Why did you decide to writeHack-Proof Your Life Now?

Back in 2013, wed been following the growing concerns about identity theft for quite a few years.

We work with financial planners and its a topic many of their clients are deeply concerned about.

Hack-Proof Your Life Now! The New Cybersecurity Rules- Free Chapter Included!

The companies and institutions weve shared that information with have done a terrible job of protecting it.

The online security advice being offered to the general public seemed fragmented, overwhelming, wrong, or incomprehensible.

The public gets all the scare and not a single solution.

Article image

But then we give them do-able solutions.

What new knowledge did you gain whilst writing the book?

Most people still dont realize the importance of two-step verification for their email and financial accounts.

Article image

Very few people do this even though it is now widely available and easy to accomplish.

Its a great feature because youll be instantly notified if any hacker starts hammering at your accounts.

But as long as you have the second part of the two-step login, youll know youre safe.

Article image

Hardly anyone is putting two-step verification on their email and financial accounts.

To get your copy ofHack-Proof Your Life Now!

Alternatively, you could buy it directly fromAmazon,Barnes & Noble,and all other booksellers.

Article image

Below is the beginning of the first part ofHack-Proof Your Life Now!

Your Email Address Is the Key to Your Digital Life:It Shouldnt Be Everywhere!

He decided to conduct an experiment and recruited his wifes friend as his target.

Article image

Pulling up the schools email login page first, he used the reset password feature to start the break-in.

The system asked Thompson to answer a security question about the womans birthday.

He knew the answer, because she had discussed it on her blog.

Thompson had cracked her alumni email.

From there, Thompson could see a possible path to the womans bank account.

Now he was just one step from the womans bank account, which used her personal email.

Thats all the professor needed.

He cracked the accounts security, changed its password, and had instant access to the money.

Thompsons experiment demonstrated the many pitfalls and weaknesses we face with our cybersecurity.

Our personal identifying information appears in many places on the Internet, and its hard to hide or remove.

Hackers can find it, too.

Being more private, more discreet, indeed more secret is simply a must.

And this secrecy starts with your email.

You must understand the danger before you learn our New Cybersecurity Rules about email and passwords.

And getting hacked involves a wider violation than just the loss of money.

Lets look at what an email breach exposes.

Suddenly, the hacker possesses a trove of your personal information.

From your email account, the cyber thief can see the places you conduct commerce on the web.

The threats even bleed into your medical life.

The wider use of electronic medical records (EMR) only heightens the danger of an email hack.

Your inbox might also serve as a mirror to your professional life.

The same is true about your community life.

Quickly the hacker who invades your email account and resets your password exercises vast control over your digital life.

Shocked barely conveys the violation when you view your loss of privacy through the lens of an email hack.

We dont think twice about sharing our email address with countless businesses, organizations, and people.

But having your email addresses in so manyhackeddatabases puts you at a significant risk.

Using the same email address for each is not a safe practice.

When selecting your password reset option, choose the most secure option available.

Instead, many offer recovery phone numbers or recovery email addresses.

You just dont want your everyday email linked to your secret financial email address.

By keeping them separate, youre maintaining secrecy and increasing the likelihood that hackers never input your bank account.

like, comment on how to improve this article.