Quotes from the Book
You are welcome to use quotes below (all taken from the book) or other quotes from the book as long as you don't change the meaning of the quote by editing out of context. If you'd like to use a quote for publication, we ask that you notify us. We can help promote your article/story by sharing it on the social media outlets of Advanced Publishing Concepts and Advanced Development Concepts.
“One of the most valuable and unique aspects lies in the sections regarding passwords. Passwords are the primary line of defense for most of your private digital life and the digital assets of your business. You will first learn what hackers value and how they obtain your password, since knowing is the key to defending yourself. Then you will discover a very unique and cool technique to create passwords that meet all of these criteria:
1. Impossible to guess
2. Complex enough to be almost mathematically impossible for hacking programs to decrypt
3. Easy to remember
4. Unique for every single online account
5. And yes, they can even be safely written down!”
p.21, Locking the Cookie Jar.
“The FBI Financial Crimes Report to the Public estimates that financial crimes account for approximately 30%-50% of all business failures.” p.21, Locking the Cookie Jar.
“Employees will be a lot more honest about reporting discrepancies, and less likely to pocket the extra or cover the shortage, when they know you might occasionally test them.“ p.25.
“With over 20 years of experience in Loss Prevention, I believe that the risk of internal theft is highest when employees perceive a lack of awareness with management. The prevention of internal theft can be directly linked to regular audits, surprise audits, and the sharing of details around the audit results. Opportunity + Desire = Theft. If you take the opportunity away, and employees understand the consequences associated with dishonest acts, the risk of internal theft is minimized.” - Christie Harrison, Loss Prevention Professional and Certified Forensic Interviewer (C.F.I.) p.39.
"If you are able to split the duties between different people, it always a good idea to separate the responsibility of recording transactions in the system with the responsibilities of actually making payments, signing checks, making bank deposits, etc. This makes it much more difficult for one person to, for example, write a check to themselves but record that it was paid to a vendor." p.42
"A fisherman fishes for his prey by dangling a piece of safe-looking food in front of an unsuspecting victim. Phishing is a technique that essentially convinces a victim that he is logging into a safe location, yet is really logging into a fake webpage that collects his login information." p.47
"Once a hacker can access your email, your private world is at the mercy of a stranger who doesn’t care about you." p.55
"Most adults write their passwords on a piece of paper. Over half of all adults “hide” this valuable piece of paper within three feet of their keyboard, both at home and at their office. The hilarious thing is that most of these hiding places are directly underneath your keyboard! Golly, and you thought no one knew?" p.64
"When a hacker targets a specific victim, they can often find success by doing a little background research on the victim. Motivated hackers will take the time to research their victim." p.67
"The longer you make your password and the more exotic types of characters you use in the password, the less likely you’ll be to have to publicly apologize for “sharing” obscene videos on Facebook." p.72
"Studies vary but it appears that 50%-75% of people use the same password for most of their login accounts. If you are one of these people, you should be worried. Why? Because all a hacker has to do is figure out your password for one account and they can access all of your accounts." p.73
"Protecting yourself from identity theft is not the responsibility of the police or the government or your bank. It’s your responsibility." p.99
"The primary target for serious identity theft is your Social Security number." p.101
"Identity thieves can use your name and SSN to file your tax return and receive your federal and state refunds. If they file before you do, there is a chance they might be successful, ... If they file a successful return and get the refund, your return will be rejected since the IRS will think you already received your return. ... You can help protect yourself by filing early in hopes of beating them in the mail." p.102
[RE: Identity Theft & Your Healthcare Benefits...and a little bit of humor] "Victims find it especially frustrating when trying to sort out the medical history down the road. You swear you’ve only had only two children but your plan shows that you’re covering five children on this plan. Your work requires a clear medical history but your doctor won’t sign off because of your surprising case of emphysema and COPD that you didn’t know you had. And then your spouse got angry when she noticed that your medication history contains Herpes and AIDS-related medications, although you never had either." p.105
[RE: Identity Theft and Vehicle Insurance] "There have been cases of identity thieves adding additional vehicles to the victim’s car insurance plans, and sending the insurance card for the additional vehicles to a different address. Sometimes the thief pays the discounted group rate on a separate bill, thus hiding the trail from the victim. Sometimes the thief adds the additional vehicle to the existing policy and while the insurance card gets mailed to a different address, the victim pays the bill each month.
It’s amazing that many victims don’t bother to question the sudden increase in rate charges. If you ever suspect that you might be a victim, contact your insurance company and ask for a list of all policies connected to your name." p.106
"Your good credit is often used by thieves to obtain credit cards, buy homes, by vehicles, obtain student loans, personal loans, and even refinance houses. Pretty much any type of loan you can get, a thief with big nads can get. In fact, the thief will probably go after things you might not. After all, it’s not his own identity he’s hurting and he’s not risking his own credit score." p.107
"Thoroughly destroy unnecessary records. A great time for a thief to harvest your information is on garbage pickup night in your neighborhood or via a business dumpster. Even when you leave your office, what are you leaving behind that can be easily stolen or photographed? ... Before tossing it, destroy credit card statements, bank statements, solicitations, and any other documents that contain private information. That means to tear it up carefully, cross shred it, burn it, or even swallow it if you want high-fiber security." p.109
"Thieves love lazy people. If you are not religiously verifying all your credit card charges or balancing your checkbook, you will not notice that someone else is using your card or writing an occasional check through your checking account. When most people notice a charge on their statement that they don’t recognize, they assume it’s legit and ignore it." p.112
"Have you ever held your credit card while waiting to pay at the store, gas station, or other venue? Do you realize that most smartphones have high-definition cameras and video built in? You wouldn’t be the first victim to lose your credit card information because someone in line behind you took a photo or video of you holding the card with the numbers showing in plain sight!" p.131