28 minute read
126
from E The Magazine for Today's Female Executive Fall 1 2020
by E The Magazine for Today's Female Executive. An ETM Media Publication
The Ultimate Lists of Resources for Health Care Workers
Advertisement
What’s Age Got to Do With It?
A Discussion of Ageism in Our Society Today
Dr. Barbara Young
At age 50 I had what I call a “grief” moment. I received my first copy of AARP and all of a sudden, I realized that I was getting older. Many of us have heard or read the poem, “Children Learn what they Live”by Dorothy Nolte. It tells how all of us are affected and influenced by what we learn as children and how we carry these behaviors and belief systems into adulthood.
Our attitudes about old age are learned as children as we witnessed how those around us reacted to it. There was also the influence of television show characters and media messages. Whether positive or negative, we will be greatly influenced by these external factors and we will apply these attitudes to others as well as our own aging process. I remember my grandmother being very active and alert; reading the newspaper every day; looking each night at the news, crocheting, making quilts, gathering clothes, making soap and doll clothes to send to a village she adopted in Africa. She also walked four blocks to go to church well-dressed each Sunday well into her 90’s. She died at age 101. We celebrated her 100th birthday in her church with all of her living children, grandchildren, and great-grandchildren.
Now is the best time to assess whether the lens in our aging attitude glasses need an adjustment. I believe it is well worth the time. I discovered later with research that It turns out that the longer people live the less they have a fear of dying. It’s called the The U Curve of Happiness – the curve itself is the way aging affects the brain. Moreover, research at Yale University has proven that having a positive attitude toward aging an add 7.5 years to your life. But reality speaks that we live in a society that practically worships youth and everyone wants to look younger, be younger and believe that younger is always better. This belief could be farther from the truth! What I
have learned is that wisdom takes time and comes from experience s and living! As older adults, we gain wisdom and we deserve respect. I have seen older adults disrespected and what it looks like when there is stereotyping of individuals based on
This is ageism, which is discrimination and stereotyping on the basis of age. We experience it anytime anyone assumes we are too old for something instead of finding
out what we are really capable of or too young. Ageism cuts both ways. All “isms” are socially constructed ideas, racism, sexism, homophobia and that means we make them up and they can change over time. Yet, all these prejudices pit us against each other to maintain the status quo. Intentional ageism includes carrying out practices that take advantage of the vulnerabilities of older persons. We see this in health care, attitudes and improper assumptions about ability and levels of health are held and made commonly by practitioners and also in the workplace.
It is an accepted fact that many people who seek employment at age 40 or over encounter difficulties. Not hiring someone based on older age is also intentional ageism and is against the law. And today, intentional ageism also includes scam artists! They are a good example of people who prey upon the vulnerabilities of older adults. They have devised all sorts of schemes using the telephone, mail, computers and even in person to access seniors. Once they have their attention, they con their way into getting hundreds –even thousands of dollars out of seniors. They are so good at it they even convince the skeptics. They use psychological tactics that helps them rob seniors of their money and self-dignity. Many times, seniors are so ashamed that they fell for the scam that they are embarrassed to report it to officials as a crime.
Ageism has crept into the fabric of our society by using things such as humor to become something that has been widely accepted. Black birthday memorabilia, over the hill birthday cards, and senor moments are definite examples of. This is a what is called unintentional age discrimination. I will not use the term senior moment when I lost my keys at age 15, I did not say I was having a junior moment. So, we must be careful of our words; what we say is what we will see. (I am getting old; I no longer drive at night) my right knee is
getting old; but your left knee does not hurt, and you have both knees.
Recently I was in a restaurant when a Chinese waitress addressed an older African American woman seated in front of me as Auntie! It so startled me that I later called the waitress over and corrected her. She stated she was not aware of the implications of her addressing this elderly African American woman as “auntie.” This is one of the types of ageism I call unintentional ageism – ideas, attitudes, rules or practices that are carried out without the perpetrator’s awareness that they are biased against persons or groups based on their older age. ow mow m
How many of you have fallen prey to this unintentional ageism? And it continues. I also learned that much of ageism is passed down from generation to generation. We do not see things as they are; we see them as
WE are! (Anais Nin). How did your grandparents behave as seniors? Did you model your behavior from them? We become adults who filter life through a looking glass we’ve held onto since childhood: which is one of implicit bias.
