Client Security Guides

We just created one of the most comprehensive collections of security and privacy guides, covering a dozen different security and privacy topics.

 

Candy Store 03Each of these guides can be branded for your firm to share with your clients – and for your clients to share with their business and social networks.

Each of the nearly 30 guides is approximately 5-7 pages and topics include:

 
THE DIFFERENT TYPES OF IDENTITY THEFT
And What You Can Do About Them

WHY SO MUCH IDENTITY THEFT?
Blame It On…Everything

12 MYTHS ABOUT IDENTITY THEFT
And Why It’s So Important To Debunk Them

WHY ARE WE LOSING THE BATTLE AGAINST IDENTITY THEFT?
10 Good Reasons

KNOW YOUR ENEMY
12 Traits Of Highly Successful Identity Thieves

DATE BREACHES AND IDENTITY THEFT
Close Cousins And Dangerous Liaisons

THE FAKE, FAKE YOU
The Growing Menace of Synthetic Identity Theft

INVASION OF THE BODY SNATCHERS
The Growing Menace Of Medical Identity Theft

THE TAX THIEF COMETH
Protecting Your Identity At Tax Time

THE MOST VULNERABLE IDENTITY
Protecting The Elderly From Identity Theft

KEEPING YOUR KIDS SAFE
From Identity Thieves, Data Stealers, Predators, And Themselves

SMALL IS BEAUTIFUL – TO IDENTITY THIEVES
Protecting Your Business From Identity Theft

AN INSIDE JOB
Protecting Your Identity In The Workplace

HOME SWEET HOME
Protecting Your Home From Identity Theft

GRINCH THIS!
Avoiding Identity Theft During The Holidays

FROM PRINCES TO SKIMMERS
Avoiding Common Scams And Frauds

ON THE ROAD AGAIN
Avoiding Identity Theft When Traveling

YOU CLICK. THEREFORE YOU LOSE
The Menace Of Phishing Attacks

CREDIT MONITORING, FREEZES, AND ALERTS
Similar, Different, Important

HACKERS AND HACKING
A Brief History

THE HACKER’S FAVORITE TOOL
Understanding The Scourge Of Malware

WE’VE GOT YOUR DATA. WE WANT YOUR MONEY
The Growing Threat Of Ransomware

PREVENTING IDENTITY THEFT
15 Simple Choices

HACKERS IN YOUR POCKET
Why The Smallest Devices Are The Biggest Target

PSST! WHAT’S YOUR P@$$WORD?
The Good, Bad, And Ugly Of The Still Essential Password

GUARDING THE CANDY STORE
Hackers and The Wealthy

DO WHAT WE $@Y!
The Growing Threat Of Cyber Extortion

50 FREE SECURITY TOOLS
Keeping Your World Safe, Secure, And Secret