Created By Annie Jennings PR, National Publicist  

Robert Siciliano


Robert Siciliano, CEO of IDTheftSecurity.com is fiercely committed to informing, educating, and empowering Americans so they can be protected from violence and crime in the physical and virtual worlds.

Robert's “tell it like it is” style is sought after by major media outlets, executives in the C-Suite of leading corporations, meeting planners, and community leaders to get the straight talk they need to stay safe in a world in which physical and virtual crime is commonplace. Robert Siciliano is accessible, real, professional, and ready to weigh in and comment at a moment’s notice on breaking news.

Connect With Robert



Posts by Robert Siciliano:

  • Should You Post Pictures Of Children Online?

  • December 26th, 2018
    Most people give no thought whatsoever to posting pictures of their children online. They are proud of their kids, they love them…so why not show the world how wonderful they are so others can enjoy each milestone [...]

  • Kids And Smartphones: How Old?

  • August 15th, 2018
    How old is old enough for a kid to have a smartphone? Right out of the gate, I’m saying 16, and I know there’ll be some backlash from that. Some will say it all depends on the kid; others will argue there’s no [...]

  • What Is Scareware?

  • September 18th, 2014
    When it comes to making us fall for their scams, cybercriminals have a number of tricks up their sleeves. One of these tricks is to scare us into thinking that our computers or smartphones have become infected with malware to [...]

  • Would You Use Facebook To Catch A Bad Guy?

  • September 12th, 2014
    In Oklahoma, the OK state, an elderly couple was home invaded and held at knifepoint, and the woman was knocked to the ground. During the ensuing abuse, their home was robbed and the predator got away. Not OK. The police [...]

  • Fighting The Bad Guy…And Winning

  • September 5th, 2014
    If someone were to jump on you and start whacking away, what would you do? Would you fight back? Run? Curl up into a ball and beg for mercy? Do you have a plan? Have you even thought about what your reaction would be? [...]

  • 5 Rules For Using Coffee Shop WiFi

  • August 29th, 2014
    In order to compete with the likes of the chain coffee shops and now fast food joints, just about every coffee shop or small restaurant is supplying its clients with free WiFi. Unfortunately, there are people who don’t [...]

  • Prepare Now For Device And Data Theft

  • August 22nd, 2014
    Digital device theft is a big problem. I’ve seen numerous stories about iPhones being stolen right from a person’s hand while the user was talking on it. Others have reported sitting in a coffee shop while having [...]

  • Unsecured Wireless Video Baby Monitors Hackable

  • August 8th, 2014
    Baby monitors have evolved from simple one-way radio communications based on older radio waves to highly evolved IP based, internet-connected cameras that can be viewed on a smartphone or tablet. Back in the day, when [...]

  • High-Tech vs. Low-Tech Locks

  • August 6th, 2014
    High technology doesn’t necessarily mean better, stronger or faster. It does usually mean more convenient, as the word technology is defined as “including the use of materials, tools, techniques, and sources of power [...]

  • 11 Easy and Simple Home Security Tips

  • July 25th, 2014
    Occasionally it’s good to be reminded of the fundamentals of home security. Print this out and stick it on your bulletin board at work or on your refrigerator as a reminder to everyone in your family. Daytime burglaries: [...]

  • 6 Tips On Securing Your Home From Those You ‘Trust’

  • July 18th, 2014
    There are going to be times in your life when you will need to simply trust people who you let into your home for various reasons. People such as: House cleaners: House cleaners get in the nooks and crannies of your [...]

  • Selling Your Smartphone? Beware Of Stowaway Data

  • July 11th, 2014
    Upgrading your mobile device? It has become standard practice to upgrade to a newer device every one to three years. And when doing so, people often sell, donate or discard the old one. The goal is often to sell the [...]

  • Passwords: Fingerprint, Heartbeat Or Brainwaves?

  • July 3rd, 2014
    There is no such thing as a truly secure password; there are only more secure or less secure passwords. Passwords are currently the most convenient and effective way to control access to your accounts. But passwords [...]

  • Streamlined ‘Passpoint’ WiFi Coming

  • July 3rd, 2014
    WiFi connects us everywhere, such as in parks, subways, airplanes, coffee shops and public WiFi hotspots. The WiFi Alliance says there are more than a million hotspots worldwide, and a report by market research company [...]

  • I Really Want My Phone to Be My Wallet. Don’t You?

  • June 20th, 2014
    Wallets suck. Seriously. Mine hurts my butt when I sit down. I have to remember to take it with me, and then I’m always afraid of losing it. There’s nothing fun about it. And…well…it’s dirty. It really is—money [...]

  • NFC App On Androids Facilitates Automation

  • June 16th, 2014
    Near field communications (NFC) is the exchange of information between two devices via wireless signal. For example, a wireless signal emitting from your cell phone can act as a credit card when making a purchase. In [...]