One of the critical issues is that many seasoned individuals, (a term I like to use) accept negative metaphors of aging that are imposed from the outside even though their inner image or personal metaphor does not necessarily correspond to the outer image. My grandmother at age 99 would always say she felt like a “young gal” inside. This is because we are spiritual beings and the spirit never grows old. Older persons sometimes resign themselves to ageist attitudes and the price may be high both individually and in terms of the loss of potential societal contributions. Ageism feeds on denial; our reluctance to acknowledge that we are going to become
that older person; it is denial when we try to pass for younger, or the use of anti-aging products, or we get upset when our bodies betray us. I advocate that those is us who are “seasoned” celebrate our ability to adapt and grow as we move through life; to help create solutions for our younger women and men; to see ourselves as human capital and a resource for intergenerational learning.
What does the Bible say about aging? “Aging” in the Bible is defined as a sign of experience. The Lord promises His continues love and concern for the elderly. “I will be your God throughout your lifetime -until your hair is white with age. I made you, and I will care for you. I will carry you along and save you. Even to your old age and gray hairs, I am He, I am He who will sustain you. I have made you and I will carry you; I will sustain you and I will rescue you. (Isaiah 46.4. John 12:12 states, “Is not wisdom found among the aged? Does not long-life bring understanding?
In summary, we do not stop playing because we grow old. There is a fountain of youth; it is your mind, your talents, the creativity you bring to your life and the lives of people you love; the longer I live, the more beautiful life becomes. Ageing is not lost youth but a new stage of opportunity and strength. The secret of health and aging for both mind and body is not to mourn for the past; not to worry about the future, but to live in the present moment wisely and earnestly.
Dr. Barbara Young July 25, 2020
Click to Play
What Makes Cyber Hackers Tick?
By Tadia Rice
It’s important to know who Kevin Mitnick is to understand the who, what, and why that took him down – and he needed to come down. His illegal cyber activities had potential to do more harm than anyone could imagine. He belongs in the annals of computer security history, but not for good reasons one would hope to aspire. His story is fascinating. He wasn’t the best, or the worst, but he’s become the most well known. And he’s made a lucrative career of it. It is a story that has, and will, continue to be repeated by innovative cyber cowboys, and girls, in unexpected places in the world. It’s a lesson for all - in ways no one could have imagined even fifty years ago. No one could have portended the implications of his actions, nor was the computer world ready for his digital destruction. There’s a villain to the story, and a hero. First, we’ll look at the villain. Kevin Mitnick was a 12-year old shy and overweight teenager living in California’s San Fernando Valley. He was a brilliant, but shocking bored adolescent. He figured out how to reverse-engineer the Los Angeles public transportation transfer system so he could ride the buses for free. The next year, in 1981, the 13-year old juvenile prodigy Mitnick used early forms of password crackers to steal classmate’s information. He quickly figured out how to use an electronic ham radio device to make free, longdistance calls, becoming an early phone “phreaker” before getting caught and earning a one-year probation for this early misdeed.
Mitnick shared his perspective on the early days of hacking to Kill Screen publication dated August 25, 2011: “The funny thing is, when I started hacking, it was a different era. In 1980 I was a senior in high school, and I tried to get into computerscience class. One of the first assignments was to write a program to find the first 100 Fibonacci numbers. I thought it would be cooler to get people’s passwords, so I wrote a program that simulated the computer system at school — when students would sign into the computer, they would actually be talking to my program, pretending to be the computer.” [1] In short course, his escalating cyber deeds would lead Mitnick to hack into the North American Defense Command (NORAD), a feat that inspired the 1983 American Cold War science fiction film, “War Games.” The three-time nominated Academy Awards film
chronicled the nuclear emergency created by character of David Lightman, a young hacker, like Mitnick, who unwittingly accesses a United States military supercomputer programmed to predict possible outcomes of nuclear war. [2]
Once is Never Enough
Once wasn’t enough for Mitnick, not even a few. Mitnick hacked in to MCI, Digital Equipment Corp, Motorola, Sun Microsystems, Netcom, Jet Propulsion Laboratory, Security Pacific, Pierce College, Great American Merchandising, and likely
