Your Amazing Itty Bitty® Personal Data Protection Book
()
About this ebook
Cybercrime is on track to become a six trillion dollar problem by 2021. After the Equifax breach, cybercrime advisors are alerting citizens that they should assume their personal information is in the hands of cyber criminals. In this essential guide, Karen Freeman Worstell, breaks down the “what to do now” into 15 essential steps that will help to minimize your exposure.
It’s more important than ever to begin and maintain good practices on a daily basis and to know what to do if you suspect your personal information has been misused. This handy guide shows you how. to protect your social security accounts in case your number is exposed or misused. Detect the signs that indicate someone is trying to steal your bank account and take appropriate action. Pick up a copy of this critical resource today and take action so you minimize your chances of becoming a cybercrime statistic.
Karen Worstell
Karen Worstell, MS, MA is a cybersecurity expert who was inspired to study cybersecurity while a computer science grad student after her professor encrypted a final exam. She had to use her kit of code-breaking tools – and the rest, as they say, is history. Her work was initially in research at companies like Boeing and SRI Consulting to develop computing models for the emerging world of distributed computing and the Internet. She presented appeals for improving cybersecurity for the Internet alongside luminaries like Donn Parker, Peter Neumann, Rhonda MacLean, the late Howard Schmidt, Fred Thompson, and the Secretary General of Interpol in the early 2000s. Later she held leadership roles in cybersecurity for Bank of America, AT&T Wireless and Russell Investments. Today she consults on cybersecurity talent, matching cybersecurity professionals to the companies who need them, and provides coaching masterminds and intensives that contribute to improved cybersecurity by increasing resilience in IT pros in highly stressful roles. She believes that computer science and cybersecurity are important career fields for everyone, and encourages women and young female students to excel as computer technology professionals through her mentoring and coaching programs. She has spoken internationally on the topic of cybersecurity, is the author of books on the subject and is also a contributor to publications on cybersecurity, IT, and e-discovery.
Related to Your Amazing Itty Bitty® Personal Data Protection Book
Related ebooks
How to Survive Identity Theft: Regain Your Money, Credit, and Reputation Rating: 0 out of 5 stars0 ratingsYour Personal Information Is At Risk: A Guide For Protecting Yourself Rating: 0 out of 5 stars0 ratings37 Ways To Protect Yourself From Identity Theft and What to Do if You Are a Victim Rating: 0 out of 5 stars0 ratingsWhat Is....Business Identity Theft! Rating: 0 out of 5 stars0 ratingsAll About Identity Theft Rating: 0 out of 5 stars0 ratingsIdentity Lockdown: Your Step By Step Guide to Identity Theft Protection Rating: 0 out of 5 stars0 ratingsYour Amazing Itty Bitty® “Before” Financial Checklist: Rating: 0 out of 5 stars0 ratingsIdentity Theft and Fraud: Evaluating and Managing Risk Rating: 0 out of 5 stars0 ratingsPersonal Information & Identification Security Made Easy Rating: 0 out of 5 stars0 ratingsUnderstanding Identity Theft: Protect Your Identity From Theft Rating: 3 out of 5 stars3/5Identity Theft: Protect Yourself Rating: 0 out of 5 stars0 ratingsID Theft Scams and Solutions (A guide on how to protect your identity) Rating: 0 out of 5 stars0 ratingsHow to Prevent Identity Theft: How Anyone Can Protect Themselves from Being a Victim of Identity Theft Rating: 0 out of 5 stars0 ratingsTips for Preventing Identity Theft Rating: 0 out of 5 stars0 ratingsScammed: How to Save Your Money and Find Better Service in a World of Schemes, Swindles, and Shady Deals Rating: 2 out of 5 stars2/5Digital Privacy: Internet Security to Stop Big Companies From Tracking and Selling Your Data Rating: 0 out of 5 stars0 ratingsMoney for Nothing: How to land the best deals on your insurances, loans, cards, er, tax and more Rating: 0 out of 5 stars0 ratingsFraud Smarts Rating: 5 out of 5 stars5/5The Basics of Digital Privacy: Simple Tools to Protect Your Personal Information and Your Identity Online Rating: 0 out of 5 stars0 ratingsSimple Credit Repair Rating: 0 out of 5 stars0 ratingsHow