Discover millions of ebooks, audiobooks, and so much more with a free trial

Only $11.99/month after trial. Cancel anytime.

Protecting Yourself Online: A Quick Guide on Safely Navigating the Internet for Non-Techie Users
Protecting Yourself Online: A Quick Guide on Safely Navigating the Internet for Non-Techie Users
Protecting Yourself Online: A Quick Guide on Safely Navigating the Internet for Non-Techie Users
Ebook101 pages44 minutes

Protecting Yourself Online: A Quick Guide on Safely Navigating the Internet for Non-Techie Users

Rating: 0 out of 5 stars

()

Read preview

About this ebook

A short guide for less tech-savvy users and older users on how to protect your information and identity online. Written in easy-to-understand language, this book covers topics including: social engineering, storing and using strong passwords, multi-factor authentication, web browser security, and securely using social media.

LanguageEnglish
Release dateMay 18, 2020
ISBN9780463448748
Protecting Yourself Online: A Quick Guide on Safely Navigating the Internet for Non-Techie Users
Author

Andrew J. Carey

Software developer/architect with over 20 years industry experience. In my spare time I write, watch soccer, and do dad and husband stuff in California.

Related to Protecting Yourself Online

Related ebooks

Internet & Web For You

View More

Related articles

Reviews for Protecting Yourself Online

Rating: 0 out of 5 stars
0 ratings

0 ratings0 reviews

What did you think?

Tap to rate

Review must be at least 10 words

    Book preview

    Protecting Yourself Online - Andrew J. Carey

    Copyright © 2020 by Andrew J. Carey.

    All rights reserved.

    Book version 1.7.2

    May 2020

    No part of this book may be reproduced in any form or by any electronic or mechanical means, including information storage and retrieval systems, without permission in writing from the author. The only exception is by a reviewer, who may quote short excerpts in a published review.

    Self-published by the author. Author can be contacted via Twitter at: @ACarey999

    ISBN: 9780463448748

    ASIN: B07PSGD5H1

    The information presented herein represents the views and opinions of the author as of the date of publication. This book is presented for informational purposes only. Due to the rate and nature of the subject matter covered in this book, the author reserves the right to alter and update his opinions and its contents based on new conditions. While every attempt has been made to verify the information in this book, neither the author nor his affiliates/partners nor the publishers nor distributors assume any responsibility for errors, inaccuracies, or omissions.

    Screenshots courtesy of Google LLC, Microsoft Corporation, and the Mozilla Corporation.

    Cover image courtesy of Lisa Fotios, via Pexels.com.

    About the Author

    Andrew J. Carey is a software developer and a software architect. He has over 20 years experience in the software development industry, including experience and training in secure programming and information security topics. He lives in California with his family.

    Table of Contents

    Introduction

    Social Engineering

    Phishing

    Phone Calls

    Letters and Faxes

    Reacting to Social Engineering

    Post-Hack Advice

    Combating Persistent Hack Attempts

    Section Review

    Multi-Factor Authentication

    What is Multi-Factor Authentication

    Multi-Factor Authentication Examples

    Section Review

    Passwords

    Password Best Practices

    Lost Password Retrieval

    Section Review

    Anti-Malware and Firewalls

    Anti-Virus versus Anti-Malware

    Choosing Anti-Malware Software

    Firewalls

    Section Review

    Personal Computer Maintenance

    How a Computer Works

    Operating System Patches

    Evergreen Software

    Updating Older Operating Systems

    Section Review

    Routers and Modems

    Router Overview

    Modem Overview

    Home Network Setup

    Upgrading your Router or Modem

    Finding a New Router or Modem

    Router Security Tips

    Section Review

    Web Browser Security

    Keeping your Web Browser up-to-date

    Browser Sessions

    Web Browser Add-ons and Extensions

    Web Protocols

    Digital Certificates

    Extended Validation Certificates

    Auto-fill Features

    Section Review

    Social Media

    Loss of Control over Data

    Privacy Settings

    Shared Credentials and Privacy Concerns

    Social Media Recommendations

    Section Review

    Miscellaneous Security Tips

    Multiple Email Accounts

    Online Banking Systems

    Simplifying your Finances

    The Internet of Things

    Section Review

    Other Terminology

    Authentication

    Bandwidth

    Bloatware

    Broadband

    Cookie

    CAPTCHA

    The Cloud

    Crypto-currency

    The Dark Net

    The Deep Web

    Encryption

    Hashing

    ISP

    Open Source

    Responsiveness

    Streaming

    Usability

    VPN

    Introduction

    In today’s day and age, online fraud and information theft has become an unfortunately common occurrence. This is largely due to the convenience and ubiquitous nature of the Internet, which makes communications and self-service extremely easy.

    Becoming the victim of data theft and asset losses can be very traumatic. However, its worth remembering that it is not a sign of gullibility or stupidity. Even the most savvy and smart consumer can fall victim to the despicable acts of online attackers. In fact, almost everyone has fallen foul of online scammers in one way or another. Additionally, while the Internet can seem scary and dangerous, there are many good and easy ways to protect yourself and your information.

    The goal of this short book is to provide guidance to you, the reader. Online consumer protection is a constantly shifting field, and some information within this book will fall out of relevance over time. But the overall goal is to relay practical time-tested steps that will

    Enjoying the preview?
    Page 1 of 1