Your Personal Information Is At Risk: A Guide For Protecting Yourself
By Rich Owen
()
About this ebook
This book is very well-written, organized, and clearly presented. This is a very complex topic, and there is quite a bit of information to learn. The author has done an excellent job of presenting the information in an easy-to-read platform that conveys all of the information in an appropriately serious tone, so that the reader fully understands both the information, and the need to be fully aware of the threats. The author also provides solutions to confront the risk and ensure that there is no breach of personal information.
Read more from Rich Owen
The Alchemy of Information Protection: A Cybersecurity Druid's Spell Book Rating: 0 out of 5 stars0 ratingsThe Continuing Adventures of Cyber Security Sam: Time Out Rating: 0 out of 5 stars0 ratingsCyber Security Sam Book 3: Rosie I'm Home Rating: 0 out of 5 stars0 ratingsCyber Security Sam Book 2: The Invisible Man Rating: 0 out of 5 stars0 ratings
Related to Your Personal Information Is At Risk
Related ebooks
Guarding Against Online Identity Theft Rating: 0 out of 5 stars0 ratingsDigital Cop: A Digital Cop's Guide to Cyber Security Rating: 0 out of 5 stars0 ratingsPersonal Information & Identification Security Made Easy Rating: 0 out of 5 stars0 ratingsMy Data My Privacy My Choice: A Step-by-step Guide to Secure your Personal Data and Reclaim your Online Privacy! Rating: 0 out of 5 stars0 ratingsThe Identity Theft Protection Guide: *Safeguard Your Family *Protect Your Privacy *Recover a Stolen Identity Rating: 0 out of 5 stars0 ratingsIdentity Theft – Protect Yourself Rating: 0 out of 5 stars0 ratings37 Ways To Protect Yourself From Identity Theft and What to Do if You Are a Victim Rating: 0 out of 5 stars0 ratingsProtect Your Personal Information Rating: 0 out of 5 stars0 ratingsHow To Stay Private Online Protecting Your Online Privacy and Shielding Your Online Presence from Snoopers Rating: 0 out of 5 stars0 ratingsStay Cyber Safe: What Every CEO Should Know About Cybersecurity Rating: 0 out of 5 stars0 ratingsBlind Spot: Smartphone and Computer Personal Security Guide Rating: 3 out of 5 stars3/5Mobile Security: How to secure, privatize and recover your devices Rating: 5 out of 5 stars5/5Your Amazing Itty Bitty® Personal Data Protection Book Rating: 0 out of 5 stars0 ratingsHack Proof Yourself!: The essential guide for securing your digital world Rating: 0 out of 5 stars0 ratingsCompsec: For the Home User Rating: 0 out of 5 stars0 ratingsCracking the Fortress: Bypassing Modern Authentication Mechanism Rating: 0 out of 5 stars0 ratingsEasy Private Browsing: How to Send Anonymous Email, Hide Your IP address, Delete Browsing History and Become Invisible on the Web Rating: 0 out of 5 stars0 ratingsHow to Survive Identity Theft: Regain Your Money, Credit, and Reputation Rating: 0 out of 5 stars0 ratingsThe Darknet Superpack Rating: 0 out of 5 stars0 ratingsCybersafe for Business: The Anti-Hack Handbook for SMEs Rating: 0 out of 5 stars0 ratingsSecurity in the Digital World Rating: 0 out of 5 stars0 ratingsManaging Information Security Breaches: Studies from real life Rating: 0 out of 5 stars0 ratingsLearn All About Cyber Safety Rating: 0 out of 5 stars0 ratingsID Theft Scams and Solutions (A guide on how to protect your identity) Rating: 0 out of 5 stars0 ratingsWhat Is....Business Identity Theft! Rating: 0 out of 5 stars0 ratingsHow to Safeguard Your Debit & Credit Card From Fraud Rating: 0 out of 5 stars0 ratingsUNHACKABLE : Your Online Security Playbook: Recreating Cyber Security in an Unsecure World Rating: 0 out of 5 stars0 ratingsBasic security settings for gadgets & digital platforms Rating: 0 out of 5 stars0 ratingsHow Not To Use Your Smartphone Rating: 5 out of 5 stars5/5Software Security For You Rating: 0 out of 5 stars0 ratings
Internet & Web For You
No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State Rating: 4 out of 5 stars4/5How to Be Invisible: Protect Your Home, Your Children, Your Assets, and Your Life Rating: 4 out of 5 stars4/5Social Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5Mike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Six Figure Blogging Blueprint Rating: 5 out of 5 stars5/5Podcasting For Dummies Rating: 4 out of 5 stars4/5How to Disappear and Live Off the Grid: A CIA Insider's Guide Rating: 0 out of 5 stars0 ratingsEverybody Lies: Big Data, New Data, and What the Internet Can Tell Us About Who We Really Are Rating: 4 out of 5 stars4/5Coding For Dummies Rating: 5 out of 5 stars5/5From Nothing Rating: 5 out of 5 stars5/5The Beginner's Affiliate Marketing Blueprint Rating: 4 out of 5 stars4/5Coding All-in-One For Dummies Rating: 4 out of 5 stars4/5How To Start A Profitable Authority Blog In Under One Hour Rating: 5 out of 5 stars5/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5The Logo Brainstorm Book: A Comprehensive Guide for Exploring Design Directions Rating: 4 out of 5 stars4/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5The Gothic Novel Collection Rating: 5 out of 5 stars5/5Wireless Hacking 101 Rating: 4 out of 5 stars4/5Cybersecurity For Dummies Rating: 4 out of 5 stars4/5200+ Ways to Protect Your Privacy: Simple Ways to Prevent Hacks and Protect Your Privacy--On and Offline Rating: 0 out of 5 stars0 ratingsMore Porn - Faster!: 50 Tips & Tools for Faster and More Efficient Porn Browsing Rating: 3 out of 5 stars3/5Get Rich or Lie Trying: Ambition and Deceit in the New Influencer Economy Rating: 0 out of 5 stars0 ratingsWordpress for Beginners: The Easy Step-by-Step Guide to Creating a Website with WordPress Rating: 5 out of 5 stars5/5How To Start A Podcast Rating: 4 out of 5 stars4/5Stop Asking Questions: How to Lead High-Impact Interviews and Learn Anything from Anyone Rating: 5 out of 5 stars5/5The $1,000,000 Web Designer Guide: A Practical Guide for Wealth and Freedom as an Online Freelancer Rating: 5 out of 5 stars5/5
