Ruin a Bad Guy’s Day Radio - Fraud Prevention Podcast
Got Chargebacks? Midigator’s Trent Spratling Explains Chargeback Truths, Consequences, and Misconceptions

Got Chargebacks? Midigator’s Trent Spratling Explains Chargeback Truths, Consequences, and Misconceptions

July 9, 2019

Got Chargebacks? Midigator's Trent Spratling Explains Chargeback Truths, Consequences, and Misconceptions

Welcome to Ruin a Bad Guy's Day Radio. We are growing by leaps and bounds because of listeners just like YOU! If you like the podcast, please go to Apple Podcasts to leave a comment and give us a 5 Star rating...Thank You!

Apple Podcasts/iTunes

https://podcasts.apple.com/us/podcast/ruin-a-bad-guys-day-radio-fraud-prevention-podcast/id1437720527?mt=2

This week, Ruin a Bad Guy's Day Radio Interviews Midigator's Trent Spratling about Chargeback Truths, Consequences, and Misconceptions.

Topics Include:

We'll discuss some of the biggest misconceptions about fighting chargebacks and disputes, dealing with banks and credit card issuers, and the potential ROI and increased revenue possibilities for fighting chargebacks.

Special Guest: Trent Spratling has a unique understanding of what merchants need to scale their business and increase profitability through Midigator's payment dispute management system that helps you prevent and respond to credit card disputes and chargebacks.

midigator_logo.png

This episode of Ruin a bad Guys Day Radio is brought to you by:

 

Midigator: Midigator is a leader in payment dispute management services.

 

Are you tired of the same old daily grind with fighting chargebacks and credit card disputes? Are you drowning in a sea of endless data and spreadsheets?

 

Look no further – Midigator's payment dispute management system provides real time analytics and advanced artificial intelligence technology that helps you identify why disputes are occurring while reducing your chargebacks and enabling your business to better avoid them in the future.

Midigator's advanced prevention options include chargeback alerts and Visa's VMPI technology to help you recover lost revenue and improve your overall chargeback management strategy.

 

Let Midigator - "Help You Get Back to Growing Your Business!"

 

For more information on how Midigator can help you prevent and respond to credit card disputes and chargebacks - Visit Midigator.com

 

Contact: 

Trent Spratling

Midigator

Account Executive

Office: 406-203-1555

Web: Midigator.com

Email: Trenton.s@midigator.com

LinkedIn: https://www.linkedin.com/in/trenton-spratling-038b632b/

Listen to the Podcast to learn more!

Contact Ruin a Bad Guy's Day Radio:
https://www.ruinabadguysday.com/contact

Donate: Help Ruin a Bad Guy's Day Radio fight fraud!
https://donorbox.org/support-ruin-a-bad-guy-s-day-radio

Ruin a Bad Guy’s Day Radio Merchandise:
-Coffee Mugs, T-Shirts, Hoodies

Sale! Get 15% Off - Use Coupon Code: THANKYOU
https://teespring.com/stores/ruin-a-bad-guys-day-radio

Who Should Listen?
Fraud Managers and Investigators, Cybersecurity, Fraud Analysts, Law Enforcement Professionals, Risk Managers, E-commerce Managers, M-commerce managers, Internal Auditors, Finance Professionals, Chargeback Specialists, Call Center Agents, and IT/Operations professionals.

Disclaimer:
Ruin a Bad Guy’s Day, LLC. The information provided in Ruin a Bad Guy’s Day/Skip Myers podcasts/webinars and accompanying material is for informational purposes only. It should not be considered legal or financial advice. You should consult with legal counsel or other professionals to determine what may be best for your individual or organizational needs.

