Your Personal Information Is At Risk: A Guide For Protecting Yourself
By Rich Owen
()
About this ebook
This book is very well-written, organized, and clearly presented. This is a very complex topic, and there is quite a bit of information to learn. The author has done an excellent job of presenting the information in an easy-to-read platform that conveys all of the information in an appropriately serious tone, so that the reader fully understands both the information, and the need to be fully aware of the threats. The author also provides solutions to confront the risk and ensure that there is no breach of personal information.
Read more from Rich Owen
The Alchemy of Information Protection: A Cybersecurity Druid's Spell Book Rating: 0 out of 5 stars0 ratingsCyber Security Sam Book 3: Rosie I'm Home Rating: 0 out of 5 stars0 ratingsCyber Security Sam Book 2: The Invisible Man Rating: 0 out of 5 stars0 ratingsThe Continuing Adventures of Cyber Security Sam: Time Out Rating: 0 out of 5 stars0 ratings
Related to Your Personal Information Is At Risk
Related ebooks
Knockout Punch for the Identity Thief -7 Secrets to Online Security for Stay at Home Moms On the Go Rating: 5 out of 5 stars5/5Identity Theft Prevention what to do when your identity is stolen & how to repair your credit Rating: 0 out of 5 stars0 ratingsMy Data My Privacy My Choice: A Step-by-step Guide to Secure your Personal Data and Reclaim your Online Privacy! Rating: 0 out of 5 stars0 ratingsHow to Safeguard Your Debit & Credit Card From Fraud Rating: 0 out of 5 stars0 ratingsUnderstanding Identity Theft: Protect Your Identity From Theft Rating: 3 out of 5 stars3/5What Is....Business Identity Theft! Rating: 0 out of 5 stars0 ratingsGuarding Against Online Identity Theft Rating: 0 out of 5 stars0 ratingsDigital Cop: A Digital Cop's Guide to Cyber Security Rating: 0 out of 5 stars0 ratingsCracking the Fortress: Bypassing Modern Authentication Mechanism Rating: 0 out of 5 stars0 ratingsHow To Stay Private Online Protecting Your Online Privacy and Shielding Your Online Presence from Snoopers Rating: 0 out of 5 stars0 ratingsPersonal Information & Identification Security Made Easy Rating: 0 out of 5 stars0 ratingsHow to Survive Identity Theft: Regain Your Money, Credit, and Reputation Rating: 0 out of 5 stars0 ratingsMobile Security: How to secure, privatize and recover your devices Rating: 5 out of 5 stars5/5UNHACKABLE : Your Online Security Playbook: Recreating Cyber Security in an Unsecure World Rating: 0 out of 5 stars0 ratingsLearn All About Cyber Safety Rating: 0 out of 5 stars0 ratingsAll About Identity Theft Rating: 0 out of 5 stars0 ratings37 Ways To Protect Yourself From Identity Theft and What to Do if You Are a Victim Rating: 0 out of 5 stars0 ratingsSoftware Security For You Rating: 0 out of 5 stars0 ratingsProtect Your Personal Information Rating: 0 out of 5 stars0 ratingsID Theft Scams and Solutions (A guide on how to protect your identity) Rating: 0 out of 5 stars0 ratingsEasy Private Browsing: How to Send Anonymous Email, Hide Your IP address, Delete Browsing History and Become Invisible on the Web Rating: 0 out of 5 stars0 ratingsYour Amazing Itty Bitty® Personal Data Protection Book Rating: 0 out of 5 stars0 ratingsCompsec: For the Home User Rating: 0 out of 5 stars0 ratings#HACKED: 10 Practical Cybersecurity Tips to Help Protect Personal or Business Inform Rating: 0 out of 5 stars0 ratingsHow Not To Use Your Smartphone Rating: 5 out of 5 stars5/5Identity Theft: Protect Yourself Rating: 0 out of 5 stars0 ratingsStay Cyber Safe: What Every CEO Should Know About Cybersecurity Rating: 0 out of 5 stars0 ratingsHow to Prevent Identity Theft: How Anyone Can Protect Themselves from Being a Victim of Identity Theft Rating: 0 out of 5 stars0 ratingsCyber Combat: Learn to Defend Against Cyber Attacks and Corporate Spying Rating: 0 out of 5 stars0 ratingsSurviving Modern Technology: Understanding Safety and Privacy Rating: 0 out of 5 stars0 ratings
Internet & Web For You
The Digital Marketing Handbook: A Step-By-Step Guide to Creating Websites That Sell Rating: 5 out of 5 stars5/5The $1,000,000 Web Designer Guide: A Practical Guide for Wealth and Freedom as an Online Freelancer Rating: 5 out of 5 stars5/5The Logo Brainstorm Book: A Comprehensive Guide for Exploring Design Directions Rating: 4 out of 5 stars4/5SEO For Dummies Rating: 4 out of 5 stars4/5Grokking Algorithms: An illustrated guide for programmers and other curious people Rating: 4 out of 5 stars4/5Cybersecurity For Dummies Rating: 4 out of 5 stars4/5Python QuickStart Guide: The Simplified Beginner's Guide to Python Programming Using Hands-On Projects and Real-World Applications Rating: 0 out of 5 stars0 ratingsCoding For Dummies Rating: 5 out of 5 stars5/5Coding All-in-One For Dummies Rating: 4 out of 5 stars4/5Wireless Hacking 101 Rating: 4 out of 5 stars4/5Six Figure Blogging In 3 Months Rating: 4 out of 5 stars4/5Hacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5The Mega Box: The Ultimate Guide to the Best Free Resources on the Internet Rating: 4 out of 5 stars4/5How to Disappear and Live Off the Grid: A CIA Insider's Guide Rating: 0 out of 5 stars0 ratingsSix Figure Blogging Blueprint Rating: 5 out of 5 stars5/5Tube Ritual: Jumpstart Your Journey to 5000 YouTube Subscribers Rating: 0 out of 5 stars0 ratingsGet Rich or Lie Trying: Ambition and Deceit in the New Influencer Economy Rating: 0 out of 5 stars0 ratingsRemote/WebCam Notarization <<Extended>> Commonwealth of Virginia Rating: 0 out of 5 stars0 ratingsThe Beginner's Affiliate Marketing Blueprint Rating: 4 out of 5 stars4/5How To Make Money Blogging: How I Replaced My Day-Job With My Blog and How You Can Start A Blog Today Rating: 4 out of 5 stars4/5Everybody Lies: Big Data, New Data, and What the Internet Can Tell Us About Who We Really Are Rating: 4 out of 5 stars4/5Wordpress for Beginners: The Easy Step-by-Step Guide to Creating a Website with WordPress Rating: 5 out of 5 stars5/5How To Start A Podcast Rating: 4 out of 5 stars4/5
