The wall of AWESOME!
FBI Letter of Appreciation

Excellent presentation! Lively and informative. Would love to have him come to the site to give his presentation.

Attendee
National OPSEC Conference

One of Two NSA Director Coins I was awarded for proactive NSA leader egagement
Jeremy speaks with students at the University of Advancing Technology, Tempe AZ
Jeremy speaks with students at the University of Advancing Technology, Tempe AZ
[Corkboard source]

Protecting Your Identity – On and Offline

At it's root, ID theft is an information risk management problem where, due to a flaw in someone's information practices, a thief gets your data and uses it for their own benefit. Without the knowledge of how this happens and what tools you can use to block it, you're left defenseless against the thief who steals your ID or the ones who run companies that pretend to offer you "protection" that don't actually.

It would be my great honor if you allowed me to speak to your audience and teach them how to cut through the rhetoric and really protect themselves without having to pay anyone monthly "protection" fees.

Learn More First

All the same informaion you'll learn in my talk is also available here on my website. Feel free to look around and learn about protecting your ID. Then, if you believe the information I have to offer will be of benefit to other people you know. please share this site or have me come to you and show your organization directly:

Talk Outline

Subject to change without notification of course.
  1. Online Identity
  2. Protecting your online accounts – passwords, using shared computers safely.
  3. Phone and laptop safety – Locks, App safety, encryption
  4. Computer Safety
  5. Doxxing – How to find and protect your information like the attackers do.
  6. Offline Identity
  7. About non-credit identity theft
  8. Protecting against non-credit identity theft
  9. About credit based identity theft
  10. Protecting against credit identity theft
  11. A special note on credit card fraud and RFID and identity theft

Ready to go?

If you'd like to discuss the seminar for use with company security days, private events, conferences, etc., please click here. Please feel free to use any of the below resources in connection with a scheduled talk.

Supporting Materials

"This highly-informative presentation was filled with practical, relevant information, and Jeremy was energetic and very entertaining.... he should give lessons on how to get lots of points across to a broad audiences in a timely manner! outstanding session - one of the week's best!"
Attendee
National OPSEC Conference

Loading...

If you want to learn more about my professional background, click here to learn more.

Check out one of my guides/tutorials:

email Tutorial
|INDEX|next: E-mail Viruses

E-mail Dangers

Until we find out who the people are who actually buy things from spammers and kick them off the Internet, you're going to have to learn how to deal with and prevent spam.
E-mail Viruses - Learn how viruses are spread through e-mail and how to stop them
Phishing - Spot and avoid lures that pull you into the dark side of the web
Don't be one of those people that loses thousands of dollars to the classic Nigerian Scam.

E-mail Etiquette

Use CC only when necessary and BCC the rest of the time.
Use Reply-All when you mean to and never when you don't.
Practice proper E-mail Forwarding to protect privacy and make e-mails more readable.
Always personalize your e-mails to make it obvious to your recipient that it's valid.

E-mail Tips and Tricks

Using E-Mail Aliases Properly - Be careful about using sensitive data (like your real name) in an e-mail account.
Remember to treat your e-mail account with the security it deserves.
Use a decoy e-mail account to keep your main e-mail account free of spam.
Avoid using any Internet provider's default e-mail.

... or check out any of my other guides and tutorials by clicking here!

Out and About Defense

The best defense against non-credit ID Theft and a variety of other risks is to adopt a mindset of protection: Data Defense. Learn how to protect your information with simple and sometimes free countermeasures all based on a simple philosophy that the less people who have your information, the safer you are.

[Click for full description]

Credit Freeze

Setting a credit report freeze is the fastest and most effective way to actually block and reduce your risk of ID Theft. And it's free.

[Click for full description]

Federal Credit Card Liability Limit

Because of a federal law protecting you from unauthorized charges, you're better off in most cases using credit cards rather than debit cards for purchases (especially online purchases).

[Click for full description]

RFID - Radio Frequency IDentification

One of the most risky technology when it comes to your privacy is Radio Frequency Identification Tags (RFID). These radio chips broadcast your identity sometimes hundreds of feet and can be found in passports, farecards, credit cards, and even some clothing.

[Click for full description]

Out and About Defense

The best defense against non-credit ID Theft and a variety of other risks is to adopt a mindset of protection: Data Defense. Learn how to protect your information with simple and sometimes free countermeasures all based on a simple philosophy that the less people who have your information, the safer you are.

[Click for full description]

Credit Freeze

Setting a credit report freeze is the fastest and most effective way to actually block and reduce your risk of ID Theft. And it's free.

[Click for full description]

Federal Credit Card Liability Limit

Because of a federal law protecting you from unauthorized charges, you're better off in most cases using credit cards rather than debit cards for purchases (especially online purchases).

[Click for full description]

RFID - Radio Frequency IDentification

One of the most risky technology when it comes to your privacy is Radio Frequency Identification Tags (RFID). These radio chips broadcast your identity sometimes hundreds of feet and can be found in passports, farecards, credit cards, and even some clothing.

[Click for full description]

Preventing Spam

Spam is annoying and worthless, but you still see it every single day. Here are some tips for preventing and reducing spam.

[Click for full description]

E-mail Viruses

Make sure that viruses don't sneak onto your computer through your e-mails. Read some simple tips to prevent that from happening.

[Click for full description]

Phishing

By far the most dangerous thing you'll find in e-mails is a lie. Sending a bogus e-mail to someone is generally called phishing, but can also be referred to as a Nigerian scam (depending on the goal of the e-mail). Learn to recognize and deal with phishing before it's too late.

[Click for full description]

Nigerian Scam

Many people have lost thousands and even hundreds of thousands of dollars to the classic Nigerian Scam. Don't fall for it!

[Click for full description]

How to Use "CC" Properly

Don't violate people's privacy and invite spam into their accounts by CC'ing all your contacts. Learn the proper way to send mass e-mails first.

[Click for full description]

Reply-All

It's easy to embarass yourself or harm your career when you don't know how to use Reply-All appropriately.

[Click for full description]

How to Forward E-mails Properly

Don't forward e-mails carelessly or you risk looking foolish as best and violating the privacy of all your contacts at worst.

[Click for full description]

Personalize E-mail

Follow this simple rule of e-mail etiquette to help prevent your friends and family from falling for phishing scams.

[Click for full description]

Using E-Mail Aliases Properly

It can be hard to find a good name to use in an e-mail account that hasn't been used and doesn't give away too much information about you.

[Click for full description]

Protecting E-mail Passwords

Your e-mail account is the most important online account you have. Remember to treat it as such!.

[Click for full description]

Using a Decoy E-Mail Account

Why it's very important to use a buffer e-mail account to shield your main account from people and companies that you don't trust.

[Click for full description]

The ISP E-mail Trap

Don't fall for the trap of using the free e-mail account provided to you by your Internet service!

[Click for full description]