fbpx
personal data privacy d-tech-educate
Please follow and like us:
Pin Share
5
(1)

1.What is identity theft?

Identity theft is any kind of deception, scam, or crime that results in the loss of personal data, including the loss of usernames, passwords, banking information, credit card numbers, Social Security Numbers and health ID’s, that is then used without your permission to commit fraud and other crimes.

For some consumers, identity theft is an annoying inconvenience and they can quickly resolve their problems and restore their identity. For others recovering their identity can cost hundreds, even thousands of dollars, take months to resolve, cause tremendous damage to their reputation, cause them to lose job opportunities, even influence the rejection of loan applications for school, homes or cars because would-be employers or loan companies see the damage on your credit scores. Some consumers have even been arrested for crimes committed by someone using their identities and have had to prove that they were not guilty.

2.How can I protect my identity online?

Below are a few key steps you can take to prevent identity theft online:

  1. Protect your computer and smartphone with strong, up-to-date security software. If your computer or phone is infected with malicious software, other safeguards are of little help because you’ve given the criminals the key to all your online actions. Also be sure that any operating system updates are installed.

  2. Learn to spot spam and scams. Though some  phishing scam are easy to identify, other phishing attempts in an email, IM, on social networking sites, or websites can look very legitimate. The only way to never fall for phishing scam is to never click on a link that has been sent to you. For example, if the email says it’s from your bank and has all the right logos and knows your name, it may be from your bank – or it may not be. Instead of using the link provided, find the website yourself using a search engine. This way you will know you landed on the legitimate site and not some mocked up fake site.

  3. Use strong passwords. Weak passwords are an identity thief’s dream – especially if you use the same password everywhere. Once the thief knows your password, they can log you’re your financial accounts and wreak havoc. You need passwords that are long (over 10 characters), strong (use upper and lower case letters, numbers and symbols), and that has nothing to do with your personal information (like name, age, birthdate, pet). Password managers and two-factor authentication (2FA) are also both best practices for password management.

  4. Monitor your credit scores. By law you have the right to three free credit reports per year; from Experian, Transunion, and Equifax.

    These three credit bureaus work together through a website called.

  5. Review your credit score. Look to see if there are new credit cards, loans or other transactions on your account that you are not aware of. If there are, take immediate steps to have these terminated and investigated.

  6. Freeze your credit. Criminals use stolen IDs to open new lines of credit. You can thwart their efforts to use your identity by simply locking (called freezing) your credit so that no new credit can be given without additional information and controls. Many states have laws giving you the right to a free credit freeze, but even where states don’t provide legal mandates, the large credit bureaus provide a voluntary security freeze program at a very low cost.

    To determine whether there are any costs associated with placing a security freeze on your credit, and for temporarily lifting that credit freeze when you do seek credit, see see State Freeze Requirements and Fees.

  7. Only use reputable websites when making purchases. If you don’t know the reputation of a company that you want to purchase from, do your homework. How are they reviewed by other users? Do they have a strong rating with the Better Business Bureau? Do they use a secure, encrypted connection for personal and financial information? Hypertext transfer protocol Secure (https), as its name suggests, is a more secure variant of the older Hypertext transfer protocol (http). The new protocol was developed to validate the safety and privacy of a site, so it’s important you see “https” in a website’s URL whenever it asks for personal or financial information.

  8. Stay alert. Watch for common signs of identity theft like:

    • False information on your credit reports, including your Social Security number, address(es), name or employer’s name.

    • Missing bills or other mail. If your bills don’t arrive or come late, contact your creditors. A missing bill may indicate that an ID thief has hijacked your account and changed your billing address to help hide the crime.

    • Getting new credit cards sent to you that you didn’t apply for.

    • Having a credit approval denied or being subjected to high-interest rates for no apparent reason.

    • Receiving calls or notices about past due bills for products or services you didn’t buy.

    • Be wary of public WiFi and think twice before joining an unsecured network.Virtual private networks, or VPNs,  are tools that can help you shield yourself from prying eyes on public WiFi networks.

How useful was this post?

Click on a star to rate it!

Average rating 5 / 5. Vote count: 1

No votes so far! Be the first to rate this post.

Please follow and like us:
Pin Share

By d-tech-educate

The passion for technology, the curiosity and the desire to discover more about the world of the internet pushed me to create an educational peace for technology which I hope will help a lot of people with the information they will get from my posts. For the creation of the website I followed many videos on Youtube and WordPress attracted me more and I started to create it, now I am very happy that I created it. D-Tech Educate is a new website created to publish materials that will educate site visitors to be adopted with the latest technology, take advantage of its benefits while being careful with privacy of personal data etc. Thank you !

Leave a Reply

Enjoy this blog? Please spread the word :)

%d bloggers like this: