Blog
How Cybercrime Changed My Global Perspective
(Posted on Monday, January 13, 2025)
When life presents challenges, it offers us the chance to rebuild, learn, and emerge stronger than before. It’s our resilience that drives us to seek better outcomes, even in the face of adversity.
My own disruptive experience with cybercrime and identity theft opened my eyes to a reality I never imagined—one ... read full
Implications of Remote Work and Bring Your Own Device (BYOD)
(Posted on Tuesday, November 19, 2024)
According to NIST, did you know that over 95% of organizations allowed the use of personal devices for work even before the pandemic?
And that mobile phishing attacks have risen by 161% in recent years? (Lookout)
Yet, despite these risks, a majority of companies still lack robust cybersecurity education and policies for ... read full
Defending Against Modern AI Cyber Threats
(Posted on Friday, November 15, 2024)
AI is transforming cybersecurity, reshaping both the threat landscape and defense strategies for companies, and consumers.
However, it is estimated that only 10% of companies have integrated AI into their cybersecurity systems, exposing many to increasingly sophisticated, AI-driven cyberattacks.
Here’s the problem: Cybercriminals are outpacing AI companies’ use of targeted attacks.
For example, ... read full
The Credit Freeze: Three Steps to Enhanced Financial and Identity Security
(Posted on Wednesday, November 6, 2024)
Did you know that only an estimated 10% of U.S. consumers*—a mere 34 million out of the 346 million of us—have taken the simple step of freezing their credit files?
That’s a powerful statistic, highlighting just how many people remain vulnerable to cybercrime and identity theft. Having experienced a targeted attack ... read full
Biometric Breaches: A Vulnerability We Can't Ignore
(Posted on Thursday, October 31, 2024)
Biometric data—fingerprints, facial scans, and even voice prints—are often considered the most secure form of identification.
However…
Recent breaches highlight a concerning vulnerability. Millions of users were potentially exposed to high-profile breaches like the incident (October 2023).
Hackers used credential-stuffing attacks to access sensitive genetic profiles, raising concerns ... read full
Deepfakes: The New Face of Digital Deception
(Posted on Thursday, October 24, 2024)
The rise of deepfake technology is reshaping how we perceive digital content—and not in a good way.
AI advancements have made it easier than ever to create hyper-realistic deepfakes, blending fabricated audio and video with real voices and faces. What once took months to create can now be done in hours.
Deepfakes ... read full
Identity Threat Detection Response: What You Don’t Know Can Hurt You
(Posted on Thursday, October 17, 2024)
Identity theft isn’t just a risk anymore—it’s a reality.
Right now, there could be hackers trying to steal your personal information, waiting for the right moment to strike. If you think this can’t happen to you, think again. Identity theft happens every 22 seconds.
The worst part? Most people don’t even ... read full
Data Breaches and Identity Theft
(Posted on Thursday, October 10, 2024)
Have you ever felt a chill down your spine when you hear about a data breach? Have you ever wondered if you were affected, what data was stolen, and what you can do about it?
It’s a scary reality that has become commonplace. When companies fail to secure our information, the ... read full
Phishing: What It Is and How to Protect Yourself
(Posted on Thursday, October 3, 2024)
Phishing is one of the most common ways hackers steal personal information and do not be fooled everyone is vulnerable to a phishing attack.
Phishing can happen when a scammer pretends to be a trusted source, like your bank or a social media platform, to trick you into giving up ... read full
3 Essential Account Takeover Tips (That Will Enhance Security to Protect Your Accounts)
(Posted on Thursday, September 26, 2024)
Account takeovers have become more common, and make no mistake, anyone can be a target.
One day, you’re logging into your email, social media, or banking app, and the next thing you know, your details are in the hands of a hacker. How many times have you seen your family and ... read full
How to Safeguard Your Data and Protect Against Identity Theft: A Comprehensive 10-Step Guide
(Posted on Tuesday, September 24, 2024)
I’m often asked how to reduce exposure to identity theft and what steps to take to safeguard yourself and your family.
