Six Easy Methods You Can Use to Protect Your Identity

tweet

“Roughly 15 million people have their identities stolen every year in the United States, with each person loosing an average of $3,500.” This is very crazy and scary number of people. It makes me kind of not even want to put any of my personal information online when shopping or paying bills online. Because it is an huge chance that someone can steal it. With the holidays right around the corner, more and more people will be shopping online. Be very careful on what you put on certain websites! Make sure you take the proper steps necessary to protect your identity.

identity theft

According to the article, that my fellow blogger posted on twitter that is shown above, there are 6 easy methods that can be used to protect your identity.

  1.  Password Protection: Try to make a password that is unique! Easy passwords like 12345 or 1111 are easy for people to figure out if they are trying to break into an account.  
  2. Choosing a Password: This method is just like the first method. Make sure that your password is unique. If you need another password for another site, try to switch the numbers up a little.  
  3.  Protecting your mail: If you have emails that contain any of your personal information like bank account numbers, try to delete them so that no one can get into your email and see that important information.  
  4. Beware of “Charities”: Never give your personal information over the phone or on the internet to a company that you never heard of. This can be a scam to get free money from you or get your information.
  5. Public Wifi Networks: Never use public networks. That is the easiest way to get hacked.  
  6. Disposing of Electronics: Erase all of your data from your old electronics before you throw it out or give it away.

Hopefully, you use these tips. As, Christmas is approaching this is the best time that scammers will try to scam you. Protect yourself the right way!

Advertisements

Intel and the PasswordBox

Another blogger, Chelsea Ray, recently posted this article to twitter..

blog 4

This article was all about Intel Security Software purchasing and combining with a program called PasswordBox, to enhance their security. This got me curious as to what PasswordBox was exactly, and how it worked.

Take a second and think about your life on the internet. All together, how many forms of social media and communication mechanisms do you belong to? If you’re anything like me – or most people as I can imagine – you have a Facebook, a twitter, a blog, a gmail account, a yahoo account, a hotmail account, I manage my bills, I mange my banking and finances, and the list goes on. The number of passwords I need to keep track of is ridiculous, and to be honest, would be quite impossible to manage if I didn’t write them down. When I think about it, I do write all my passwords down – so what exactly is the point? Not only do we have to keep track of all of these passwords to secure our information, but we can’t even make them all the same because each site asks for different specific password requirements.

blog 4 meme

PasswordBox is a program that allows it’s users to log into these websites and even apps without having to manually type in your password every single time you go to visit. It helps users create passwords that are still secure and complex without them having to always remember them. Over the past year PasswordBox has grown in popularity with almost 14 million downloads, and why not? Almost sounds too good to be true. Let’s have the software – free software – keep me secure, I won’t have to remember a thing. It also allows you to pass along your digital legacy to friends or family if something were to ever happen to you.

However is this a good thing? Although the program claims to be complete secure and just teamed up with a profound company, it’s scary to think that we rely on a computer program to keep track of all of our credentials and passwords for us. You hear about programs and softwares being hacked all the time. One slip up and a hacker could have everyone of your passwords and accounts. So who makes this call? Many positive reviews have been out there about the PasswordBox, and here is a very informative YouTube Video I found on PasswordBox. You make this call!

Tor Software: Anonymity Online

I recently posted this on twitter under the hashtag #tfebt and #tfwf14

twitter blog 2

an article all about how to remain anonymous online at all times, in all ways. Something that is extremely important to do these days if you want to keep a good hold on your personal information while still being able to function in this technological world.

The article talks all about a software known as Tor. Tor is a software of networks you can download, that allows for people to use a variety of applications on the internet all while not compromising their security, privacy, and identity. Tor prevents websites from being able to track down is visitors, users, and followers. The website mentions multiple users of Tor and how they utilize it to keep their anonymity. These users consist of: people in the journalist profession, groups such as Indymedia and Electronic Frontier Foundation, and even a branch in the United States Navy.

The main function of Tor is to protect its users from a type of internet spying known as “traffic analysis.” This type of thing allows for people to discover who is talking to who over public networks. Tor hides this for you.The website does a great job at explaining just how Tor works.

