Twelve and a Half Steps to Avoid Identity Theft
()
About this ebook
Do you know how to protect your vital identity information when you use computers for your banking, credit card transactions, and everyday purchases? What about when you are using email, web surfing, texting, or social networking? You’ll learn about these in Twelve Steps to Avoid Identity Theft.
What do all these companies, organizations, and people have in common?
•Heartland
•RBS Worldpay
•Citizens Financial Group Inc
•Hannaford Brothers Co
•TJX Companies Inc
•Marshalls
•TJ Maxx
•CardSystems Solutions
•The U.S. Internal Revenue Service
•Ben Bernanke, Chairman of the Federal Reserve
•Wyndam Worldwide Corporation (Wyndam hotels)
•Zappos
•Sony’s online accounts for Play Station users
•Verisign
•LinkedIn
The sad answer is that all of them have suffered well-publicized recent successful attacks from identity thieves. Many of these attacks involved thieves obtaining access to confidential financial information from thousands, and in some cases, millions, of customers.
How can you protect yourselves from this crime? In this book we describe 12 1/2 suggestions that can strongly reduce, or even eliminate, the likelihood of you being an identity theft victim. Why 12 1/2 steps? Because twelve of the steps are ones that you can begin to take right away, and the other will require you to do some additional work reading up on this vital topic.
Here are the twelve and a half simple steps to help avoid identity theft:
1.Strip to a bare minimum
2.Don’t Pameiob
3.Be strong
4.Watch for zombies
5.Watch for vampires
6.Free is too costly
7.Don’t give too much credit
8.Surf safely
9.Gullible’s travels
10.Don’t give it up if you don’t have to
11.Just the FAX, please
12.Be shrewd and shred
12 1⁄2. Get more information
This short, easy-to-understand book, intended for the general, non-specialist reader, will tell you what to do and what to avoid when going to a bank, pharmacy, or doctor; shopping in person; traveling; or using any kind of electronic commerce. You’ll learn about the most common security weaknesses of modern banking and e-commerce software and when to avoid using certain software systems, the tell-tale signs of potentially insecure transmission of your data, and how to avoid the dangerous practice of “Pameiob.” You'll learn how you have to protect yourself from the kinds of identity theft that can occur even if YOU never do any online shopping.
This book is a brief, easy-to-understand guide that is dedicated to keeping your assets and identity safe while navigating this dangerous world. The book is based on the author's experiences as a long-term identity theft consultant and lecturer and computer scientist.
Want more detailed information on identity theft? Then “Identity Theft in the Cyber Age” is the book for you.
Ronald J. Leach
About the Author I recently retired from being a professor of computer science at Howard University for over 25 years, with 9 of those years as a department chair. (I was a math professor for 16 years before that.) While I was department chair, we sent more students to work at Microsoft in the 2004-5 academic year than any other college or university in the United States. We also established a graduate certificate program in computer security, which became the largest certificate program at the university. I had major responsibility for working with technical personnel to keep our department’s hundreds of computers functional and virus-free, while providing email service to several hundred users. We had to withstand constant hacker attacks and we learned how to reduce the vulnerability of our computer systems. As a scholar/researcher, I studied complex computer systems and their behavior when attacked or faced with heavy, unexpected loads. I wrote five books on computing, from particular programming languages, to the internal structure of sophisticated operating systems, to the development and efficient creation of highly complex applications. My long-term experience with computers (I had my first computer programming course in 1964) has helped me understand the nature of many of the computer attacks by potential identity thieves and, I hope, be able to explain them and how to defend against them, to a general audience of non-specialists. More than 5,000 people have attended my lectures on identity theft; many others have seen them on closed-circuit television. I have written more than twenty books, and more than 120 technical articles, most of which are in technical areas. My interests in data storage and access meshed well with my genealogical interests when I wrote the Genealogy Technology column of the Maryland Genealogical Society Journal for several years. I was the editor or co-editor of that society’s journal for many years.
