Locking the Cookie Jar™
How to Protect Against Embezzlement, Identity Theft, and Hackers
Seminar
Eighty-one percent (81%) of hacking-related breaches leveraged stolen and/or weak passwords. Your employees will likely be the cause of your company's downfall.
The Locking the Cookie Jar Seminar can be customized for businesses, neighborhood groups, networking groups, professional seminars, families, classrooms, and individuals.
While anti-embezzlement aspects can be included for department leadership and security professionals, most organizations and groups benefit by teaching your computer users how to avoid being the victim of a hacker. When they become a victim, your organization can be a victim.
This fun and easy-to-follow seminar can help bring all employees to a common understanding that they are often the weak link in company security. The lessons taught can save companies significant dollars (see the animated figures below). The Return on Investment (ROI) this training seminar offers is high and will easily pay for itself many times over.
The cost of being victimized by a hacker is significant and the risk is increasing. InfoWorld stated: The scale of attacks against financial institutions indicate criminals are moving away from low-value consumer-related attacks such as identity and credit card theft in favor of high-value attacks. “The old ‘smash and grab’ jobs are becoming carefully orchestrated and executed jobs,” said Mike Davis, CTO of CounterTack.
For example, Gawker's database of emails and passwords was not only hacked by a group called Gnosis, but they deciphered over 250,000 of the passwords and posted them online!
This resulted in MILLIONS of accounts on other systems being hacked because people tend to use the same password for multiple accounts. The identify theft damage and financial theft could not be calculated.
Here's a visual list of hundreds of data breaches. Each one puts YOUR company at risk.
What you will learn:
- The potential damage that can be done with a stolen password
- Why your email account is the “Holy Grail” to a hacker
- How hackers obtain your password
- The difference between a weak password and a strong password
- The 5 things a hacker knows
- How to create “hacker-proof” passwords!
You will be able to create hacker-proof passwords with the following features:
- Impossible to guess, even by your closest friends and relatives
- Complex enough to be mathematically impossible for hacking programs
- Easy to remember
- Unique for every single online account
- And yes… they can even be safely written down!
Sounds impossible? Nope! "Mr. Alvord describes the ultimate formula to develop AND remember multiple passwords. Great sidebars and tips throughout for continued reference and oh yes, a bit of humor sprinkled throughout as well! Makes this book easy reading!" - Jodi Riolo (Amazon 5-star review)
Pricing
There are number of factors that affect the price of the training seminar. These include:
- The location of the facility in which the seminar will take place (e.g., travel expenses)
- The number of attendees
- If you'd like us to provide a free book to all attendees (retailed at $20 but we can give significant discounts depending on the arrangement)
- Who is providing the presentation equipment (projector and screen). We'll bring a PC and PowerPoint.
- Whether or not you want handouts and who is printing them.
- The length of the training seminar.
- 30 Minutes:
- The hacker-proof password technique can be crammed into a 30-minute segment without time for questions.
-OR- - A very quick overview of the various ways embezzlement can happen in the workplace and how to stop it. This is designed for management, not workers.
- The hacker-proof password technique can be crammed into a 30-minute segment without time for questions.
- 60 Minutes:
- An easier-paced, hacker-proof password seminar that better-explains what the hackers are going after and how they are doing it. This allows for much better employee conviction of why this is critical.
-OR- - An interesting and thorough overview of the various ways embezzlement takes place in the work place and how to effectively stop it. This is designed for management, not workers.
- An easier-paced, hacker-proof password seminar that better-explains what the hackers are going after and how they are doing it. This allows for much better employee conviction of why this is critical.
- 90 Minutes:
- An ideal length of time for ALL aspects of the hacker-proof seminar that allows for better interaction with the speaker and allows for additional real-life examples.
-OR- - An ideal length of time for ALL aspects of embezzlement. This allows for better interaction with the speaker and allows for additional real-life examples.
-OR- - A combined Embezzlement and Hacker-proof seminar that covers both topics in a compressed timeframe with limited interaction with the speaker.
- An ideal length of time for ALL aspects of the hacker-proof seminar that allows for better interaction with the speaker and allows for additional real-life examples.
- 2 Hours and beyond: This allows for extensive group interaction, small breakout sessions to work on scenarios, time to deal with a company's custom situation, etc.
- 30 Minutes:
Suggested Sample Pricing:
For a local seminar to a membership organization, we can charge $30 to members and $50 to non-members, and include a free book to all attendees.
To train a local company department, we might charge $20 per attendee with a minimum price. We can negotiate our rates depending on several factors.
