If you’re a member of the press\/media and want to bring the author onto your show or gather some background information on him or the book, this is a good place to start.<\/p>\n
Below you can read the Table of Contents, review the targeted audience, obtain some good quotes from the book, etc.<\/p>\n
Click on the “+” to open up the details.\u00a0<\/p>\n
\t\t\tBasic Information<\/p>\n
Official Book Title: Locking the Cookie Jar (How to Protect Against Embezzlement, Identity Theft, and Hackers)<\/strong><\/p>\n ISBN-13:<\/p>\n Author: R. Scott Alvord<\/strong><\/a>\u00a0(Click for information about the author<\/a>)<\/p>\n Publisher: Advanced Publishing Concepts<\/a> (a division of Advanced Development Concepts, LLC)<\/p>\n Places you can purchase this book<\/a><\/strong>.<\/p>\n First published in 2017<\/p>\n Copyright (C) 2014-2017 (The Embezzlement Chapter was originally written in 2014 as part of the author’s book, Fire Your Job, Hire Yourself<\/em><\/a> which was not yet completed at the time of this publication.)<\/p>\n \t\t\tWho Should Read This Book? (Audience)<\/p>\n This book is designed for a variety of audiences:<\/p>\n \t\t\tTestimonials About the Book<\/p>\n \u201cScott Alvord has provided business owners with an excellent handbook on how to avoid being a victim<\/strong> to embezzlers, identity thieves, and hackers. His easy-to-use hacker-proof password technique is worth the price of this book many times over<\/strong>. I enjoyed his humor<\/strong> throughout the book.<\/em>\u201d –\u00a0Wendy Gerig, CEO, Roseville Area Chamber of Commerce<\/p>\n “The author has a very comfortable and engaging writing style<\/strong>. Contains very useful information and many tips<\/strong> on how to protect your various electronic accounts from information and identity theft. Great tips on how to create a bullet proof password and PIN<\/strong>. Also has many useful tips to guard against embezzlement<\/strong> of business and personal assets. I highly recommend this book.<\/em>” – R. Schmitt (Amazon 5-Star Review)<\/p>\n “Mr. Alvord describes the ultimate formula to develop AND remember multiple passwords<\/strong>. Great sidebars and tips throughout<\/strong> for continued reference and oh yes, a bit of humor sprinkled throughout<\/strong> as well! Makes this book easy reading!<\/em>” – Jodi Riolo (Amazon 5-Star Review)<\/p>\n “Locking the Cookie Jar is a must read for every small business owner, manager and supervisor<\/strong>. As a Risk Management and Identity Theft Solutions professional, I found a wealth of insights and information in this very interesting read<\/strong>. The author is comprehensive, systematic, practical, and solutions oriented while providing an easy read. The Tips and Techniques provided will help many individuals sleep better<\/strong> knowing they have taken important steps to minimize risks, mitigate potential liability and protect one of their greatest assets. I highly recommend<\/strong> ‘Locking the Cookie Jar’<\/em>” – Denny Sappington (Amazon 5-star Review)<\/p>\n “My original intent of purchasing this book was a special technique that is in this book on how to create a personalized, hacker proof password<\/strong>. However, as I began to read the book, I began to learn a few tips to be aware of in terms of embezzlement. Also, the language in this book is very understandable<\/strong>. I definitely recommend this book to future entrepreneurs and business owners.<\/em>” – Alvaro Gamez (Amazon 5-star Review)<\/p>\n “I finished reading this over the weekend. Learning how to protect yourself against being taken advantage of<\/strong> is not necessarily something anyone thinks about until AFTER it happens. Identity theft, embezzlement, ransomware, etc. – it hasn’t happened to me, but it HAS happened to clients and colleagues of mine, so I’ve seen how it can impact lives.<\/em> \t\t\tTable of Contents<\/p>\n As you can see from the Table of Contents below, the book is loaded with interesting and helpful material. And it has been carefully worded to be easy to understand. The tips are highly useful and easy to implement. Click here for a larger view of the Table of Contents<\/a>.<\/p>\n [clearboth]<\/p>\n \t\t\tQuotes from the Book<\/p>\n You are welcome to use quotes below<\/strong> (all taken from the book) or other quotes from the book as long as you don’t change the meaning of the quote by editing out of context. If you’d like to use a quote for publication, we ask that you notify us.<\/strong> We can help promote your article\/story by sharing it on the social media outlets of Advanced Publishing Concepts and Advanced Development Concepts.