Protecting Yourself Online: A Quick Guide on Safely Navigating the Internet for Non-Techie Users
()
About this ebook
A short guide for less tech-savvy users and older users on how to protect your information and identity online. Written in easy-to-understand language, this book covers topics including: social engineering, storing and using strong passwords, multi-factor authentication, web browser security, and securely using social media.
Andrew J. Carey
Software developer/architect with over 20 years industry experience. In my spare time I write, watch soccer, and do dad and husband stuff in California.
Related to Protecting Yourself Online
Related ebooks
Engaging Students through Social Media: Evidence-Based Practices for Use in Student Affairs Rating: 0 out of 5 stars0 ratingsBlockchain for Customer Service The Ultimate Step-By-Step Guide Rating: 0 out of 5 stars0 ratingsA Best Practices Guide for Comprehensive Employee Awareness Programs Rating: 0 out of 5 stars0 ratingsProfit From Mobile Social Media Revolution Rating: 0 out of 5 stars0 ratingsSocial Networking: Make money online Rating: 0 out of 5 stars0 ratingsCyber Security From Beginner To Expert Cyber Security Made Easy For Absolute Beginners Rating: 0 out of 5 stars0 ratingsEmail Marketing Nuts And Bolts Rating: 2 out of 5 stars2/5Straight Talk About Social Media Rating: 0 out of 5 stars0 ratingsAfter the Pandemic: A Market Oriented Analysis Rating: 0 out of 5 stars0 ratingsLiving in Social Networks Manual of Responsible Use Rating: 0 out of 5 stars0 ratingsHow to Succeed with LinkedIn and other Social Media Platforms Rating: 0 out of 5 stars0 ratingsThe Ultimate Guide To Web Traffic: Free Advertising That WORKS! Rating: 0 out of 5 stars0 ratingsWorking the Crowd: Social media marketing for business Rating: 5 out of 5 stars5/5Startups A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsYou Too Can Become a Professional Web Designer and Blogger Rating: 5 out of 5 stars5/5Friend Me!: 600 Years of Social Networking in America Rating: 3 out of 5 stars3/5Unlock The Twitter Social Media Marketing Code Rating: 0 out of 5 stars0 ratingsSocial Media Business Rating: 0 out of 5 stars0 ratingsSocial Media Metrics Secrets Rating: 4 out of 5 stars4/5Startups A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsWork Online: Become a Solopreneur, Start Working Remotely. The Complete Guide to Grow Your Company on the Internet. Rating: 0 out of 5 stars0 ratingsBad. Pitches. Period. 30 Flavors of Spammy Emails Rating: 0 out of 5 stars0 ratingsElectronic Business Cards Rating: 0 out of 5 stars0 ratingsHow to Use Web 2.0 and Social Networking Sites Securely: A Pocket Guide Rating: 0 out of 5 stars0 ratingsStart Saying No!: How to Stop Living for Others and Start Pursuing Your Goals Rating: 0 out of 5 stars0 ratingsBlockchain Digital Standard Requirements Rating: 0 out of 5 stars0 ratingsBrand loyalty Complete Self-Assessment Guide Rating: 0 out of 5 stars0 ratingsIdentity Attack Vectors: Implementing an Effective Identity and Access Management Solution Rating: 0 out of 5 stars0 ratingsPrivileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations Rating: 0 out of 5 stars0 ratings
Internet & Web For You
No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State Rating: 4 out of 5 stars4/5How to Disappear and Live Off the Grid: A CIA Insider's Guide Rating: 0 out of 5 stars0 ratingsSocial Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5Coding For Dummies Rating: 5 out of 5 stars5/5How to Be Invisible: Protect Your Home, Your Children, Your Assets, and Your Life Rating: 4 out of 5 stars4/5Everybody Lies: Big Data, New Data, and What the Internet Can Tell Us About Who We Really Are Rating: 4 out of 5 stars4/5Six Figure Blogging Blueprint Rating: 5 out of 5 stars5/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5The Beginner's Affiliate Marketing Blueprint Rating: 4 out of 5 stars4/5Grokking Algorithms: An illustrated guide for programmers and other curious people Rating: 4 out of 5 stars4/5The Gothic Novel Collection Rating: 5 out of 5 stars5/5Get Rich or Lie Trying: Ambition and Deceit in the New Influencer Economy Rating: 0 out of 5 stars0 ratingsCoding All-in-One For Dummies Rating: 4 out of 5 stars4/5200+ Ways to Protect Your Privacy: Simple Ways to Prevent Hacks and Protect Your Privacy--On and Offline Rating: 0 out of 5 stars0 ratingsPodcasting For Dummies Rating: 4 out of 5 stars4/5Hacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5Remote/WebCam Notarization : Basic Understanding Rating: 3 out of 5 stars3/5Beginner's Guide To Starting An Etsy Print-On-Demand Shop Rating: 0 out of 5 stars0 ratingsMore Porn - Faster!: 50 Tips & Tools for Faster and More Efficient Porn Browsing Rating: 3 out of 5 stars3/5The Cyber Attack Survival Manual: Tools for Surviving Everything from Identity Theft to the Digital Apocalypse Rating: 0 out of 5 stars0 ratingsThe Digital Marketing Handbook: A Step-By-Step Guide to Creating Websites That Sell Rating: 5 out of 5 stars5/5The Logo Brainstorm Book: A Comprehensive Guide for Exploring Design Directions Rating: 4 out of 5 stars4/5The Internet Is Not What You Think It Is: A History, a Philosophy, a Warning Rating: 4 out of 5 stars4/5How To Start A Podcast Rating: 4 out of 5 stars4/5How to Destroy Surveillance Capitalism Rating: 4 out of 5 stars4/5Introduction to Internet Scams and Fraud: Credit Card Theft, Work-At-Home Scams and Lottery Scams Rating: 4 out of 5 stars4/5
Reviews for Protecting Yourself Online
0 ratings0 reviews
Book preview
Protecting Yourself Online - Andrew J. Carey
Copyright © 2020 by Andrew J. Carey.
