Book Endorsements
Live Demonstrations and Free Parenting Insights
Testimonials
How to Deal with Ransomed Files (WannaCry)
Posted on May 16th, 2017 by jjd in Uncategorized - No Comments - 0When should you use your debit card?
Posted on January 3rd, 2017 by jjd in Uncategorized - No Comments - 0
“YOU HAVE BEEN HACKED.”
This is a dreadful message to receive. I have had to deal with this statement many times (most recently at Target). This is in spite of me being a professional in the Info Security industry. I’ve seen my family and friends suffer through having accounts hacked, identities stolen, and other miscellaneous breaches of data.
While the odds are certainly not in our favor to not be hacked – there are many lessons we can all learn to better protect others and ourselves. Secure habits are not indefensible, but the tips you learn here on How Not To Be Hacked will significantly lower the chance of harm and improve your ability to repair any damage done.
I have already been a victim. Odds are that I will be a victim again. Everyone is at risk and no one is completely safe.
James
This site and the book published are designed for you, your parents, your family, and your friends. This is not a site designed by security professionals for security professionals. There is to much jargon and confusion to help.
This is information for you the regular individual, parent, and kid. Information that will help you not be hacked, harmed, and simply harassed due to the online digital nature of our world. The problem of identities being stolen, bank accounts emptied, healthcare policies being abused, and simple basic human rights being harmed is large and expanding.
How large – roughly 70% of the U.S. population has some of their information stolen, and 30% have been harmed as a result. The seriousness of this problem is summed up simply – this information can be used for as long as you live.
To halt and help you, my friends, and family I am continuing to invest my nights and weekends pulling together material to be useful to you. I am publishing these ideas via email, so please sign-up right away, and if you can help please do so.
A weakness in the information security, cyber, and broader government data security initiatives can be summarized in one phrase – ‘echo chamber’. To often, I have seen brilliant individuals raise concerns, seek resolution, and improve the operating state of their employer, customer, and nation state. The challenge has been scale, distribution, and long lasting benefit.
Security by its nature is dealing with an ever evolving landscape and threat scenarios that are never consistent. Therefore the practices of old are required (just as we wouldn’t remove our window locks because we realized there were rocks outside) and new ones too. In this state of flux, the challenge of communicating and helping those not at the leading edge.
This site, the tips, and book are absolute simplified, assumptions based, statistics supported, and in some cases not great in every universal scenario. I acknowledge this fact, but would ask you as an expert in the field to help draw out that scenario and share that feedback. This way this thinking can be distributed and embraced by the 4 billion people that currently not getting the best you have to give today.
[contact-form][contact-field label=’Name’ type=’name’ required=’1’/][contact-field label=’Email’ type=’email’ required=’1’/][contact-field label=’Comment’ type=’textarea’ required=’1’/][/contact-form]
- Save your identity
- Cost of card theft to you is $1,600
- Time to you is approx 20 hours
- Damages: $5,600 lost identity