Medical Identity Theft: How to Protect Against Fraud

Available for Interviews:  Paul Tracey

Paul Tracey is the Founder & CEO of Innovative Technologies, a Managed Security Service Provider in New York, and is a national speaker, cyber security educator, small business advocate, and author of Delete The Hacker Playbook and Cyber Storm.

What Paul Tracey can say in an interview on
Medical Identity Theft:

Medical Identity Theft is when a criminal obtains your personal information to commit fraud and we classify that fraud as medical when health care services were the target of that fraudulent activity. The US Dept of Health and Human Services Office of Inspector General defines Medical Identity theft as the use of personal information Like your name, social security number, insurance, or other medical numbers to submit fraudulent claims on a victim’s behalf to Medicaid and other health insurers without your authorization.

Continue reading “Medical Identity Theft: How to Protect Against Fraud”

Cybersecurity Is Changing: What Security Issues We Need to Know

Available for Interviews:  Paul Tracey

Paul Tracey is the Founder & CEO of Innovative Technologies, a Managed Security Service Provider in New York, and is a national speaker, cyber security educator, small business advocate, and author of Delete The Hacker Playbook and Cyber Storm.

What Paul Tracey can say in an interview on
Multifactor Authentification:

    • Workforce Shortage. As cybercrimes continue to increase at exponential rates this segment of the workforce is not growing fast enough to meet the demand.  It is estimated that 700,000 people joined the cybersecurity workforce in 2021, however, 2.7 million more were needed. Businesses are moving much slower to attract these workers than is required and obtaining talent in this sector will become increasingly difficult.

Continue reading “Cybersecurity Is Changing: What Security Issues We Need to Know”

6 Paramount Points When It Comes to Cybersecurity Today

Available for Interviews:  Paul Tracey

Paul Tracey is the Founder & CEO of Innovative Technologies, a Managed Security Service Provider in New York, and is a national speaker, cyber security educator, small business advocate, and author of Delete The Hacker Playbook and Cyber Storm.

What Paul Tracey can say in an interview on
Doorbell Cameras:

1) It is more important to ensure your business is protected from cyber criminals now than ever.

The probability that a business will be attacked is 100% if the business has any device PC, laptop, cell phone, or IoT device that connects to the internet.

Continue reading “6 Paramount Points When It Comes to Cybersecurity Today”

Doorbell Cams: How to Mitigate the Privacy Risks They Pose

Available for Interviews:  Paul Tracey

Paul Tracey is the Founder & CEO of Innovative Technologies, a Managed Security Service Provider in New York, and is a national speaker, cyber security educator, small business advocate, and author of Delete The Hacker Playbook and Cyber Storm.

What Paul Tracey can say in an interview on
Doorbell Cameras:

      • Doorbell cams and Home security cameras pose as much if not more risk than benefit.
      • In some cases, if an attacker gains access to these devices they can gain access to the video feed and microphones. This creates several risks even if the cameras are not inside the house.

Continue reading “Doorbell Cams: How to Mitigate the Privacy Risks They Pose”

Is Someone Spying on Your iPhone?

Available for Interviews:  Paul Tracey

Paul Tracey is the Founder & CEO of Innovative Technologies, a Managed Security Service Provider in New York, and is a national speaker, cyber security educator, small business advocate, and author of Delete The Hacker Playbook and Cyber Storm.

What Paul Tracey can say in an interview on
Protecting Against Stalkerware & Spyware:

    • Stalkerware is a subset of spyware, It is specifically designed to spy on the personal habits of someone. The stalkerware is designed to gain access to GPS location, microphones, and call and text records. 
    • Stalkerware is a type of spyware that usually is in the context of an abusive or controlling relationship and is meant to terrorize.

Continue reading “Is Someone Spying on Your iPhone?”

6 Ways You Can Protect Your Privacy on Workplace Computers

Available for Interviews:  Paul Tracey

Paul Tracey is the Founder & CEO of Innovative Technologies, a Managed Security Service Provider in New York, and is a national speaker, cyber security educator, small business advocate, and author of Delete The Hacker Playbook and Cyber Storm.

What Paul Tracey can say in an interview on
Workplace Computers:

Sometimes it’s easy to forget that that computer you work on day in and day out is not really yours. You might think that your personal life is none of their business, but technically, it is! That means, that everything you do on it is subject to your employer’s information. Here are 6 things you would be wise to avoid or pay attention to when using your employer’s devices:

Continue reading “6 Ways You Can Protect Your Privacy on Workplace Computers”

President Biden Warns of Russian Cyber Attacks. Here’s What to Do

Available for Interviews:  Paul Tracey

Paul Tracey is the Founder & CEO of Innovative Technologies, a Managed Security Service Provider in New York, and is a national speaker, cyber security educator, small business advocate, and author of Delete The Hacker Playbook and Cyber Storm.

What Paul Tracey can say in an interview on
Protection Against Cyber Attacks:

The threat on infrastructure has taken on additional significance in the eyes of government agencies for this announcement to come from President Biden. The Whitehouse is pretty much begging you to stop ignoring the warnings and act now.

Not sure this applies to you? It does!

Continue reading “President Biden Warns of Russian Cyber Attacks. Here’s What to Do”

Stealth Mode or Incognito Mode for Your Web Browsing. How Private Is It Really?

Available for Interviews:  Paul Tracey

Paul Tracey is the Founder & CEO of Innovative Technologies, a Managed Security Service Provider in New York, and is a national speaker, cyber security educator, small business advocate, and author of Delete The Hacker Playbook and Cyber Storm.

What Paul Tracey can say in an interview on
Incognito Web Browsing:

    • Incognito or private mode will keep your local browsing private, but it won’t stop your ISP, school, or employer from seeing where you’ve been online. In fact, your employer or school has access to all your browsing activity no matter what you do. 

Continue reading “Stealth Mode or Incognito Mode for Your Web Browsing. How Private Is It Really?”

4 Dangers of Using USB Thumb Drives and How to Secure Data

Available for Interviews:  Paul Tracey

Paul Tracey is the Founder & CEO of Innovative Technologies, a Managed Security Service Provider in New York, and is a national speaker, cyber security educator, small business advocate, and author of Delete The Hacker Playbook and Cyber Storm. 

What Paul Tracey can say in an interview on
Thumb Drives:

 1. Malware potential. USB drives are a great way to make malware portable without breaking in through your internet access.  If USB access is open on your computers anyone can slip one in and in less time than you can make a single cup of coffee, have all of your data on the cloud.  Unfortunately, we are finding that this not only comes from bad actors adding malware on a regular drive but also from the supply chain. This is where the drive comes infected from the factory. Some attackers have also targeted electronic devices directly, and have infected items such as electronic picture frames and USB devices during production. When users buy the infected products and plug them into their computers, malware is installed on their computers.

Continue reading “4 Dangers of Using USB Thumb Drives and How to Secure Data”

Data Privacy and Data Security: Why You Need Both

Available for Interviews: Phil Crowley.

Philip P. Crowley, is a dedicated attorney who has been handling legal matters for pharmaceutical, biomedical, medical devices, information technology and other technology companies for over 30 years. He has also spent nearly 25 years on the board of trustees of the Stevens Institute of Technology, with substantial involvement in the oversight of academic innovation and entrepreneurship.

 

What Phil Crowley Can Say in an Interview:

Data privacy deals with the ownership and restrictions on the use of data acquired from others. It also deals with the processes and procedures needed to maintain the privacy of that data. Data security deals with the  details of protecting data from unauthorized disclosure or use. 

Continue reading “Data Privacy and Data Security: Why You Need Both”