With the advent of the World Wide Web, a whole new breed of criminals have surfaced, posing threats to more than just our material assets, but also to our very identities. Although there are a number of effective methods for protecting yourself from internet identity theft, not everyone takes the necessary steps to initiate such a plan. By tightening up your own personal security measures, you'll be far safer when you go online, and much less likely to become just another victim in the world of cyber-theft.
Securing your Channel
Anybody who's spent any amount of time online knows that internet addresses begin with "http://". This is used to electronically communicate the request for a line in which to jump onto the internet, and is what most people use for web surfing. Those who are a bit savvier know that a request can be put in for a secure channel, which will deflect attempts to capture any personal data that may be transmitted through the line, such as in the case of bank account numbers for those who prefer to do online banking. In order to request a secure channel, simply begin the web address with "https://" ? the "s" is a red flag to the system that you're requesting a secure channel.
Credit Card vs. Debit Card
Making online purchases using a credit card is a fairly common practice today, but is far different from using a debit card online. If you really must make a purchase in this way, don't ever use a debit card. Once the funds are removed from your account, you'll be unable to retrieve them, but a credit card charge can be disputed and ? in most cases ? the amount that was charged without your authorization can be retrieved.
Phishing Scams
While it's simply common sense not to provide anyone with your password to an online account ? or other information that might be used to access it by an outside entity ? some rather creative scams have been perpetrated, which are convincing enough to lure even the most cautious of consumers into their trap.
The best example of this type of scenario would be the receipt of an e-mail from your bank, payment service or online auction host that appears to be perfectly legitimate, telling you that you need to confirm your account number, password or balance due to some type of fraud investigation, etc., that they've initiated.
Typically, a link is offered that you're instructed to click onto, in order to verify that you are, in fact, the owner of the account. When you sign in with your screen name and password after clicking on the link, these electronic thieves capture that information and use it against you in the future.
The moral of the story is that, if you should receive any type of communication from one of these types of institutions, always use an outside internet line to contact them directly in order to confirm the fact that they've sent you this e-mail. In nearly every case, these messages are fraudulent.
Social Security and Credit Cards
Since cards such as these contain extremely sensitive information about your identity ? particularly in the case of the social security card ? then the best way to guard against internet identity theft is to avoid providing them online. If these are truly needed in order to process some type of transaction, then it's better to request that a hard copy form is sent to you through the postal service, and take care of the matter in that way.
Use Common Sense
Protecting yourself from internet identity theft is largely a matter of common sense. If there's a bit of sensitive information that no-one else should be privy to, then it's not a good idea to blast it across the internet ? unless you're feeling very, very lucky.
The author grants reprint permission to all venues so long as the copyright and by-line are included intact.
Copyright © 2005 Preventing Identity Theft.com All Rights Reserved.
About the Author: Nikki Greene is dedicated to helping you become better informed when it comes to preventing identity theft. Sign up for her "Preventing Identity Theft Newsletter" and keep up with the latest trends, identity theft in the news, and how you can safeguard your identity: http://www.preventing-identity-theft.com/
If you know what is the 'Fishing' then it's very... Read More
So called phishers try to catch the information about the... Read More
There you are busily typing away on your PC or... Read More
No auntie Sookie, not earth worms, computer virus worms that... Read More
As you know, this time the virus under the name... Read More
A crowded marketplace can lead to unethical webmasters using underhand... Read More
There has not been a time in the history of... Read More
There are ways to insure security though. You can get... Read More
What is a Firewall?The term "firewall" illustrates a system that... Read More
Phishing in its "classic" variant is relatively well-known. Actually, 43.4... Read More
Computer infections can be broken up into 4 main categories... Read More
This is not some new fangled techno-speak, it is a... Read More
The Federal Bureau of Investigation has identified "phishing" as the... Read More
One evening, during the graveyard shift, an AOL technical support... Read More
Identity Theft is one of the most serious problems facing... Read More
Spyware/adware is a new major concern for PC users everywhere.... Read More
You've seen it in the news - 40 million credit... Read More
First the basic definition of Spyware: It is a type... Read More
There are folks out there who use their powers for... Read More
As soon as almost all computer users already got used... Read More
Do you sometimes notice your computer running slower. Is your... Read More
In recent days, I was one of the unfortunate persons... Read More
With the Internet entering our lives in such an explosive... Read More
Credit card fraud is a growing problem for online businesses... Read More
The Internet is a vast International Network of people and... Read More
"You've just won a fabulous vacation or prize package! Now,... Read More
1)Spyware is on your system. Like it or not, statistically... Read More
High-tech private investigators are becoming the answer for many Internet... Read More
Spyware is the most troublesome software to appear on the... Read More
Nobody wants to pay to remove spyware. At the very... Read More
A friend called me one day and asked if I... Read More
Whether we like it or not, we are all living... Read More
The top five online scams on the Internet hit nearly... Read More
Over £5 billion pounds was spent on online shopping in... Read More
Monday morning, 6am; the electric rooster is telling you it's... Read More
Did you know...? 1 in 5 children who use computer... Read More
After Two Security Assessments I Must Be Secure, Right? ---------------------------------------... Read More
Remember the television show about the nosy neighbor Mrs. Kravitz... Read More
We all know that it's dangerous to use the same... Read More
Blaster, Welchia, Sobig, W32, Backdoor, Trojan, Melissa, Klez, Worm, Loveletter,... Read More
Phishing: (fish'ing) (n.)This is when someone sends you an email... Read More
May. 16th 2005 - MicroWorld has reported the discovery of... Read More
The words Corporate Security may conjure up images of a... Read More
Viruses, Bugs, Worms, Dataminers, Spybots, and Trojan horses. The Internet... Read More
Computer infections can be broken up into 4 main categories... Read More
Spies, spyware, internet parasites are among what they are usually... Read More
Is your enterprise following the rules?The bulk of financial information... Read More
So you want to know who your kids are chatting... Read More
A week or so ago, I received an inquiry from... Read More
A couple of days ago, I was searching for a... Read More
|