Your Amazing Itty Bitty® Personal Data Protection Book
()
About this ebook
Cybercrime is on track to become a six trillion dollar problem by 2021. After the Equifax breach, cybercrime advisors are alerting citizens that they should assume their personal information is in the hands of cyber criminals. In this essential guide, Karen Freeman Worstell, breaks down the “what to do now” into 15 essential steps that will help to minimize your exposure.
It’s more important than ever to begin and maintain good practices on a daily basis and to know what to do if you suspect your personal information has been misused. This handy guide shows you how. to protect your social security accounts in case your number is exposed or misused. Detect the signs that indicate someone is trying to steal your bank account and take appropriate action. Pick up a copy of this critical resource today and take action so you minimize your chances of becoming a cybercrime statistic.
Karen Worstell
Karen Worstell, MS, MA is a cybersecurity expert who was inspired to study cybersecurity while a computer science grad student after her professor encrypted a final exam. She had to use her kit of code-breaking tools – and the rest, as they say, is history. Her work was initially in research at companies like Boeing and SRI Consulting to develop computing models for the emerging world of distributed computing and the Internet. She presented appeals for improving cybersecurity for the Internet alongside luminaries like Donn Parker, Peter Neumann, Rhonda MacLean, the late Howard Schmidt, Fred Thompson, and the Secretary General of Interpol in the early 2000s. Later she held leadership roles in cybersecurity for Bank of America, AT&T Wireless and Russell Investments. Today she consults on cybersecurity talent, matching cybersecurity professionals to the companies who need them, and provides coaching masterminds and intensives that contribute to improved cybersecurity by increasing resilience in IT pros in highly stressful roles. She believes that computer science and cybersecurity are important career fields for everyone, and encourages women and young female students to excel as computer technology professionals through her mentoring and coaching programs. She has spoken internationally on the topic of cybersecurity, is the author of books on the subject and is also a contributor to publications on cybersecurity, IT, and e-discovery.
Related to Your Amazing Itty Bitty® Personal Data Protection Book
Related ebooks
Understanding Identity Theft: Protect Your Identity From Theft Rating: 3 out of 5 stars3/5All About Identity Theft Rating: 0 out of 5 stars0 ratingsIdentity Lockdown: Your Step By Step Guide to Identity Theft Protection Rating: 0 out of 5 stars0 ratingsHow to Survive Identity Theft: Regain Your Money, Credit, and Reputation Rating: 0 out of 5 stars0 ratingsYour Amazing Itty Bitty® “Before” Financial Checklist: Rating: 0 out of 5 stars0 ratingsYour Personal Information Is At Risk: A Guide For Protecting Yourself Rating: 0 out of 5 stars0 ratings37 Ways To Protect Yourself From Identity Theft and What to Do if You Are a Victim Rating: 0 out of 5 stars0 ratingsPersonal Information & Identification Security Made Easy Rating: 0 out of 5 stars0 ratingsSimple Credit Repair Rating: 0 out of 5 stars0 ratingsIdentity Theft: Protect Yourself Rating: 0 out of 5 stars0 ratingsWhat Is....Business Identity Theft! Rating: 0 out of 5 stars0 ratingsKnockout Punch for the Identity Thief -7 Secrets to Online Security for Stay at Home Moms On the Go Rating: 5 out of 5 stars5/5Confessions of an Identity Thief Rating: 0 out of 5 stars0 ratingsIdentity Theft – Don’t Be The Next Victim! Rating: 0 out of 5 stars0 ratingsThe Online Identity Theft Prevention Kit: Stop Scammers, Hackers, and Identity Thieves from Ruining Your Life Rating: 0 out of 5 stars0 ratingsIdentity Theft Prevention what to do when your identity is stolen & how to repair your credit Rating: 0 out of 5 stars0 ratingsMemoirs of a Fraudster: Confessions Rating: 0 out of 5 stars0 ratingsChasing Thieves: A True Story of Identity Theft, Felons, and Fighting Back Rating: 0 out of 5 stars0 ratingsThe hackers' destiny - Attack to the system Rating: 0 out of 5 stars0 ratingsMaking Common Cents of Credit: A Common Sense Approach to Understanding, Managing, & Restoring Your