Your Amazing Itty Bitty® Personal Data Protection Book
()
About this ebook
Cybercrime is on track to become a six trillion dollar problem by 2021. After the Equifax breach, cybercrime advisors are alerting citizens that they should assume their personal information is in the hands of cyber criminals. In this essential guide, Karen Freeman Worstell, breaks down the “what to do now” into 15 essential steps that will help to minimize your exposure.
It’s more important than ever to begin and maintain good practices on a daily basis and to know what to do if you suspect your personal information has been misused. This handy guide shows you how. to protect your social security accounts in case your number is exposed or misused. Detect the signs that indicate someone is trying to steal your bank account and take appropriate action. Pick up a copy of this critical resource today and take action so you minimize your chances of becoming a cybercrime statistic.
Karen Worstell
Karen Worstell, MS, MA is a cybersecurity expert who was inspired to study cybersecurity while a computer science grad student after her professor encrypted a final exam. She had to use her kit of code-breaking tools – and the rest, as they say, is history. Her work was initially in research at companies like Boeing and SRI Consulting to develop computing models for the emerging world of distributed computing and the Internet. She presented appeals for improving cybersecurity for the Internet alongside luminaries like Donn Parker, Peter Neumann, Rhonda MacLean, the late Howard Schmidt, Fred Thompson, and the Secretary General of Interpol in the early 2000s. Later she held leadership roles in cybersecurity for Bank of America, AT&T Wireless and Russell Investments. Today she consults on cybersecurity talent, matching cybersecurity professionals to the companies who need them, and provides coaching masterminds and intensives that contribute to improved cybersecurity by increasing resilience in IT pros in highly stressful roles. She believes that computer science and cybersecurity are important career fields for everyone, and encourages women and young female students to excel as computer technology professionals through her mentoring and coaching programs. She has spoken internationally on the topic of cybersecurity, is the author of books on the subject and is also a contributor to publications on cybersecurity, IT, and e-discovery.
Related to Your Amazing Itty Bitty® Personal Data Protection Book
Related ebooks
Your Personal Information Is At Risk: A Guide For Protecting Yourself Rating: 0 out of 5 stars0 ratingsPrivacy Online: The Practical Privacy Guide For Anyone Rating: 0 out of 5 stars0 ratingsStupid Ways People are Being Hacked! Rating: 0 out of 5 stars0 ratingsIdentity Theft Prevention what to do when your identity is stolen & how to repair your credit Rating: 0 out of 5 stars0 ratingsThe Online Identity Theft Prevention Kit: Stop Scammers, Hackers, and Identity Thieves from Ruining Your Life Rating: 0 out of 5 stars0 ratingsTrusting the Dawn: How to Choose Freedom and Joy After Trauma Rating: 0 out of 5 stars0 ratingsMemory Improvement: Train Your Mind to Unlock Your Brain’s Potential for a Better Standard of Living Rating: 5 out of 5 stars5/5Unmasking Deception: AI-Powered Fraud Management for a Secure Future: 1A, #1 Rating: 0 out of 5 stars0 ratingsCyber Protect Your Business Rating: 0 out of 5 stars0 ratingsThe Miracle Law: The Pristine Path to Purpose and Prosperity Rating: 0 out of 5 stars0 ratingsThe Transparency Fix: Secrets, Leaks, and Uncontrollable Government Information Rating: 0 out of 5 stars0 ratingsAdvanced OSINT Strategies: Online Investigations And Intelligence Gathering Rating: 0 out of 5 stars0 ratingsCoping from Covert Stalking: A Guide to Healing and Justice: 1A, #1 Rating: 0 out of 5 stars0 ratingsConspiracy Theory Culture: The Interviews Rating: 0 out of 5 stars0 ratingsSmall Business Startup Guide Rating: 0 out of 5 stars0 ratingsWealth Mentality Rating: 0 out of 5 stars0 ratingsAnother Book of Thirty-Three (33) Rules Regarding Life Rating: 0 out of 5 stars0 ratingsSurviving in the Hi-Tech World Rating: 0 out of 5 stars0 ratingsAI vs. Identity