many yet unnamed others. Mitnick became a fugitive on the run as the hacking and communications-related criminal evidence against continued piling up against him. His rap sheet grew. During the two years preceding his arrest, Mitnick spent one year in a low-security prison, and three years of supervised release, but served one year, most of it at a halfway house for people with compulsive disorders. It would be in 1995 that a 25-count indictment against Mitnick would include charges ranging from computer fraud, illegal possession of unauthorized access devices for hacking into personal, corporate, and government computers, possession of unauthorized access devices, and wire fraud. He was finally arrested after a national hacking spree that earned him the merciless spot on the FBI’s most wanted list. It would be until 1999, however, that Mitnick would be sent to prison where he spent 46 months. Although Mitnick had become a cult hero to many, especially those wanna-be hackers and cyber trolls, Steve Gold, a news editor of Secure Computing Magazine and a former hacker himself, told The Independent of London on March 18, 1999, “For all that he's done, there are despots and murderers out there who have suffered less than Kevin.” [3] CNN Interactive covered the trials of Kevin Mitnick in March 1999. Reporter John Christensen quoted Assistant U.S. Attorney Christopher Painter saying, “He's a danger to the community,” said Painter. “We're talking about someone who has consistently and without self-control hacked into systems everywhere. He also was a fugitive and used multiple identities. We think there's a firm basis for holding him, and the courts have agreed.” The deeper and more compelling part of the story is the story behind it - about the innocent man who would unwittingly become the unexpected hunter hacker who finally had the intellectual power to bring down Mitnick. Once thought to be impervious to capture, it would be on Christmas Day, 1994 at 2:09 p.m. (Pacific Standard Time) that Mitnick anonymously IP spoofed a computer security researcher working at the University of California at San Diego Supercomputer Center. His name: Tsutomu Shimomura. His email address: tsutomu@ariel.sdsc.edu.
Shimomura, a 30-year-old computational physicist and renown security guru, explained the TCP dump packet logs at a presentation given at the Computer Misuse and Anomaly Detection on January 11, 1995 in Sonoma, California. He was able to show the actual logs, and explained, “...that two different attack mechanisms were used. IP source address spoofing and TCP sequence number prediction were used to gain initial access to a diskless workstation being used mostly as an X terminal. After root access had been obtained, an existing connection to another system was hijacked by means of a loadable kernel STREAMS module.” [4] Two different attack mechanisms were used to gain access to an x-terminal workstation: IP source address spoofing and TCP sequence number prediction. Mitnick got root access and hijacked an existing connection. That got him access to the rest of the system. The detail was explained this way: The first IP spoofing probes came from toad.com to determine if the system could be exploited with an IP spoofing attack. Shimomura explained that about six minutes later a flurry of TCP SYNs from 130.92.6.97 to port 513, also a privileged port, filled the connection queue with half-open connections. Then came 20 connection attempts from apollo.it.luc.edu to determine the behavior of x-terminal's TCP sequence number generator. Within 16 seconds the first spoofed packet shut down. What followed, however, was that, “...root access had been gained via IP address spoofing, a kernel STREAMS module named tap-2.01 was compiled and installed on x-terminal... and used to take control of an already authenticated login session...” Shimomura mistakenly thought that firewalls were too restrictive so he did not use one. Although he used encryption and a set of log files to track activity on his machines, the
technology had become obsolete. Security was breached. Shimomura emailed the logs to a research assistant to check for intrusions, and an automated process mathematically compared all log files with one another. An inconsistency was found and the assistant contacted Shimomura. However, Mitnick deleted the log file to cover his tracks. Three days later, on December 27th at 4:33 p.m., Mitnick escalated his behavior by leaving a threatening message on Shimomuraʻs voice mail, mysteriously speaking in a faux-British accent saying, “Damn you. My technique is the best. My boss is the best. Damn you. I know the best technique. I know send mail technique, and my style is much better. Damn you. Don't you know who I am? Me, and my friends, will