Reviews for Your Personal Information Is At Risk
0 ratings0 reviews
Book preview
Your Personal Information Is At Risk - Rich Owen
Your Personal Information Is At Risk
A Guide For Protecting Yourself
Rich Owen
ISBN (Print Edition): 978-1-09833-858-9
ISBN (eBook Edition): 978-1-09833-859-6
© 2020. All rights reserved. No part of this publication may be reproduced, distributed, or transmitted in any form or by any means, including photocopying, recording, or other electronic or mechanical methods, without the prior written permission of the publisher, except in the case of brief quotations embodied in critical reviews and certain other noncommercial uses permitted by copyright law.
Contents
Dedication
Preface
Introduction
Documents
Life
Education & Career
Possessions
Finances
Family
Protection of your documents
Devices
Your Virtual Self
Privacy Points
Common risks with our Digital Devices
Hackers, Viruses, and Worms, Oh My!
Vulnerabilities
Backups
Phones
How does my phone know that it is me?
It’s a Smartphone.
Personal Computers
How does the computer know that it is me?
Using a computer away from home.
Communication
Phone
Phone Scams
You’ve Got Mail! (Email)
The Basic Email
Evil Email
Evil Email Examples:
Final Thoughts on email
Messages
Message SCAMS:
Blended threats
Cloud
Internet (World Wide Web)
Firewalls
Wi-Fi
VPN (Virtual Private Network)
Applications (Apps)
Social Media
Likes & Comments
Smile
Financial, Medical and other Sensitive Applications
Credit Monitoring
Do you want to play a game?
Data Storage
Summary
Lies
Misuse & Fraud
Risk and Risk Reduction
Bullies
Checklists & Reminders of what to do.
Phone calls:
Messages:
Application/Game:
Acknowledgements
Other Books by this Author
Dedication
This book is dedicated to my grandchildren and to all who have an interest in protecting their information.
Preface
This book began as just a small book for new users of smartphones. It was originally written for children and teenagers. It was soon realized that there are also older first time users of smartphones. There are many features that also spread into the world of the personal computer and accessing personal information online. The entire world of social media and email also needed to be explored. This led to security and privacy, and discussing how your data is stored or processed online.
Although this is all necessary because of the age in which we live, we have not totally gotten away from paper. Therefore this book is front-ended with steps that you should take to protect your paper-self as well as your virtual-self.
To my security brethren, you will note that I avoid getting too deep so as to avoid exposing the reader to areas where they could put them further at risk.
Introduction
We live in the Information Age. We are constantly asked to provide information about ourselves to verify our identity or value. To do so, we need to hold some elements of our identity to ourselves while other bits of information need to be publicly available. We need to be in control of the information that defines us. There are forces of evil that exist to collect as much information as they can about us. Granted, not all information collection is evil. Some information collection about us is intended
to better serve us, but what happens when that well intended collection is exposed in a data breach? Some individuals and companies create profiles of data about us, defining our virtual identity. They can use that profile to influence our lives in a way that may not be in our best interests or worse, they may be able to virtually become us. Acting on our behalf, they can send email for us, access our bank accounts, and more. They can virtually destroy our personal, financial and emotional lives.
This book will examine several actions that you can take to physically protect your documents. For information about you that is in a digital form, we will explore ways in which you can reduce the risk that your data will be disclosed, modified, or just made unavailable even to you. The following diagram shows that we will create a foundation of protection based on our physical documents. On top of this, we will explore how your digital information is at risk and what you can do to reduce that risk in the devices that you use, the ways you communicate, and even data that you put, or allow to be put, into the cloud¹.
1 The term cloud is the collection of computers that are accessible via the internet, sometimes called the World Wide Web (www). When you access Facebook, your bank, a booking site on the internet you are accessing a computer in the cloud. That computer may be anywhere in the world.
Documents
We will begin by identifying what scraps of paper in your life may be of value. Then we will suggest steps to take to protect them.
Life
The following are examples of documents about you that you should consider protecting:
Birth Certificate
Social Security Number
Driver’s License
Identification cards (student ID, etc.)
Marriage Certificate
Citizenship paperwork
Divorce Decree
Passport
Last Will & Testament
Death Certificate
Living Will
NDR
Other