Goodbye Identity Theft – Online Course

Goodbye Identity Theft. This course will make you tangibly safer from ID Theft today than you were yesterday.

Identity theft is a huge problem, but a bigger problem is how little responsibility the large data brokers and perpetrators of negligent breaches are doing about it. Though you didn't ask to be put at risk, companies profit from credit and data-sharing practices and aren't motivated to put you first.

For the past 13 years, I've written articles, done podcasts, consulted, spoken at conferences, and tried to raise awareness in any way I can. Now, I've put together an online course containing the experiences of more than a decade of ID Theft education. I've watched the rise of the "monitoring services" and insurance scams and "dark web scanning" nonsense and now, I will show you how to apply valid risk-analysis (in an easy-to-understand way) to determine if you are throwing your money away on "security theater".

.

Most importantly, I will give you solid tips, tricks, and strategies for actually protecting your information based operations risk assessment skills cultivated from more than a decade of working for the Department of Defense. That combined with making you aware of your legal right to force credit reporting companies to stop selling your data to anyone they please (creditors and ID Thieves alike) make this one of the best classes you will ever take.

I will give you information that will make you tangibly safer from ID Theft today than you were yesterday. Click here to see pricing.
Tags: , ,

Are You Listening?

Are You Listening? – The Geek Professor
Employees are allies, not the adversary

Inside the US’s most secretive spy agency, dedicated employees protect our national security interests while suffering a level of toxicity that could send nuclear lizards tap-dancing through downtown Tokyo. From multi-million-dollar boondoggle contracts to therapy-inducing tools and processes, employees stood silently by while the agency measured waste in seven+ digits.

"But why? Why – when managers and execs are authentically doing everything they can to be open and approachable – do employees insist on keeping their distance? Why do they stay silent on critical issues until it's too late? And how do they then justify scoring leaders down for 'communication' on the company survey year after year?!"

The answer is simple: if you had succeeded in building a culture of collaboration… one where employees feel invited and safe to openly raise objections and issues, then they would.

In Are You LIstening? I explain how easily despair and dysfunction are overlooked when leaders – no matter how personable, charismatic, and well-intentioned – assume they've made every reasonable concession to an endlessly demanding workforce when, in reality, their efforts create an "us vs them" gap so wide, it could draw paying tourists (and waste enough dollars to fill it back up again).

Using stories and examples cultivated from 16 years with the National Security Agency, I will demonstrate the difference between what is and isn't listening. I will share the significant consequences of treating your workforce as an adversary instead of an ally.

Part of our dysfunctional culture is that dissent too often is regarded as form of disloyalty, of not being a team player. Yet to say nothing is tacit consent. Those who desire deep and durable change in our “corporate” culture need to gain the mature understanding that sometimes one’s most harsh critic is one’s most sincere friend.
–E. Writer

Sign up for mail updates for the publishing of Are You Listening, Lessons in Waste, Abuse, and Mismanagement from the Agency that Doesn't Listen and get a complimentary copy of my promotional mini-book, Reflections on an NSA Career!

Tags: , , , ,

Agifta – Family Gift Registry

Agifta Family Gift Registry

Have you ever wanted to give a thoughtful gift, but couldn't think of a good one? Ever told someone in your family how much you love something only for them to surprise you with… the wrong one? What if you snagged the perfect gift ever for your spouse, but so did your Grandma? Ever had someone ask you what you wanted, but you couldn't think of anything? With a gift registry:

  • It's easy to add things you like on a list through the year as you think about it. Then, when someone asks what you want, just show them the list. They can pick from there or use it for ideas.
  • Friends and family can "claim" things on your list so others don't buy the same thing — all keeping it secret from you so the surprise isn't spoiled.

My family has used this site for 12 years in various forms and it's been a huge help. If you're not already using a gift registry in your family, now's a good time to try!

Tags: , , , , , ,

Loading...

If you want to learn more about my professional background, click here to learn more.

Check out one of my guides/tutorials:

web posting dangers Tutorial
|INDEX|next: Spyware Scanners
Chat, Instant Messaging, Forums, and Internet Blogs are fun, but make sure you post carefully.
Sometimes spyware gets in your computer and the anti-virus won't stop it. Use a spyware scanner to find and remove spyware and adware.
Use a software firewall to detect bad code on your computer when it tries to connect to the Internet.
Always keep your system up to date with security patches or none of the rest of your security software will matter.
Use an encryption tool to protect your important data when storing or transmitting it.
Switch to Firefox for your web browsing and you'll be better protected from Internet threats.

... or check out any of my other guides and tutorials by clicking here!

Spyware Scanners

Learn how to detect and remove spyware and adware using a free scanning tool.

[Click for full description]

Software Firewall

Learn what a firewall is and why you want one on your computer.

[Click for full description]

Operating System Updates

Make sure to keep your operating system up-to-date with security patches or else none of the rest of your security software will be able to protect you.

[Click for full description]

File Encryption

Learn how to protect your important files on your computer or when transmitting them with free tools for file encryption.

[Click for full description]

Mozilla Firefox - Internet Browser

There are many browser choices out there. Read why I think Firefox is one of the best.

[Click for full description]