Online Security: How to Protect Your Identity and Stay Safe While Surfing Online Premium class

John Williams, Home Business Expert

Play Speed
  • 0.5x
  • 1x (Normal)
  • 1.25x
  • 1.5x
  • 2x
10 Videos (59m)
    • Introduction to Online Security

      8:06
    • Online Protection 101

      8:33
    • Anti-Virus / Firewall

      8:31
    • Spyware / Malware protection

      3:48
    • Passwords

      6:36
    • Browser Password Breach

      1:32
    • Centralize and encrypt your passwords with this software

      7:40
    • Surfing Security

      5:18
    • How to spot Phishing scams

      6:22
    • What to do if your identity has been taken

      2:48

About This Class

Watch as a Former Web Security Expert Reveals How You Can Protect Your Identity While Surfing Online, Starting Today, In This Step by Step Video Course

While 99% of the population won't do anything until it's too late, you'll be ahead of everyone else and less of a target. Don’t know where to start? Most of this video course is screen-captured video, meaning you'll see everything on my screen as I walk you through the whole process.

You’re information isn’t 100 percent safe online. I’m not trying to scare you but it’s true, and my goal is to help you as best I can.

Millions of people have their identities stolen each year. 

In April 2014, the NSA revealed one of the biggest vulnerabilities known to history called the Heartbleed Bug.

It affected the majority of websites out there.

Even large sites like Yahoo were compromised.

According to officials in a U.S. Department of Defense statement, “Heartbleed undermines the encryption process on secure websites, email, instant messaging and likely a variety of other programs and applications, potentially putting users’ sensitive personal data — such as usernames, passwords and credit card information — at risk of being intercepted by hackers."

So that means even if you were proactive, hackers in this case could still access your information.

There are ways to combat this by centralizing your passwords and updating them frequently.

Of course, there are other ways to secure your identity as much as possible as well.

The reality of it all is that your information is not going to be 100% safe. But what you do online and depending on how you do it can cause you to easily open yourself up to security breaches.

Now, I want you to realize that none of this should prevent you from going about your business online. Yet it should be a wakeup call to ensure you are being proactive.

So what do you need to do and what can you do right now to protect your online identity?

Video #1. Introduction to Online Security

Before we jump right in and show you how to secure your online identity, I want to make sure that I give you a brief overview of the video course itself and of course I'll show you how it all works. Also, most importantly I’ll get you ready so that you can easily implement everything that I teach.

Video #2. Online Protection 101

Before we jump right in and I show you exactly what software to use, there are specific things you need to understand in terms of online protection 101.While some of these might seem quite obvious, these are particular reasons why a lot of viruses and spyware come into your computer and we need to ensure we do as much as possible to prevent this. We’ll talk about online surfing security including how to protect your credit cards and more.

Video #3. Anti-Virus / Firewall

There is a huge amount of different antivirus software out there on the internet, and there is a lot of firewall software out there as well. Unfortunately, many are disguised as software that intends to help you but instead actually has the opposite effect.  Now, there are two pieces of software that I have used all the way from the beginning of 2000 that were the first leaders in their industry, so I will reveal these to you.  A lot of people confuse antivirus software and firewall software. They are not the same.  While they can work well together and sometimes have firewalls built into the antivirus software, you'll see exactly why you need these two different types of software because they protect against two different types of security breaches.

Video #4. Spyware / Malware protection

Beyond antivirus software and firewalls, there is a specific type of security breach called spyware. The way spyware works is it gets on your computer and spies on everything that you do. It records everything from all keyboard strokes that you type in, the mouse clicks, as well as all the websites you visit, and then of course it sends all that information back to the creator of the spyware. Now the reality of this all is that lots of software will claim to be spyware protection, but what you truly want is a specific software that focuses on spyware specifically. So in the particular video I'm going to show you a specific software tool that is the absolute leader in spyware protection.

Video #5. Passwords

Are you using the same exact password to log into all of your accounts and all of your websites? If you are, if somebody finds one of your passwords then it is going to be super easy to get into your other accounts such as your banking accounts, your financial accounts, your email accounts, and other secured sites. Now while it makes sense to create a strong password, most people forget to do so. Yet that's not what this video is all about. This video is going to show you how to organize your passwords so that if anything happens in the future you can always refer back to the spreadsheet we show you how to create.

Video #6.  Browser Password Breach

Did you know that if you’re surfing with certain Internet browsers, when you enter your username and password, a lot of these browsers will actually save that password?  Now what’s even scarier is that if you have somebody else that comes in and uses that same computer, there is actually a way to grab all of your passwords easily. Knowing this, you probably shouldn't be storing your passwords inside of the Internet browser itself, especially if somebody other than yourself is able to access it. However, there is a way to protect yourself and I will show you how by using free software.

Video #7. Centralize and encrypt your passwords with this software

In this specific video I'm going to show you how to use the centralized password encryption system that I talk about in video number six.  While there is a pro version, it is not really necessary for most of your basic needs.

Video #8. Surfing Security

This video will cover some basic things that you need to look for when you are surfing online. I want to make sure that I cover all this information so that we keep you completely secure.

Video #9. How to spot Phishing scams

Even if you don’t know what phishing is, you’ve encountered it before. Phishing is the act of somebody emailing or contacting you and pretending that they are a legitimate company you are familiar with. So for example, you get an email that looks like it's from your bank. And in that email they say something like you have over drafted money - so you need to go ahead and log in and pay your fee. But the reality of it all is that a lot of these sites are phishing sites and what they're trying to do is get your username and password. Now most of you may or may not do this, but some of you will fill out your username and password and ultimately give the hacker your information. And guess what? You have ultimately given them the keys to your bank account. And this is dangerous because they can go in and steal your money and… you get the idea. So here I want to show you real-life examples where you can pinpoint and decide whether somebody is actually phishing or legit, because sometimes it’s hard to figure this out.

Video #10. What to do if your identity has been taken

Now the big question is what if you’re too late? What do you do if your online identity has already been taken, or someone has stolen your credit card or credit information?  What can you do today to take action? 

Go ahead and watch this video course. Grab it and start learning how to take charge and protect your online identity from prying eyes. 

38

Students

--

Projects

John Williams

Home Business Expert