Ruin a Bad Guy’s Day® is a registered trademark.
Visit: https://www.ruinabadguysday.com

More Podcasts: 

https://ruinabadguysday.podbean.com/

Sponsor a Podcast:

https://ruinabadguysday.podbean.com/p/sponsor-us/

Twitter:

https://twitter.com/ruinabadguysday

Newsletter: Cyber-Security and Fraud Prevention News

https://paper.li/ruinabadguysday/1557668208?edition_id=822c0510-76b2-11e9-bff4-0cc47a0d164b#/

Listen Free on iHeartRadio

https://www.iheart.com/podcast/256-ruin-a-bad-guys-day-radio-43100362/

How Fraudsters Exploit Malware and Phishing for Financial Gain

How Fraudsters Exploit Malware and Phishing for Financial Gain

April 29, 2019

How Fraudsters Exploit Malware and Phishing for Financial Gain

Subscribe: Apple Podcasts | YouTube | Spotify | Stitcher | TuneIn

Welcome to Ruin a Bad Guy's Day Radio. We are growing by leaps and bounds because of listeners just like YOU! If you like the podcast, please go to Apple Podcasts to leave a comment and give us a 5 Star rating...Thank You!

Apple Podcast

https://podcasts.apple.com/us/podcast/ruin-a-bad-guys-day-radio-fraud-prevention-podcast/id1437720527?mt=2

In this episode we discuss how fraudsters exploit malware and phishing for financial gain. A recent conviction of international cybercriminals in federal court reveals how these fraudsters operate and target their victims. Learn how protect yourself from malware and phishing schemes.

Source: Department of Justice
https://www.justice.gov/opa/pr/two-romanian-cybercriminals-convicted-all-21-counts-relating-infecting-over-400000-victim

Romanian Cybercriminals Convicted of All 21 Counts Relating to Infecting Over 400,000 Victim Computers with Malware and Stealing Millions of Dollars
A federal jury convicted two Bucharest, Romania residents of 21 counts related to their scheme to infect victim computers with malware in order to steal credit card and other information to sell on dark market websites, mine cryptocurrency and engage in online auction fraud, announced Assistant Attorney General Brian A. Benczkowski of the Justice Department’s Criminal Division and U.S. Attorney Justin E. Herdman of the Northern District of Ohio

Two Romanians were convicted after a 12-day trial of conspiracy to commit wire fraud, conspiracy to traffic in counterfeit service marks, aggravated identity theft, conspiracy to commit money laundering and 12 counts each of wire fraud. Sentencing has been set for Aug. 14, 2019 before Chief Judge Patricia A. Gaughan of the Northern District of Ohio.

According to testimony at trial and court documents, the defendants who pleaded guilty collectively operated a criminal conspiracy from Bucharest, Romania. It began in 2007 with the development of proprietary malware, which they disseminated through malicious emails purporting to be legitimate from such entities as Western Union, Norton AntiVirus and the IRS. When recipients clicked on an attached file, the malware was surreptitiously installed onto their computer.

This malware harvested email addresses from the infected computer, such as from contact lists or email accounts, and then sent malicious emails to these harvested email addresses. The defendants infected and controlled more than 400,000 individual computers, primarily in the United States.

Listen to the podcast for more information!

Malware:
https://en.wikipedia.org/wiki/Malware

Malware (malicious software) is any software intentionally designed to cause damage to a computer, server, client, or computer network. Malware does the damage after it is implanted or introduced in some way into a target's computer and can take the form of executable code, scripts, active content, and other software. The code is described as computer viruses, worms, Trojan horses, ransomware, spyware, adware, and scareware, among other terms. Malware has a malicious intent, acting against the interest of the computer user—and so does not include software that causes unintentional harm due to some deficiency, which is typically described as a software bug.

Phishing
https://en.wikipedia.org/wiki/Phishing

Phishing is the fraudulent attempt to obtain sensitive information such as usernames, passwords and credit card details by disguising as a trustworthy entity in an electronic communication. Typically carried out by email spoofing or instant messaging, it often directs users to enter personal information at a fake website, the look and feel of which are identical to the legitimate site.

Phishing is an example of social engineering techniques being used to deceive users. Users are often lured by communications purporting to be from trusted parties such as social web sites, auction sites, banks, online payment processors or IT administrators.

Contact Ruin a Bad Guy's Day Radio:
https://www.ruinabadguysday.com/contact

Donate: Help Ruin a Bad Guy's Day Radio fight fraud!
https://donorbox.org/support-ruin-a-bad-guy-s-day-radio

Ruin a Bad Guy’s Day Radio Merchandise:
-Coffee Mugs, T-Shirts, Hoodies

Sale! Get 15% Off - Use Coupon Code: THANKYOU
https://teespring.com/stores/ruin-a-bad-guys-day-radio

Who Should Listen?
Fraud Managers and Investigators, Cybersecurity, Fraud Analysts, Law Enforcement Professionals, Risk Managers, E-commerce Managers, M-commerce managers, Finance Professionals, Chargeback Specialists, Call Center Agents, and IT/Operations.

Disclaimer:
Ruin a Bad Guy’s Day, LLC. The information provided in Ruin a Bad Guy’s Day/Skip Myers podcasts/webinars and accompanying material is for informational purposes only. It should not be considered legal or financial advice. You should consult with legal counsel or other professionals to determine what may be best for your individual or organizational needs.

Ruin a Bad Guy’s Day® is a registered trademark.
Visit: https://www.ruinabadguysday.com

More Podcasts: 

https://ruinabadguysday.podbean.com/

Sponsor a Podcast:

https://ruinabadguysday.podbean.com/p/sponsor-us/

 

What is Visa Merchant Purchase Inquiry Program (VMPI)? Interview with Fraud Expert Scott Adams from FraudPVP.com

What is Visa Merchant Purchase Inquiry Program (VMPI)? Interview with Fraud Expert Scott Adams from FraudPVP.com

April 23, 2019

What is Visa Merchant Purchase Inquiry Program (VMPI)? Interview with Fraud Expert Scott Adams with FraudPVP.com

Subscribe: RadioPublic | Apple Podcasts | YouTube | Spotify | Stitcher | TuneIn

Ruin a Bad Guy's Day Radio interviews fraud expert Scott Adams with FraudPVP. Scott Adams with FraudPVP.com explains the value of Visa's Merchant Purchase Inquiry Program for reducing chargebacks and disputes and how FraudPVP can enhance your program by reducing chargeback management time and saving sales. FraudPVP/VMPI services can help prevent chargebacks before they even happen by improving communication between the parties involved. 

VMPI stands for Visa Merchant Purchase Inquiry and is part of the larger Visa Claims Resolution initiative (VCR). Visa created VMPI in an effort to make chargeback disputes simpler and more automated for merchants, issuers, acquirers and processors. Simply put, VMPI can help prevent chargebacks before they even happen by improving communication between the parties involved.

Scott Adams is the founder of FraudPVP. He has more than 20 years of experience in the field of payments as both a merchant and a fraud expert. He's worked with companies large and small to reduce chargebacks, improve ROI and fight fraud on multiple platforms. He strives to always think like a merchant and develop tools that make merchants' lives easier.

FraudPVP's VMPI Service gives you the chargeback-reducing power of VMPI with little to no set-up on your end. You can start deflecting chargebacks NOW. Listen to the Podcast to learn more!

What is special about FraudPVP’s VMPI Service?

Time Saved: We have real time alerts from Visa on Fraud and Chargebacks.  Our VMPI alert time is 3-4 days faster than traditional fraud and chargeback alerts merchants receive from their acquirer.

Inquiries Deflected: In 50+% of cases in which a customer called their issuer with a dispute, our system was able to prevent chargebacks by either saving the sale or providing an avenue to refund the transaction without a chargeback.

Saved Sales: In 25+% of cases in which a customer called with a dispute, our system was able to not only avoid the chargeback, but also save the sale completely, so the merchant kept their money!

