Estimated Reading Time: 5 Minutes
This is the third article in our Identity Theft series. The first post worked as an introduction to identity theft, while the second explained how it happens, and the many security vulnerabilities that enable it. Please feel free to go back to those if you are looking for more information on this subject.
Alternatively, download our Free Essential Guide on How to Avoid Identity Theft to have all information in an illustrated PDF guide.
In this post, we are going to talk about you, and the online habits that could put you at risk of identity theft. Not only will we be revealing the kinds of suspicious activity that may indicate you have been targeted by a cybercriminal, but we will discuss why a strict password policy is crucial, and how to implement one. Finally, we have a simple self-test for you, to help evaluate your own personal cyber security.
Major company data breaches have occurred over the past decade, where even the most cautious user could not have avoided having their information leaked. Yahoo alone has suffered data breaches that have exposed the personal information of all of its 3 billion accounts. When we add in other major data breaches of the last three years, the total comes to over 4.3 billion cases. Dropbox, eBay, and LinkedIn were among the high-profile targets.
If you are looking for more information on Data Breaches, view this detailed Infographic by Hosting Tribunal, highlighting the 15 biggest cases in 15 years.
Any of these data breaches could have exposed a user’s personal data to a cybercriminal, which could then be used as the initial seed of identity theft. Remember, it only takes one piece of critical personal information in the hands of a cybercriminal to put you at risk personally.
We recommend using this online tool to check if your credentials have been leaked. If you have been the victim of some of the circumstances above, you could use this site to verify if your identity is available for criminals to take.
Although identity theft primarily takes place online, many of the initial signs that you have been targeted will become apparent in the real world. Indeed, the symptoms of identity theft often do not occur until after the data breach has already occurred. The cybercriminal will have spent some time selling your identity on, and then the perpetrator of the crimes will carry them out. All of the suspicious activities below could indicate that you have been the victim of identity theft. If two or more of these things happen, you can be certain you have.
We have all been guilty of using a weak password at one time or another. If you use multiple websites regularly, it can be very tempting to use the same simple password for every site to make things easy. Of course, this is a terrible idea in relation to your online security. Establishing a strict password policy is your first line of defence against hackers. Always make sure that:
We have a complete guide on How to Create and Manage Passwords, available on our website. Check it out if you want to learn the best techniques to create strong passwords that are easy to remember.
If you have not been using such a password policy, and you start to notice strange activities such as those mentioned in the section above, change your passwords using such a policy ASAP.
A Password Manager is a very useful tool that will generate strong passwords and keep them safe for you, behind an encrypted barrier. There are many of these available on the web or app stores.
In this section we have a short identity theft self-assessment test you can work through, to discern your own personal level of risk. Answer each question with a yes or no.
If you answered no to:
14 or more questions – your Identity is in danger;
9 to 14 questions – a lot to improve;
4 to 9 questions – good, aware of the main risks;
3 or less – excellent, vigilant.
Always remember that you are the first line of defence when it comes to your own cybersecurity. Acting in a safety-conscious manner at all times is the best way to deter cyber criminals and keep your identity safe from identity theft. Hopefully, you are becoming an expert in Identity Theft. Our next blog post will tell you what to do if your identity has been stolen, a question that we hear a lot from our customers.
To have all this information in one place, including exclusive methods, data and tools to avoid Identity Theft, download our Essential Guide. It’s an illustrated PDF with all the knowledge you and your staff may need to avoid facing this threat.