<\/p>\n \u00a0<\/p>\n \u201cOne of the most valuable and unique aspects lies in the sections regarding passwords. Passwords are the primary line of defense for most of your private digital life and the digital assets of your business. You will first learn what hackers value and how they obtain your password, since knowing is the key to defending yourself. Then you will discover a very unique and cool technique to create passwords that meet all of these criteria<\/strong>: \u201cThe FBI Financial Crimes Report to the Public estimates that financial crimes account for approximately 30%-50% of all business failures<\/strong>.\u201d p.21, Locking the Cookie Jar.\u00a0<\/p>\n \u201cEmployees will be a lot more honest about reporting discrepancies, and less likely to pocket the extra or cover the shortage, when they know you might occasionally test them.\u201c p.25.<\/p>\n \u201cWith over 20 years of experience in Loss Prevention, I believe that the risk of internal theft is highest when employees perceive a lack of awareness with management. The prevention of internal theft can be directly linked to regular audits, surprise audits, and the sharing of details around the audit results.\u00a0Opportunity + Desire = Theft. If you take the opportunity away, and employees understand the consequences associated with dishonest acts, the risk of internal theft is minimized.<\/em>\u201d – Christie Harrison, Loss Prevention Professional and Certified Forensic Interviewer (C.F.I.)\u00a0 p.39.<\/p>\n “If you are able to split the duties between different people<\/strong>, it always a good idea to separate the responsibility of recording transactions in the system with the responsibilities of actually making payments, signing checks, making bank deposits, etc. This makes it much more difficult for one person to, for example, write a check to themselves but record that it was paid to a vendor.” p.42<\/p>\n “A fisherman fishes for his prey by dangling a piece of safe-looking food in front of an unsuspecting victim. Phishing is a technique that essentially convinces a victim that he is logging into a safe location, yet is really logging into a fake webpage<\/strong> that collects his login information.” p.47<\/p>\n “Once a hacker can access your email, your private world is at the mercy of a stranger<\/strong> who doesn\u2019t care about you.” p.55<\/p>\n “Most adults write their passwords on a piece of paper. Over half of all adults \u201chide\u201d this valuable piece of paper within three feet of their keyboard<\/strong>, both at home and at their office. The hilarious thing is that most of these hiding places are directly underneath your keyboard! Golly, and you thought no one knew?” p.64<\/p>\n “When a hacker targets a specific victim, they can often find success by doing a little background research on the victim. Motivated hackers will take the time to research<\/strong> their victim.” p.67<\/p>\n “The longer you make your password and the more exotic types of characters you use in the password, the less likely you\u2019ll be to have to publicly apologize for \u201csharing\u201d obscene videos on Facebook.” p.72<\/p>\n “Studies vary but it appears that 50%-75% of people use the same password for most of their login accounts<\/strong>. If you are one of these people, you should be worried. Why? Because all a hacker has to do is figure out your password for one account and they can access all of your accounts.” p.73<\/p>\n “Protecting yourself from identity theft<\/strong> is not the responsibility of the police or the government or your bank. It\u2019s your responsibility.” p.99<\/p>\n “The primary target<\/strong> for serious identity theft is your Social Security number.” p.101<\/p>\n “Identity thieves can use your name and SSN to file your tax return and receive your federal and state refunds<\/strong>. If they file before you do, there is a chance they might be successful, … If they file a successful return and get the refund, your return will be rejected since the IRS will think you already received your return. …\u00a0You can help protect yourself by filing early in hopes of beating them in the mail.” p.102<\/p>\n [RE: Identity Theft & Your Healthcare Benefits…and a little bit of humor] “Victims find it especially frustrating when trying to sort out the medical history down the road. You swear you\u2019ve only had only two children but your plan shows that you\u2019re covering five children on this plan. Your work requires a clear medical history but your doctor won\u2019t sign off because of your surprising case of emphysema and COPD that you didn\u2019t know you had. And then your spouse got angry when she noticed that your medication history contains Herpes and AIDS-related medications, although you never had either<\/strong>.” p.105<\/p>\n [RE: Identity Theft and