Twelve and a Half Steps to Avoid Identity Theft

Business & Finance, Personal Finance, Money Management, Nonfiction, Computers, Internet, Electronic Commerce
Cover of the book Twelve and a Half Steps to Avoid Identity Theft by Ronald J. Leach, AfterMath
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Ronald J. Leach ISBN: 9780985368555
Publisher: AfterMath Publication: October 29, 2012
Imprint: Language: English
Author: Ronald J. Leach
ISBN: 9780985368555
Publisher: AfterMath
Publication: October 29, 2012
Imprint:
Language: English

Ronald J. Leach's lectures on identity theft have been attended by more than 1,200 people. Many more have heard him on closed-circuit television.  This experience, and his long experience as a professor of computer science make him uniquely qualified to write this book.

Do you know how to protect your vital identity information when you use computers for your banking, credit card transactions, and everyday purchases?  What about when you are using email, web surfing, texting, or social networking?   You’ll learn about these in Twelve and a Half Steps to Avoid Identity Theft.

What do all these companies, organizations, and people have in common?

  • Heartland
  • RBS Worldpay
  • Citizens Financial Group Inc
  • Hannaford Brothers Co
  • TJX Companies Inc
  • Marshalls
  • TJ Maxx
  • CardSystems Solutions
  • The U.S. Internal Revenue Service
  • Ben Bernanke, Chairman of the Federal Reserve
  • Wyndam Worldwide Corporation (Wyndam hotels)
  • Zappos
  • Sony’s online accounts for Play Station users
  • Verisign
  • LinkedIn

The sad answer is that all of them have suffered well-publicized recent successful attacks from identity thieves.  Many of these attacks involved thieves obtaining access to confidential financial information from thousands, and in some cases, millions, of customers.

How can you protect yourselves from this crime?  In this book we describe 12 1/2 suggestions that can strongly reduce, or even eliminate, the likelihood of you being an identity theft victim.  Why 12 1/2 steps?  Because twelve of the steps are ones that you can begin to take right away, and the other will require you to do some additional work reading up on this vital topic.

Here are the twelve and a half simple steps to help avoid identity theft:

  1. Strip to a bare minimum
  2. Don’t Pameiob
  3. Be strong
  4. Watch for zombies
  5. Watch for vampires
  6. Free is too costly
  7. Don’t give too much credit
  8. Surf safely
  9. Gullible’s travels
  10. Don’t give it up if you don’t have to
  11. Just the FAX, please
  12. Be shrewd and shred

12 ½.  Get more information

This short, easy-to-understand book, intended for the general, non-specialist reader, will tell you what to do and what to avoid when going to a bank, pharmacy, or doctor; shopping in person; traveling; or using any kind of electronic commerce.  You’ll learn about the most common security weaknesses of modern banking and e-commerce software and when to avoid using certain software systems, the tell-tale signs of potentially insecure transmission of your data, and how to avoid the dangerous practice of “Pameiob.  You'll learn how you have to protect yourself from the kinds of identity theft that can occur even if YOU never do any online shopping.

This book is a brief, easy-to-understand guide that is dedicated to keeping your assets and identity safe while navigating this dangerous world.   The book is based on the author's experiences as a long-term identity theft consultant and lecturer and computer scientist.

Want more detailed information on identity theft?  Then “Identity Theft in the Cyber Age” is the book for you.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Ronald J. Leach's lectures on identity theft have been attended by more than 1,200 people. Many more have heard him on closed-circuit television.  This experience, and his long experience as a professor of computer science make him uniquely qualified to write this book.

Do you know how to protect your vital identity information when you use computers for your banking, credit card transactions, and everyday purchases?  What about when you are using email, web surfing, texting, or social networking?   You’ll learn about these in Twelve and a Half Steps to Avoid Identity Theft.

What do all these companies, organizations, and people have in common?

The sad answer is that all of them have suffered well-publicized recent successful attacks from identity thieves.  Many of these attacks involved thieves obtaining access to confidential financial information from thousands, and in some cases, millions, of customers.

How can you protect yourselves from this crime?  In this book we describe 12 1/2 suggestions that can strongly reduce, or even eliminate, the likelihood of you being an identity theft victim.  Why 12 1/2 steps?  Because twelve of the steps are ones that you can begin to take right away, and the other will require you to do some additional work reading up on this vital topic.

Here are the twelve and a half simple steps to help avoid identity theft:

  1. Strip to a bare minimum
  2. Don’t Pameiob
  3. Be strong
  4. Watch for zombies
  5. Watch for vampires
  6. Free is too costly
  7. Don’t give too much credit
  8. Surf safely
  9. Gullible’s travels
  10. Don’t give it up if you don’t have to
  11. Just the FAX, please
  12. Be shrewd and shred

12 ½.  Get more information

This short, easy-to-understand book, intended for the general, non-specialist reader, will tell you what to do and what to avoid when going to a bank, pharmacy, or doctor; shopping in person; traveling; or using any kind of electronic commerce.  You’ll learn about the most common security weaknesses of modern banking and e-commerce software and when to avoid using certain software systems, the tell-tale signs of potentially insecure transmission of your data, and how to avoid the dangerous practice of “Pameiob.  You'll learn how you have to protect yourself from the kinds of identity theft that can occur even if YOU never do any online shopping.

This book is a brief, easy-to-understand guide that is dedicated to keeping your assets and identity safe while navigating this dangerous world.   The book is based on the author's experiences as a long-term identity theft consultant and lecturer and computer scientist.

Want more detailed information on identity theft?  Then “Identity Theft in the Cyber Age” is the book for you.

More books from AfterMath

Cover of the book Classic Martian Stories, Vol. 2 by Ronald J. Leach
Cover of the book Fastest Paths to a Job in the Computer Industry by Ronald J. Leach
Cover of the book Slave Narratives From Confederate States by Ronald J. Leach
Cover of the book A Gertrude Stein Reader by Ronald J. Leach
Cover of the book Georgia Slave Narratives by Ronald J. Leach
Cover of the book Texas Slave Narratives by Ronald J. Leach
Cover of the book Classic Venus Stories, Vol. 2 by Ronald J. Leach
Cover of the book Awakening of a COIL Girl by Ronald J. Leach
Cover of the book The Crevice by Ronald J. Leach
Cover of the book Tales of Atlantis by Ronald J. Leach
Cover of the book Classic Martian Stories, Vol. 3 by Ronald J. Leach
Cover of the book Classic Moon Stories - the Complete Series by Ronald J. Leach
Cover of the book Odd Dictionaries and Alphabets by Ronald J. Leach
Cover of the book C and UNIX by Ronald J. Leach
Cover of the book A Colonial America Reader by Ronald J. Leach
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy