Categories Corporate
Professional eBook

Cyber Scams and You! Volume 1

Learn how to Protect Yourself and Your Work from Cybercrime

37
Language:  English
Don’t be a victim of cybercrime. Understand how scams work and how to protect yourself.
Professional Plus subscription free for the first 30 days, then $6.99/mo
Access this book on our eReader, no adverts inside the book
Description
Content
book.tabs.learning objectives

Don’t be a victim of cybercrime. Learn how to identify various Cyberscams function and how to protect yourself. Various topics include the history and psychology of scams. How to protect your digital accounts before you are a victim and what to do if you are a victim.

About the Author

  Howard Kier is a currently a web developer in Chicago, Illinois. He started his career at IBM after earning a B.S Computer Engineering and M.S Computer Engineering from Syracuse University. While working at IBM, Howard earned his M.B.A from Southern Methodist University where he was inducted into Beta Gamma Sigma, the National Honor Society for Business students. After earning his M.B.A, Howard worked at Electronic Data Systems (now HP Solutions), as a consultant.  Tiring of the corporate culture, Howard left EDS, to start his own company. After twelve successful years, he found himself spending more time counseling other business owners rather than on his own business. At that time, Howard redirected his company to provide consulting services. He spent a year as a consultant at Legacy Analytics and left when offered his current position. Throughout his career, Howard has consistently learned about current threats to computer systems after working with other IBM programmers and developers to stop the first computer virus and denial of service attack. Tired of seeing innocent people being taken advantage of via various cybercrimes, Howard decided to write these 2 volumes to educate the general public.  Howard is the author of numerous LinkedIn articles on a variety of business subjects. This is his first book.

  • Introduction
  1. Victim Psychology
    1. Acceptance and Belonging
    2. Altruism
    3. Fear
    4. Fear of Missing Out (FOMO)
    5. Greed
    6. Loneliness and Love
    7. Reciprocity and Debt
    8. Putting it all Together
  2. ID Theft
  3. Old But Good
    1. Bait and Switch
    2. Advanced Fee
    3. Work at Home
    4. Lonely Hearts
    5. Mail Fraud
  4. Telephone Scams
    1. The Grandparent Scam
    2. Technical Support Scams
    3. IRS Scam7
    4. One Ring
    5. Debt Collection Scams
    6. Court Fee Scam
    7. Other Phone Scams
  5. Cyberscams
    1. Commonly Used Terms
  6. Email
    1. Funds Forwarding
    2. Refund Overpayment Scams
    3. Phishing Scams
  7. Malware
    1. System Backup
  • Endnotes

Explain the reasons people fall for scams and how scammers exploit psychological factors. Apply strategies to detect identity theft early and protect personal information from being misused. Describe ways to identify phone and tech support scams and how to effectively dismiss them. Use knowledge of cybercrime terminology to safeguard against online scams and protect digital assets.

About the Author
Howard

Howard Kier