Categorieën Zakelijk
Professionele eBook

Cyber Scams and You! Volume 2

Learn how to Protect Yourself and Your Work from Cybercrime

51
Taal :  English
Don’t be a victim of cybercrime. Understand how scams work and how to protect yourself.
Professioneel Plus abonnement gratis voor 30 dagen, daarna $6.99 per maand
Lees dit boek via onze eReader, geen advertenties in het boek
Beschrijving
Inhoud
book.tabs.learning objectives

Don’t be a victim of cybercrime. Learn how to identify various Cyberscams function and how to protect yourself. Various topics include the history and psychology of scams. How to protect your digital accounts before you are a victim and what to do if you are a victim.

About the Author

  Howard Kier is a currently a web developer in Chicago, Illinois. He started his career at IBM after earning a B.S Computer Engineering and M.S Computer Engineering from Syracuse University. While working at IBM, Howard earned his M.B.A from Southern Methodist University where he was inducted into Beta Gamma Sigma, the National Honor Society for Business students. After earning his M.B.A, Howard worked at Electronic Data Systems (now HP Solutions), as a consultant.  Tiring of the corporate culture, Howard left EDS, to start his own company. After twelve successful years, he found himself spending more time counseling other business owners rather than on his own business. At that time, Howard redirected his company to provide consulting services. He spent a year as a consultant at Legacy Analytics and left when offered his current position. Throughout his career, Howard has consistently learned about current threats to computer systems after working with other IBM programmers and developers to stop the first computer virus and denial of service attack. Tired of seeing innocent people being taken advantage of via various cybercrimes, Howard decided to write these 2 volumes to educate the general public.  Howard is the author of numerous LinkedIn articles on a variety of business subjects. This is his first book.

  • Introduction
  1. Passwords
    1. Sample Breach
    2. Protecting Passwords
    3. Password Managers
    4. Multifactor Authentication
    5. Code Phishing
    6. Old Accounts
    7. SIM Swapping
  2. Phishing Websites
    1. Shortened URLs
    2. Instant Payments “Reversal” Scam
    3. More on URLs
    4. Another URL Twist
    5. QR Codes
    6. Class Action Lawsuit Scam
  3. Good Web Sites, Bad Apples
    1. Fake Job Listings
    2. On-Line Dating
    3. Sextortion
    4. Cryptocurrency
    5. The Con Artist Seller
    6. The Con Artist Buyer
    7. Real Estate Scams
    8. Credit repair
    9. Surveys
  4. What’s Next
  • Appendix A: Real FBI Cyber Warnings
  • Appendix B: Additional Scam Emails
  • Endnotes

Learn how to create strong passwords and use password managers to protect your online accounts. Acquire skills in setting up and using multifactor authentication to safeguard your personal information. Identify phishing websites and know how to verify the legitimacy of a site before providing personal details. Understand different types of online scams and the red flags to watch out for, including fake job offers and dating scams. Know how to protect yourself from common internet fraud tactics like SIM swapping and credit repair scams.

Over de auteur
Howard

Howard Kier