It may seem that a “digital defense” is really difficult to set up in a world that seems almost overrun by “black hat hackers,” but there are a lot of very simple steps that can be taken to put reasonable levels of protection into place. This chapter is a “how to” guide to undertaking some basic cyber-protection strategies and outlines various strategies to protect yourself and your family against various types of malware, identity theft, and even steps to take with regard to cyber-bullying. These steps can be taken at reasonable cost—indeed, for less than the cost of subscribing to a newspaper. In the digital age we seem to be moving toward a world where we pay less to get information and pay more to screen out information that you do not want.
KeywordsSmart Phone Hate Crime Identity Theft Antivirus Software Backup Protection
- 1.Norton Internet Security www.Symantec-Norton.com/Security.
- 3.2012 Identity Fraud Survey Report. Javelin Strategy & Research. February 2012.Google Scholar
- 4.“Top Ten Identity Theft Protection Sites.” www.top10identitytheftprotection.com.
- 5.Life Lock Individual Plans: Identity Theft Protection, http://www.lifelock.com/services/.
- 6.Daniel Brecht and edited by: Bill Bunter, “Pros and Cons of Computer Security Systems” http://www.brighthub.com/computing/smb-security/articles/32411.aspx also see. Finn Orfano and edited by Bill Bunte, “Firewall Basics Part III: The Pros and Cons of Firewall Methods.” http://www.brighthub.com/computing/smb-security/articles/8293.aspx.
- 7.MetLife Defender. https://www.metlife.com/individual/employee-benefits/metlife-defender/index.html .
- 8.“She Stole My Life,” AARP Magazine, Nov. 2014.Google Scholar
- 9.“2013 Youth Risk Behavior Surveillance Survey, Centers for Disease Control and Prevention,” June 13, 2014.Google Scholar
- 10.Jeff R. Temple, Ph.D., Jonathan A. Paul, Ph.D., Patricia van den Berg, P.hD., Vi Donna Le, B.S.; Amy McElhany, B.A.; Brian W. Temple, M.D. “Teen Sexting and Its Association With Sexual Behaviors,” Journal of the American Medical Association, September 2012, Vol. 166, No. 9 http://archpedi.jamanetwork.com/article.aspx?articleid=1212181.
- 11.Gary M. Kaye, “Sooner or Later Your Hard Drive Will Fail: Computer backup is like digital fire insurance” AARP, June 23, 2011. http://www.aarp.org/technology/privacy-security/info-06-2011/back-up-computer-files.2.html.
- 12.Gretchen Anderson “Identity Theft: Who’s At Risk?” AARP Research, September 2014. http://www.aarp.org/money/scams-fraud/info-2014/identity-theft-incidence-risk-behaviors.html.
- 13.Kim Loop, “Prevention, Not Just Awareness, Key to Cyber Security.” AARP Texas October 11, 2012. http://states.aarp.org/prevention-awareness-cyber-security/.
- 14.Sid Kirchheimer, “Scam Alert: How to Cyberproof Your Phone – 12 ways to protect yourself and your device,” AARP Bulletin, May 2014 http://www.aarp.org/home-family/personal-technology/info-2014/cyberproof-stolen-phone-kirchheimer.html.
- 15.Technology, Tablets, and Social Media. http://states.aarp.org/prevention-awareness-cyber-security/.