The most important advice I can offer is to start by understanding your potential exposure. It is crucial to be proactive and create a plan for yourself and ... read full
On The Impact of AI on Digital Identity
(Posted on Tuesday, May 21, 2024)
Our digital identity, the footprint we leave online, is constantly evolving. Artificial intelligence (AI) is playing a growing role in this transformation, impacting both the security and privacy of our digital selves. Let’s delve into the positive and negative ways AI is shaping our online experience.
AI: The Security Shield
AI acts as a powerful shield against online ... read full
(Posted on Wednesday, May 8, 2024)
The digital age provides a lot of convenience but at the same time threatens privacy. We enjoy being connected to the internet, but that also means we leave our digital footprints behind us. However, you do not have to worry because we have got you covered.
Here’s a roadmap to ... read full
On Understanding Catfish vs. Cuttlefish
(Posted on Thursday, May 2, 2024)
At first glance, “catfish” and “cuttlefish” might sound like close relatives in the animal kingdom. However, they represent two very different things: one is a fascinating marine creature, while the other is a cunning online deception.
The same can be said for consumer safety and security. As consumers navigate the ... read full
Password? or Passphrase? Understanding the Key Difference
(Posted on Tuesday, April 23, 2024)
In our digital age, securing our accounts with strong passwords is fundamental. But with so many accounts to manage, complex passwords can be a nightmare to remember. Enter the hero – the passphrase!
So, what is the difference between a password and a passphrase, and why should you care?
The Password ... read full
Fort Knox Your Digital Life: Essential Tips to Defending Your Digital Identity
(Posted on Friday, April 19, 2024)
The internet is a double-edged sword. It connects us, informs us, and entertains us, but it also exposes a treasure trove of personal information – our digital identity. This identity, if compromised, can lead to a world of trouble, from financial loss to damaged reputation. Fear not, fellow netizen! Here’s ... read full
On Why Multi-Factor Authentication (MFA) is Your Best Friend
(Posted on Tuesday, April 16, 2024)
We live in a world where our digital lives are intertwined with our physical ones. From bank accounts to social media, protecting our digital identities is crucial. But let’s face it, remembering complex passwords for everything can be a challenge.
Enter multi-factor authentication (MFA), your new best friend in the fight ... read full
On Protecting Yourself from Digital Identity Theft
(Posted on Tuesday, April 9, 2024)
In today’s digital world, most of our activities are conducted online, such as banking, shopping, and socializing, which is very convenient. However, this convenience is not without risks, as it exposes us to the danger of digital identity theft.
Digital identity theft occurs when someone steals your personal information, including your ... read full
2023 INDIES Book of the Year Award Finalist
(Posted on Thursday, March 14, 2024)
I’m excited to announce that Privacy Pandemic has been chosen as a finalist for the 2023 INDIES Book of the Year Award by Foreword Reviews, in the Science & Technology (Adult Non-Fiction) category.
I want to extend my sincere gratitude to Amplify Publishing Group, the Identity Theft Resource Center – Nonprofit, The ... read full
On Dumping the Social Security Number (SSN)
(Posted on Friday, December 15, 2023)
Should We Dump the Social Security Number?
In my opinion, yes.
We should replace the venerable Social Security number (SSN) —not as a financial identifier for things like tax filing, but as the be-all, end-all for identity. The reality is that the SSN was never intended to be the bulwark of ... read full
On The Digital Castle: 5 Things You Can Do to Keep Your Home Safe From Cybercriminals
(Posted on Monday, November 20, 2023)
Ah, the holidays. What a wonderful time to travel, to warmer weather or the slopes.
