A Defensive Computing Checklist    by Michael Horowitz
NOTE: I gave a presentation on Defensive Computing at the HOPE conference in July 2022
HOME | Full Site Index | Domain Names | VPNs | iOS | Android | About | Rules of the Road | DC Presentation |

IDENTITY THEFT

Considering the many data breaches of personal information, along with the legal sharing of it, ID theft is all too likely.

AFTER

FYI: My identity theft nightmare could be your nightmare too by Jessica Roy (October 2022). Her story started with a stolen wallet. The bad guys could not get into her Gmail account because of two-factor authentication. So, they made a new Gmail account with her name. Her driver’s license had been reported stolen, yet Bank of America and Wells Fargo both issued checkbooks to accounts opened using it. The reporter/victim suggests reviewing your credit reports at least once a year.

 This page: 5 views per day (over 44 days)   Total views: 221   Created: October 26, 2022
This Page
Last Updated

October 26, 2022
Total Site
Page Views

 481,054
Site Page
Views Today

  435
Previous
Website View

1.0 minutes ago
Website by
Michael Horowitz
@defensivecomput
top
Copyright 2019 - 2022