Read more from Ronald J. Leach
Confessions of a Cruise Lecturer Rating: 0 out of 5 stars0 ratingsData Recovery Rating: 0 out of 5 stars0 ratingsThe 101 Most Important UNIX and Linux Commands Rating: 0 out of 5 stars0 ratingsRecovering From Identity Theft Rating: 0 out of 5 stars0 ratingsSoftware Reuse: Methods, Models, Costs, Second Edition Rating: 0 out of 5 stars0 ratingsDigitizing Microfilm and Microfiche Rating: 0 out of 5 stars0 ratingsBaltimore Blue and Freddie Gray Rating: 0 out of 5 stars0 ratingsThe Bible as a Manual for Identity Theft Rating: 0 out of 5 stars0 ratingsUser Guide to Microfilm and Microfiche Rating: 0 out of 5 stars0 ratingsWhy 2K? Rating: 0 out of 5 stars0 ratingsEat Kids at School Rating: 0 out of 5 stars0 ratingsWhere Have All The Templars Gone? Rating: 0 out of 5 stars0 ratings
Related to Twelve and a Half Steps to Avoid Identity Theft
Related ebooks
In the Name of Security – Secrecy, Surveillance and Journalism Rating: 0 out of 5 stars0 ratingsBushcraft : 7 Top Tips of Bushcraft Skills For Beginners Rating: 0 out of 5 stars0 ratingsChasing Thieves: A True Story of Identity Theft, Felons, and Fighting Back Rating: 0 out of 5 stars0 ratingsCIA Manual: For Psychological Operations in Guerrilla Warfare Rating: 0 out of 5 stars0 ratingsYou vs the New World Legion: I, "J. Doe" Will Transform Rating: 0 out of 5 stars0 ratingsSafe and Sound: How Not to Get Lost in the Woods and How to Survive If You Do Rating: 0 out of 5 stars0 ratingsSecrets of the Cannabis Industry Rating: 0 out of 5 stars0 ratingsMake money buy gold: Safest and best investment strategy in the world Rating: 0 out of 5 stars0 ratings37 Ways To Protect Yourself From Identity Theft and What to Do if You Are a Victim Rating: 0 out of 5 stars0 ratingsThe World's Greatest Military Spies and Secret Service Agents: With the Introductory Chapter 'The Ethos of the Spy' Rating: 0 out of 5 stars0 ratingsThe Family Guide to Home and Personal Security- A Common Sense Approach Rating: 0 out of 5 stars0 ratingsEmergency Food and Water Supplies Rating: 0 out of 5 stars0 ratingsMountain Climbing Rating: 0 out of 5 stars0 ratingsSurvival Medicine for Beginners: A Quick start Guide to Coping with Injury during Disaster Rating: 0 out of 5 stars0 ratingsSurvival Mindset Rating: 0 out of 5 stars0 ratingsDrug Money Rating: 0 out of 5 stars0 ratingsThe Cyber Attack Survival Manual: Tools for Surviving Everything from Identity Theft to the Digital Apocalypse Rating: 0 out of 5 stars0 ratingsCybersafe For Humans: A Simple Guide to Keep You and Your Family Safe Online Rating: 0 out of 5 stars0 ratingsCybersafe for Business: The Anti-Hack Handbook for SMEs Rating: 0 out of 5 stars0 ratingsIdentity Lockdown: Your Step By Step Guide to Identity Theft Protection Rating: 0 out of 5 stars0 ratingsYour Personal Information Is At Risk: A Guide For Protecting Yourself Rating: 0 out of 5 stars0 ratingsHack Proof Yourself!: The essential guide for securing your digital world Rating: 0 out of 5 stars0 ratingsCyber Curiosity: A Beginner's Guide to Cybersecurity Rating: 0 out of 5 stars0 ratingsKeeping Cyber Security Simple Rating: 0 out of 5 stars0 ratingsUnderstanding Identity Theft: Protect Your Identity From Theft Rating: 3 out of 5 stars3/5The Identity Theft Protection Guide: *Safeguard Your Family *Protect Your Privacy *Recover a Stolen Identity Rating: 0 out of 5 stars0 ratingsHow To Stay Private Online Protecting Your Online Privacy and Shielding Your Online Presence from Snoopers Rating: 0 out of 5 stars0 ratingsYour Right To Privacy: Minimize Your Digital Footprint Rating: 0 out of 5 stars0 ratings
Security For You
How to Be Invisible: Protect Your Home, Your Children, Your Assets, and Your Life Rating: 4 out of 5 stars4/5Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5CompTIA Network+ Certification Guide (Exam N10-008): Unleash your full potential as a Network Administrator (English Edition) Rating: 0 out of 5 stars0 ratingsHacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5Make Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5Social Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5Mike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5How to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5CompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5Hacking For Dummies Rating: 4 out of 5 stars4/5Wireless Hacking 101 Rating: 4 out of 5 stars4/5Remote/WebCam Notarization : Basic Understanding Rating: 3 out of 5 stars3/5CompTIA Network+ Review Guide: Exam N10-008 Rating: 0 out of 5 stars0 ratingsCybersecurity For Dummies Rating: 4 out of 5 stars4/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5Dark Territory: The Secret History of Cyber War Rating: 4 out of 5 stars4/5The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy Rating: 4 out of 5 stars4/5CompTIA Network+ Practice Tests: Exam N10-008 Rating: 0 out of 5 stars0 ratingsPractical Lock Picking: A Physical Penetration Tester's Training Guide Rating: 5 out of 5 stars5/5The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers Rating: 4 out of 5 stars4/5What is the Dark Web?: The truth about the hidden part of the internet Rating: 4 out of 5 stars4/5Hacking: Ultimate Beginner's Guide for Computer Hacking in 2018 and Beyond: Hacking in 2018, #1 Rating: 4 out of 5 stars4/5Mike Meyers CompTIA Security+ Certification Passport, Sixth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Real-World Cryptography Rating: 4 out of 5 stars4/5How to Hack Like a Pornstar Rating: 5 out of 5 stars5/5Wireless and Mobile Hacking and Sniffing Techniques Rating: 0 out of 5 stars0 ratingsSecurity+ Boot Camp Study Guide Rating: 5 out of 5 stars5/5
Reviews for Twelve and a Half Steps to Avoid Identity Theft
0 ratings0 reviews