For a large, regional trade show, we might provide a breakout session for $1,500 or a keynote presentation teaching the very cool Hacker-proof Password technique for a higher price. But again, there are a lot of factors involved.
More Questions?
Interested in having a Locking the Cookie Jar Seminar, Lecture, or Presentation for your corporation, business team, association, or club? Contact Us!
Testimonials
"He presented excellent information on password security. I took away some great new tips. I will use the information provided in this module for both my business and personal life."
“Nice password protection trick!”
“I am in the process now of recreating a very strong password system. Thanks to the Seminar's very creative way to make this more secure. Great insight also by you to bring these innovative and creative people in to show us how to do this.”
“This was very useful!! I will be changing all my passwords tonight!!”
“THIS WAS EXCELLENT. I have trouble remembering the passwords for all the accounts... I usually end up resetting my passwords to something easy, of course. I learned how easy those are to crack. So this information REALLY helped me. Thank you!”
"Thank you for taking the time out of your busy schedule to be a presenter at the Spring Police Business Academy. The information you presented is a valuable addition to the academy and is very useful to those in our business."
If it can happen to THEM, it can happen to YOU!
LivingSocial got hacked and over 50 million user accounts, emails, names, addresses, dates of birth, and passwords were stolen.
What would your customers think if their information was stolen from your computer system?
Federal Reserve internal website was hacked and the personal data of over 4,000 bank executives (names, addresses, phones, email addresses, and fax numbers) were stolen AND PUBLISHED online. Ouch.
What would your customers think of you if a hacker published their private data stolen from your computer systems?
JP Morgan Chase, the world's largest bank, had 76,000,000 accounts copied after hackers got access to their highest level of computer administration access.
How secure are the employee passwords of your computer system? Most are using easy-to-guess passwords and most use the same password for multiple systems...so if their account gets hacked somewhere else, a bad guy can easily get into your system using that same password.
Gawker's database of emails and passwords was not only hacked by a group called Gnosis, but they deciphered over 250,000 of the passwords and posted them online!
This resulted in MILLIONS of accounts on other systems being hacked because people tend to use the same password for multiple accounts. The identify theft damage and financial theft could not be calculated.
This means your company is only as secure as the weakest link in your employee team.
Get the Book!
Locking the Cookie Jar is now available in printed book format and eBook format. It's easy to get your copy right now!
The Seminar
The Locking the Cookie Jar Seminar is both interesting and highly informative. It's designed for businesses to educate teams to avoid being the weak link for hackers to access sensitive company information or damage valuable data. The seminar can be customized for teams to focus more or less on embezzlement, identity theft, how hackers do their dirty deeds, how to protect against hackers, and how to create hacker-proof passwords that can be unique for each account and can be safely written down!
Resources & Blog
The book references online resources in multiple places throughout the book. You can access all of those resources here.
Incredible Numbers
Percent of Companies are Fraud Victims
According to the latest Annual Global Fraud Survey commissioned by Kroll Inc., 81 percent of firms were victims of frauds perpetrated by insiders. The costs are too high for firms of any size to ignore the threat and not invest in more means of defending the business from the inside.
Passwords are the Weak Link!
According to IT World Canada, "Just over 60% of breaches involved hacking, but that's not the big news:
81% per cent of hacking-related breaches leveraged stolen and/or weak passwords."
Average Loss per Company
According to the ACFE, the median loss caused by fraud was $145,000, with 22% of those cases reporting losses of at least $1 million. Identity theft and cybercrime—especially credit card abuse—were among some of the most common sources of fraud in small businesses. Unfortunately, however, it’s smaller companies with fewer than 100 employees that lose a median of $155,000 compared to $120,000 for larger businesses.
About the Book
Learn how to protect yourself and your business against embezzlement, identity theft, and online hackers. Learn how the bad guys do it and how to avoid being a victim. Also learn a valuable hacker-proof password technique that is unique for each account and can even be safely written down! Includes sections on Embezzlement Schemes, Hacking the Hacker’s Mind, How Hackers Obtain Your Passwords, How to Create a Hacker-proof Password, and Identity Theft. Also includes other security techniques such as hardware deterrents, PINs, transposing digits, and explains how to report possible cybercrime and internet crime. It frankly lays out how cyber criminals do it and how your employees can embezzle from your company, so make sure you know what they know so you can stop it! It has great examples and humor as it turns complex subjects into something that is easy and fun to read.
Current or Future Business Owner?
Get a free How to Fund Your Business book by the same author!