Twelve and a Half Steps to Avoid Identity Theft
()
About this ebook
Do you know how to protect your vital identity information when you use computers for your banking, credit card transactions, and everyday purchases? What about when you are using email, web surfing, texting, or social networking? You’ll learn about these in Twelve Steps to Avoid Identity Theft.
What do all these companies, organizations, and people have in common?
•Heartland
•RBS Worldpay
•Citizens Financial Group Inc
•Hannaford Brothers Co
•TJX Companies Inc
•Marshalls
•TJ Maxx
•CardSystems Solutions
•The U.S. Internal Revenue Service
•Ben Bernanke, Chairman of the Federal Reserve
•Wyndam Worldwide Corporation (Wyndam hotels)
•Zappos
•Sony’s online accounts for Play Station users
•Verisign
•LinkedIn
The sad answer is that all of them have suffered well-publicized recent successful attacks from identity thieves. Many of these attacks involved thieves obtaining access to confidential financial information from thousands, and in some cases, millions, of customers.
How can you protect yourselves from this crime? In this book we describe 12 1/2 suggestions that can strongly reduce, or even eliminate, the likelihood of you being an identity theft victim. Why 12 1/2 steps? Because twelve of the steps are ones that you can begin to take right away, and the other will require you to do some additional work reading up on this vital topic.
Here are the twelve and a half simple steps to help avoid identity theft:
1.Strip to a bare minimum
2.Don’t Pameiob
3.Be strong
4.Watch for zombies
5.Watch for vampires
6.Free is too costly
7.Don’t give too much credit
8.Surf safely
9.Gullible’s travels
10.Don’t give it up if you don’t have to
11.Just the FAX, please
12.Be shrewd and shred
12 1⁄2. Get more information
This short, easy-to-understand book, intended for the general, non-specialist reader, will tell you what to do and what to avoid when going to a bank, pharmacy, or doctor; shopping in person; traveling; or using any kind of electronic commerce. You’ll learn about the most common security weaknesses of modern banking and e-commerce software and when to avoid using certain software systems, the tell-tale signs of potentially insecure transmission of your data, and how to avoid the dangerous practice of “Pameiob.” You'll learn how you have to protect yourself from the kinds of identity theft that can occur even if YOU never do any online shopping.
This book is a brief, easy-to-understand guide that is dedicated to keeping your assets and identity safe while navigating this dangerous world. The book is based on the author's experiences as a long-term identity theft consultant and lecturer and computer scientist.
Want more detailed information on identity theft? Then “Identity Theft in the Cyber Age” is the book for you.
Ronald J. Leach
About the Author I recently retired from being a professor of computer science at Howard University for over 25 years, with 9 of those years as a department chair. (I was a math professor for 16 years before that.) While I was department chair, we sent more students to work at Microsoft in the 2004-5 academic year than any other college or university in the United States. We also established a graduate certificate program in computer security, which became the largest certificate program at the university. I had major responsibility for working with technical personnel to keep our department’s hundreds of computers functional and virus-free, while providing email service to several hundred users. We had to withstand constant hacker attacks and we learned how to reduce the vulnerability of our computer systems. As a scholar/researcher, I studied complex computer systems and their behavior when attacked or faced with heavy, unexpected loads. I wrote five books on computing, from particular programming languages, to the internal structure of sophisticated operating systems, to the development and efficient creation of highly complex applications. My long-term experience with computers (I had my first computer programming course in 1964) has helped me understand the nature of many of the computer attacks by potential identity thieves and, I hope, be able to explain them and how to defend against them, to a general audience of non-specialists. More than 5,000 people have attended my lectures on identity theft; many others have seen them on closed-circuit television. I have written more than twenty books, and more than 120 technical articles, most of which are in technical areas. My interests in data storage and access meshed well with my genealogical interests when I wrote the Genealogy Technology column of the Maryland Genealogical Society Journal for several years. I was the editor or co-editor of that society’s journal for many years.