To Recognize And Avoid Internet Scam Rating: 0 out of 5 stars0 ratingsKnockout Punch for the Identity Thief -7 Secrets to Online Security for Stay at Home Moms On the Go Rating: 5 out of 5 stars5/5Memoirs of a Fraudster: Confessions Rating: 0 out of 5 stars0 ratingsThe Online Identity Theft Prevention Kit: Stop Scammers, Hackers, and Identity Thieves from Ruining Your Life Rating: 0 out of 5 stars0 ratingsHow to Buy and Sell Stocks Yourself: Realize Family’S Dreams and Invest Like a Billionaire Rating: 0 out of 5 stars0 ratingsBlockchain Exploit: She Cracked the Uncrackable Rating: 0 out of 5 stars0 ratingsIdentity Theft – Don’t Be The Next Victim! Rating: 0 out of 5 stars0 ratingsThe hackers' destiny - Attack to the system Rating: 0 out of 5 stars0 ratingsIdentity Theft Prevention what to do when your identity is stolen & how to repair your credit Rating: 0 out of 5 stars0 ratingsConfessions of an Identity Thief Rating: 0 out of 5 stars0 ratings
Security For You
How to Be Invisible: Protect Your Home, Your Children, Your Assets, and Your Life Rating: 4 out of 5 stars4/5How to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5Hacking: Ultimate Beginner's Guide for Computer Hacking in 2018 and Beyond: Hacking in 2018, #1 Rating: 4 out of 5 stars4/5Remote/WebCam Notarization : Basic Understanding Rating: 3 out of 5 stars3/5Mike Meyers CompTIA Security+ Certification Passport, Sixth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Social Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5CompTIA Network+ Review Guide: Exam N10-008 Rating: 0 out of 5 stars0 ratingsCybersecurity For Dummies Rating: 4 out of 5 stars4/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5CompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5Network+ Study Guide & Practice Exams Rating: 4 out of 5 stars4/5Wireless Hacking 101 Rating: 4 out of 5 stars4/5CompTIA Network+ Certification Guide (Exam N10-008): Unleash your full potential as a Network Administrator (English Edition) Rating: 0 out of 5 stars0 ratingsHacking For Dummies Rating: 4 out of 5 stars4/5Practical Lock Picking: A Physical Penetration Tester's Training Guide Rating: 5 out of 5 stars5/5The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers Rating: 4 out of 5 stars4/5How to Hack Like a Pornstar Rating: 5 out of 5 stars5/5Dark Territory: The Secret History of Cyber War Rating: 4 out of 5 stars4/5Hacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5CompTIA CySA+ Practice Tests: Exam CS0-002 Rating: 0 out of 5 stars0 ratingsTor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5Ethical Hacking 101 - How to conduct professional pentestings in 21 days or less!: How to hack, #1 Rating: 5 out of 5 stars5/5Mike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Ultimate Guide for Being Anonymous: Hacking the Planet, #4 Rating: 5 out of 5 stars5/5Make Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5Hands on Hacking: Become an Expert at Next Gen Penetration Testing and Purple Teaming Rating: 3 out of 5 stars3/5
Reviews for Your Amazing Itty Bitty® Personal Data Protection Book
0 ratings0 reviews
Book preview
Your Amazing Itty Bitty® Personal Data Protection Book - Karen Worstell
Your Amazing Itty Bitty®
Personal Data Protection Book
15 Keys to Minimize Your Exposure to Cybercrime
Using These Essential Steps
By Karen Worstell
Smahwords Edition
Published by Itty Bitty® Publishing
A subsidiary of S & P Productions, Inc.
Copyright © 2017 Karen Worstell
Cybercrime is on track to become a six trillion dollar problem by 2021. After the Equifax breach, cybercrime advisors are alerting citizens that they should assume their personal information is in the hands of cyber criminals. In this essential guide, Karen Freeman Worstell, breaks down the what to do now
into 15 essential steps that will help to minimize your exposure.
It’s more important than ever to begin and maintain good practices on a daily basis and to know what to do if you suspect your personal information has been misused. This handy guide shows you how. to protect your social security accounts in case your number is exposed or misused. Detect the signs that indicate someone is trying to steal your bank account and take appropriate action. Pick up a copy of this critical resource today and take action so you minimize your chances of becoming a cybercrime statistic.
Dedication
For all my cybersecurity colleagues over the last 30 years