber Storm.

What Paul Tracey can say in an interview on
Protection Against Cyber Attacks:

The threat on infrastructure has taken on additional significance in the eyes of government agencies for this announcement to come from President Biden. The Whitehouse is pretty much begging you to stop ignoring the warnings and act now.

Not sure this applies to you? It does!

Continue reading “President Biden Warns of Russian Cyber Attacks. Here’s What to Do”

Cybersecurity: How to Safely Use Your Credit Card Online

Available for Interviews:  Paul Tracey

Paul Tracey is the Founder & CEO of Innovative Technologies, a Managed Security Service Provider in New York, and is a national speaker, cyber security educator, small business advocate, and author of Delete The Hacker Playbook and Cyber Storm.

What Paul Tracey can say in an interview on
Safely Using Your Credit Card Online:

    • Online checkouts are a top priority for hackers and you should NEVER use a debit card for online purchases. To mitigate risk always use a credit or prepaid card to shop online. Your money is insured for fraudulent withdrawal in either event, but when you use a debit card you actually lose the cash until it’s resolved.

Continue reading “Cybersecurity: How to Safely Use Your Credit Card Online”

5 Scary Internet Mistakes We Commonly Make

Available for Interviews:  Paul Tracey

Paul Tracey is the Founder & CEO of Innovative Technologies, a Managed Security Service Provider in New York, and is a national speaker, cyber security educator, small business advocate, and author of Delete The Hacker Playbook and Cyber Storm.

What Paul Tracey can say in an interview on
The Common Internet Mistakes We Make:

We have all heard the reports or possibly done business with a company that’s been breached. Our digital security issues are not going away.  The truth is we can do a great deal to protect our data just by changing some of our online behaviors. Here are 5 easily correctable mistakes being made when we are online:

Continue reading “5 Scary Internet Mistakes We Commonly Make”