  • 5 Home Security Tactics Of The Uber Rich

  • June 13th, 2014
    The uber rich have many reasons to invest in uber security. I met a woman who won a $300 million lottery, and she had some unfortunate stories about how low people go to get at and to moneyed individuals. So to protect [...]

  • New App Stores House Or Car Keys Online. Is It Safe?

  • June 4th, 2014
    Ever lock yourself out of your car or home? I’ve done each at least once this year; that’s about my average. After the last time I got stuck on the cold side of my front door, I decided to go with keyless locks for [...]

  • 7 Scary Privacy Issues To Be Aware Of

  • May 9th, 2014
    We are all too aware of the National Security Agency breaking encryption. The NSA has frequently been known to be implanting back doors on various servers, networks and within numerous social sites, email providers, [...]

  • Hackproof Your Facebook Account

  • May 2nd, 2014
    With over one billion people connected to Facebook, we have to assume that many of them are criminals. (Criminals are people with friends too!) But the criminals we need to be concerned about are the ones who create [...]

  • Good Heavens! Churches are Big Targets for Burglars

  • April 25th, 2014
    Is nothing sacred? Well, no. Not even churches. Really, especially churches. The problem with churches, like any public place, is that by design, they are open for anyone to come in and worship at any time. But in the [...]

  • Why Mobile Security is a Must

  • April 18th, 2014
    Smartphone use continues to increase. More than one third of Americans have dropped landlines and only use mobiles. It is very possible that within the next 10 years, the landline will be obsolete and we will all be [...]

  • 12 Biggest Home Security Mistakes

  • April 11th, 2014
    We all make mistakes; the key is to make them once or twice and learn from them. If you keep making them, bad things happen—and home security mistakes are not ones you want to repeat. Here are a dozen mistakes that [...]

  • Scammers Use Online Calendars To Phish Victims

  • April 4th, 2014
    You’ve been here before: You’re at work, you get a notification via a popup, then an email, then a text reminding you of an appointment on your calendar. For most busy professionals, this is pretty normal because [...]

  • Apple Makes Life Harder For iPhone Thieves

  • March 28th, 2014
    You probably know that iPhones are high on the wish list of thieves all over the country —so much so that data from the New York City Police Department reveals that iPhone and iPad thefts have soared 40 percent compared [...]

  • Socint: Disseminating Cybercrime Through Social Intelligence

  • March 21st, 2014
    People talk—A LOT. They can’t stop talking. Talking, getting something off your mind and out there feels good. Talking takes the pressure off one’s mind; our mouths are like relief valves for our heads. The problem [...]

  • Laptop Theft Leads to Identity Theft

  • March 14th, 2014
    Ever lose a mobile device? Have one stolen? Know someone who has? Device loss and theft is a common issue when it comes to identity theft and results in data breaches. Some studies have shown as many as 2.5 million laptops [...]

  • Standard Door Frames Make Burglary Easy

  • March 7th, 2014
    Stop what you are doing. Walk over to your front or back door. Open it. Look down at the doorjamb where the holes are—you know, where your doorknob and deadbolt locks (hopefully they are Schlage) go into the frame. [...]

  • Mobile, Wearable And Now…Implantable Technology?

  • February 28th, 2014
    It began with the laptop. The laptop was the first portable internet-connected device that freed up millions to create a mobile workforce. Next was the smartphone, which didn’t really take off until Apple opened it [...]

  • Cellular Base Station Range Extenders Vulnerable to Attack

  • February 21st, 2014
    Low-powered cellular base stations are often found in residential homes and small businesses where mobile coverage is scant. The device, which also known as a femtocell, connects to DSL or cable connections and extends [...]

  • Top 5 Home Security System Scams

  • February 14th, 2014
    When a home security salesman comes a-knockin’, beware, pay attention and know what you are getting into. He might not be who he says he is, or he might have tactics under his belt that will cost you big time. WZZM [...]

  • Mirror Mirror Online, Who Is the Most Dangerous Celebrity of Them All?

  • February 7th, 2014
    We all do it. We probably all just don’t admit it. Well I admit it—I’ve searched for that elusive picture of Kimye’s baby North (who I thought would be called Kadence, but I’m not in the know, which is why [...]

  • Identity Thieves Go After the Deceased

  • January 30th, 2014
    There are a reported 2.5 million cases of identity theft among the deceased every year. Theft of deceased people’s identity happens partly because of the availability of public records coupled with the time it takes [...]

  • 4 Ways To Share Paid Hotspots

  • January 27th, 2014
    There are a number of scenarios you might be in where friends, family and colleagues need to jump on a (read: your) wireless connection, but they’d rather not pay a connection fee. So if you have the goods right in [...]

  • What’s The Point Of $1 Million In Insurance For Identity Theft?

  • January 3rd, 2014
    Honesty is the best policy, right? I’ve spent my life being honest, and do you know what is the most important lesson I’ve learned is? The truth hurts. And when you (meaning me too) says it like it is, someone somewhere [...]