For The Rookies

For The Rookies

I often tell people that learning about privacy and security is like going to a salad bar.  When you attend a live training about these subjects or begin to explore the large number of topics that are related to this endeavor, it can be a bit overwhelming.  With so many options and choices to consider, how does a person decide where to begin?  Hence the salad bar analogy.  There are decisions to made at every turn along the way.  What…

Read More Read More

The Equifax Debacle

The Equifax Debacle

Here is the latest information from reputable sources on the massive Equifax breach from this past week.  I encourage everyone to review the information, stay informed, and take proactive steps to protect your personal information.  A recent podcast about this breach is embedded below which discusses important actions a person can take, and also a free credit freeze tutorial is included in the notes below.  Unfortunately, this latest breach will not be the last. Breach at Equifax May Impact 143M…

Read More Read More

Phone Strategy: Update

Phone Strategy: Update

Last year I wrote an article (here) which detailed a way to set up your phone strategy with enhancements to privacy & security in mind.  Since that time, I have received numerous emails with questions and feedback on the solutions I set up.  I decided to post an update to my strategy and highlight some of the changes I have made over the past year.  I am going to leave the original article untouched so that readers can compare the…

Read More Read More

Metapho: App Review

Metapho: App Review

I wanted to do a quick review for a useful iOS app that I have been using for a while now.  Metapho allows you to view, edit, and remove the metadata from your photos before sharing them.  It should come as no surprise that anytime someone sends me a photo, I check it for metadata.  I am curious who among my contacts has location services enabled on their phone.  Many of the people I associate with are also privacy conscious,…

Read More Read More

Privacy For Pets

Privacy For Pets

The personal information you provide and associate with your pets should be considered as part of your overall strategy to protect your personal information.  Pet owners know that there are many entities and businesses that gather information about your pets and you during the course of doing business.  If/when that information is compromised, then it could easily lead to the disclosure of information you did not want leaked.  We take our pets to the veterinarian, groomer, and many municipalities require…

Read More Read More

Address Confidentiality Programs

Address Confidentiality Programs

Address Confidentiality Programs (ACP) were created to protect victims of stalking, domestic violence, sexual assault, and other crimes from offenders who use public records, such as voter or drivers’ license registries, to locate them. These programs give victims a legal substitute address to use in place of their real physical address; this address can be used whenever an address is required by public agencies.  First class mail sent to the substitute address is forwarded to the victim’s actual address. One…

Read More Read More

Voter Records

Voter Records

On June 12, 2017, media outlets in the U.S. began reporting the news that information on over 200 million registered voters was accidentally exposed online due to poor security measures.  The data, which was stored on a publicly accessible cloud server, included 1.1 terabytes of unsecured personal information including names, dates of birth, addresses, phone numbers, voter registration details, as well as data described as “modeled” voter ethnicities and religions.  The disclosure exposed the personal details of over 61% of…

Read More Read More

Sharing A Cell Phone Number

Sharing A Cell Phone Number

During a recent trip out of town, I met with a real estate broker to inquire about home prices in the area and also get a contact for a local attorney who may be able to help with purchasing property in a non-traditional, private manner.  The broker I met worked for a well known firm, one that caters to high end clients worldwide.  For the purpose of this article, her name was “Megan”, and she proved to be very knowledgeable…

Read More Read More

Mobile App Collection

Mobile App Collection

In this post I will summarize some of the mobile apps that I have chosen as part of my strategy for a more secure and private communications platform.  I have reviewed several of these in previous posts, however I am frequently asked for recommendations and a list of what my current set up consists of.  Of course, the basis for privacy with a mobile phone starts with purchasing your phone, and then setting up a prepaid account with the provider…

Read More Read More

TruePeopleSearch (Opt-Out)

TruePeopleSearch (Opt-Out)

The following information was originally posted to the Privacy-Training blog earlier today.  In a previous post, I discussed FamilyTreeNow and how that website has very accurate details about most Americans, including home addresses, telephone numbers, emails, family members, and other personal information.  An option to remove your data from FamilyTreeNow is available, which was already discussed here. Recently, a site that appears to offer a clone of that data has emerged at TruePeopleSearch.com.  Even more interesting, the data that was…

Read More Read More