Easy Integration / Fast Results:  Little to no IT/Engineering required.  We have paths to go live that require no integration.  You could be live within a matter of days and saving sales and reducing chargebacks within the current month!  No ramp-up needed!

More Information:

FraudPVP.com

https://www.fraudpvp.com/

FRAUDPVPLOGO.png

Scott Adams - LinkedIn

https://www.linkedin.com/in/speakerscotteadams/

Visa Merchant Purchase Inquiry Program 

https://developer.visa.com/capabilities/visa-cardholder-purchase-inquiry

Fraud Stats mentioned in podcast: Kount Blog

https://www.kount.com/blog-against-fraud/11-frightening-chargeback-statistics

Email Us: Ruin a Bad Guy's Day Radio
https://www.ruinabadguysday.com/contact

Subscribe to Ruin a Bad Guy's Day Radio

https://www.ruinabadguysday.com/contact

Donate: Help Ruin a Bad Guy's Day Radio fight fraud!
https://donorbox.org/support-ruin-a-bad-guy-s-day-radio

Ruin a Bad Guy’s Day Radio Merchandise:
-Coffee Mugs, T-Shirts, Hoodies

Sale! Get 15% Off - Use Coupon Code: THANKYOU
https://teespring.com/stores/ruin-a-bad-guys-day-radio

More Episodes:

https://ruinabadguysday.podbean.com/

Who Should Listen?
Fraud Managers and Investigators, Cybersecurity, Fraud Analysts, Law Enforcement Professionals, Risk Managers, E-commerce Managers, M-commerce managers, Finance Professionals, Chargeback Specialists, Call Center Agents, and IT/Operations.

Disclaimer:
Ruin a Bad Guy’s Day, LLC. The information provided in Ruin a Bad Guy’s Day/Skip Myers podcasts/webinars and accompanying material is for informational purposes only. It should not be considered legal or financial advice. You should consult with legal counsel or other professionals to determine what may be best for your individual or organizational needs.

Ruin a Bad Guy’s Day® is a registered trademark.
Visit: https://www.ruinabadguysday.com

What is Synthetic Identity Fraud?

What is Synthetic Identity Fraud?

March 5, 2019

What is Synthetic Identity Fraud?

Subscribe: RadioPublic | Apple Podcasts | YouTube | Spotify | Stitcher | TuneIn

Source: ThomsonReuters

Summary: In order to commit SIF or Synthetic Identify Fraud, fraudsters steal legitimate social security numbers from individuals who are not using their credit and/or have not established a credit file with the three credit reporting agencies. Fraudsters build and create synthetic identities by adding bogus addresses, names, and even fake social media accounts. This is when the real "fraud" begins with synthetic identity theft. Download the Podcast for more information!

Topics Discussed:
-Synthetic Identity Fraud/Theft
-How Bad Guy's Create Synthetic Identities
-What You Can Do?

Ruin a Bad Guy’s Day Radio Merchandise - 15% Off - Use Coupon Code: THANKYOU
-Coffee Mugs, T-Shirts, Hoodies
https://teespring.com/stores/ruin-a-bad-guys-day-radio

Contact Us:
https://www.ruinabadguysday.com/contact

Donate: Help Ruin a Bad Guy's Day Radio fight fraud!
https://donorbox.org/support-ruin-a-bad-guy-s-day-radio

Top VPN Services:
-Private Internet Access – PIA
-PureVpn
-IPVanish
-NordVPN

More Information:
Senate Bill 2155: Economic Growth, Regulatory Relief, Consumer Protection Act

Link: https://www.congress.gov/bill/115th-congress/senate-bill/2155
-Internet Crime Center - File a Complaint
-IC3.gov
-Secret Service.gov

Dashlane Password Management:

dashlanelogobanner.png

Check out AuditLock Fraud Consultancy:

Fraudnotfrog.com

Who Should Listen?
Fraud Managers and Investigators, Fraud Analysts, Law Enforcement Professionals, Risk Managers, E-commerce Managers, M-commerce managers, Finance Professionals, Chargeback Specialists, Call Center Agents, IT/Operations.

