{"id":12111,"date":"2022-04-07T19:35:26","date_gmt":"2022-04-07T16:35:26","guid":{"rendered":"https:\/\/kifarunix.com\/?p=12111"},"modified":"2022-04-07T19:35:29","modified_gmt":"2022-04-07T16:35:29","slug":"how-to-protect-from-identity-theft-online-a-detailed-guide-for-2022","status":"publish","type":"post","link":"https:\/\/kifarunix.com\/how-to-protect-from-identity-theft-online-a-detailed-guide-for-2022\/","title":{"rendered":"How to Protect From Identity Theft Online: A Detailed Guide for 2022"},"content":{"rendered":"\n
With internet users increasing globally, identity theft numbers are spiking. According to the Federal Trade Commission (FTC), there was a 70% increase<\/a> in fraud reports from 2020 to 2021 at 2.8 million. This statistic added to the 45% increase<\/a> reported between 2019 and 2020 at nearly 2.2 million.<\/p>\n\n\n\n While the pandemic had a huge effect on these numbers, it wasn\u2019t solely responsible. It acted as an accelerator in the global rush towards everything digital. <\/p>\n\n\n\n In this digital boom, many of us are exposing our data \u2014 knowingly and unknowingly. And often lying in wait are cybercriminals who want to use that data for nefarious purposes. <\/p>\n\n\n\n Here are the common ways cybercriminals can steal your identity and some of the best practices to protect yourself from identity theft online.<\/p>\n\n\n\n The US Department of Justice<\/a> defines identity theft or fraud as any type of crime where someone illicitly obtains and uses data. <\/p>\n\n\n\n Both companies and individuals can fall victim to the attack via deception or outright fraud. This is usually done for financial gain. <\/p>\n\n\n\n There are many ways in which criminals can use your personal information, including:<\/p>\n\n\n\n Though this can happen in person \u2014 like when someone steals your wallet or purse \u2014 identity theft isn\u2019t limited to the physical world. <\/p>\n\n\n\n Overall, the number of online frauds is still less than the number of phone and text scams. Yet, with $1.8 billion in losses<\/a> from online fraud methods \u2014 email, website\/apps, and social media \u2014 the monetary numbers far surpass phone, text, and snail-mail methods.<\/p>\n\n\n\n That\u2019s why it\u2019s important to know what methods cybercriminals use to get to your personal data. <\/p>\n\n\n\n Below is a list of some common online methods for identity theft.<\/p>\n\n\n\n In simple words, phishing is when someone tricks you into giving your personal information using a fake email.<\/p>\n\n\n\n The email may look like it\u2019s coming from a reputable source or company \u2014 think banks and charity organizations. It contains a message that says there\u2019s a problem and urges you to press a certain link to resolve the issue. <\/p>\n\n\n\n Typically, the link leads to a fake webpage where you have to input your personal information to verify your account. Once you click to proceed, it sends your information to the scammer.<\/p>\n\n\n\n On the other hand, an email can contain a toll-free number that routes to a cybercriminals\u2019 call center. From there, they\u2019ll do or say anything to get you to reveal your financial or other sensitive information.<\/p>\n\n\n\n Malicious software is also known by its catch-all term \u2018malware.\u2019 Most identity thieves use ransomware and spyware. Both can get into a computer when you visit a compromised website or open a malicious attachment in an email.<\/p>\n\n\n\n Once installed, ransomware blocks you from accessing your computer. To regain access, a thief demands a ransom from their victim. In the meantime, they can access personal information stored on the computer.<\/p>\n\n\n\n Spyware, on the other hand, infiltrates the computer to collect information that a thief can use to steal an identity. <\/p>\n\n\n\n Social media has become deeply ingrained in society. Many of us use our accounts to share photos and videos and post about events going on in our lives. <\/p>\n\n\n\n Unfortunately, cybercriminals are turning to our social media profiles to access our sensitive information. <\/p>\n\n\n\n Here are some key things you should avoid sharing on social media:<\/p>\n\n\n\n Surprisingly, discarding your old laptops, tablets, smartphones, and other electronics can pose a danger and put you at risk.<\/p>\n\n\n\n How many of us complete a factory reset of a device before tossing it? While it may seem unimportant, this is another way identity thieves can steal our data.<\/p>\n\n\n\n Hackers find discarded devices and reboot them to gain access to banking, contact, and other login information, while a previous user is completely unaware. <\/p>\n\n\n\n To avoid identity theft in this situation, the FTC recommends<\/a> backing up your device, signing out of all accounts, de-pairing it from any Wi-Fi or Bluetooth connections, and then performing a factory reset before recycling or donating<\/a> your device.<\/p>\n\n\n\n A data breach is a type of security violation that exposes personal or business information and leads to reputational and financial loss.<\/p>\n\n\n\n The most notable example of a data breach occurred in 2017. Hackers infiltrated the databases at Equifax \u2014 one of the three main credit bureaus in the US \u2014 and gained access to the personal information of over 147 million people<\/a>. <\/p>\n\n\n\n If you\u2019re unsure how to protect yourself from identity theft, read on.<\/p>\n\n\n\n Public Wi-Fi networks aren\u2019t always using the latest standards of encryption. This creates an opportunity for cybercriminals to access your information while you\u2019re browsing the web in a cafe.<\/p>\n\n\n\nDefining identity theft<\/h2>\n\n\n\n
Common methods for online identity theft<\/h2>\n\n\n\n
Phishing<\/h3>\n\n\n\n
Malicious software<\/h3>\n\n\n\n
Oversharing<\/h3>\n\n\n\n
Poor device disposal<\/h3>\n\n\n\n
Data Breach<\/h3>\n\n\n\n
How to protect your identity online<\/h2>\n\n\n\n
Public networks 101<\/h3>\n\n\n\n