Medical Identity Theft: How to Protect Against Fraud

Available for Interviews:  Paul Tracey

Paul Tracey is the Founder & CEO of Innovative Technologies, a Managed Security Service Provider in New York, and is a national speaker, cyber security educator, small business advocate, and author of Delete The Hacker Playbook and Cyber Storm.

What Paul Tracey can say in an interview on
Medical Identity Theft:

Medical Identity Theft is when a criminal obtains your personal information to commit fraud and we classify that fraud as medical when health care services were the target of that fraudulent activity. The US Dept of Health and Human Services Office of Inspector General defines Medical Identity theft as the use of personal information Like your name, social security number, insurance, or other medical numbers to submit fraudulent claims on a victim’s behalf to Medicaid and other health insurers without your authorization.

Continue reading “Medical Identity Theft: How to Protect Against Fraud”

Cybersecurity Is Changing: What Security Issues We Need to Know

Available for Interviews:  Paul Tracey

Paul Tracey is the Founder & CEO of Innovative Technologies, a Managed Security Service Provider in New York, and is a national speaker, cyber security educator, small business advocate, and author of Delete The Hacker Playbook and Cyber Storm.

What Paul Tracey can say in an interview on
Multifactor Authentification:

    • Workforce Shortage. As cybercrimes continue to increase at exponential rates this segment of the workforce is not growing fast enough to meet the demand.  It is estimated that 700,000 people joined the cybersecurity workforce in 2021, however, 2.7 million more were needed. Businesses are moving much slower to attract these workers than is required and obtaining talent in this sector will become increasingly difficult.

Continue reading “Cybersecurity Is Changing: What Security Issues We Need to Know”

6 Paramount Points When It Comes to Cybersecurity Today

Available for Interviews:  Paul Tracey

Paul Tracey is the Founder & CEO of Innovative Technologies, a Managed Security Service Provider in New York, and is a national speaker, cyber security educator, small business advocate, and author of Delete The Hacker Playbook and Cyber Storm.

What Paul Tracey can say in an interview on
Doorbell Cameras:

1) It is more important to ensure your business is protected from cyber criminals now than ever.

The probability that a business will be attacked is 100% if the business has any device PC, laptop, cell phone, or IoT device that connects to the internet.

Continue reading “6 Paramount Points When It Comes to Cybersecurity Today”

Money: Avoid Getting Scammed

Available for Interviews: Suzanne Powell

Suzanne Powell Suzanne is the founder of Capital Strategies Group, and acting Vice-President of Meridian Wealth Management. She is also the author of the newly released book, The Ultimate Money Moves for Women Over 50.

What Suzanne Powell could say on
How to Avoid Getting Scammed:

    • Keep one credit card with fraud protection at a low balance and use it for any internet purchases that are not a major retailer. 
    • Do not use your debit card for any internet purchases ever.

Continue reading “Money: Avoid Getting Scammed”

Doorbell Cams: How to Mitigate the Privacy Risks They Pose

Available for Interviews:  Paul Tracey

Paul Tracey is the Founder & CEO of Innovative Technologies, a Managed Security Service Provider in New York, and is a national speaker, cyber security educator, small business advocate, and author of Delete The Hacker Playbook and Cyber Storm.

What Paul Tracey can say in an interview on
Doorbell Cameras:

      • Doorbell cams and Home security cameras pose as much if not more risk than benefit.
      • In some cases, if an attacker gains access to these devices they can gain access to the video feed and microphones. This creates several risks even if the cameras are not inside the house.

Continue reading “Doorbell Cams: How to Mitigate the Privacy Risks They Pose”

4 Simple Tips to Stay Cyber Secure While Traveling

Available for Interviews:  Paul Tracey

Paul Tracey is the Founder & CEO of Innovative Technologies, a Managed Security Service Provider in New York, and is a national speaker, cyber security educator, small business advocate, and author of Delete The Hacker Playbook and Cyber Storm.

What Paul Tracey can say in an interview on
Cybersecurity Tips While Traveling/Away From Home:

Cybersecurity can be a daunting task but luckily we know that the majority of breaches come from the same main surfaces. Therefore, some simple steps can make a drastic difference in staying secure:

Continue reading “4 Simple Tips to Stay Cyber Secure While Traveling”

The Ubiquity of Hacking and Getting at the Root of the Problem

Available for Interviews:  Paul Tracey

Paul Tracey is the Founder & CEO of Innovative Technologies, a Managed Security Service Provider in New York, and is a national speaker, cyber security educator, small business advocate, and author of Delete The Hacker Playbook and Cyber Storm.

What Paul Tracey can say in an interview on
Cybersecurity and Hacking:

Hacking involves the misuse of devices like computers, smartphones, tablets, and networks to cause damage to or corrupt systems, gather information on users, steal data and documents, or disrupt data-related activity. They can also trick users into opening malicious attachments or links which further compromise sensitive personal data.

Unfortunately, hackers are increasingly growing in size and sophistication, and are using strong and malicious methods of attack that are designed to fly under the radar of cybersecurity software and IT teams.

Continue reading “The Ubiquity of Hacking and Getting at the Root of the Problem”

Ransomware 101: Don’t Be a Victim

Available for Interviews:  Paul Tracey

Paul Tracey is the Founder & CEO of Innovative Technologies, a Managed Security Service Provider in New York, and is a national speaker, cyber security educator, small business advocate, and author of Delete The Hacker Playbook and Cyber Storm.

What Paul Tracey can say in an interview on
Ransomware:

We should all know by now that ransomware is a threat to everyone, not just companies.

The data tells us that 95% of ransomware attacks originate with social engineering and phishing emails. So if we want to mitigate the majority of risks, social media and email hygiene are a necessity. 

Continue reading “Ransomware 101: Don’t Be a Victim”

Is Someone Spying on Your iPhone?

Available for Interviews:  Paul Tracey

Paul Tracey is the Founder & CEO of Innovative Technologies, a Managed Security Service Provider in New York, and is a national speaker, cyber security educator, small business advocate, and author of Delete The Hacker Playbook and Cyber Storm.

What Paul Tracey can say in an interview on
Protecting Against Stalkerware & Spyware:

    • Stalkerware is a subset of spyware, It is specifically designed to spy on the personal habits of someone. The stalkerware is designed to gain access to GPS location, microphones, and call and text records. 
    • Stalkerware is a type of spyware that usually is in the context of an abusive or controlling relationship and is meant to terrorize.

Continue reading “Is Someone Spying on Your iPhone?”

6 Ways You Can Protect Your Privacy on Workplace Computers

Available for Interviews:  Paul Tracey

Paul Tracey is the Founder & CEO of Innovative Technologies, a Managed Security Service Provider in New York, and is a national speaker, cyber security educator, small business advocate, and author of Delete The Hacker Playbook and Cyber Storm.

What Paul Tracey can say in an interview on
Workplace Computers:

Sometimes it’s easy to forget that that computer you work on day in and day out is not really yours. You might think that your personal life is none of their business, but technically, it is! That means, that everything you do on it is subject to your employer’s information. Here are 6 things you would be wise to avoid or pay attention to when using your employer’s devices:

Continue reading “6 Ways You Can Protect Your Privacy on Workplace Computers”