All rights reserved.
Book version 1.7.2
May 2020
No part of this book may be reproduced in any form or by any electronic or mechanical means, including information storage and retrieval systems, without permission in writing from the author. The only exception is by a reviewer, who may quote short excerpts in a published review.
Self-published by the author. Author can be contacted via Twitter at: @ACarey999
ISBN: 9780463448748
ASIN: B07PSGD5H1
The information presented herein represents the views and opinions of the author as of the date of publication. This book is presented for informational purposes only. Due to the rate and nature of the subject matter covered in this book, the author reserves the right to alter and update his opinions and its contents based on new conditions. While every attempt has been made to verify the information in this book, neither the author nor his affiliates/partners nor the publishers nor distributors assume any responsibility for errors, inaccuracies, or omissions.
Screenshots courtesy of Google LLC, Microsoft Corporation, and the Mozilla Corporation.
Cover image courtesy of Lisa Fotios, via Pexels.com.
About the Author
Andrew J. Carey is a software developer and a software architect. He has over 20 years experience in the software development industry, including experience and training in secure programming and information security topics. He lives in California with his family.
Table of Contents
Introduction
Social Engineering
Phishing
Phone Calls
Letters and Faxes
Reacting to Social Engineering
Post-Hack Advice
Combating Persistent Hack Attempts
Section Review
Multi-Factor Authentication
What is Multi-Factor Authentication
Multi-Factor Authentication Examples
Section Review
Passwords
Password Best Practices
Lost Password Retrieval
Section Review
Anti-Malware and Firewalls
Anti-Virus versus Anti-Malware
Choosing Anti-Malware Software
Firewalls
Section Review
Personal Computer Maintenance
How a Computer Works
Operating System Patches
Evergreen Software
Updating Older Operating Systems
Section Review
Routers and Modems
Router Overview
Modem Overview
Home Network Setup
Upgrading your Router or Modem
Finding a New Router or Modem
Router Security Tips
Section Review
Web Browser Security
Keeping your Web Browser up-to-date
Browser Sessions
Web Browser Add-ons and Extensions
Web Protocols
Digital Certificates
Extended Validation Certificates
Auto-fill Features
Section Review
Social Media
Loss of Control over Data
Privacy Settings
Shared Credentials and Privacy Concerns
Social Media Recommendations
Section Review
Miscellaneous Security Tips
Multiple Email Accounts
Online Banking Systems
Simplifying your Finances
The Internet of Things
Section Review
Other Terminology
Authentication
Bandwidth
Bloatware
Broadband
Cookie
CAPTCHA
The Cloud
Crypto-currency
The Dark Net
The Deep Web
Encryption
Hashing
ISP
Open Source
Responsiveness
Streaming
Usability
VPN
Introduction
In today’s day and age, online fraud and information theft has become an unfortunately common occurrence. This is largely due to the convenience and ubiquitous nature of the Internet, which makes communications and self-service extremely easy.
Becoming the victim of data theft and asset losses can be very traumatic. However, its worth remembering that it is not a sign of gullibility or stupidity. Even the most savvy and smart consumer can fall victim to the despicable acts of online attackers. In fact, almost everyone has fallen foul of online scammers in one way or another. Additionally, while the Internet can seem scary and dangerous, there are many good and easy ways to protect yourself and your information.
The goal of this short book is to provide guidance to you, the reader. Online consumer protection is a constantly shifting field, and some information within this book will fall out of relevance over time. But the overall goal is to relay practical time-tested steps that will