File sharing has advanced greatly since the days of Napster, and it’s important to protect your online security. Especially when our culture today so strongly relies and uses the internet.

A recent article from digitaltrends.com talks about ways to remain anonymous online as well. Although the article argues that eventually we will all be monitored regardless over the internet for what we search, send and do, it mentions Tor as one of the first proxy servers mentioned to keep you safe and anonymous.

tor

Reviews mention that the networks is slow moving since it is still developing, but over time it has gotten much faster as it gains popularity and support!

Protect your online identity

It wasn’t until I read a recent article by Da`nielle Nicole DeVoss  and James E. Porter called “Why Napster matters to writing: Filesharing as a new ethic of digital delivery” did I realize just how connected we all really are through the internet. In the article, the two talk all about file sharing and the way files are transmitted from one computer to another over the Internet. Something that we KNOW happens, but we often don’t realize the severity of it. With the ability to be connected like that to so many people (anyone really) from all over the world, its no wonder identity theft online has become an issue. It almost seems.. easy?

I Recently posted this on twitter using the hashtag #tfebt (tweeting from everywhere but twitter) and article with tips and reminders about protecting yourself from online identity theft:

The first thing I noticed about the article (which really is a small poster with information on it) was the weird/random comment about Canada and the increased identity theft and online shopping.  Maybe this isn’t such a bad thing..

identity-theft-someecards1

No but seriously..

I thought it was a strange bit of information to open with, however, the article gives good advice and pointers to help maintain your privacy and security while online. It talks about social media, passwords, email, and even wi-fi. All of these things we deal with on a daily basis and in fact have become a common everyday part in our now technological lives.

Email:

Think about it, what do we even have regular mail for anymore? Even the old school way of mailing in the payments for your bills is beginning to go out the window. We use email daily for multiple forms of communication. A lot of important information is given through email, especially when it comes to online shopping. We often receive shipping and receipt information through email which can contain some pretty hefty information we wouldn’t want anyone to get a hold of. As complicated as it may be, it’s important to make sure you create a complicated password for all of your information. This simple preventative step will go a long way in keeping your information safe.

Fishy Scammer Websites:

People are sneaky! You’ve seen the television show..

catfish-meaning

Michael Welsh even mentions it in this YouTube video “An anthropological introduction to YouTube,” authenticity is hard to come by on the internet. People are constantly pretending to be someone their not, for whatever the reason. But really.. isn’t that the beauty of the internet? However, some people have more evil intentions then others. It’s important to remember that people create fake emails and create ways to get people to visit their scamming websites, which may look a lot like the websites we all know and love! Remember not to give your password away for any reason no matter what website asks for it.

Wifi:

This is something we often don’t think about. Well, at least I never thought about it.. I’m always on the search for someones free wifi! Especially if I’m out at a store or away from home. But open wifi is dangerous. Its numerous people functioning under the same connection who can get hold of your information. NO ONLINE SHOPPING IN PUBLIC.

Social Media:

It’s important to protect yourself on social media, especially sites such as facebook. You often see many of these sites, including yahoo, other email/search engine type sites, asking for phone numbers as a better way to “keep you connected”, or to “ensure your privacy.” Social media is exactly what it’s name suggests, social. Whether you think your considered private or not under the terms and conditions of these websites, it’s never a good idea to post personal information such as your phone number or address.

Let’s wrap it all up: THE CELL PHONE

honestly.. the smartphone, is a mini computer. Anything internet related that you can do on your computer, you can do on your cell phone. I personally even pay some of my bills online through my cell phone. I can access my bank accounts through an app on my cell phone. I’m fully logged in and ready to go on every social media website there is, right on my cell phone. I can even access every bit of email from my 4 email accounts, ALL ON MY PHONE. Many people can run their entire business all through their fully functioning smartphone. It only makes sense that you would put a passcode and lock on your smartphone. This is alarming:

wolf blog pic

It’s important for us as avid internet users to be aware of all of these things. Especially the way technology and the internet is advancing more and more today. We all think it will never happen to us, however.. you never know until it DOES happens to you.