kill you. (second voice) Hey boss, your kung fu’s really good! (first voice) That's right, my style is the best.” On December 30th at 2:35 p.m., another call came in to Shimomuraʻs voice mail. Mitnick said, “Your security technique will be defeated. Your technique is no good.” The next message, left on January 5, 1995 at 12:28 p.m., was simply eerie music. A third message came on February 4, 1995, after which a Newsweek article mentioned the attack. “Ahh... Tsutomu, my learned disciple. I see you, you put my voice for Newsweek, you put it on Newsweek and you put it on the net. Don't you know that my kung fu is the best? My kung fu is great! Why you put my voice on the net? This is not good! Have I not taught you, grasshopper? You must learn from the master. I know, I know all the techniques and styles. I know tiger claw style. I know trane, I know crane technique. I know, crazy monkey technique. and I also know rdist and send mail. And you put my voice on the net? I'm very disappointed, my son.” Disturbingly, of the six messages Mitnick left, this one on February 15, 1995 was delivered after he was arrested: “Hi, it is I again, Tsutomu, my son. I just want to tell you, very important, very important, all these phone calls you received with uh, making reference to kung fu movies? Nothing to do with any computer thing whatsoever. Just a little, uh, interesting call. I see now that this is getting too big, way too big. I want to tell you, my son, that these have nothing to do with any computer, activities whatsoever. Just, making fun of kung fu movies. That's it, that's it. And making reference to, uh, you know trying to make a reference to, putting kung fu movies into, the, into a computer, reference. That's it. Nothing to do with any, Mitnick, hacking, anything. Nothing. I tell you, it was just an interesting call. That's it. All coincidence. This is getting too big, and nothing wrong has been done by anybody who left any messages on your voice mail. Just to let you know. OK? It's getting way too big.” The last message was on February 15, 1995: “Tsutomu, my friend. I just want to say, want to reiterate, it is big joke. It is big, make fun of kung fu movies. Have nothing to do computer hacking, Mitnick, nothing. You tell me, do not send them, to come and get me. No do not fly out to come and get me. I'm not worth it. Just make fun of kung fu movies. That is it. Thank you.” [5] Mitnick was already the center of attention by the FBI. Since 1992 he had been wanted for a probation violation on a computer theft charge, yet, he continued to copy Shimomuraʻs electronic files. Shimomuraʻs system contained two Internet service providers, the Sausalito-based WELL and the San Jose- based Netcom
Communications Inc. to companies that housed thousands of credit card numbers. The potential for theft was enormous as the security of credit card transactions was evaporating. Further, Shimomura knew that material on his system also included computer software controlling cellular phone operations. Shimomura said that material found also included computer software controlling the operations of cellular phones, “One of the reasons I think he broke into my machine is I work with companies that do work for cellular companies,” he said. Shimomura's files also included “some of the tools we have used to track these guys. I believe he was after those tools.” [6]
The Sting
Quickly working together to set a trap, Shimomura, the FBI, other law enforcement agencies and also industry sources started setting an electronic manhunt Mitnick. Shimomura reported widely on the theft of his files, and on-line alerts were sent to computer programmers and professionals, as well as Internet enthusiasts. Mitnick became more audacious and broke into the account of a public policy group that opposed government intrusion in the computer world. Mitnick was using modified cellular technology to try to hide himself. It was time for the sting. Tsutomu had his machines “halted” and his disks analyzed. They looked at the very basic data structure of the disk to recreate the deleted log file, and then created various programs to analyze the bit patterns on the disk to retrieve the log information. Observing Mitnickʻs pattern of hacking, Shimomura teamed up with federal agents on February 8, 1994 as the hunt intensified. Then Mitnick began accessing The WELL through Netcom, a commercial network that contained Shimomura’s stolen files. It was this large ISP network that had become the staging point for many of Mitnicks’ attacks. Computational physicist Shimomura suspected Mitnick was behind the thefts, so for two weeks he methodically and meticulously tracked Mitnick Based on information stolen, along with data Mitnick was interested in. Shimomura and government investigators tracked the elusive Mitnick. Shimomura used his own modified cellular technology to trace Mitnick's phone activity to the Raleigh, North Carolina area of the U.S. Shimomura and his team called in the FBI. He found Mitnick. After a two-and-a-half-year computer hacking spree the kept Mitnick on the run, the 24-hour stakeout was successful. The FBI arrested Mitnick at his apartment in Raleigh at 1:30 a.m. on February 15, 1995.
Mitnick admitted using a number of tools to commit his crimes, including: • Social engineering; • Cloning cellular telephones; • Sniffer programs placed on victims' computer systems; and • Hacker software programs.
