Table of Contents
Dedication 1
Preface 3
Introduction 5
Documents 7
Life 7
Education & Career 8
Possessions 8
Finances 9
Family 9
Protection of your documents 9
Devices 11
Your Virtual Self 11
Privacy Points 12
Common risks with our Digital Devices 13
Hackers, Viruses, and Worms, Oh My! 13
Vulnerabilities 15
Backups 16
Phones 16
How does my phone know that it is me? 18
It's a Smartphone. 19
Personal Computers 20
How does the computer know that it is me? 21
Using a computer away from home. 23
Communication 25
Phone 25
Phone Scams 27
You've Got Mail! (Email) 31
The Basic Email 31
Evil Email 37
Evil Email Examples: 39
Final Thoughts on email 59
Messages 60
Message SCAMS: 61
Blended threats 62
Cloud 64
Internet (World Wide Web) 65
Firewalls 68
Wi-Fi 68
VPN (Virtual Private Network) 69
Applications (Apps) 69
Social Media 71
Likes & Comments 73
Smile 73
Financial, Medical and other Sensitive Applications 74
Credit Monitoring 74
"Do you want to play a game?" 74
Data Storage 75
Summary 77
Lies 77
Misuse Si Fraud 77
Risk and Risk Reduction 78
Bullies 79
Checklists & Reminders of what to do. 79
Phone calls: 79
Messages: 80
Application/Game: 80
Acknowledgements 82
Other Books by this Author 83