Disclaimer:
Ruin a Bad Guy’s Day, LLC. The information provided in Ruin a Bad Guy’s Day/Skip Myers podcasts/webinars and accompanying material is for informational purposes only. It should not be considered legal or financial advice. You should consult with legal counsel or other professionals to determine what may be best for your individual or organizational needs.
Ruin a Bad Guy’s Day® is a registered trademark.

Visit: https://www.ruinabadguysday.com

HACKED! My Identity Has Been Stolen - Really!

HACKED! My Identity Has Been Stolen - Really!

December 27, 2018

HACKED! My Identity Has Been Stolen - Really!

Subscribe: Apple Podcasts | YouTube | Spotify | Stitcher | TuneIn 

After the Equifax data breach in September 2017, I started a personal journey to protect my identity and take proactive measures to ruin a bad guy's day! I researched and reviewed several identity theft monitoring services, credit monitoring services, and how I could freeze my credit with all three credit bureaus. There are some very simple steps YOU can take right now to protect your identity and stop a bad guy from opening credit in your name and Ruining Your Day.

Sponsored By: Nord VPN 

Best Plan: 3 Years - Only $2.99 month

Get a VPN that takes your privacy seriously

  •  
    - Access 5,238 servers worldwide
  •  
    - No logs policy
  •  
    - Connect 6 devices at the same time
  •  
    - 30-day money-back guarantee

Today, Skip discusses how his personal identity was compromised and recently used by criminals to open a line of credit with a large women's clothing retailer. However, through a proactive approach to protect his identity, Skip details the steps he took to stop the fraudsters in their tracks. Now, Skip is awaiting additional information from LifeLock and the retailer so that he can pursue the fraudsters with every means at his disposal. Check out Ruin a Bad Guy's Day: https://www.ruinabadguysday.com

It's time to play offense against the fraudsters and Ruin a Bad Guy's Day!

What can YOU do?

  • Open an Identity Theft Monitoring Account -  LifeLock or Experian
  • Open a Credit Monitoring Account - Credit Karma
  • Freeze Your Credit with All 3 Credit Bureaus

Who should YOU call?

  • Social Security Administrations Fraud Alert Line - 800-269-0271
  • Federal Trade Commission - Report Identity Theft - 877-FTC-HELP

Ruin a Bad Guy’s Day Radio Merchandise:

-Coffee Mugs, T-Shirts, Hoodies
https://teespring.com/stores/ruin-a-bad-guys-day-radio

Who Should Listen? 
Fraud Managers and Investigators, Fraud Analysts, Law Enforcement Professionals, Risk Managers, E-commerce Managers, M-commerce managers, Finance Professionals, Chargeback Specialists, Call Center Agents, IT/Operations.

Disclaimer: 
Ruin a Bad Guy’s Day, LLC. The information provided in Ruin a Bad Guy’s Day/Skip Myers podcasts/webinars and accompanying material is for informational purposes only. It should not be considered legal or financial advice. You should consult with legal counsel or other professionals to determine what may be best for your individual or organizational needs.

Ruin a Bad Guy’s Day® is a registered trademark.

Visit:https://www.ruinabadguysday.com

nordsquare.png

Question of the Week: What is Phishing, Vishing, and Smishing?

Question of the Week: What is Phishing, Vishing, and Smishing?

December 17, 2018

Question of the Week: What is Phishing, Vishing, and Smishing?

Subscribe: Apple Podcasts | YouTube | Spotify | Stitcher | TuneIn

Thank you for all of your emails and questions about Phishing, Vishing, and Smishing. This week we'll discuss the bombardment of social engineering techniques fraudsters use to lure us into giving away our personal information. We'll also go into greater detail on each of the primary methods currently being used to steal your identity.

Phishing is the fraudulent attempt to obtain sensitive information such as usernames, passwords and credit card details by disguising itself as a trustworthy entity in an electronic communication. Typically carried out by email spoofing or instant messaging, it often directs users to click a link, download an attachment and enter personal information at a fake website. From Wikipedia.org

Vishing or Voice phishing is a form of criminal phone fraud, using social engineering over the telephone system to gain access to private personal and financial information for the purpose of financial reward. From Wikipedia.org

Smishing or SMS phishing is a form of criminal activity using social engineering techniques. Phishing is the act of attempting to acquire personal information such as passwords and details by masquerading as a trustworthy entity in an electronic communication. SMS phishing uses cell phone text messages to deliver the bait to induce people to divulge their personal information. From Wikipedia.org

 

Best Spam Call Blocker Apps for Smartphones

Ruin a Bad Guy’s Day Radio Merchandise:

-Coffee Mugs, T-Shirts, Hoodies
https://teespring.com/stores/ruin-a-bad-guys-day-radio

Who Should Listen? 
Fraud Managers and Investigators, Fraud Analysts, Law Enforcement Professionals, Risk Managers, E-commerce Managers, M-commerce managers, Finance Professionals, Chargeback Specialists, Call Center Agents, IT/Operations.

Disclaimer: 
Ruin a Bad Guy’s Day, LLC. The information provided in Ruin a Bad Guy’s Day/Skip Myers podcasts/webinars and accompanying material is for informational purposes only. It should not be considered legal or financial advice. You should consult with legal counsel or other professionals to determine what may be best for your individual or organizational needs.

Ruin a Bad Guy’s Day® is a registered trademark.

Catch of the Day: Credit Card Cloners Stole Thousands - Fraudsters Used Overseas Hackers to Get Card Numbers

Catch of the Day: Credit Card Cloners Stole Thousands - Fraudsters Used Overseas Hackers to Get Card Numbers

December 12, 2018

Catch of the Day: Credit Card Cloners Stole Thousands - Fraudsters Used Overseas Hackers to Get Card Numbers

Subscribe: Apple Podcasts | YouTube | Spotify | Stitcher | TuneIn

Source: FBI.gov

A prolific credit card scammer—who continued his crimes from behind bars—is now serving a lengthy sentence thanks to a multi-agency investigation into his card-cloning operation.

From 2014 to 2016, Syracuse, New York, resident Daquan Rice, 23, and several associates purchased credit card numbers online from hackers in Russia, Pakistan, and Ukraine, who sell the information they steal. Rice also bought credit card numbers from a friend who worked at a Syracuse restaurant who had skimmed numbers from customer credit cards on Rice’s behalf.

Rice had an associate in New York City with a credit card cloning machine, and he would provide the numbers to the person to make new cards for him. Rice and his accomplices then used these cards to buy gift cards, which they would convert into cash or money orders.

How does this happen? Today we discuss how carder networks operate and how carders steal personal information, use credit card cloning devices, and manufacture counterfeit credit cards.

Who Should Listen? 
Fraud Managers and Investigators, Fraud Analysts, Law Enforcement Professionals, Risk Managers, E-commerce Managers, M-commerce managers, Finance Professionals, Chargeback Specialists, Call Center Agents, IT/Operations.

Disclaimer: 
Ruin a Bad Guy’s Day, LLC. The information provided in Ruin a Bad Guy’s Day/Skip Myers podcasts/webinars and accompanying material is for informational purposes only. It should not be considered legal or financial advice. You should consult with legal counsel or other professionals to determine what may be best for your individual or organizational needs.

Ruin a Bad Guy’s Day® is a registered trademark.

Breaking News! Marriott Says Up To 500 Million Customers’ Data Stolen In Breach

Breaking News! Marriott Says Up To 500 Million Customers’ Data Stolen In Breach

December 3, 2018

Breaking News! Marriott Says Up To 500 Million Customers' Data Stolen In Breach

Source: NPR.com

Marriott International said Friday that information on up to about 500 million of its customers worldwide was exposed in a breach of its Starwood guest reservation database dating as far back as 2014. The world's largest hotel chain said it learned of the breach on Sept. 8.

