Hack Proofing Your Identity in the Information Age: Protect Your Family on the Internet!

Front Cover
Teri Bidwell, Michael Cross, Ryan Russell
Syngress Pub., 2002 - Computers - 512 pages
0 Reviews
If more than half of the following statements are true, you are at high risk for identity theft: You receive at least one loan solicitation or preapproved credit offer each week; You usually toss preapproved credit or loan solicitations in the trash without shredding; You usually toss old banking or credit documents in the trash without shredding; Mail is delivered to you in an unlocked mailbox; You send mail by placing it in an unlocked mailbox; You carry your Social Security or Social Insurance card in your wallet; Your Social Security Number is printed on the health insurance card in your wallet; Your Social Security Number is printed on your drivers license; Your Social Security or drivers license number is printed on your personal checks; You make occasional or frequent purchases online using a credit card; You seldom check whether a site is "secure" before using a credit card to make an online purchase or before disclosing private data, such as your Social Security Number, to a Web site; You seldom read Web site privacy policies before disclosing private information; Your online account with your bank, health insurer, or stockbroker uses your SSN as your account number; Your bank doesnt require a password before allowing you to make a withdrawal in person; The password for your online bank account is written down in an unlocked location; Your ATM PIN is written down in your wallet or on the ATM card; You sometimes share your name, address, e-mail address, and/or phone number with Web sites; You dont use privacy software to remove identifying information from your computer; You seldom take advantage of programs designed to opt-out of information sharing; You havent seen your credit report in the past year; Your Internet-connected computer stores private or financial information and is not protected from the Internet by both a firewall and antivirus software.

What people are saying - Write a review

We haven't found any reviews in the usual places.

About the author (2002)

Bidwell has been involved in Internet security for over 10 years as an analyst, engineer, and administrator and is a SANS-Certified GCIA Intrusion Analyst.

Michael Cross's critically acclaimed debut, IN FELT TREELING: A LIBRETTO, was published by Chax Press in 2008. HAECCEITIES is his second collection of poetry. He is the editor of INVOLUNTARY VISION: AFTER AKIRA KUROSAWA'S DREAMS (Avenue B, 2003) and The George Oppen Memorial Lectures at San Francisco State University (forthcoming). Cross lives in Oakland.

Russell is MIS Manager at SecurityFocus.com, has served as an expert witness on security topics, and has done internal security investigation for a major software vendor. He has been working in the IT field for over 11 years. He has a BS degree in Computer Science.

Bibliographic information