Protecting our identity Information is a task that should be started before a disaster happens as that will be one thing that you wont have time to deal with. This book walks you through starting the process of protecting yourself before something happens.
The more that Technology is increasingly present in our daily lives, the more vigilant we must be in protection the personal information that exists about each one of us. Sometimes the best defense isn’t with high technology but with things that already exist. For those that have read about Kevin Mitnick who has the reputation of worlds best hacker. One of his biggest strengths was his ability to social engineer his way into a company with having the most basic of information. Social Engineering is just one of the attacks that must be anticipated. This is just one of the ways that someone can start the process of getting personal information.
When traveling, we almost expect to have some type of internet access available when we arrive at the hotel or motel that we are at. The first wireless networks that I encountered several years ago, used a basic level of encryption but hotel/motel operators started having enough support calls when visitors had problems accessing the wireless network. What I have seen recently is a totally open network in terms of encryption. That is easier for visitors to access but leaves the visitors vulnerable to having their traffic sniffer and valuable information learned that could be used to steal their identity.
If that wasn’t enough, you now need to think about what items you get in the mail or print out that should be shredded. It used to be that you could safely dispose of things in the trash. Now, even mail such as a pre-approved credit card offer must be shredded to keep you out of harms way. I have been the victim of identity theft in the past and hope that when you read this that what is contained in this eBook will help you avoid having to deal with the same situation as I found myself.