When it comes to your identity, computer technology can be both your friend and foe. Computers and the internet have changed our lives. They have positively influenced the way we shop, find, store and use information, and manage our personal and professional business. Unfortunately, the important advantages computers and the internet provide do not come without a clearly defined element of risk to our personal information.
Identity theft has become an increasing problem, with technology playing a key role. You see it in the news almost daily – “Stolen UC Berkeley laptop exposes personal data of nearly 100,000” or “FBI seeks stolen personal data on 26 million vets.” We cannot control the security measures our employers and creditors take, but we can take important measures to ensure we are doing the best to avoid being an identity theft victim.
Secure Your Personal Computer
It’s easy to be lax with the information we keep on our personal computers. Personal information, financial data and passwords all need to be protected to avoid their being stolen and used by an identity thief. Ensure that “passers-bys” cannot access key ID and financial data by securing it with passwords. You probably do not know the background of the pest control person or the housekeeper and without secure password protection, anyone with access to your computer could take a quick look and find data that they could use or sell to a hungry ID criminal. When creating these passwords, always use a combination of numbers and letters that will seem completely illogical to anyone but you. Do not use a birthday, children’s name, etc. because they are too easy to figure out. To help secure your computer from an Internet security breach, install Internet security software including a firewall. A firewall is a barrier that protects your computer from anyone who tries to access it from outside without authorization.
Become E-Mail Savvy
Email is an outstanding tool for communication, but we need to be aware of the potential for its misuse by identity thieves and act accordingly. There are two common ways criminals can target you via email:
- Phishing is an email fraud method where the ID thieves send you a legitimate-looking email in an attempt to get hold of your personal and financial information. In a recent Federal Trade Commission (FTC) case, a 17-year-old male sent out messages purporting to be from America Online that said there had been a billing problem with recipients’ AOL accounts. The perpetrator’s e-mail used AOL logos and contained legitimate links. If recipients clicked on the “AOL Billing Center” link, however, they were taken to a spoofed AOL Web page that asked for personal information, including credit card numbers; personal identification numbers (PIN), social security numbers, banking numbers, and passwords. To avoid being a victim of a phishing fraud, never go directly from an email link into a web site with a form asking for your information. Always put the actual URL, not the one in the email, into your web browser and sign in directly. Potential phishing activity should always be reported to the company and or organization associated with the questionable email.
- Spyware can be used to gather all types of confidential information and in most cases the user has no idea the information is being taken. Spyware lets the spy access everything you do online including usernames, passwords, online shopping purchases and e-mail or chat correspondence. In the hands of an identity thief, this type of information is a deadly treasure trove. The spyware can get to your computer via an email attachment. To avoid inadvertently installing spyware on your computer, never open an email or email attachment from a sender who is not familiar.
Surfing, Sharing and Passwords
Be careful what you do, where you go and where you buy. Your computer will warn you if you are about to enter a web site or page that is not “secure” meaning you information will not be encrypted to protect your privacy. Never input personal, password, financial or credit card information into insecure pages. Secure web pages will have an https:// web address rather than http://. The “s” means secure. Insecure web pages may also include a broker key symbol or an open padlock symbol at the bottom of your screen.
Are You a Victim?
Because most of us have not been computer/internet security savvy from day one, it is possible that your personal information has already be jeopardized and a thief is waiting patiently for the right time to take over. If a criminal does get your personal information via the web, without an ID monitoring service to watch for changes and the use of your that data, you may not become aware of the misuse of your identity until sever financial damage has already occurred. The thieves will take the information they obtained via the web to recreate your identity either for themselves or for sell it to a third party for future use. Stay on top of the use of your personal information. Do not become a victim.