Read more from Ronald J. Leach
Software Reuse: Methods, Models, Costs, Second Edition Rating: 0 out of 5 stars0 ratingsData Recovery Rating: 0 out of 5 stars0 ratingsConfessions of a Cruise Lecturer Rating: 0 out of 5 stars0 ratingsRecovering From Identity Theft Rating: 0 out of 5 stars0 ratingsBaltimore Blue and Freddie Gray Rating: 0 out of 5 stars0 ratingsWhere Have All The Templars Gone? Rating: 0 out of 5 stars0 ratingsThe Bible as a Manual for Identity Theft Rating: 0 out of 5 stars0 ratingsEat Kids at School Rating: 0 out of 5 stars0 ratingsThe 101 Most Important UNIX and Linux Commands Rating: 0 out of 5 stars0 ratingsWhy 2K? Rating: 0 out of 5 stars0 ratingsDigitizing Microfilm and Microfiche Rating: 0 out of 5 stars0 ratingsUser Guide to Microfilm and Microfiche Rating: 0 out of 5 stars0 ratings
Related to Twelve and a Half Steps to Avoid Identity Theft
Related ebooks
Scammed: How to Save Your Money and Find Better Service in a World of Schemes, Swindles, and Shady Deals Rating: 2 out of 5 stars2/5Supply chain security A Complete Guide Rating: 0 out of 5 stars0 ratingsIn the Name of Security – Secrecy, Surveillance and Journalism Rating: 0 out of 5 stars0 ratingsU.S. Armed Forces Survival Guide: The Same Survival Training the U.S. Military Uses for Its Troops Rating: 0 out of 5 stars0 ratingsSurvival Mindset Rating: 0 out of 5 stars0 ratingsChasing Thieves: A True Story of Identity Theft, Felons, and Fighting Back Rating: 0 out of 5 stars0 ratingsHow To Grow Tall Poppies - A Practical Guide To Cultivating High-Performance Teams Rating: 0 out of 5 stars0 ratingsThe Family Guide to Home and Personal Security- A Common Sense Approach Rating: 0 out of 5 stars0 ratingsWhen the Grid Goes Down Rating: 0 out of 5 stars0 ratingsBushcraft: The Ultimate Bushcraft 101 Guide To Survive In The Wilderness Like A Pro: The Blokehead Success Series Rating: 0 out of 5 stars0 ratingsSurvival Medicine for Beginners: A Quick start Guide to Coping with Injury during Disaster Rating: 0 out of 5 stars0 ratingsEmergency Food and Water Supplies Rating: 0 out of 5 stars0 ratingsCampus Security Guard III: Passbooks Study Guide Rating: 0 out of 5 stars0 ratings@War: The Rise of the Military-Internet Complex Rating: 4 out of 5 stars4/5Secrets of the Cannabis Industry Rating: 0 out of 5 stars0 ratingsrCorps Knowledge Rating: 0 out of 5 stars0 ratingsCIA Manual: For Psychological Operations in Guerrilla Warfare Rating: 0 out of 5 stars0 ratingsYou vs the New World Legion: I, "J. Doe" Will Transform Rating: 0 out of 5 stars0 ratings37 Ways To Protect Yourself From Identity Theft and What to Do if You Are a Victim Rating: 0 out of 5 stars0 ratingsFinancial Self-Defense (Review and Analysis of Givens' Book) Rating: 0 out of 5 stars0 ratingsNemesis - A Good Guide for Bad Guys: EA'AE, #3 Rating: 0 out of 5 stars0 ratingsSafeguarding Cultural Properties: Security for Museums, Libraries, Parks, and Zoos Rating: 0 out of 5 stars0 ratingsThe Shtf Stockpile: Items Every Bug Out Bag Needs for Survival in the Wild Rating: 0 out of 5 stars0 ratingsThe Storm: How Young Men Become Good Men Rating: 0 out of 5 stars0 ratingsUnderstanding, Assessing, and Responding to Terrorism: Protecting Critical Infrastructure and Personnel Rating: 0 out of 5 stars0 ratingsCrisis Survival: Earthquakes, Floods, Fires, Airplane Crashes, Terrorism and Much More Rating: 0 out of 5 stars0 ratingsThe World's Greatest Military Spies and Secret Service Agents: With the Introductory Chapter 'The Ethos of the Spy' Rating: 0 out of 5 stars0 ratingsA Beginner's Guide to Winter Survival: How to Survive Cold Weather Rating: 0 out of 5 stars0 ratingsHow to Survive an Active Shooter, 2nd Edition: What You do Before, During and After an Attack Could Save Your Life: Conversations Rating: 0 out of 5 stars0 ratingsSurviving Urban Crisis Rating: 3 out of 5 stars3/5
Security For You
Remote/WebCam Notarization : Basic Understanding Rating: 3 out of 5 stars3/5How to Be Invisible: Protect Your Home, Your Children, Your Assets, and Your Life Rating: 4 out of 5 stars4/5Social Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5Hacking: Ultimate Beginner's Guide for Computer Hacking in 2018 and Beyond: Hacking in 2018, #1 Rating: 4 out of 5 stars4/5CompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5How to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5Practical Lock Picking: A Physical Penetration Tester's Training Guide Rating: 5 out of 5 stars5/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5CompTIA Network+ Review Guide: Exam N10-008 Rating: 0 out of 5 stars0 ratingsCybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5Codes and Ciphers - A History of Cryptography Rating: 4 out of 5 stars4/5Cybersecurity For Dummies Rating: 4 out of 5 stars4/5Mike Meyers CompTIA Security+ Certification Passport, Sixth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Dark Territory: The Secret History of Cyber War Rating: 4 out of 5 stars4/5Network+ Study Guide & Practice Exams Rating: 4 out of 5 stars4/5Wireless Hacking 101 Rating: 4 out of 5 stars4/5CompTIA Network+ Certification Guide (Exam N10-008): Unleash your full potential as a Network Administrator (English Edition) Rating: 0 out of 5 stars0 ratingsHacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5How to Hack Like a Pornstar Rating: 5 out of 5 stars5/5Mike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Ultimate Guide for Being Anonymous: Hacking the Planet, #4 Rating: 5 out of 5 stars5/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers Rating: 4 out of 5 stars4/5Hacking For Dummies Rating: 4 out of 5 stars4/5CompTIA CySA+ Practice Tests: Exam CS0-002 Rating: 0 out of 5 stars0 ratingsCybersecurity First Principles: A Reboot of Strategy and Tactics Rating: 5 out of 5 stars5/5Make Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5The Cyber Attack Survival Manual: Tools for Surviving Everything from Identity Theft to the Digital Apocalypse Rating: 0 out of 5 stars0 ratings
Reviews for Twelve and a Half Steps to Avoid Identity Theft
0 ratings0 reviews