Knockout Punch for the Identity Thief -7 Secrets to Online Security for Stay at Home Moms On the Go

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Knockout Punch for the Identity Thief -7 Secrets to Online Security for Stay at Home Moms On the Go by Scott Lewis, Scott Lewis
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Scott Lewis ISBN: 9781311591876
Publisher: Scott Lewis Publication: March 16, 2014
Imprint: Smashwords Edition Language: English
Author: Scott Lewis
ISBN: 9781311591876
Publisher: Scott Lewis
Publication: March 16, 2014
Imprint: Smashwords Edition
Language: English

More and more in the society we live in today, there has become a huge need for education regarding online security, internet security, internet safety and computer security. I’ve found that most stay at home moms are dedicated to protecting their family in all aspects of life, but few know how to protect their families from online threats. After reading this book you will be well educated about your family’s online security risks and how they directly relate to you and your family to make certain you are never at risk. This book will show you ways to thwart Identity Theft as well.
I am certain that as a stay at home mom, you are on the go constantly at home and away from your home. While at home, you are busy teaching, playing, comforting, etc. While away from home, you are shuttling your children here and there, playing at the park, going to museums, out to eat, shopping and the sort. Either way, you should not have to worry about online security best practices. You have many other things to do.

This book will detail specific ways you can protect yourself and your family regarding online security in a straightforward step by step fashion without the need to be a super techno nerd.

According to the website http://www.statisticbrain.com, there were 16 million households that have had serious virus problems in the past 2 years and 1 million households that lost money or had accounts misused by phishing attacks through email. These statistics are from the US alone. Local and national news channels seem to report each day on identity theft, information stolen from individuals, data breaches on companies large and small, Wi-Fi used for illegal purposes, computers stolen at the workplace and even on playgrounds and fast food restaurants. As an Information Security Officer, it is my job to manage these types of threats each day. With that being said, I am going to walk you through exactly how to protect yourself from all of the above with easy to follow step by step instructions.

The need for online security becomes even greater while you are traveling and on the go. We seem to let our guard down a bit because we are thrilled about our time on vacation, going to the park or simply the coffee shop around the corner. Either way, we must stay alert and do the small things that will help keep us safe.
After helping numerous stay at home moms, it became evident, they were the ones responsible for issues related to the Internet, computers, tablets, phones and other devices. Having had very limited prior training, they struggled with computer and online security issues and the disturbance and damage it caused for their families.

Through these support experiences, I saw a definite need to share my knowledge with others just like YOU as the matriarch of your family. This is why and how this book has come to fruition.

However, anyone that travels and/or uses a computer, smartphone or tablet will learn what steps to take to protect themselves from online security threats.
The book has been written in story form so that the information can be brought to life in a realistic fashion. I will give you scenarios of real life situations and show you exactly how you can avoid them.

Topics covered include:

  1. Why and how to stay safe on Public Wi-Fi

  2. Why and how to create strong passwords

  3. Why you should stay muted on Social Networking Sites while out of town, at the playground or shopping

  4. Why you should not use Hotel business center computers

  5. Why and how to encrypt your laptop and desktop computer

  6. Why and how to use and setup a VPN on your laptop to stay safe while on Public Wi-Fi

  7. Why it is important to have an RFID Wallet to ensure that someone cannot steal the information from your credit card

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

More and more in the society we live in today, there has become a huge need for education regarding online security, internet security, internet safety and computer security. I’ve found that most stay at home moms are dedicated to protecting their family in all aspects of life, but few know how to protect their families from online threats. After reading this book you will be well educated about your family’s online security risks and how they directly relate to you and your family to make certain you are never at risk. This book will show you ways to thwart Identity Theft as well.
I am certain that as a stay at home mom, you are on the go constantly at home and away from your home. While at home, you are busy teaching, playing, comforting, etc. While away from home, you are shuttling your children here and there, playing at the park, going to museums, out to eat, shopping and the sort. Either way, you should not have to worry about online security best practices. You have many other things to do.

This book will detail specific ways you can protect yourself and your family regarding online security in a straightforward step by step fashion without the need to be a super techno nerd.

According to the website http://www.statisticbrain.com, there were 16 million households that have had serious virus problems in the past 2 years and 1 million households that lost money or had accounts misused by phishing attacks through email. These statistics are from the US alone. Local and national news channels seem to report each day on identity theft, information stolen from individuals, data breaches on companies large and small, Wi-Fi used for illegal purposes, computers stolen at the workplace and even on playgrounds and fast food restaurants. As an Information Security Officer, it is my job to manage these types of threats each day. With that being said, I am going to walk you through exactly how to protect yourself from all of the above with easy to follow step by step instructions.

The need for online security becomes even greater while you are traveling and on the go. We seem to let our guard down a bit because we are thrilled about our time on vacation, going to the park or simply the coffee shop around the corner. Either way, we must stay alert and do the small things that will help keep us safe.
After helping numerous stay at home moms, it became evident, they were the ones responsible for issues related to the Internet, computers, tablets, phones and other devices. Having had very limited prior training, they struggled with computer and online security issues and the disturbance and damage it caused for their families.

Through these support experiences, I saw a definite need to share my knowledge with others just like YOU as the matriarch of your family. This is why and how this book has come to fruition.

However, anyone that travels and/or uses a computer, smartphone or tablet will learn what steps to take to protect themselves from online security threats.
The book has been written in story form so that the information can be brought to life in a realistic fashion. I will give you scenarios of real life situations and show you exactly how you can avoid them.

Topics covered include:

  1. Why and how to stay safe on Public Wi-Fi

  2. Why and how to create strong passwords

  3. Why you should stay muted on Social Networking Sites while out of town, at the playground or shopping

  4. Why you should not use Hotel business center computers

  5. Why and how to encrypt your laptop and desktop computer

  6. Why and how to use and setup a VPN on your laptop to stay safe while on Public Wi-Fi

  7. Why it is important to have an RFID Wallet to ensure that someone cannot steal the information from your credit card

More books from Application Software

Cover of the book Mesoscale Modeling in Chemical Engineering Part II by Scott Lewis
Cover of the book Der Einsatz eines Lernmanagement-Systems zur Unterstützung von Lernprozessen - Entwicklung und Evaluation eines Projekts für den Englischunterricht by Scott Lewis
Cover of the book iWork: The Missing Manual by Scott Lewis
Cover of the book Bitcoin Explained by Scott Lewis
Cover of the book Digital Archaeology by Scott Lewis
Cover of the book Using Graphics In Books: The Reflowable Edition by Scott Lewis
Cover of the book Advances in Cryptology – EUROCRYPT 2019 by Scott Lewis
Cover of the book Advances in Intelligent Data Analysis XIV by Scott Lewis
Cover of the book Service Oriented Architecture (SOA) For Dummies by Scott Lewis
Cover of the book AutoCAD 3D Modeling by Scott Lewis
Cover of the book Online Scam Survival Guide by Scott Lewis
Cover of the book Everything you want to know about Business Continuity by Scott Lewis
Cover of the book Android Wireless Application Development Vol I Android Essentials 3rd Edition by Scott Lewis
Cover of the book The Real MCTS/MCITP Exam 70-640 Prep Kit by Scott Lewis
Cover of the book Two-Dimensional Change Detection Methods by Scott Lewis
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy