{"id":12111,"date":"2022-04-07T19:35:26","date_gmt":"2022-04-07T16:35:26","guid":{"rendered":"https:\/\/kifarunix.com\/?p=12111"},"modified":"2022-04-07T19:35:29","modified_gmt":"2022-04-07T16:35:29","slug":"how-to-protect-from-identity-theft-online-a-detailed-guide-for-2022","status":"publish","type":"post","link":"https:\/\/kifarunix.com\/how-to-protect-from-identity-theft-online-a-detailed-guide-for-2022\/","title":{"rendered":"How to Protect From Identity Theft Online: A Detailed Guide for 2022"},"content":{"rendered":"\n<div><a href=\"https:\/\/kifarunix.com\/wp-content\/uploads\/2022\/04\/Protect-From-Identity-Theft-Online.png\" class=\"td-modal-image\"><div class=\"wp-block-image\"><figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"932\" height=\"720\" src=\"https:\/\/kifarunix.com\/wp-content\/uploads\/2022\/04\/Protect-From-Identity-Theft-Online.png\" alt=\"How to Protect From Identity Theft Online: A Detailed Guide for 2022\" class=\"wp-image-12112\" title=\"\" srcset=\"https:\/\/kifarunix.com\/wp-content\/uploads\/2022\/04\/Protect-From-Identity-Theft-Online.png 932w, https:\/\/kifarunix.com\/wp-content\/uploads\/2022\/04\/Protect-From-Identity-Theft-Online-768x593.png 768w, https:\/\/kifarunix.com\/wp-content\/uploads\/2022\/04\/Protect-From-Identity-Theft-Online-150x116.png 150w, https:\/\/kifarunix.com\/wp-content\/uploads\/2022\/04\/Protect-From-Identity-Theft-Online-300x232.png 300w, https:\/\/kifarunix.com\/wp-content\/uploads\/2022\/04\/Protect-From-Identity-Theft-Online-696x538.png 696w, https:\/\/kifarunix.com\/wp-content\/uploads\/2022\/04\/Protect-From-Identity-Theft-Online-544x420.png 544w\" sizes=\"(max-width: 932px) 100vw, 932px\" \/><figcaption><em>Source: Pixabay<\/em><\/figcaption><\/figure><\/div><\/a><\/div>\n\n\n\n<p>With internet users increasing globally, identity theft numbers are spiking. According to the Federal Trade Commission (FTC), there was a <a href=\"https:\/\/www.ftc.gov\/news-events\/news\/press-releases\/2022\/02\/new-data-shows-ftc-received-28-million-fraud-reports-consumers-2021-0\" target=\"_blank\" rel=\"noopener\">70% increase<\/a> in fraud reports from 2020 to 2021 at 2.8 million. This statistic added to the <a href=\"https:\/\/www.ftc.gov\/news-events\/news\/press-releases\/2021\/02\/new-data-shows-ftc-received-22-million-fraud-reports-consumers-2020\" target=\"_blank\" rel=\"noopener\">45% increase<\/a> reported between 2019 and 2020 at nearly 2.2 million.<\/p>\n\n\n\n<p>While the pandemic had a huge effect on these numbers, it wasn\u2019t solely responsible. It acted as an accelerator in the global rush towards everything digital.&nbsp;<\/p>\n\n\n\n<p>In this digital boom, many of us are exposing our data \u2014 knowingly and unknowingly. And often lying in wait are cybercriminals who want to use that data for nefarious purposes.&nbsp;<\/p>\n\n\n\n<p>Here are the common ways cybercriminals can steal your identity and some of the best practices to protect yourself from identity theft online.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Defining identity theft<\/h2>\n\n\n\n<p>The <a href=\"https:\/\/www.justice.gov\/criminal-fraud\/identity-theft\/identity-theft-and-identity-fraud\" target=\"_blank\" rel=\"noopener\">US Department of Justice<\/a> defines identity theft or fraud as any type of crime where someone illicitly obtains and uses data.&nbsp;<\/p>\n\n\n\n<p>Both companies and individuals can fall victim to the attack via deception or outright fraud. This is usually done for financial gain.&nbsp;<\/p>\n\n\n\n<p>There are many ways in which criminals can use your personal information, including:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Running up large shopping bills.<\/li><li>Stealing tax returns.<\/li><li>Opening lines of credit or credit card accounts.<\/li><li>Withdrawing money from your account.<\/li><li>Engaging in other criminal activities in your name.<\/li><\/ul>\n\n\n\n<p>Though this can happen in person \u2014 like when someone steals your wallet or purse \u2014 identity theft isn\u2019t limited to the physical world.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Common methods for online identity theft<\/h2>\n\n\n\n<p>Overall, the number of online frauds is still less than the number of phone and text scams. Yet, with <a href=\"https:\/\/public.tableau.com\/app\/profile\/federal.trade.commission\/viz\/FraudReports\/LossesContactMethods\" target=\"_blank\" rel=\"noopener\">$1.8 billion in losses<\/a> from online fraud methods \u2014 email, website\/apps, and social media \u2014 the monetary numbers far surpass phone, text, and snail-mail methods.<\/p>\n\n\n\n<p>That\u2019s why it\u2019s important to know what methods cybercriminals use to get to your personal data.&nbsp;<\/p>\n\n\n\n<p>Below is a list of some common online methods for identity theft.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Phishing<\/h3>\n\n\n\n<p>In simple words, phishing is when someone tricks you into giving your personal information using a fake email.<\/p>\n\n\n\n<p>The email may look like it\u2019s coming from a reputable source or company \u2014 think banks and charity organizations. It contains a message that says there\u2019s a problem and urges you to press a certain link to resolve the issue.&nbsp;<\/p>\n\n\n\n<p>Typically, the link leads to a fake webpage where you have to input your personal information to verify your account. Once you click to proceed, it sends your information to the scammer.<\/p>\n\n\n\n<p>On the other hand, an email can contain a toll-free number that routes to a cybercriminals\u2019 call center. From there, they\u2019ll do or say anything to get you to reveal your financial or other sensitive information.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Malicious software<\/h3>\n\n\n\n<p>Malicious software is also known by its catch-all term \u2018malware.\u2019 Most identity thieves use ransomware and spyware. Both can get into a computer when you visit a compromised website or open a malicious attachment in an email.<\/p>\n\n\n\n<p>Once installed, ransomware blocks you from accessing your computer. To regain access, a thief demands a ransom from their victim. In the meantime, they can access personal information stored on the computer.<\/p>\n\n\n\n<p>Spyware, on the other hand, infiltrates the computer to collect information that a thief can use to steal an identity.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Oversharing<\/h3>\n\n\n\n<p>Social media has become deeply ingrained in society. Many of us use our accounts to share photos and videos and post about events going on in our lives.&nbsp;<\/p>\n\n\n\n<p>Unfortunately, cybercriminals are turning to our social media profiles to access our sensitive information.&nbsp;<\/p>\n\n\n\n<p>Here are some key things you should avoid sharing on social media:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Your driver\u2019s license, credit cards, or bills &#8211; Yes, even if you use a photo program to block sensitive information.<\/li><li>Geolocation tags &#8211; These can help to verify your address.<\/li><li>Check-ins &#8211; They help thieves identify other data points where they could steal information \u2014 like when you go to the doctor\u2019s office, fitness center, or a small business.<\/li><li>Your birthday &#8211; Identity thieves may use it for verification questions.<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Poor device disposal<\/h3>\n\n\n\n<p>Surprisingly, discarding your old laptops, tablets, smartphones, and other electronics can pose a danger and put you at risk.<\/p>\n\n\n\n<p>How many of us complete a factory reset of a device before tossing it? While it may seem unimportant, this is another way identity thieves can steal our data.<\/p>\n\n\n\n<p>Hackers find discarded devices and reboot them to gain access to banking, contact, and other login information, while a previous user is completely unaware.&nbsp;<\/p>\n\n\n\n<p>To avoid identity theft in this situation, the <a href=\"https:\/\/consumer.ftc.gov\/articles\/how-protect-your-data-you-get-rid-your-computer\" target=\"_blank\" rel=\"noopener\">FTC recommends<\/a> backing up your device, signing out of all accounts, de-pairing it from any Wi-Fi or Bluetooth connections, and then performing a factory reset before <a href=\"https:\/\/www.epa.gov\/recycle\/electronics-donation-and-recycling\" target=\"_blank\" rel=\"noopener\">recycling or donating<\/a> your device.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Data Breach<\/h3>\n\n\n\n<p>A data breach is a type of security violation that exposes personal or business information and leads to reputational and financial loss.<\/p>\n\n\n\n<p>The most notable example of a data breach occurred in 2017. Hackers infiltrated the databases at Equifax \u2014 one of the three main credit bureaus in the US \u2014 and gained access to the personal information of over <a href=\"https:\/\/www.ftc.gov\/enforcement\/refunds\/equifax-data-breach-settlement\" target=\"_blank\" rel=\"noopener\">147 million people<\/a>.&nbsp;<\/p>\n\n\n\n<p>If you\u2019re unsure how to protect yourself from identity theft, read on.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How to protect your identity online<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Public networks 101<\/h3>\n\n\n\n<p>Public Wi-Fi networks aren\u2019t always using the latest standards of encryption. This creates an opportunity for cybercriminals to access your information while you\u2019re browsing the web in a cafe.<\/p>\n\n\n\n<p>To prevent identity theft on a public network, you have to encrypt the information on your device. Virtual private networks \u2014 or VPNs \u2014 are some of the most useful solutions for this. VPNs are available for almost any device and operating system, even if you need a <a href=\"https:\/\/surfshark.com\/download\/linux\" target=\"_blank\" rel=\"noopener\">VPN for Linux<\/a>.&nbsp;<\/p>\n\n\n\n<p>If you don\u2019t have access to a VPN, using your phone data can serve as an alternative way of protection. Phone companies often encrypt their data.