Identify theft occurs when someone uses another individual’s personal information, like their name, credit card, social security number, and other private information.
LET’S BE AWARE SO THAT WE CAN BE SECURE
Have a strong password with a bare minimum of 14 characters. It is recommended to change your passwords every 90 days.
You can reduce the risk of attack by limiting the amount of information you provide to social media. Sometimes less is more.
Antimalware software is software program that helps protect an individual from malicious software waiting to attack your computer.
BE AWAREOF WHO STARES
A person may not look like someone who wants to take your information. Be wary of onlookers. Criminals do not discriminate!
- When using your credit card.
- When logging into anything.
- When looking at any information you don’t want shared.
THE TIME IS NOW
We currently live in a time where our technology is always advancing. This is great but it also means there is a greater risk when it comes to cybercrimes. There is a saying that goes, “locks are to keep honest people honest.” Cyber criminals are not honest people. They do not care who they hurt. They look for an easy vulnerable target. Don’t let that target be you!
The most common types of identity theft are credit card fraud, phone fraud, bank fraud, employment fraud, and loan fraud. When it comes to cybercrimes, getting access to an individual can be easier when they leave themselves vulnerable. There are many resources that can help prevent and reduce your overall risk of becoming a victim. October is cyber awareness month but year-round you should be cyber aware.
My overall process for looking into identify theft was from personal experience. There was a time where I was more vulnerable, and someone got ahold of my credit card information. Fortunate for me this did not get to far out of hand because my bank notified be of the suspicious activity. This could have been much worse. I now take the steps to help prevent and reduce the rick of this ever happening again.
htts://www.google.com/search?q=social+media&rlz=1C1VDKB_enUS969US969&sxsrf=AOaemvJnd6RWHEego0cQzyYXFXEAeQXvdA:1633417523027&source=lnms&tbm=isch&sa=X&sqi=2&ved=2ahUKEwj25uq52rLzAhUHk2oFHc5KCqgQ_AUoAnoECAEQBA&biw=1536&bih=750&dpr=1.25#imgrc=t_gtQiS--CxHKM https://www.google.com/search?q=strong+password&tbm=isch&ved=2ahUKEwinrv7j1LLzAhVC2qwKHZNqBPcQ2-cCegQIABAA&oq=strong+password&gs_lcp=CgNpbWcQAzIKCAAQsQMQgwEQQzIECAAQQzIECAAQQzIECAAQQzIFCAAQgAQyBAgAEEMyBQgAEIAEMgUIABCABDIFCAAQgAQyBQgAEIAEUK07WK07YNY-aABwAHgAgAFFiAFFkgEBMZgBAKABAaoBC2d3cy13aXotaW1nwAEB&sclient=img&ei=QPNbYaeOMcK0swWT1ZG4Dw&bih=750&biw=1536&rlz=1C1VDKB_enUS969US969#imgrc=a6vKdPlwukHj7M https://www.google.com/search?q=anti+malware+software&rlz=1C1VDKB_enUS969US969&sxsrf=AOaemvK3ZlVkcGI-V6oNI3u03ULtoNytww:1633415977182&source=lnms&tbm=isch&sa=X&ved=2ahUKEwju-9vY1LLzAhVUmGoFHS-0AwIQ_AUoAnoECAEQBA&biw=1536&bih=750&dpr=1.25#imgrc=lUgpDp2B0CDw5M