Receive a FREE checklist: 10 Important and Easy Steps to Secure Your Smartphone and Laptop when you sign up for my weekly newsletter.
Overwhelmed by complex, impractical, or difficult-to-follow cybersecurity advice?
I make cybersecurity simple – and will help you stay safer than before – while making staying cyber-safe a lot easier for you than you thought possible.
Please sign up for my weekly newsletter – I will send you information that you want, and will never SPAM you.
Topics include: cybersecurity, digital crime, privacy, and technology trends.
Expert, highly convincing and entertaining presenter.
Available for keynotes, conferences, and corporate events.
Available for television appearances.
Leverage position as top-ranked influencer and trusted authority in cybersecurity and tech to help firms grow their brand recognition and sales pipelines.
Author thought leadership articles to improve client’s credibility and website traffic.
Provide high level cybersecurity guidance based on decades of experience.
Assist investors and others with due diligence on cybersecurity and tech related firms.
Highly convincing expert for both technical and non-technical audiences.
Respected worldwide for domain expertise and decades of experience.
Can also help attorneys prepare for trial or determine a case’s merits.
Deja-Vu: Check Your Venmo Settings Right Now Unless You Want Everyone To See How You Spend Your Money
If, like millions of other people, you use Venmo, the PayPal-owned online payment system that sports various social features, you might be at risk for having the details of all of your transactions made public. Last year, in an article entitled, Check Your Venmo Settings Right Now Unless You Want Everyone To See How You […]
Are you planning to upgrade your smartphone, to sell your old device, or to give it to a child or friend? Were you planning to “factory reset” your device to clean out all your data? Unfortunately, in many cases, “factory resetting” a device does not stop later users from accessing your data. Here is why […]
Hackers may be able to read whatever you type on a smartphone – by listening in via the device’s microphone. When humans tap on a touchscreen, they generate sound waves that are often strong enough to be picked up by the same device’s nearby microphone/s. Because each particular character on a device’s virtual keyboard appears […]