Twelve and a Half Steps to Avoid Identity Theft
()
About this ebook
Do you know how to protect your vital identity information when you use computers for your banking, credit card transactions, and everyday purchases? What about when you are using email, web surfing, texting, or social networking? You’ll learn about these in Twelve Steps to Avoid Identity Theft.
What do all these companies, organizations, and people have in common?
•Heartland
•RBS Worldpay
•Citizens Financial Group Inc
•Hannaford Brothers Co
•TJX Companies Inc
•Marshalls
•TJ Maxx
•CardSystems Solutions
•The U.S. Internal Revenue Service
•Ben Bernanke, Chairman of the Federal Reserve
•Wyndam Worldwide Corporation (Wyndam hotels)
•Zappos
•Sony’s online accounts for Play Station users
•Verisign
•LinkedIn
The sad answer is that all of them have suffered well-publicized recent successful attacks from identity thieves. Many of these attacks involved thieves obtaining access to confidential financial information from thousands, and in some cases, millions, of customers.
How can you protect yourselves from this crime? In this book we describe 12 1/2 suggestions that can strongly reduce, or even eliminate, the likelihood of you being an identity theft victim. Why 12 1/2 steps? Because twelve of the steps are ones that you can begin to take right away, and the other will require you to do some additional work reading up on this vital topic.
Here are the twelve and a half simple steps to help avoid identity theft:
1.Strip to a bare minimum
2.Don’t Pameiob
3.Be strong
4.Watch for zombies
5.Watch for vampires
6.Free is too costly
7.Don’t give too much credit
8.Surf safely
9.Gullible’s travels
10.Don’t give it up if you don’t have to
11.Just the FAX, please
12.Be shrewd and shred
12 1⁄2. Get more information
This short, easy-to-understand book, intended for the general, non-specialist reader, will tell you what to do and what to avoid when going to a bank, pharmacy, or doctor; shopping in person; traveling; or using any kind of electronic commerce. You’ll learn about the most common security weaknesses of modern banking and e-commerce software and when to avoid using certain software systems, the tell-tale signs of potentially insecure transmission of your data, and how to avoid the dangerous practice of “Pameiob.” You'll learn how you have to protect yourself from the kinds of identity theft that can occur even if YOU never do any online shopping.
This book is a brief, easy-to-understand guide that is dedicated to keeping your assets and identity safe while navigating this dangerous world. The book is based on the author's experiences as a long-term identity theft consultant and lecturer and computer scientist.
Want more detailed information on identity theft? Then “Identity Theft in the Cyber Age” is the book for you.
Ronald J. Leach
Ronald J. Leach recently retired as Professor and Chair Emeritus from the Department of Systems and Computer Science at Howard University, where he had taught since 1969. He received the B.S., M.S., and Ph.D. degrees from the University of Maryland at College Park and the M. S. degree in Computer Science from Johns Hopkins University. His research interests include distributed systems, performance modeling and capacity planning; and most areas of software engineering, especially software reuse, fault-tolerance, and software performance measurement and their empirical foundations. Some of his current work includes the application of computing to the social sciences, especially in the area of name matching within historical documents, using both his computer search skills and genealogical knowledge. He is a frequent member of ABET site visit teams. He is an experienced cruise ship lecturer, with special emphasis on identity theft and computer forensics. He also lectures to other groups.Ron Leach is the author of seven print books: "Using C in Software Design," Academic Press Professional,"Advanced Topics in UNIX," John Wiley; "Object-Oriented Design and Programming in C++," Academic Press Professional, Software Reuse: Methods, Models, and Costs," McGraw-Hill, "Introduction to Software Engineering," CRC Press, "Genealogy for the Information Age," Disruptive Publishing, and "Relative Genealogy," Disruptive Publishing. He has published two books on the subject of identity theft: "Twelve and a Half Steps to Avoid Identity Theft," as an ebook, and "Identity Theft in the Cyber Age," which is available as both an ebook and in print. Revised editions of many of these are available as ebooks.Dr. Leach has offered technical training and seminars on software reuse, reengineering, and testing on three continents. He has lectured on a variety of other topics between continents! He is also the author or co-author of more than one hundred technical papers. In his spare time, he is the co-Editor of the Maryland Genealogical Society Journal and is webmaster for its newly designed website.