The company said the Marriott hotel network was not affected. "The investigation only identified unauthorized access to the separate Starwood network," it said. Marriott acquired Starwood Hotels & Resorts Worldwide in 2016. For 327 million of the affected guests, the compromised data includes "some combination of name, mailing address, phone number, email address, passport number, Starwood Preferred Guest ("SPG") account information, date of birth, gender, arrival and departure information, reservation date, and communication preferences," the company said.

Today, we'll discuss how the bad guys may attempt to compromise your accounts through deceptive and spear phishing attacks and what you can do to avoid becoming a victim of identify theft.

Report Phishing Emails

File a Complaint: FTC.gov/complaint

Forward phishing emails to: spam@uce.gov (FTC.gov site)

Identity Theft Information: Identitytheft.gov

Check to see if your email accounts have been compromised: https://haveibeenpwned.com/

Disclaimer: 
Ruin a Bad Guy’s Day, LLC. The information provided in Ruin a Bad Guy’s Day/Skip Myers podcasts/webinars and accompanying material is for informational purposes only. It should not be considered legal or financial advice. You should consult with legal counsel or other professionals to determine what may be best for your individual or organizational needs.

Ruin a Bad Guy’s Day® is a registered trademark.

Catch of the Day: Thousands of credit cards were potentially compromised in a hotel room scheme

Catch of the Day: Thousands of credit cards were potentially compromised in a hotel room scheme

November 28, 2018

Catch of the Day: Thousands of credit cards were potentially compromised in a hotel room scheme – “Carding network” used to purchase stolen credit card numbers.

 

Source: Star-Telgram.com

In this Podcast, we will discuss what the term “Carding” means and how “Carders” operate.

DALLAS - Thousands of credit cards were potentially compromised in a hotel room purchasing scheme worth $250,000, according to federal court documents. According to the criminal complaint, which was unsealed last week, investigators in Dallas began looking into suspicious hotel room purchases allegedly made by K. Klutts and O. Edwards in late August.  The pair would rent one or two rooms in different hotels in Dallas, Fort Worth and other areas and then sub-rent the room to other people at lower fees, the document says. Klutts is accused of buying those rooms with credit card numbers she bought from a “carding network.”

 

Disclaimer: 
Ruin a Bad Guy’s Day, LLC. The information provided in Ruin a Bad Guy’s Day/Skip Myers podcasts/webinars and accompanying material is for informational purposes only. It should not be considered legal or financial advice. You should consult with legal counsel or other professionals to determine what may be best for your individual or organizational needs.

Ruin a Bad Guy’s Day® is a registered trademark.

How to Protect Your Identity During the Holidays

How to Protect Your Identity During the Holidays

November 23, 2018

How to Protect Your Identity During the Holidays

The holiday season brings all kinds of joy and potential stress. It is easy to become caught up with the holiday rush, shopping on-line, traveling to meet with friends and family, and forget to safeguard our identities from potential hackers and criminals.

Today we’ll discuss some simple steps to protect your identity while surfing the web, connecting to Wi-Fi hotspots, and protecting your Bluetooth devices. We’ll also explain the importance of using a VPN (virtual private network) when connecting to free Wi-Fi services at airports, hotels, and coffee shops.

Top VPN Services

  • Private Internet Access - PIA
  • PureVpn
  • IPVanish
  • NordVPN

Disclaimer: 
Ruin a Bad Guy’s Day, LLC. The information provided in Ruin a Bad Guy’s Day/Skip Myers podcasts/webinars and accompanying material is for informational purposes only. It should not be considered legal or financial advice. You should consult with legal counsel or other professionals to determine what may be best for your individual or organizational needs.

Ruin a Bad Guy’s Day® is a registered trademark.