With the advent of the World Wide Web, a whole new breed of criminals have surfaced, posing threats to more than just our material assets, but also to our very identities. Although there are a number of effective methods for protecting yourself from internet identity theft, not everyone takes the necessary steps to initiate such a plan. By tightening up your own personal security measures, you'll be far safer when you go online, and much less likely to become just another victim in the world of cyber-theft.
Securing your Channel
Anybody who's spent any amount of time online knows that internet addresses begin with "http://". This is used to electronically communicate the request for a line in which to jump onto the internet, and is what most people use for web surfing. Those who are a bit savvier know that a request can be put in for a secure channel, which will deflect attempts to capture any personal data that may be transmitted through the line, such as in the case of bank account numbers for those who prefer to do online banking. In order to request a secure channel, simply begin the web address with "https://" ? the "s" is a red flag to the system that you're requesting a secure channel.
Credit Card vs. Debit Card
Making online purchases using a credit card is a fairly common practice today, but is far different from using a debit card online. If you really must make a purchase in this way, don't ever use a debit card. Once the funds are removed from your account, you'll be unable to retrieve them, but a credit card charge can be disputed and ? in most cases ? the amount that was charged without your authorization can be retrieved.
Phishing Scams
While it's simply common sense not to provide anyone with your password to an online account ? or other information that might be used to access it by an outside entity ? some rather creative scams have been perpetrated, which are convincing enough to lure even the most cautious of consumers into their trap.
The best example of this type of scenario would be the receipt of an e-mail from your bank, payment service or online auction host that appears to be perfectly legitimate, telling you that you need to confirm your account number, password or balance due to some type of fraud investigation, etc., that they've initiated.
Typically, a link is offered that you're instructed to click onto, in order to verify that you are, in fact, the owner of the account. When you sign in with your screen name and password after clicking on the link, these electronic thieves capture that information and use it against you in the future.
The moral of the story is that, if you should receive any type of communication from one of these types of institutions, always use an outside internet line to contact them directly in order to confirm the fact that they've sent you this e-mail. In nearly every case, these messages are fraudulent.
Social Security and Credit Cards
Since cards such as these contain extremely sensitive information about your identity ? particularly in the case of the social security card ? then the best way to guard against internet identity theft is to avoid providing them online. If these are truly needed in order to process some type of transaction, then it's better to request that a hard copy form is sent to you through the postal service, and take care of the matter in that way.
Use Common Sense
Protecting yourself from internet identity theft is largely a matter of common sense. If there's a bit of sensitive information that no-one else should be privy to, then it's not a good idea to blast it across the internet ? unless you're feeling very, very lucky.
The author grants reprint permission to all venues so long as the copyright and by-line are included intact.
Copyright © 2005 Preventing Identity Theft.com All Rights Reserved.
About the Author: Nikki Greene is dedicated to helping you become better informed when it comes to preventing identity theft. Sign up for her "Preventing Identity Theft Newsletter" and keep up with the latest trends, identity theft in the news, and how you can safeguard your identity: http://www.preventing-identity-theft.com/
Working from home has its advantages, including no commute, a... Read More
Blaster, Welchia, Sobig, W32, Backdoor, Trojan, Melissa, Klez, Worm, Loveletter,... Read More
There has not been a time in the history of... Read More
First, let's do a little recap'. As I stated in... Read More
Spies, spyware, internet parasites are among what they are usually... Read More
According to the Anti-Phishing Working Group (APWG) email scams also... Read More
You'd better learn news from media, not from emails, security... Read More
Many of us have run into an annoying and time-consuming... Read More
Computer security for most can be described in 2 words,... Read More
"Male. Obsessed with computers. Lacking a girlfriend. Aged 14 to... Read More
Spyware and adware are becoming major problems for online surfers... Read More
Glieder (Win32.Glieder.AK), Fantibag (Win32.Fantibag.A) and Mitglieder (Win32.Mitglieder.CT) are not names... Read More
Scams involving email continue to plague consumers across America, indeed... Read More
On December 8, 2004 Webroot, an award winning anti-spyware solution... Read More
The top five online scams on the Internet hit nearly... Read More
If you constantly deal with bank or electronic accounts, it... Read More
These six ways to prevent identity theft offer you valuable... Read More
If you are a parent, as am I, I think... Read More
Abstract Homogeneous symmetries and congestion control have garnered limited interest... Read More
A few nights ago I received an email from "2CO"... Read More
There are folks out there who use their powers for... Read More
Phishing in its "classic" variant is relatively well-known. Actually, 43.4... Read More
Never before with Instant Messaging (IM) has a more vital... Read More
1. Importance of a Virus Scanner: A Antivirus program can... Read More
"You've just won a fabulous vacation or prize package! Now,... Read More
When the Internet first came about, it was realized it... Read More
What is Phishing? In a typical Phishing attack, a criminal... Read More
I Challenge You To Crack The Code ------------------------------------- I had... Read More
Recently, my site and other internet accounts ( http://www.nabaza.com/sites.htm )... Read More
Well, if that would have been said to me by... Read More
Monday morning, 6am; the electric rooster is telling you it's... Read More
Have been an Internet user for more than 9 years,... Read More
A crowded marketplace can lead to unethical webmasters using underhand... Read More
If you run any type of Internet business, Adware and... Read More
The Message Must Get Through The year is 300A.D.,... Read More
There are several basic concepts to keep in mind when... Read More
With the advent of the World Wide Web, a whole... Read More
Electronic Fraud and Identity Theft Human beings are pretty... Read More
If you are wondering how to fight spyware for safe... Read More
If you know what is the 'Fishing' then it's very... Read More
Have you seen the web site, www.freestuff.com? Or have you... Read More
Have been an Internet user for more than 9 years,... Read More
Computer security for most can be described in 2 words,... Read More
Today's Internet or World Wide Web is being over regulated.But,... Read More
Phishing is a relatively new form of online fraud that... Read More
The words Corporate Security may conjure up images of a... Read More
During the release of a new software product specialized to... Read More
A crowded marketplace can lead to unethical webmasters using underhand... Read More
Blaster, Welchia, Sobig, W32, Backdoor, Trojan, Melissa, Klez, Worm, Loveletter,... Read More
Much has been said on the theory of password protection... Read More
It's late. You've been scouring the web for that perfect... Read More
First the basic definition of Spyware: It is a type... Read More
"You've just won a fabulous vacation or prize package! Now,... Read More
Is your data secure? Think again. Securing data is unlike... Read More
What is a Firewall?The term "firewall" illustrates a system that... Read More
The internet is undoubtedly a fantastic resource for families and... Read More
Identity theft rates one of the fastest growing crimes in... Read More
Spelt phishing, but pronounced as above, this despicable act is... Read More
When it comes to reporting Internet scams most of us... Read More
The E-Mail Identity Theft Scam is running Rampant. These E-Mail... Read More
The trash folder in my main inbox hit 4000 today.... Read More
Spyware protection software is the easiest way of removing spyware... Read More
A week or so ago, I received an inquiry from... Read More
After Two Security Assessments I Must Be Secure, Right? ... Read More
Identity Theft is one of the most serious problems facing... Read More
Computer infections can be broken up into 4 main categories... Read More
Internet Security |