Kesar Tech

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Thursday, 30 December 2010

How to Prevent Identity Theft.

Posted on 22:52 by Unknown
Identity thieves use many different ways to steal your information. They use low-tech methods (stealing your wallet or even eavesdropping at key moments) or they use sophisticated Internet scams to rob people of their sensitive personal data.

That's why it's so important to protect any documents, banking cards, or sensitive numbers that can be used by thieves for their personal gain.

The following are a basic guideline to help you reduce the risk of identity theft, whether you are online or offline:
  • Monitor your credit closely. Your credit report contains information about your credit accounts and bill paying history so you can be tipped off when someone is impersonating you. Watch for suspicious signs, like accounts you did not open. You can also consider identity protection services, which range from credit monitoring to database scanning, for extra security.
  • Keep records of your financial data and transactions. Review your statements regularly for any activity or charges you did not make.
  • Install security software (firewall, anti-virus, anti-spyware software) and keep it up-to-date as a safety measure against online intrusions. Use an updated Web browser to make sure you're taking advantage of its current safety features.
  • Be wary of e-mail attachments and links in both e-mail and instant messages. Use caution even when the message appears to come from a safe sender, as identity information in messages can easily be spoofed.
  • Store sensitive data securely. Just as you keep sensitive paper documents under lock and key, secure sensitive online information. This can be done through file encryption software.
  • Shred documents (both paper and electronic) that contain personal or financial information before discarding them. This prevents dumpster diving and, in the online world, the ability for hackers to bypass information that has not been permanently deleted from your computer.
  • Protect your PII. Be cautious about giving out your personally identifiable information (PII) to anyone. Find out why the information is needed, and if it's absolutely necessary to give out. Be careful about the details you provide about yourself online, such as on social networking sites.
  • Stay alert to the latest scams. Awareness and caution are effective methods to counter fraud. Share security tips you learn with your friends and family.

You may ask, "What do I do if I think I may have already given my information to a scammer?" Helpful sites like the Identity Theft Resource Center (ITRC) have you covered! Refer to the ITRC's fact sheet, " I Gave My Info to a Scam Artist, Now What" to find out the immediate steps to take, tips for dealing with authorities, and additional resources. On the ITRC's website, you'll also find specific information to help guide you through a variety of identity theft issues — including safety tips and tactics aimed specifically at college students, job seekers, and travelers.

Hopefully you find this helpful & I think this is Keith signing off. Have A Happy New Year.

Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in Informative, Security | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • I need your help.
    Hello and thanks for tuning in for another episode of the Kesar Tech blog. Today I would like to go in a little bit of a different directi...
  • 10 Reasons to Root Your Android Device
    Hello & Happy New Year. For those of you with Android devices, here is a way to take control of your device. It's called "Rooti...
  • Belarc Advisor
    This entry is to explain what the Belarc Advisor link on this page is for. Belarc's products automatically create an accurate and up-to-...
  • How do you get infected with malware?
    The answer to the above question is: Social engineering! Several people have asked me this very question, so to you guys, here is your answe...
  • Welcome
    Let me first start by saying, I am by no means an expert at writing, so you will probably find many grammatical errors and maybe even a spel...
  • Extortionware / Rogue Security Software / Malware
    You may not be familiar with the terms ‘rogue software, extortionware, or malware’ but there’s a very good chance that you or someone you kn...
  • Cell phone privacy reminder
    Cell phone numbers became public in March, and telemarketing companies can now call you on your cell. If you do not want to receive these ca...
  • Banking Scam
    Hello Everyone, I received the following scam email in my junk email account today. Many thing alerted me that this was false. * I have a Ch...
  • Free Download F-Secure Anti-Theft for Mobile 6.2
    Are you worried about your mobile phone being stolen and all your info (contacts, account info, etc..) being used for evil? Have no fear F-S...
  • Beware of Christmas scams
    Scammers absolutely love the holiday season. There are likely to be more online scam victims during those busy shopping and travelling Decem...

Categories

  • Facebook
  • Informative
  • Other
  • Security

Blog Archive

  • ►  2014 (1)
    • ►  January (1)
  • ►  2013 (14)
    • ►  December (6)
    • ►  November (3)
    • ►  October (1)
    • ►  September (1)
    • ►  August (1)
    • ►  June (1)
    • ►  April (1)
  • ►  2012 (20)
    • ►  November (3)
    • ►  October (1)
    • ►  September (1)
    • ►  August (3)
    • ►  July (1)
    • ►  May (3)
    • ►  April (3)
    • ►  March (2)
    • ►  February (2)
    • ►  January (1)
  • ►  2011 (48)
    • ►  December (3)
    • ►  November (4)
    • ►  October (2)
    • ►  September (2)
    • ►  August (4)
    • ►  July (1)
    • ►  June (8)
    • ►  May (3)
    • ►  April (6)
    • ►  March (9)
    • ►  February (3)
    • ►  January (3)
  • ▼  2010 (32)
    • ▼  December (5)
      • How to Prevent Identity Theft.
      • Adobe exploits continue to be found.
      • Google, Microsoft Duped Into Serving Malware Ads.
      • Facebook Places - good or bad?
      • Armor for Social Butterflies
    • ►  November (2)
    • ►  October (2)
    • ►  September (2)
    • ►  August (2)
    • ►  July (1)
    • ►  June (2)
    • ►  May (2)
    • ►  April (3)
    • ►  March (2)
    • ►  February (4)
    • ►  January (5)
Powered by Blogger.

About Me

Unknown
View my complete profile