Welcome!
If you have an account, please:
Log in
The wall of AWESOME!

This is a signature briefing! Outstanding in presentation and content. Should be expanded to include additional sessions.

Attendee
National OPSEC Conference

Mr. Duffy owned the room, I could have sat there for another hour and not minded. Give him more time next year.

Attendee
National OPSEC Conference

Jeremy speaks with students at the University of Advancing Technology, Tempe AZ
[Corkboard source]

Reclaiming Your Online Identity

Somehow, hopefully not because of a bad experience, you've come to realize just how dangerous and unpleasant it is to have your whole life available online for any creep or enemy to see at all times. The big question is; what do I do about all the data that's already out there? It's often said that once online, it's out there forever, but is that always the case?

Learn from Jeremy how to find your data online like the investigators do and what steps can be taken to remove it once you DO find it.

As always, you have two options: Hire me to teach your/your family/your company or learn right here, right now.

Ready to go?

If you'd like to discuss the seminar for use with company security days, private events, conferences, etc., please click here.

Supporting Materials

Learn More First

Other than my dashing good looks and lightning charisma, you can get a great deal of the same information for free right here on my website. Job number one is making us all safer after all:

Talk Outline

Subject to change without notification of course.
  1. Why privacy is important to your future (in brief)
  2. Find your data
  3. Remove your data
  4. Drown out the bad data that's left
  5. Protect it in the future
"You guys scored when he was hired! I have attended many OPSEC courses within the Air Force and DoD and by-far Jeremy was the best. Yes, understand he is 100% computer geek, but what an awesome dude! I got more from those three days then in any course or training that I have attended."
G.C.
Air Force

Loading...

If you want to learn more about my professional background, click here to learn more.

Check out one of my guides/tutorials:

email Tutorial
|INDEX|next: E-mail Viruses

E-mail Dangers

Until we find out who the people are who actually buy things from spammers and kick them off the Internet, you're going to have to learn how to deal with and prevent spam.
E-mail Viruses - Learn how viruses are spread through e-mail and how to stop them
Phishing - Spot and avoid lures that pull you into the dark side of the web
Don't be one of those people that loses thousands of dollars to the classic Nigerian Scam.

E-mail Etiquette

Use CC only when necessary and BCC the rest of the time.
Use Reply-All when you mean to and never when you don't.
Practice proper E-mail Forwarding to protect privacy and make e-mails more readable.
Always personalize your e-mails to make it obvious to your recipient that it's valid.

E-mail Tips and Tricks

Using E-Mail Aliases Properly - Be careful about using sensitive data (like your real name) in an e-mail account.
Remember to treat your e-mail account with the security it deserves.
Use a decoy e-mail account to keep your main e-mail account free of spam.
Avoid using any Internet provider's default e-mail.

... or check out any of my other guides and tutorials by clicking here!

How To Hunt Someone Like A Dog On the Internet

Learn where your information may be found by learning the techniques pros use to find people.

[Click for full description]

Data Removal

Tips for removing your data from the Internet

[Click for full description]

Reputation Management

Just because there are things out there about you that are out of your control and are unflattering or worse, doesn't mean you're powerless.

[Click for full description]

Preventing Spam

Spam is annoying and worthless, but you still see it every single day. Here are some tips for preventing and reducing spam.

[Click for full description]

E-mail Viruses

Make sure that viruses don't sneak onto your computer through your e-mails. Read some simple tips to prevent that from happening.

[Click for full description]

Phishing

By far the most dangerous thing you'll find in e-mails is a lie. Sending a bogus e-mail to someone is generally called phishing, but can also be referred to as a Nigerian scam (depending on the goal of the e-mail). Learn to recognize and deal with phishing before it's too late.

[Click for full description]

Nigerian Scam

Many people have lost thousands and even hundreds of thousands of dollars to the classic Nigerian Scam. Don't fall for it!

[Click for full description]

How to Use "CC" Properly

Don't violate people's privacy and invite spam into their accounts by CC'ing all your contacts. Learn the proper way to send mass e-mails first.

[Click for full description]

Reply-All

It's easy to embarass yourself or harm your career when you don't know how to use Reply-All appropriately.

[Click for full description]

How to Forward E-mails Properly

Don't forward e-mails carelessly or you risk looking foolish as best and violating the privacy of all your contacts at worst.

[Click for full description]

Personalize E-mail

Follow this simple rule of e-mail etiquette to help prevent your friends and family from falling for phishing scams.

[Click for full description]

Using E-Mail Aliases Properly

It can be hard to find a good name to use in an e-mail account that hasn't been used and doesn't give away too much information about you.

[Click for full description]

Protecting E-mail Passwords

Your e-mail account is the most important online account you have. Remember to treat it as such!.

[Click for full description]

Using a Decoy E-Mail Account

Why it's very important to use a buffer e-mail account to shield your main account from people and companies that you don't trust.

[Click for full description]

The ISP E-mail Trap

Don't fall for the trap of using the free e-mail account provided to you by your Internet service!

[Click for full description]