Read more from Ronald J. Leach
Where Have All The Templars Gone? Rating: 0 out of 5 stars0 ratingsSoftware Reuse: Methods, Models, Costs, Second Edition Rating: 0 out of 5 stars0 ratingsConfessions of a Cruise Lecturer Rating: 0 out of 5 stars0 ratingsWhy 2K? Rating: 0 out of 5 stars0 ratingsBaltimore Blue and Freddie Gray Rating: 0 out of 5 stars0 ratingsThe 101 Most Important UNIX and Linux Commands Rating: 0 out of 5 stars0 ratingsRecovering From Identity Theft Rating: 0 out of 5 stars0 ratingsData Recovery Rating: 0 out of 5 stars0 ratingsIdentity Theft in the Cyber Age Rating: 0 out of 5 stars0 ratingsEat Kids at School Rating: 0 out of 5 stars0 ratingsUser Guide to Microfilm and Microfiche Rating: 0 out of 5 stars0 ratingsThe Bible as a Manual for Identity Theft Rating: 0 out of 5 stars0 ratingsDigitizing Microfilm and Microfiche Rating: 0 out of 5 stars0 ratingsManaging an Estate Without Paper Records Rating: 0 out of 5 stars0 ratings
Related to Twelve and a Half Steps to Avoid Identity Theft
Related ebooks
Identity Theft in the Cyber Age Rating: 0 out of 5 stars0 ratingsThe Cyber Attack Survival Manual: Tools for Surviving Everything from Identity Theft to the Digital Apocalypse Rating: 0 out of 5 stars0 ratingsRecovering From Identity Theft Rating: 0 out of 5 stars0 ratingsHow to Safeguard Your Online Identity: Stop Hackers and Protect Your Privacy Rating: 0 out of 5 stars0 ratingsCybersafe For Humans: A Simple Guide to Keep You and Your Family Safe Online Rating: 0 out of 5 stars0 ratingsCybersafe for Business: The Anti-Hack Handbook for SMEs Rating: 0 out of 5 stars0 ratingsIdentity Lockdown: Your Step By Step Guide to Identity Theft Protection Rating: 0 out of 5 stars0 ratingsYour Personal Information Is At Risk: A Guide For Protecting Yourself Rating: 0 out of 5 stars0 ratingsHack Proof Yourself!: The essential guide for securing your digital world Rating: 0 out of 5 stars0 ratingsCyber Curiosity: A Beginner's Guide to Cybersecurity Rating: 0 out of 5 stars0 ratingsKeeping Cyber Security Simple Rating: 0 out of 5 stars0 ratingsUnderstanding Identity Theft: Protect Your Identity From Theft Rating: 3 out of 5 stars3/5The Identity Theft Protection Guide: *Safeguard Your Family *Protect Your Privacy *Recover a Stolen Identity Rating: 0 out of 5 stars0 ratingsHow To Stay Safe, Smart and Secure Online Rating: 0 out of 5 stars0 ratingsHow To Stay Private Online Protecting Your Online Privacy and Shielding Your Online Presence from Snoopers Rating: 0 out of 5 stars0 ratingsHidemyacc - How to Hide Your Online Accounts A Step-by-Step Guide to Protecting Your Digital Identity Rating: 0 out of 5 stars0 ratingsCapital of Spies Rating: 0 out of 5 stars0 ratingsAct Now: The Basic Study of Prevention Rating: 0 out of 5 stars0 ratingsThe Online Identity Theft Prevention Kit: Stop Scammers, Hackers, and Identity Thieves from Ruining Your Life Rating: 0 out of 5 stars0 ratingsCyberpocalypse: Inside the Digital Assault on Healthcare Rating: 0 out of 5 stars0 ratingsBe Scam Smart: A Guide to Outsmarting Online and Offline Fraudsters Rating: 0 out of 5 stars0 ratingsCyberish Rating: 0 out of 5 stars0 ratingsHow to Prevent Identity Theft: How Anyone Can Protect Themselves from Being a Victim of Identity Theft Rating: 0 out of 5 stars0 ratingsCryptocurrency Security: Safeguarding Your Digital Wealth Rating: 0 out of 5 stars0 ratingsID Theft Scams and Solutions (A guide on how to protect your identity) Rating: 0 out of 5 stars0 ratingsSTEAM Jobs in Cybersecurity Rating: 0 out of 5 stars0 ratingsSpam Nation: The Inside Story of Organized Cybercrime—from Global Epidemic to Your Front Door Rating: 4 out of 5 stars4/5Passwords Made Easy Rating: 0 out of 5 stars0 ratingsDigital Privacy Rights Rating: 0 out of 5 stars0 ratingsInformation Security For Young Adults: HCM Information Security, #1 Rating: 0 out of 5 stars0 ratings
Security For You
Cypherpunks: Freedom and the Future of the Internet Rating: 4 out of 5 stars4/5Social Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5How to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5Cyber Security From Beginner To Expert Cyber Security Made Easy For Absolute Beginners Rating: 0 out of 5 stars0 ratingsCISM Certified Information Security Manager Study Guide Rating: 4 out of 5 stars4/5ISO/IEC 27001:2022: An introduction to information security and the ISMS standard Rating: 5 out of 5 stars5/5Mastering Blockchain Rating: 5 out of 5 stars5/5Understanding Blockchain Rating: 0 out of 5 stars0 ratingsTor Anonymity Network 101: An Introduction to The Most Private Part of The Internet Rating: 0 out of 5 stars0 ratingsHacking For Dummies Rating: 4 out of 5 stars4/5Hacking of Computer Networks: Full Course on Hacking of Computer Networks Rating: 0 out of 5 stars0 ratingsCyber Threat Intelligence Governance: A Guide to Risk and Compliance Strategies Rating: 0 out of 5 stars0 ratingsCyber Resilience: Defence-in-depth principles Rating: 0 out of 5 stars0 ratingsCertified Ethical Hacker (CEH v12) Exam Preparation Rating: 0 out of 5 stars0 ratingsCompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation Rating: 0 out of 5 stars0 ratings(ISC)2 SSCP Systems Security Certified Practitioner Official Study Guide Rating: 0 out of 5 stars0 ratingsBuild a Security Culture Rating: 0 out of 5 stars0 ratingsThe Art of Attack: Attacker Mindset for Security Professionals Rating: 5 out of 5 stars5/5Metasploit Bootcamp Rating: 5 out of 5 stars5/5IAPP CIPM Certified Information Privacy Manager Study Guide Rating: 0 out of 5 stars0 ratingsThe Wires of War: Technology and the Global Struggle for Power Rating: 5 out of 5 stars5/5An Executive Guide to Identity Access Management - 2nd Edition Rating: 4 out of 5 stars4/5NFT for Beginners: NFT collection guides, #1 Rating: 5 out of 5 stars5/5
Reviews for Twelve and a Half Steps to Avoid Identity Theft
0 ratings0 reviews