What do you think?
Rate this book


288 pages, Paperback
First published November 24, 2015
“More than 500 million photographs are uploaded to major websites every day. More than 2 billion pictures are taken on mobile devices every day” (Kindle Location 85). Elsewhere Levin cautions against using geotagged photos at websites like Facebook because it can give thieves clues to your PII (personally identifiable information). It probably begins with the settings in your camera or iPhoto. I think it makes sense NOT to geotag.
“Debit cards increase your exposure to fraud. Use a credit card” (Kindle Location 578). Levin asserts that “carefully placed cameras” (by thieves?) can record PIN numbers as you enter them in an ATM or device at your favorite store. Not sure what his authority or source is on this assertion, and he’s assuming that thieves could EASILY install their own cameras at ATM stations. Seriously?
He warns against the free release of your social security number: “With your Social Security number in the wind, whoever finds it—or, more likely, whoever buys it on one of the many black-market information exchanges on the deep web—holds the keys to every part of your life. What that means—plain and simple—is that you’re going to need an efficient way to keep one eye over your shoulder, all the time” (Kindle Location 591). The paranoiac tone notwithstanding, Levin’s advice is probably good. Elsewhere in the book, he directs the reader to keep only a COPY of your Medicare card in your wallet with all but the last four numbers blacked out, the “M” or “F,” as well. This way, you can still inform someone who needs the number (medical personnel) but protect yourself from unwarranted use if someone should steal your wallet. He also warns against carrying your Social Security card (or copy) for the very same reasons.
Pick up a phone, respond to a text, click on a link, or carelessly provide personal information to someone we don’t know;
Fail to properly secure computers or devices;
Create easy-to-crack passwords;
Discard, rather than shred, documents that contain PII;
Respond to an email that directs us to call a number we can’t independently confirm, or complete an attachment that asks for our PII in an insecure environment;
Save our user ID or password on a website or in an app as a shortcut for future logins;
Use the same user ID or password throughout our financial, social networking, and email universes;
Take [online] quizzes that subtly ask for information we’ve provided as the answers to security questions on various websites.
Snap pictures with our smartphone or digital camera without disabling the geotagging function;
Use our email address as a user name/ID, if we have the option to change it;
Use PINS like 1234 or a birthday;
Go twenty-four hours without reviewing our bank and credit card accounts to make absolutely sure that every transaction we see is familiar;
Fail to enroll in free transactional monitoring programs offered by banks, credit unions, and credit card providers that notify us every time there is any activity in our accounts;
Use a free Wi-Fi network [i.e. cafés or even airports] without confirming it is correctly identified and secure, to check email or access financial services websites that contain our sensitive data” (Kindle Location 668-678).
“The deep web is a hidden part of the Internet. It consists of a vast number of sites, most of them thoroughly boring, that can’t be found by a traditional search engine like Google. To access these sites, you need a password, a specific URL, a sophisticated understanding of how computers communicate, or sometimes all of the above. The deep web is four hundred to six hundred times larger than the ‘surface web,’ that is, the familiar sites you can access via search engines and see every day” (Kindle Location 781).