Predator: Secret Service Special Agent Discussion: Securing My Googlable Identity Continuing with our goal, providing you with knowledge from both good guys and bad guys - here is the recommended cheat sheet for securing your google identity or otherwise known as Google+ (Plus). Just like all social...

Predator: Secret Service Special Agent Discussion: The Definitive Answer to Keeping My Facebook Account Secure Facebook, 1 billion and growing, is the most targeted social media platform by nefarious individuals. They want to impersonate you, stalk you, collect your personal data and bully you. There are ways...

Predator: Secret Service Special Agent Discussion: Best means of securing my Twitter Identity In recent discussions with former military and current Secret Service agents - they recommend the Twitter Smart Card to ensure your personal security in tweet world. It is easy to use  - print it, keep it...

Our Top 5 Must Have Security Apps These are, for now, great apps to promote security and privacy in your professional and personal life. If you use all five, you will be able to secure text, secure voice calls, determine tampering of your environment, unlock your...

Predator: Craig P., Virginia State Prison System, Professional Burglar Discussion: Preventing Home Invasion and Burglary We had the opportunity to interview Craig via his lawyer this month – the dates kept sliding to the right and why you didn’t get this before months end. We apologize –...

Predator: Chris C. - State Department Information Security Specialist Subject: Mobile Device Security TLO: Terminal Learning Objective is the specific message a lesson conveys to the student. 1. Introduction to Mobile Device Security a. TLO: Familiarize the member with threats that impact intellectual property, security and safety. b. Laptops,...

For the past week, Escape the Wolf along with 1.2 billion other websites, were targeted by Russian hackers utilizing a massive "bot" attack. These bots aggressively attempted access to websites with username and password options. Fortunately, Escape the Wolf has very robust and secure servers...

Predator: Convicted Rapist, Texas Prison System Every predator utilizes surveillance, intelligence collection and strategy prior to executing a crime – whether they know it or not. Crimes of rage tend to skip all these steps and predators inevitably get caught. It's human nature to observe, collect...