Theft: Securing the Digital Age: 1A, #1 Rating: 0 out of 5 stars0 ratingsEnding the Silver Bullet Cycle: Breaking the Habit of Following Snake Oil Trends Rating: 0 out of 5 stars0 ratingsGardening at Night Rating: 0 out of 5 stars0 ratingsThe Invisibility Toolkit Rating: 5 out of 5 stars5/5THE ALTRUISM CODE: Your Protection Rating: 0 out of 5 stars0 ratingsYou Can Say That Again!: A Fun Approach to Sounding Better When You Open Your Mouth to Speak Rating: 0 out of 5 stars0 ratingsAttitude Adjustment E course Rating: 0 out of 5 stars0 ratingsHow to Interpret Your Dreams Rating: 0 out of 5 stars0 ratingsYour Easy to Follow Guide-How to Create the Life You Always Wanted Rating: 0 out of 5 stars0 ratingsConsciousness as I: Non fiction, #1.2 Rating: 5 out of 5 stars5/5The Gang Stalking Coach: Strategies That Will Make You Become Happier And Protected In A World That Tries To Break You Rating: 0 out of 5 stars0 ratingsThe AI Cash Machine: Unleash Passive Income Riches with Generative AI Rating: 0 out of 5 stars0 ratings
Security For You
CompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5Hacking For Dummies Rating: 4 out of 5 stars4/5Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5Cybersecurity For Dummies Rating: 5 out of 5 stars5/5CompTIA Security+ Study Guide with over 500 Practice Test Questions: Exam SY0-701 Rating: 5 out of 5 stars5/5(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide Rating: 3 out of 5 stars3/5Social Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5Practical Digital Forensics Rating: 0 out of 5 stars0 ratingsTor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5CISM Certified Information Security Manager Study Guide Rating: 4 out of 5 stars4/5Codes and Ciphers Rating: 5 out of 5 stars5/5CompTia Security 701: Fundamentals of Security Rating: 0 out of 5 stars0 ratingsHow to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5How to Hack Like a Pornstar Rating: 4 out of 5 stars4/5Unmasking the Social Engineer: The Human Element of Security Rating: 5 out of 5 stars5/5IAPP CIPP / US Certified Information Privacy Professional Study Guide Rating: 0 out of 5 stars0 ratingsHow to Hack Like a GOD: Master the secrets of hacking through real-life hacking scenarios Rating: 4 out of 5 stars4/5Make Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5CISA Certified Information Systems Auditor Study Guide Rating: 5 out of 5 stars5/5Threat Modeling: Designing for Security Rating: 4 out of 5 stars4/5The Official (ISC)2 CCSP CBK Reference Rating: 0 out of 5 stars0 ratingsThe Art of Attack: Attacker Mindset for Security Professionals Rating: 5 out of 5 stars5/5The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers Rating: 4 out of 5 stars4/5The Art of Deception: Controlling the Human Element of Security Rating: 3 out of 5 stars3/5
Reviews for Your Amazing Itty Bitty® Personal Data Protection Book
0 ratings0 reviews
Book preview
Your Amazing Itty Bitty® Personal Data Protection Book - Karen Worstell
Your Amazing Itty Bitty®
Personal Data Protection Book
15 Keys to Minimize Your Exposure to Cybercrime
Using These Essential Steps
By Karen Worstell
Smahwords Edition
Published by Itty Bitty® Publishing
A subsidiary of S & P Productions, Inc.
Copyright © 2017 Karen Worstell
Cybercrime is on track to become a six trillion dollar problem by 2021. After the Equifax breach, cybercrime advisors are alerting citizens that they should assume their personal information is in the hands of cyber criminals. In this essential guide, Karen Freeman Worstell, breaks down the what to do now
into 15 essential steps that will help to minimize your exposure.
It’s more important than ever to begin and maintain good practices on a daily basis and to know what to do if you suspect your personal information has been misused. This handy guide shows you how. to protect your social security accounts in case your number is exposed or misused. Detect the signs that indicate someone is trying to steal your bank account and take appropriate action. Pick up a copy of this critical resource today and take action so you minimize your chances of becoming a cybercrime statistic.
Dedication
For all my cybersecurity colleagues over the last 30 years