&nbsp;<\/p>\n\n\n\n<p>Regardless, the best practice is to never access personal or financial information on a public network and don\u2019t permanently log in to accounts from it.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Securing your private network<\/h3>\n\n\n\n<p>Even if you\u2019re not using public Wi-Fi, your personal information could still be at risk.&nbsp;<\/p>\n\n\n\n<p>In fact, anyone close enough to your Wi-Fi router can access your sensitive information.&nbsp;<\/p>\n\n\n\n<p>Use these simple tips to protect your home or company&#8217;s private network from cybercriminals:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Be sure to secure your Wi-Fi network with a unique, strong password. And even at home, change your password every quarter.<\/li><li>Install an application that monitors devices that connect to your network. Set it to block any unauthorized devices.<\/li><li>Never use your router\u2019s default passwords, especially for the router admin login. Identity thieves can easily access this information on the web.<\/li><li>Switch off any remote management features on your router.<\/li><li>Create a \u2018guest network\u2019 for visitors or friends to use. This is more for companies, but you can do it at home too.<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Strong password protection<\/h3>\n\n\n\n<p>Strong passwords are long passwords \u2014 at least 16 characters \u2014 that combine capital and lowercase letters, symbols, and numbers.&nbsp;<\/p>\n\n\n\n<p>Never set up a common password with number combinations like \u201c1234\u201d or words like \u201cadmin\u201d or \u201csystem.\u201d And always ensure that security questions are unique to you with information not available on the internet.<\/p>\n\n\n\n<p>Set up strong passwords for all accounts that contain your personal information. To make it easier, you can use one of the password managers. These apps create and store unique passwords for any website you use.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Credit monitoring<\/h3>\n\n\n\n<p>Experian, TransUnion, and Equifax \u2014 are the three national credit bureaus that track credit history in the US. When you apply for a credit card or a loan, that\u2019s who the bank or credit card company contacts for your credit score.<\/p>\n\n\n\n<p>Obviously, keeping a solid credit score is important, and it\u2019s good to monitor it for personal or business purposes. But it\u2019s also a way to check if someone is illegally using your identity.<\/p>\n\n\n\n<p>Visit the official site \u2014 authorized by federal law \u2014 AnnualCreditReport.com on a regular basis and access your free credit report. The report can help verify bill payments, credit checks, and loan applications or payments. From there, you can look into anything that\u2019s suspicious and immediately inform your bank.&nbsp;&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion<\/h2>\n\n\n\n<p>With this guide, you have the resources you need to identify and protect yourself from identity theft.&nbsp;<\/p>\n\n\n\n<p>Remember, the FTC only tracks reported cases, but there are many more out there that go unreported. Identity theft is a serious issue. Stay cyber safe!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>With internet users increasing globally, identity theft numbers are spiking. According to the Federal Trade Commission (FTC), there was a 70% increase in fraud reports<\/p>\n","protected":false},"author":1,"featured_media":12112,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"rank_math_lock_modified_date":false,"footnotes":""},"categories":[34,121],"tags":[4837,4836,4834,4835,4838,323],"class_list":["post-12111","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","category-howtos","tag-common-methods-for-online-identity-theft","tag-defining-identity-theft","tag-how-to-protect-from-identity-theft-online-a-detailed-guide-for-2022","tag-protect-identity-theft","tag-securing-your-private-network","tag-vpn","generate-columns","tablet-grid-50","mobile-grid-100","grid-parent","grid-50","resize-featured-image"],"_links":{"self":[{"href":"https:\/\/kifarunix.com\/wp-json\/wp\/v2\/posts\/12111"}],"collection":[{"href":"https:\/\/kifarunix.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kifarunix.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kifarunix.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/kifarunix.com\/wp-json\/wp\/v2\/comments?post=12111"}],"version-history":[{"count":1,"href":"https:\/\/kifarunix.com\/wp-json\/wp\/v2\/posts\/12111\/revisions"}],"predecessor-version":[{"id":12113,"href":"https:\/\/kifarunix.com\/wp-json\/wp\/v2\/posts\/12111\/revisions\/12113"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kifarunix.com\/wp-json\/wp\/v2\/media\/12112"}],"wp:attachment":[{"href":"https:\/\/kifarunix.com\/wp-json\/wp\/v2\/media?parent=12111"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kifarunix.com\/wp-json\/wp\/v2\/categories?post=12111"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kifarunix.com\/wp-json\/wp\/v2\/tags?post=12111"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}