Find out what The Identity Theft Enforcement and Restitution Act is and what it offers as definitions of and penalties for identity theft.
I have heard of Lo Jack for my dog, it is an implant that helps to locate him if lost or stolen. I’ve heard of LoJack for my car, which helps locate my car when it is stolen. But what about Lo Jack for my computer (A.K.A. LoJack for Laptops)? Will it protect my laptop and me?
In this interview, Paul Herbka, VP of South Seas Corporation, based out of Colorado, USA, answers the question: “How does encryption work.”
He also helps to understand everything from file and data encryption to WEP Encryption, and talks about a variety of the software and security solutions available in the market today.
Take a listen to the interview, and/or read the transcript below.
Download this “How does Encryption Work Interview in MP3 Format”
ID Watchdog Discount/Promotional Code
Get a free trial (and save money) on ID Watchdog by clicking here
(Opens in new Window)
ID Watchdog is a company we interviewed a few months ago, but for whatever reason, never got the transcript of the interview up online.
So, here is the transcript (and an audio replay) of the interview we did with IDWatchdog.
Click here to get a discount on IDWatchdog’s coverage.
(A Transcription of this Interview with IDWatchdog will be available shortly.)
Click below to listen to the Identity Theft Secrets Interview with ID Watchdog
ID Watchdog Review: Download the MP3
What is your identity worth? Did you know there are actually black market sites selling your identity? This article tells you what you need to know about a whole other world of black market purchases.
Do you know what “pod slurping” is? How does it happen? Slurping isn’t just for cherry and coke anymore, but a quick and easy method of slurping up information from computers, both personal and private.
There are several methods and options available to help you protect yourself from Identity Theft. What is available and what are the best parts of each of the well-known options; Life Lock, Trusted ID and Identity Guard.
As more and more people are “going green” this includes decisions to recycle their old computer to charities, schools or even just dumping them thinking they are no longer working. But what about the information that is stored on those computers? Did you really erase your identity in the form of documents, spreadsheets, photos and other important information.. important to identity thieves that is!