According to FTC statistics, a case of identity theft happens every 22 seconds in America. Stories emerge every day about an individual or company taking a massive hit. Protecting yourself from these attacks might seem daunting, but staying safe is easier than you think. Here are six simple tactics that will help keep your identity safe.
1. Don’t Overshare
A number-one threat to identity security is social media. People live out much of their social lives online these days. It can be tempting to reveal personal information on those “about” pages. Resist the urge to post any details of your life, such as your address or phone number. These can be plugged into search engines to research more information about you and your loved ones. Even photos can be copied and used to construct a fictitious page. Think about the potential security issues involved before you make that post. Afterward is too late.
2. Beware of Neighbor Spoofing
One common trick used to steal personal data is called “neighbor spoofing.” Someone will acquire a phone number with a local area code to make it look like they’re a local business. That appearance of legitimacy will be leveraged to convince their victim to give out personal data over the phone or online. Always ask for official verification from anyone whose identity you aren’t sure of. A legitimate business shouldn’t balk at showing its bona fides to customers.
3. Avoid Ransomware Scams
A related scam making headlines is one called a ransomware attack. In these scams, a criminal attaches malicious software to an email attachment or link. When it’s opened, the software installs itself and takes over the victim’s computer. Victims are often forced to pay a “ransom” to regain control. Consider adding a firewall to your current antivirus suite. Firewalls look for suspicious software on incoming emails and flag them. Never click on an unfamiliar link, and always double-check web addresses. Mockup websites disguised to look like the real thing are another common criminal tactic.
4. Protect All Devices Equally
Networked systems are part of the information age. Since everyone is working from and communicating with multiple devices, you should give all of your devices equal protection. Consider installing antivirus software on your mobile devices, specifically if you use them for business purposes. Many smartphones (especially iPhones) come with formidable security measures built in, but it’s not a bad idea to see what can be added.
5. Be Suspicious of Public WiFi
Another vulnerability specific to mobile, networked devices is the dangers posed by unsecured WiFi connections. For the sake of customer convenience, public WiFi often has mediocre protection at best. Think twice about connecting to one that isn’t password protected. Try to minimize doing business on open connections. Personal data could be intercepted by anyone else nearby with the right skills. If it can’t wait, ask the proprietors or managers about their security measures.
6. Upgrade Your Passwords
Speaking of the importance of passwords, chances are that yours aren’t strong enough to counter modern cyber threats. The statistics are troubling: An eight-letter password using all-lowercase letters can be cracked instantly by cryptography programs. At a minimum, your passwords should be a mix of letters and numbers with the case of the letters varied. The best passwords are randomized and include symbols. All of these measures add to the time required to break the code.
Similarly, many passwords suffer from being too easy for human code-crackers to solve. Never make a password something personal, like a pet’s name. If someone learns information about you, they’ll likely be able to guess your password on a few tries. A tough password might be inconvenient for you, but it’s equally awkward for criminals.
Your money and reputation are far too important to risk losing them to a random cyberattack. Staying safe means learning how criminals think and how to counter their strategies. Let these bits of advice start your journey to better security.
Leave a Reply