Presenting Be the High Hanging Fruit: Top 5 Tips to Protect Your Online Identity

Identity theft victims? They could be...if they do not get sufficient training.

Identity theft victims? They could be…if they do not get sufficient training.

Are you planning next quarter’s training and need a trainer who can WOW your attendees If so, you’re at the right place.

Internet thieves want to steal your online identity. This includes credit card numbers, social security numbers and passwords. What you do for a living does not matter to them. Therefore, what does matter is you have some information they can steal and sell.

Protect yourself and your online identity. Position yourself as high hanging fruit. Make it so the thieves would have quicker and easier success stealing from someone else (the low hanging fruit).

When I say high hanging fruit, I am quoting from Urban Dictionary, “Matters that take more effort and require more time and are usually most rewarding.” The opposite, of course, is low hanging fruit. I am once again quoting from Urban Dictionary, “Targets or goals which are easily achievable and which do not require a lot of effort.”

When it comes to protecting your online identity, position yourself as the high hanging fruit. This should be a no-brainer. In the highly interactive Be the High Hanging Fruit workshops, you enjoy these takeaways:

  • Understand high hanging vs. low hanging fruit.
  • See how we are all targets.
  • Analyze a successful phish attempt.
  • Learn how to identify phish attempts (with an interactive phishing quiz).
  • Plan how to use what you’ve learned back at work.

Audience participation is expected. We’re talking about protecting your online identity, not mine. This is for anybody who uses e-mail, accesses client data or does any web surfing. Be the High Hanging Fruit (Intro) is a 20-minute workshop with a 10-minute “After the Show” Q&A session. Hope to see you there.

Mark follows PST (Point → Story → Takeaway)

Mark follows the PST (Point → Story → Takeaway) system. You get crisper takeaways when the speaker follows the PST system. If you’ve seen Mark present these themes online, you have already seen Point → Story → Takeaway in action.

Point: Vet links before clicking them. They might not take you where you expect to go.

Story: Daphne opened her email. She had 20 new messages from people she did not know. One offered a free pizza if she clicked before 12:00 noon. Daphne moved her mouse pointer over the link, but she did not click it. Windows revealed where the free pizza link would have taken her. She saw that it linked to a website in .RU. “Russia,” she yelled. “I don’t think this is an honest link. Looks like a phish attempt. I‘m glad I vetted this link before clicking.” She deleted the message.

Takeaway: Vet links to make sure they are honest. That’s how you protect yourself from becoming another identity theft victim.

How can Mark help you look good?

  • Mark will team up with you to help promote your initiative.
  • Mark arrives early and stays late to help your attendees feel comfortable.
  • Mark follows the Point → Story → Takeaway system to educate and entertain.
  • Mark finishes on time.
  • Mark does not sell from the stage.

How much does it cost?

The 20-minute introductory program has no cost. The 90-minute training sessions do. All presentations are more than 40% audience interactive. Feedback is very positive. You can check Mark’s recommendations at