He also admitted that he stole E-mails, monitored computer systems and impersonated employees of victim companies. Mitnick pleaded guilty to four counts of wire fraud, two counts of computer fraud and one count of illegally intercepting a wire communication. He acknowledged altering computer systems belonging to the
University of Southern California and signed a plea deal admission for breaking into a number of computer systems and stole proprietary software belonging to Motorola, Novell, Fujitsu, Sun Microsystems and other companies. Charges against Mitnick related to the following United States Computer Fraud and Abuse Act cyber security laws: • 18 U.S.C. § 1030. Fraud and Related
Activity in Connection with Computers; • 18 U.S.C. § 2510 et seq. Wire and
Electronic Communications Interception and Interception of Oral Communications; • 8 U.S.C. § 2701 et seq. Stored Wire and
Electronic Communications and
Transactional Records Access • 18 U.S.C. § 1029. Fraud and Related
Activity in Connection with Access
Devices
Felony and Fame
Mitnickʻs story does not end here. His trial, and the media coverage of the nascent days of cybercrime prosecution, raised public awareness not only about security issues involving networked computers, but also the new technological frontier had not yet found a match to legislation that could deal with these crimes in 80s and 90s. Today, antihacking legislation is far more appropriate for the current cybercrime environment. Mitnick was held without a bail hearing for four and a half years and held in solitary confinement for eight months before being sentenced. In 1999, Mitnick was sent to prison where he spent 46 months in prison. Some considered this punishment excessive. The FBI calculated the value of the damage that Mitnick perpetrated against the following companies: [7]
• Sun Microsystems: hundreds of millions of dollars • NEC America, Inc: the (stolen) software design for a NEC cellular mobile telephone $1,750,000.00 • NOKIA Mobile Phones (UK) LTD: minimum US $135 Million • NOVELL: cost associated with the development of the source code in excess of $75,000,000 • Fujitsu: $5,517,389.61 In his book, The Art of Deception: Controlling the Human Element of Security, Mitnick states that he compromised computers solely by using passwords and codes that he gained by social engineering. He claims he did not use software programs or hacking tools for cracking passwords or otherwise exploiting computer or phone security. [8] Investigative reporter Jonathan Littman wrote The Fugitive in response to Mitnick’s book, alleging the following key points: [9] • Journalistic impropriety by Shimomuraʻs co-author, John Markoff, who had covered the case for The New York
Times, based on rumor and government claims, while never interviewing Mitnick himself; • Overzealous prosecution of Mitnick by the government; • Mainstream media over-hyping Mitnick's actual crimes; • Shimomura's involvement in the matter being unclear or of dubious legality.
The two men, who both had shoulder-length hair, finally met one another in the courtroom pre-arraignment hearing. “Hello, Tsutomu,” Mitnick said to Shimomura. “I respect your skills.” The story of Kevin Mitnick, FBI Most Wanted, computer outlaw, and cybercriminal extraordinaire is a good one. But the story of Tsutomu Shimomura is better. He made the “takedown” heard around the globe happen. He demands my respect for his intellectual clarity and moral courage. Shimomura explained, “The real motivation for tracking him, for putting together a team to go after him, was that we considered this was not
acceptable behavior, and it will not be tolerated. My feeling was he had caused a lot of grief for a lot of people, and he had incentive to stop. He had been to prison before, and he still continued. It wasn't acceptable behavior, and something had to happen. It seemed throwing someone in prison is a very inelegant way of stopping someone. I wish there were an elegant way.”
Had Shimomura not assembled the puzzle that stopped Mitnick from moving forward in his criminal capacity, the economic damage could have been unimaginable, not to mention how cyber attacks have significant socio-economic impact on both global enterprises and individuals. Mitnick could have wreaked havoc in a multitude of ways—identity theft, cyber bullying, data leakage, distributed denials of service, and malware attacks on medical devices and smart vehicles. He could have brought businesses and governments to their knees and tanked the economy of the globe. No one should have that power, and Shimomura prevented that from happening. The world owes him a great debt.
Today, continuing to work on advanced technology, Tsutomu Shimomura is CEO and founder of Neofocal that produces innovative semiconductor chips considered to be fundamental technology to provide power to products that use “smart LED” more efficiently. Kevin Mitnick, now 54 years-old, runs his own security firm that does security consulting for Fortune 500 companies and the FBI, performs penetration testing services for the world's largest companies and teaches Social Engineering classes to dozens of companies and government agencies. He is a millionaire. Kevin Mitnick certainly was an intentional computer security hacker, but not to be the only one taken down. Computer forensic technologists, like the unintended Shimomura, are the ones who find the electronic evidence to catch the cybercriminal. It is fundamental to the world of law enforcement. Famous folk were caught by forensics, albeit less sophisticated than the newer cyber crimes, but just as
impactful.