Vehicle Insurance] “There have been cases of identity thieves adding additional vehicles to the victim\u2019s car insurance plans<\/strong>, and sending the insurance card for the additional vehicles to a different address. Sometimes the thief pays the discounted group rate on a separate bill, thus hiding the trail from the victim. Sometimes the thief adds the additional vehicle to the existing policy and while the insurance card gets mailed to a different address, the victim pays the bill each month. “Your good credit is often used by thieves to obtain credit cards, buy homes, by vehicles, obtain student loans, personal loans, and even refinance houses. Pretty much any type of loan you can get, a thief with big nads can get<\/strong>. In fact, the thief will probably go after things you might not. After all, it\u2019s not his own identity he\u2019s hurting and he\u2019s not risking his own credit score.” p.107<\/p>\n “Thoroughly destroy unnecessary records. A great time for a thief to harvest your information is on garbage pickup night in your neighborhood or via a business dumpster<\/strong>. Even when you leave your office, what are you leaving behind that can be easily stolen or photographed? …\u00a0Before tossing it, destroy credit card statements, bank statements, solicitations, and any other documents that contain private information. That means to tear it up carefully, cross shred it, burn it, or even swallow it if you want high-fiber security<\/strong>.” p.109<\/p>\n “Thieves love lazy people.<\/strong> If you are not religiously verifying all your credit card charges or balancing your checkbook, you will not notice that someone else is using your card or writing an occasional check through your checking account. When most people notice a charge on their statement that they don\u2019t recognize, they assume it\u2019s legit and ignore it.” p.112<\/p>\n “Have you ever held your credit card while waiting to pay at the store, gas station, or other venue? Do you realize that most smartphones have high-definition cameras and video built in? You wouldn\u2019t be the first victim to lose your credit card information because someone in line behind you took a photo or video of you holding the card<\/strong> with the numbers showing in plain sight!” p.131<\/p>\n \t\t\tGraphics and Images<\/p>\n Below are various images and graphics of the book cover, the author, and the publishing company. We also have a screen shot showing the first time the book reached the Amazon Top 100 in each registered category. If you need additional graphics or information, please contact us<\/a>.<\/p>\n <\/p>\n <\/p>\n <\/p>\n <\/p>\n <\/p>\n <\/p>\n <\/p>\n Locking the Cookie Jar is now available in printed book format and eBook format. It’s easy to get your copy right now!<\/p>\n The Locking the Cookie Jar Seminar<\/em> is both interesting and highly informative. It’s designed for businesses to educate teams to avoid being the weak link for hackers to access sensitive company information or damage valuable data<\/strong>. The seminar can be customized <\/strong>for teams to focus more or less on embezzlement, identity theft, how hackers do their dirty deeds, how to protect against hackers, and how to create hacker-proof passwords that can be unique for each account and can be safely written down!<\/p>\n The book references online resources in multiple places throughout the book. You can access all of those resources here.<\/p>\n \t\t\n
\n
This book opened my eyes<\/strong> to more of what potential problems are “out there” – and what I can do to proactively protect myself. Some of the solutions are really targeted at business owners with employees, so may not apply to everyone. But even that might be helpful, as you may better understand why things are a certain way at work, and if there are glaringly obvious shortfalls in company procedures, you might be able to bring them up and improve the situation.<\/em>” – Daniel Blum\u00a0(Amazon 5-Star Review)<\/p>\nTable of Contents<\/h1>\n
Quotes from the Book<\/h1>\n
1.\u00a0Impossible to guess
2.\u00a0Complex enough to be almost mathematically impossible for hacking programs to decrypt
3.\u00a0Easy to remember
4.\u00a0Unique for every single online account
5.\u00a0And yes, they can even be safely written down!\u201d
p.21, Locking the Cookie Jar.<\/p>\n
It\u2019s amazing that many victims don\u2019t bother to question the sudden increase in rate charges<\/strong>. If you ever suspect that you might be a victim, contact your insurance company and ask for a list of all policies connected to your name.” p.106<\/p>\nGraphics and Images<\/h1>\n
Get the Book!<\/a><\/h2>\n
The Seminar<\/a><\/h2>\n
Resources & Blog<\/a><\/h2>\n
Incredible Numbers<\/h2>\n