Credit Rating: 0 out of 5 stars0 ratingsMoney By Internet: Vol. 2 of 2 Rating: 0 out of 5 stars0 ratingsData Personified: How Fraud Is Transforming the Meaning of Identity Rating: 0 out of 5 stars0 ratingsThe Identity Theft Protection Guide: *Safeguard Your Family *Protect Your Privacy *Recover a Stolen Identity Rating: 0 out of 5 stars0 ratingsThe Truth About Social Security: The Founders’ Words Refute Revisionist History, Zombie Lies, and Common Misunderstandings Rating: 0 out of 5 stars0 ratingsEnvelope Accounting: The Secret To Taking Control Of Your Personal Finances Rating: 0 out of 5 stars0 ratingsWhat Is....Identity Theft! Rating: 0 out of 5 stars0 ratingsBlockchain Exploit: She Cracked the Uncrackable Rating: 0 out of 5 stars0 ratingsHow To Achieve A Better Credit Score Rating: 0 out of 5 stars0 ratingsMaster Your Debt: Slash Your Monthly Payments and Become Debt Free Rating: 5 out of 5 stars5/5Secrets of a Stingy Scoundrel: 100 Dirty Little Money-Grubbing Secrets Rating: 3 out of 5 stars3/5
Security For You
Remote/WebCam Notarization : Basic Understanding Rating: 3 out of 5 stars3/5Hacking for Beginners: Mastery Guide to Learn and Practice the Basics of Computer and Cyber Security Rating: 0 out of 5 stars0 ratingsCompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5How to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5Make Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5Wireless Hacking 101 Rating: 4 out of 5 stars4/5Hacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5How to Hack Like a GOD: Master the secrets of hacking through real-life hacking scenarios Rating: 4 out of 5 stars4/5Practical Ethical Hacking from Scratch Rating: 5 out of 5 stars5/5Practical Lock Picking: A Physical Penetration Tester's Training Guide Rating: 5 out of 5 stars5/5Ultimate Guide for Being Anonymous: Hacking the Planet, #4 Rating: 5 out of 5 stars5/5Cybersecurity For Dummies Rating: 4 out of 5 stars4/5Hacking For Dummies Rating: 4 out of 5 stars4/5Game Console Hacking: Xbox, PlayStation, Nintendo, Game Boy, Atari and Sega Rating: 0 out of 5 stars0 ratingsCompTIA Network+ Review Guide: Exam N10-008 Rating: 0 out of 5 stars0 ratingsAmazon Web Services (AWS) Interview Questions and Answers Rating: 5 out of 5 stars5/5IAPP CIPP / US Certified Information Privacy Professional Study Guide Rating: 0 out of 5 stars0 ratingsHow to Hack Like a Pornstar Rating: 5 out of 5 stars5/5Mike Meyers CompTIA Security+ Certification Passport, Sixth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers Rating: 4 out of 5 stars4/5Mike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5Network+ Study Guide & Practice Exams Rating: 4 out of 5 stars4/5Codes and Ciphers - A History of Cryptography Rating: 4 out of 5 stars4/5CompTIA CySA+ Practice Tests: Exam CS0-002 Rating: 0 out of 5 stars0 ratingsSocial Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5Security+ Boot Camp Study Guide Rating: 5 out of 5 stars5/5
Reviews for Your Amazing Itty Bitty® Personal Data Protection Book
0 ratings0 reviews
Book preview
Your Amazing Itty Bitty® Personal Data Protection Book - Karen Worstell
Your Amazing Itty Bitty®
Personal Data Protection Book
15 Keys to Minimize Your Exposure to Cybercrime
Using These Essential Steps
By Karen Worstell
Smahwords Edition
Published by Itty Bitty® Publishing
A subsidiary of S & P Productions, Inc.
Copyright © 2017 Karen Worstell
Cybercrime is on track to become a six trillion dollar problem by 2021. After the Equifax breach, cybercrime advisors are alerting citizens that they should assume their personal information is in the hands of cyber criminals. In this essential guide, Karen Freeman Worstell, breaks down the what to do now
into 15 essential steps that will help to minimize your exposure.
It’s more important than ever to begin and maintain good practices on a daily basis and to know what to do if you suspect your personal information has been misused. This handy guide shows you how. to protect your social security accounts in case your number is exposed or misused. Detect the signs that indicate someone is trying to steal your bank account and take appropriate action. Pick up a copy of this critical resource today and take action so you minimize your chances of becoming a cybercrime statistic.
Dedication
For all my cybersecurity colleagues over the last 30 years