Publication Date:June 2, 2012
We (the authors) created this book after years of providing counsel to clients that have, unfortunately, been the victims of identity theft. We’ve given counsel and advice on virtually every kind of problem. From the very basic to the extremely complex, the experiences have taught us several things.
First, a basic template to repair the damage can be used for nearly every client.
Second, each client has something unique that cannot be anticipated.
Finally, the mental toll that this takes on people is nearly always underestimated. It takes a lot of time, energy, and persistence to deal with all the agencies, credit bureaus and other private parties.
We created this book and the related materials for you. We know that it’s not always possible to hire someone else to take care of all these problems for you. Our bills can be substantial and we felt like our knowledge and experience would be better served by becoming transformed into something a bit more mainstream.
We’ve developed these materials over time. Some of it is basic information, some of it was used to draft our book and pamphlets and some of it is a compilation of great information that others have drafted. We have used our legal backgrounds to help shape this program (full disclosure: we’re lawyers, but this book is not legal advice).
Please take these materials and use them according to your needs. Don’t be shy to add or modify something if your situation is a little different. Our book/information cannot be all things to all people, but we believe that it will help you with most all situations. Best of luck with everything.
It is better to stop identity theft from happening in the first place than have to fix or repair the situation afterwards. Steve Weisman reveals the threats of new identity theft attacks based on use of Facebook, iPad, iPhone, Android, cloud apps, iPod, and other new technologies — and shows you how to protect yourself, or how to fix the damage if you’ve already been attacked! Discover why ID theft is more dangerous than ever, and discover today’s most dangerous new threats — including attacks targeting medical records, personal finance and online banking sites, the elderly, and military service members. Meet the hackers and organized crime groups who want to steal your identity and money — and learn how to protect your data and your life! Step by step, Weisman shows how to avoid risks, minimize risks you can’t completely avoid, and immediately take the right steps if you’re ever victimized. He objectively reviews new products and services that promise to fight identity theft, and previews emerging dangers, such as RFID credit cards. If you use a computer, the Internet, a smartphone, cell phone, tablet, or any other communications device, 50 Ways to Protect Your Identity in a Digital Age isn’t just an indispensable wake-up call: it’s the world’s best resource for protecting yourself!