It is also a joyous time for your family, friends, celebrations, and possibly criminals (digital or physical) patrolling your neighborhood, sending you phishing emails or texts, and looking for the perfect opportunity to star in ... read full
Kirkus Reviews: Privacy Pandemic
(Posted on Tuesday, November 7, 2023)
TITLE INFORMATION
PRIVACY PANDEMICHow Cybercriminals Determine Targets, Attack Identities, and Violate Privacy–and How Consumers, Companies, and Policymakers Can Fight Back
Christopher A. SmithAmplify Publishing (304 pp.)$30.00 hardcover, $9.99 e-bookISBN: 9781645433934November 7, 2023BOOK REVIEW
Tech entrepreneur and author Smith considers the growing threat of cybercrime and offers ways to respond to it, personally and ... read full
On How to Keep Your Personal Data Safe
(Posted on Wednesday, November 1, 2023)
I want to thank Maria Bartiromo and the Fox Business Network for the tremendous opportunity to share my story and book #PrivacyPandemic on Mornings with Maria.
As President Biden signed an Executive Order on Artificial Intelligence (AI) this week, this was a timely opportunity to share my thoughts on how we as Americans ... read full
On Artificial Intelligence and Data Mining: Dangers, Benefits and Staying Safe
(Posted on Monday, October 30, 2023)
For all the chatter and anxiety about artificial intelligence (AI) and the chaos it could unleash in academia, journalism, Hollywood, and politics, one of the quieter yet more ominous uses of the technology has been going on for years: data mining using machine learning.
The growing practice of AI data ... read full
Foreword Reviews: Review of Privacy Pandemic
(Posted on Sunday, October 22, 2023)
HOW CYBERCRIMINALS DETERMINE TARGETS, ATTACK IDENTITIES, AND VIOLATE PRIVACY—AND HOW CONSUMERS, COMPANIES, AND POLICYMAKERS CAN FIGHT BACKChristopher A. SmithAmplify Publishing(305pp)978-1-64543-393-4
Clarion Rating: 4 out of 5
The illuminating technology guide Privacy Pandemic issues proposals for protecting against dangers related to digital crime and unsecured personal data.
Startup founder and tech executive Christopher ... read full
On Creating Better Digital Privacy and Security Habits Before a Data Breach
(Posted on Monday, October 16, 2023)
Like it or not, we all rely on major corporations to provide services and products we need to make our lives better. Unfortunately, one of the pre-conditions of the digital age is that to allow companies to bring us maximum value, we provide them with a great deal of personal ... read full
On Protecting Seniors from Fraudsters
(Posted on Wednesday, September 6, 2023)
It’s no secret that seniors are among the most common victims of fraudsters. In fact, according to Comparitech, ten percent of U.S. seniors were victims of financial fraud in 2022—a total of about 7.8 million people.
But in the past, when we thought about elders being victimized, we probably thought ... read full
(Posted on Wednesday, March 29, 2023)
In general, digital identity is an understood concept. However, let’s take a look at a definition from TechTarget.
A digital identity is the body of information about an individual, organization, or electronic device that exists online. Unique identifiers and use patterns make detecting individuals or their devices possible.
When I think about ... read full
(Posted on Wednesday, March 15, 2023)
Cybersecurity is typically categorized into five distinct types:
Critical infrastructure security Application security Network security Cloud security Internet of Things (IoT) securityFor this post, I would like to focus on a sixth category.
Human or User securityAccording to the Identity Theft Resource Center, in 2022, there were over 1800 data breaches. While this ... read full
(Posted on Thursday, March 2, 2023)
On the surface, privacy is a well-defined and understood concept.
As a reminder, here is the following definition from Merriam-Webster:
A. the quality or state of being apart from company or observation.
B. freedom from unauthorized intrusion
With this definition in mind, I’d like to focus on “freedom from unauthorized intrusion.”
So, how does privacy show up ... read full
(Posted on Wednesday, March 1, 2023)
Behind every great cause, company, or movement lives a founder’s story. An incident, an experience, or an event that compels the person to act, change and evolve.Today, I’m ready to share my story. A few years ago, I became the target of significant and life-altering digital identity theft. Until you ... read full