Reviews for Your Personal Information Is At Risk
0 ratings0 reviews
Book preview
Your Personal Information Is At Risk - Rich Owen
Your Personal Information Is At Risk
A Guide For Protecting Yourself
Rich Owen
ISBN (Print Edition): 978-1-09833-858-9
ISBN (eBook Edition): 978-1-09833-859-6
© 2020. All rights reserved. No part of this publication may be reproduced, distributed, or transmitted in any form or by any means, including photocopying, recording, or other electronic or mechanical methods, without the prior written permission of the publisher, except in the case of brief quotations embodied in critical reviews and certain other noncommercial uses permitted by copyright law.
Contents
Dedication
Preface
Introduction
Documents
Life
Education & Career
Possessions
Finances
Family
Protection of your documents
Devices
Your Virtual Self
Privacy Points
Common risks with our Digital Devices
Hackers, Viruses, and Worms, Oh My!
Vulnerabilities
Backups
Phones
How does my phone know that it is me?
It’s a Smartphone.
Personal Computers
How does the computer know that it is me?
Using a computer away from home.
Communication
Phone
Phone Scams
You’ve Got Mail! (Email)
The Basic Email
Evil Email
Evil Email Examples:
Final Thoughts on email
Messages
Message SCAMS:
Blended threats
Cloud
Internet (World Wide Web)
Firewalls
Wi-Fi
VPN (Virtual Private Network)
Applications (Apps)
Social Media
Likes & Comments
Smile
Financial, Medical and other Sensitive Applications
Credit Monitoring
Do you want to play a game?
Data Storage
Summary
Lies
Misuse & Fraud
Risk and Risk Reduction
Bullies
Checklists & Reminders of what to do.
Phone calls:
Messages:
Application/Game:
Acknowledgements
Other Books by this Author
Dedication
This book is dedicated to my grandchildren and to all who have an interest in protecting their information.
Preface
This book began as just a small book for new users of smartphones. It was originally written for children and teenagers. It was soon realized that there are also older first time users of smartphones. There are many features that also spread into the world of the personal computer and accessing personal information online. The entire world of social media and email also needed to be explored. This led to security and privacy, and discussing how your data is stored or processed online.
Although this is all necessary because of the age in which we live, we have not totally gotten away from paper. Therefore this book is front-ended with steps that you should take to protect your paper-self as well as your virtual-self.
To my security brethren, you will note that I avoid getting too deep so as to avoid exposing the reader to areas where they could put them further at risk.
Introduction
We live in the Information Age. We are constantly asked to provide information about ourselves to verify our identity or value. To do so, we need to hold some elements of our identity to ourselves while other bits of information need to be publicly available. We need to be in control of the information that defines us. There are forces of evil that exist to collect as much information as they can about us. Granted, not all information collection is evil. Some information collection about us is intended
to better serve us, but what happens when that well intended collection is exposed in a data breach? Some individuals and companies create profiles of data about us, defining our virtual identity. They can use that profile to influence our lives in a way that may not be in our best interests or worse, they may be able to virtually become us. Acting on our behalf, they can send email for us, access our bank accounts, and more. They can virtually destroy our personal, financial and emotional lives.
This book will examine several actions that you can take to physically protect your documents. For information about you that is in a digital form, we will explore ways in which you can reduce the risk that your data will be disclosed, modified, or just made unavailable even to you. The following diagram shows that we will create a foundation of protection based on our physical documents. On top of this, we will explore how your digital information is at risk and what you can do to reduce that risk in the devices that you use, the ways you communicate, and even data that you put, or allow to be put, into the cloud¹.
1 The term cloud is the collection of computers that are accessible via the internet, sometimes called the World Wide Web (www). When you access Facebook, your bank, a booking site on the internet you are accessing a computer in the cloud. That computer may be anywhere in the world.
Documents
We will begin by identifying what scraps of paper in your life may be of value. Then we will suggest steps to take to protect them.
Life
The following are examples of documents about you that you should consider protecting:
Birth Certificate
Social Security Number
Driver’s License
Identification cards (student ID, etc.)
Marriage Certificate
Citizenship paperwork
Divorce Decree
Passport
Last Will & Testament
Death Certificate
Living Will
NDR
Other