Doorbell Cams: How to Mitigate the Privacy Risks They Pose

Available for Interviews:  Paul Tracey

Paul Tracey is the Founder & CEO of Innovative Technologies, a Managed Security Service Provider in New York, and is a national speaker, cyber security educator, small business advocate, and author of Delete The Hacker Playbook and Cyber Storm.

What Paul Tracey can say in an interview on
Doorbell Cameras:

      • Doorbell cams and Home security cameras pose as much if not more risk than benefit.
      • In some cases, if an attacker gains access to these devices they can gain access to the video feed and microphones. This creates several risks even if the cameras are not inside the house.

Continue reading “Doorbell Cams: How to Mitigate the Privacy Risks They Pose”

Reduce Your Risk of Becoming a Cyber Crime Victim

Available for Interviews:  Paul Tracey

Paul Tracey is the Founder & CEO of Innovative Technologies, a Managed Security Service Provider in New York, and is a national speaker, cyber security educator, small business advocate, and author of Delete The Hacker Playbook and Cyber Storm.

What Paul Tracey can say in an interview on
Staying Cyber Secure:

Internet security threats such as malware, ransomware, botnets, Wi-Fi threats, phishing, hacking, data loss, malicious websites . . . What can we do to protect ourselves from cyber attacks?!

Continue reading “Reduce Your Risk of Becoming a Cyber Crime Victim”

6 Paramount Points When It Comes to Cybersecurity Today

Available for Interviews:  Paul Tracey

Paul Tracey is the Founder & CEO of Innovative Technologies, a Managed Security Service Provider in New York, and is a national speaker, cyber security educator, small business advocate, and author of Delete The Hacker Playbook and Cyber Storm.

What Paul Tracey can say in an interview on
Doorbell Cameras:

1) It is more important to ensure your business is protected from cyber criminals now than ever.

The probability that a business will be attacked is 100% if the business has any device PC, laptop, cell phone, or IoT device that connects to the internet.

Continue reading “6 Paramount Points When It Comes to Cybersecurity Today”

Medical Identity Theft: How to Protect Against Fraud

Available for Interviews:  Paul Tracey

Paul Tracey is the Founder & CEO of Innovative Technologies, a Managed Security Service Provider in New York, and is a national speaker, cyber security educator, small business advocate, and author of Delete The Hacker Playbook and Cyber Storm.

What Paul Tracey can say in an interview on
Medical Identity Theft:

Medical Identity Theft is when a criminal obtains your personal information to commit fraud and we classify that fraud as medical when health care services were the target of that fraudulent activity. The US Dept of Health and Human Services Office of Inspector General defines Medical Identity theft as the use of personal information Like your name, social security number, insurance, or other medical numbers to submit fraudulent claims on a victim’s behalf to Medicaid and other health insurers without your authorization.

Continue reading “Medical Identity Theft: How to Protect Against Fraud”

Cybersecurity Is Changing: What Security Issues We Need to Know

Available for Interviews:  Paul Tracey

Paul Tracey is the Founder & CEO of Innovative Technologies, a Managed Security Service Provider in New York, and is a national speaker, cyber security educator, small business advocate, and author of Delete The Hacker Playbook and Cyber Storm.

What Paul Tracey can say in an interview on
Multifactor Authentification:

    • Workforce Shortage. As cybercrimes continue to increase at exponential rates this segment of the workforce is not growing fast enough to meet the demand.  It is estimated that 700,000 people joined the cybersecurity workforce in 2021, however, 2.7 million more were needed. Businesses are moving much slower to attract these workers than is required and obtaining talent in this sector will become increasingly difficult.

Continue reading “Cybersecurity Is Changing: What Security Issues We Need to Know”

Is Someone Spying on Your iPhone?

Available for Interviews:  Paul Tracey

Paul Tracey is the Founder & CEO of Innovative Technologies, a Managed Security Service Provider in New York, and is a national speaker, cyber security educator, small business advocate, and author of Delete The Hacker Playbook and Cyber Storm.

What Paul Tracey can say in an interview on
Protecting Against Stalkerware & Spyware:

    • Stalkerware is a subset of spyware, It is specifically designed to spy on the personal habits of someone. The stalkerware is designed to gain access to GPS location, microphones, and call and text records. 
    • Stalkerware is a type of spyware that usually is in the context of an abusive or controlling relationship and is meant to terrorize.

Continue reading “Is Someone Spying on Your iPhone?”

6 Ways You Can Protect Your Privacy on Workplace Computers

Available for Interviews:  Paul Tracey

Paul Tracey is the Founder & CEO of Innovative Technologies, a Managed Security Service Provider in New York, and is a national speaker, cyber security educator, small business advocate, and author of Delete The Hacker Playbook and Cyber Storm.

What Paul Tracey can say in an interview on
Workplace Computers:

Sometimes it’s easy to forget that that computer you work on day in and day out is not really yours. You might think that your personal life is none of their business, but technically, it is! That means, that everything you do on it is subject to your employer’s information. Here are 6 things you would be wise to avoid or pay attention to when using your employer’s devices:

Continue reading “6 Ways You Can Protect Your Privacy on Workplace Computers”

Multifactor Authentification: How secure is it? (The Real Dangers in the APP Store)

Available for Interviews:  Paul Tracey

Paul Tracey is the Founder & CEO of Innovative Technologies, a Managed Security Service Provider in New York, and is a national speaker, cyber security educator, small business advocate, and author of Delete The Hacker Playbook and Cyber Storm.

What Paul Tracey can say in an interview on
Multifactor Authentification:

We all know that we are encouraged to use multifactor authentication, which we recommend as well but how good is it really? Can it be compromised? The answer can come as a shock when we look at the security of cell phones. 

Continue reading “Multifactor Authentification: How secure is it? (The Real Dangers in the APP Store)”

Stealth Mode or Incognito Mode for Your Web Browsing. How Private Is It Really?

Available for Interviews:  Paul Tracey

Paul Tracey is the Founder & CEO of Innovative Technologies, a Managed Security Service Provider in New York, and is a national speaker, cyber security educator, small business advocate, and author of Delete The Hacker Playbook and Cyber Storm.

What Paul Tracey can say in an interview on
Incognito Web Browsing:

    • Incognito or private mode will keep your local browsing private, but it won’t stop your ISP, school, or employer from seeing where you’ve been online. In fact, your employer or school has access to all your browsing activity no matter what you do. 

Continue reading “Stealth Mode or Incognito Mode for Your Web Browsing. How Private Is It Really?”

4 Dangers of Using USB Thumb Drives and How to Secure Data

Available for Interviews:  Paul Tracey

Paul Tracey is the Founder & CEO of Innovative Technologies, a Managed Security Service Provider in New York, and is a national speaker, cyber security educator, small business advocate, and author of Delete The Hacker Playbook and Cyber Storm. 

What Paul Tracey can say in an interview on
Thumb Drives:

 1. Malware potential. USB drives are a great way to make malware portable without breaking in through your internet access.  If USB access is open on your computers anyone can slip one in and in less time than you can make a single cup of coffee, have all of your data on the cloud.  Unfortunately, we are finding that this not only comes from bad actors adding malware on a regular drive but also from the supply chain. This is where the drive comes infected from the factory. Some attackers have also targeted electronic devices directly, and have infected items such as electronic picture frames and USB devices during production. When users buy the infected products and plug them into their computers, malware is installed on their computers.

Continue reading “4 Dangers of Using USB Thumb Drives and How to Secure Data”