Top Menu

About The Book

Do you have at least one social media account or website login ? If so, you should read this book !

Your social media or website presence is something that is valuable and needs to be protected. Look at it this way – would you rather invest a little time and money to protect your social media and website present now or potentially spend thousands or tens of thousands of dollars later ?

Here is why you should be concerned about this-

“55% of net users use the same password for most, if not all, websites”
Sophos
“Users report their Groupon account have been compromised or hacked”
Christian Science Monitor
“Stolen Twitter accounts ‘more’ valuable than credit cards”
ZDNet

I think you understand the point, I am trying to make. Strong, or difficult to guess, passwords are one step in the process of protecting your social media and web login accounts. Creating the longer/hardware passwords may seem like it is a pain but it really isn’t. I show you several ways to do just that.

Using additional level of authentication can help prevent someone from taking over your account(s). Some sites send you an email or text message with a code to enter before you can login. Another way is something called Two Factor Authentication. While better known in the corporate world, it is a piece of hardware or software that displays a set of 6 digits that changes every 30 seconds. Having the code now wont let someone log in a minute or so later. This is easier to setup than you may think.

Here is some of what you will see in the book

  1. Selecting a Password Manager
  2. Software vs Hardware Token
  3. Creating a Strong Password
  4. Email and SMS as Two Factor Authentication
  5. Answering Account Security Questions

I cover a host of social media account types and others such as cloud backup providers, web hosting providers and retail accounts to mention just some of what you can protect with stronger methods that what you probably are now. If the social media account or web service doesn’t support two factor authentication, I will show you an easy to implement way to get very close to that.