Four tips for protecting your identity against cybercrime

Technology

Four tips for protecting your identity against cybercrime

With more than 9.9 million people every year becoming a victim of identity theft, review these tips and be mindful of your online activity

With more than 9.9 million people every year becoming a victim of identity theft, review these tips and be mindful of your online activity

The ability to communicate and perform financial transactions over the internet has provided convenience and time management for many people. However, with more and more transactions conducted over the web, the federal trade commission reports that about 9.9 million people are victims of identity theft each year.

Fortunately, you can take steps to safeguard your information so you don’t become a victim of identity theft or the cyber swindling of your financial assets.

Be proactive and consider implementing the following suggestions:

  • Invest in a micro shredder to shred any financial documents or paperwork with personal information before you throw them away.
  • Use only secure websites with “https” at the beginning of the URL (“s” stands for secure) or websites that show a padlock icon in your browser’s security status bar. These signs indicate that the website has passed certain security measures to ensure the privacy of user data.
  • Never click on links sent in unsolicited emails; although these sites may seem legitimate they are often fakes. Exit the email and visit the website from your Internet browser to see if the offer is legitimate; call the phone number on that website to make inquiries.
  • Do not pay bills, bank, shop or conduct other financial transactions on a public or shared computer, or on any device (such as a laptop or cellphone) that is using a public wireless network, as the security is unreliable.

While you do have to take precautions when using the Internet, according to Javelin Strategy & Research, making online payments is considered safer than paying by mail. That’s because information is encrypted over the Internet, whereas thieves generally obtain personal data through low-tech methods like stealing physical property and “dumpster diving” (rummaging through trash for household bills). Consider eliminating as many paper statements, bills and checks as you can, and replace them with electronic transactions. 



View more


Back to Top

Related articles

Ensure that you are cyber secure
Ensure that you are cyber secure VIEW VIEW
Hacked!
Hacked! READ READ
Cutting the cable [INFOGRAPHIC]
Cutting the cable [INFOGRAPHIC] VIEW VIEW

Sort by topic

Sort by Topic