. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

How you can defend yourself against identity theft

According to the Federal Bureau of Investigation (FBI), identity theft has become “the fastest growing problem in America.” In the United States alone, approximately 10 million Americans fall victim to identity theft each year, and that’s just from reported cases; you can imagine what the numbers would be all over the world. In addition, the growing reliance on the Internet and other electronic means for transactions is giving identity thieves more opportunities to steal personal information.

However, there are ways to protect yourself against malicious people. For one thing, there are several identity theft protection systems available, and these can provide you with quite effective security measures against those who want to steal your personal data. But then again, such apps can only go so far as to protect you if you are unaware of how the crooks would try to get to you in the first place. In fact, learning how your personal information can be stolen is your line of defense against this crime.

Secure your computer

Beware of unsolicited email solicitations as they are sometimes used by online scammers to steal your sensitive personal information. Any electronic correspondence requesting your financial or personal information should be ignored or reported to the authorities. Also, make sure your PC has virus protection software, as hackers can sometimes use malware to gain access to your computer and the data on it. Also, make sure you change your passwords regularly and don’t share them with anyone. Finally, take the time to install or subscribe to identity fraud detection services for an extra layer of protection.

Take steps to safeguard your postal mail

Your mailbox can be an attractive target for identity thieves, who may send you email with the intention of phishing your sensitive personal information. To minimize the risk of being scammed, work to reduce the number of unsolicited offers you receive. You can start by opting out of insurance newsletters or pre-approved credit card offers. If you want to continue receiving these types of offers in the mail, be sure to shred the documents before you throw them away.

Keep your social security number safe

The SSN is one of the most sensitive pieces of information, so make sure that, if possible, you are the only one who knows it. For example, make sure it is never printed on your checks or any type of personal identification. Also, avoid using your full name as your authenticator or personal identifier for transactions. In some cases, banks and other financial institutions may require the last four digits of the SSN for authentication (although some require the full set of numbers for this purpose). But aside from those establishments, any other entity that asks for your full SSN should be considered suspicious.

Beware of the caller seeking personal or account information

Sometimes identity thieves turn to the phone to get the information they want. In fact, most of them pose as bank representatives and claim that there has been suspicious activity on your account. Once they’ve set it up, they’ll ask you to provide your account numbers or PINs to verify it’s your account, but you shouldn’t give in. Here’s the thing: banks don’t ask for your details over the phone. It’s one thing to provide them with authentication when you’re the one calling them, but it’s an entirely different matter when so-called ‘bank representatives’ contact you looking for sensitive data.

Now, if you think someone is trying to gain access to your information using the methods listed above, or any other method, take steps to protect your information immediately and report your suspicions to the authorities.

Leave A Comment