Privacy Protection
The Moving Finger writes; and, having writ,
Moves on: nor all thy Piety nor Wit
Shall lure it back to cancel half a Line,
Nor all thy Tears wash out a Word of it.

Verse 51 of Edward FitzGerald's translation of the Rubáiyát of Omar Khayyám
Have you ever considered how much personal information is stored on your computer?
How about your smartphone (iPhone, Android, or Blackberry)?
What about your Web-based email or social networking accounts?
Unless you have never used technology, your personal digital footprint is far larger than you can imagine, and far more vulnerable than you realize; and there are unscrupulous people everywhere seeking to exploit your weaknesses.
Is your computer firewalled? If not, your neighbor, or a hacker on another continent, can see the files on your computer. We show you how to firewall your computer to help protect it from attackers.

We use advanced computer forensic analysis to ensure your computer is free from viruses, keyloggers, rootkits, or other spyware.

Do you use an easy-to-remember password for your e-mail? So did Sarah Palin.

How do you know that link you just clicked isn't sending you to a site run by an organization waiting to steal your credit card information, or worse, your identity?

We will teach you how to protect yourself against identity thieves opening credit accounts in your name, and leaving you with the bills, and the nightmare of restoring your good name.

As RFID chips spread into drivers licenses, passports, and credit cards, how do you know the person you just passed didn't capture all your information with an RFID reader?

Is your smartphone protected against the multitude of applications which can turn your phone into an eavesdropping device, even when it's turned off? We can you tell if it has been infected.

Cellular text messages are all in clear text with no security at all; we show you how to secure them.

Do you reuse the same password on lots of sites, because it's just too difficult to remember a bunch of different passwords? Are they long, complex passwords, or easily broken? We can provide you with easy methods through which you can use very strong passwords, and have them available to you when you need them.

We can work with you to use the privacy settings for your Facebook, Twitter, LinkedIn, or other social networking account, to protect your personal information as much as possible.

When was the last time you threw away a piece of mail contining your name, address, and an account number? How do you know it wasn't removed from your trash can? Buy a good crosscut shredder, and use it.

Do you have a baby? Do you use a wireless baby monitor? Do your neighbors enjoy listening to your conversations? They can.

How about your voicemail? Do you use a passcode, or can anyone spoofing your cellphone number pick up your messages?

Is your webcam watching you when you're not using it? Are you sure?
Do you use free, open, WiFi hotspots? Is your home WiFi network secured with WEP encryption, or worse, none at all? If either of these applies to you, you have sent your passwords and possibly credit card information over a wireless signal which can easily be captured with easily-obtained hardware and software.
Do you turn off Bluetooth when you're not using it? If not you could be a victim of  BlueJacking?
Have you ever noticed how people buy alarm systems after they are burglarized?      Act proactively to protect yourself before you become a statistic.
Please call us at (818) 492-9900 from a telephone which is away from an area of concern.

You may e-mail us at:

P.O. Drawer 708, La Canada Flintridge, California 91012

Licensed State of California Private Investigator PI15830

The Comsec logo is a trademark of Comsec Associates, Inc.
Copyright 1977-2013 Comsec Associates, Inc.

"I am so grateful for the peace of mind you have given me. It was money I couldn't afford not to spend."
D.H., Actor, Los Angeles