Not long ago, I was hit head on by a driver who made a U-turn on the freeway while driving at the speed of 65 miles per hour. So how did that happen? Well, he lost control of his car while retrieving his cell phone, which means he must have had his left hand on the steering wheel while retrieving his phone with his right hand, causing his left hand to lose control of the steering wheel, thus making a 180- degree left turn. The driver hit my car first, which caused me to hit another car before mine came to a stop when my entire car hit the center divider. In any case, the driver who lost control ended up hitting two other cars, and since one of them had a passenger, there were four victims in this accident including myself. Even though my automobile was a total wreck, I’m glad everyone involved was ok and not seriously hurt. Upon finding out from the body shop that my car was totaled, my first reaction was to get a rental car while I wait for the insurance companies to sort it out and send me a check to get another vehicle. After all, it does state on my insurance contract I have rental coverage for 30 days. However, little did I know that once the insurance company inspects and verifies my car as a total loss, the insurance company gave me only two business days to get another vehicle or I will have to pay for my own rental car going forward. This doesn’t sound fair at all by any stretch, but what’s really upsetting is that since my car was a lease, I had to deplete my savings account by $3500 as a down payment for another lease. What if I didn’t have any extra funds in my account? Would I have to start walking or taking public transportation everywhere I go while I wait for the settlement for an indefinite period? Not that there is
anything wrong with walking or taking public transportation, but it is a bit inconvenient when I often must rely on driving to perform my job duties at work. Keep in mind, there are four people involved and everyone must agree upon and share the minimum liability coverage of the driver at fault. “Being adequately insured and saving up for an emergency fund is crucial for yourself and the well-being of your family” My financial woes don’t end there. Having been injured, now I must seek medical care. My first thought was to see a Doctor who works on contingency which means they will be paid out from my settlement once the case is settled. The problem with that is, the medical provider wanted me to sign a contract stating that if the amount of the settlement isn’t enough to pay the final amount of my medical expenses, I will personally be liable to pay the difference. Now that to me, just sounds like financial suicide. With no other option, I use my own medical insurance to obtain the needed physical therapy. My therapy lasted for about two months. Once my treatment was over, within a few weeks, I received my first medical bill. At this point, my case was no closer to getting settled so I called the patient support line on the bill to let them know that my case is still pending and eventually, I will be able to pay them once the case settled. To my surprise, the representative on the other end advised me that I should begin paying the bill as soon as possible. Otherwise, it might get sent to collections and ultimately ruin my credit I’ve worked so hard to build up all these years. Of course, without hesitation, I made a payment arrangement to pay in monthly installments out of my own pocket. As you can see, just because you may be the victim in an accident, this does not mean you will be financially taken care of. Not only did I have to pay out of my own pocket for a down payment on another car, I had to first start paying for my own medical bills, all
before even settling the case. Once the case settled, the monetary portion I received was so minimal, it did not justify all the pain and suffering I endured throughout this ordeal. Therefore, I made a claim to collect on my underinsured motorist coverage. About the underinsured motorist coverage, keep in mind that I am only able to make a claim if my coverage is higher than the liability amount that I received from the insurance company of the at-fault driver. Let’s say for example, the at-fault driver has only the minimum liability coverage in the state of California of $15,000 per person and $30,000 per accident. Since there are four people who are entitled to split the $30,000, I can only claim the difference of what I’m covered for minus the amount I already received. Let’s just say I only received $9,000 for the liability claim; remember, onethird of that goes to the attorney so my portion is only $6,000. Now, if I only purchased underinsured motorist coverage of $15,000, then the maximum I will be entitled to, if the insurance company agrees, is $6,000 ($15,000-$9,000). Again, one-third goes to the attorney, so I will only end up with $4,000 if my auto insurance company even agree that I deserve extra compensation for my pain and suffering. What’s the moral of the story? I recommend every driver obtain a higher amount of uninsured/underinsured motorist coverage just in case it’s ever needed. Through my own experience, I have now increased my uninsured/underinsured motorist coverage to $100,000 each person / $300,000 per accident. I’m not planning to use it anytime soon, but life is a moving target and no matter how careful you may be, accidents can happen at any time. Therefore, being adequately insured and saving up for an emergency fund is crucial for yourself and the well-being of your family. As a rule of thumb, have at least nine months-worth of emergency funds for those one-off situations you may never have imagined could happen.