{"id":1783,"date":"2013-05-02T10:00:31","date_gmt":"2013-05-02T14:00:31","guid":{"rendered":"https:\/\/www.kaspersky.com.au\/blog\/?p=1783"},"modified":"2020-02-27T03:29:54","modified_gmt":"2020-02-26T16:29:54","slug":"prevent-identity-theft","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.au\/blog\/prevent-identity-theft\/1783\/","title":{"rendered":"How to Prevent Identity Theft"},"content":{"rendered":"<p>The general public should be well aware at this point that <a href=\"https:\/\/www.kaspersky.com.au\/blog\/tag\/identity-theft\/\" target=\"_blank\" rel=\"noopener\">identity theft<\/a> is <a href=\"https:\/\/www.kaspersky.com.au\/blog\/data-theft-infographic\/\" target=\"_blank\" rel=\"noopener\">increasingly common<\/a> and has calamitous effects that are far more serious than the half-baked Melissa McCarthy comedy \u201cIdentity Thief\u201d would lead you to believe \u2014 though instead of going on a harrowing cross-country road trip, it\u2019s your personal and financial data that could be on the road to ruin. Here\u2019s how to protect yourself from such disastrous fates.<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2013\/05\/06050933\/theft_title.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-1784 aligncenter\" alt=\"identity theft\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2013\/05\/06050933\/theft_title.jpg\" width=\"640\" height=\"420\"><\/a><\/p>\n<p><b>Password Security<\/b>: Attacks on large cloud-based sites like DropBox and LinkedIn have jeopardized the data security of millions of users, but you can limit the impact of even those unlikely events by practicing good password security. <a href=\"https:\/\/threatpost.com\/password-security-dos-and-donts-050411\/\" target=\"_blank\" rel=\"noopener nofollow\">Strong passwords are critical<\/a>; they should be long combinations of letters, numerals and non-alphanumeric symbols; never use names or words found in a dictionary. And change the passwords frequently. Use different (and dissimilar) logins for each online account, and create separate<b> <\/b><a href=\"https:\/\/www.kaspersky.com.au\/blog\/email-the-hackers-key-to-stealing-your-online-life\/\" target=\"_blank\" rel=\"noopener\">email accounts<\/a> to which you link only your online finances.<\/p>\n<p><b>Don\u2019t Store Financial Data<\/b>: It\u2019s really convenient to keep your credit card number and billing address stored in every website you use to shop for things online, but because security breaches of websites are disturbingly common, play it safe and don\u2019t do it. It\u2019ll be worth the extra minute it takes to add that information each time you check out.<\/p>\n<div class=\"pullquote\">Use different logins for each online account, and create separate email accounts to which you link only your online finances.<\/div>\n<p><b>Know Your Scams<\/b>: <a href=\"https:\/\/www.kaspersky.com.au\/blog\/five-popular-spam-scams\/\" target=\"_blank\" rel=\"noopener\">Online scams<\/a> come in all forms. Whether it\u2019s easily recognizable, like an email from a member of an African royal family who wants to give you millions of dollars, or something seemingly trustworthy like a password reset notification that appears to be sent by your credit card company, be equally suspicious of any online communication \u2014\u00a0by email or social media \u2014 that asks you for personal information or to download a document or even to click through to a new web page. Always be vigilant and skeptical.<\/p>\n<p><b>Consider Insurance<\/b>: Identity theft has become such an issue that there are now even <a href=\"http:\/\/www.iii.org\/individuals\/other\/insurance\/identitytheft\/\" target=\"_blank\" rel=\"noopener nofollow\">insurance policies<\/a> that cover it, which could protect you \u2014 and your credit score \u2014 should you be attacked.<\/p>\n<p><b>Social Duplicity<\/b>: One of the more insidious forms of identity theft comes from attackers who steal your personal information to create a duplicate social media presence that tricks others into believing they are interacting and exchanging information with you, when in fact they are not. Whether it\u2019s done as a prank or to obtain sensitive data from others, it can result in terrible damage to your reputation. Prevent this by periodically searching yourself in Google and on Facebook to make sure you are the only you out there. If you\u2019re not, use the appropriate abuse reporting tools for the respective platform and shut it down ASAP.<\/p>\n<p><b>Act Quickly<\/b>: Much like the social media presence reaction, if you think you have <a href=\"https:\/\/www.kaspersky.com\/threats\/identity-theft\" target=\"_blank\" rel=\"noopener nofollow\">been the victim<\/a> of identity or data theft, act fast. Contact your bank, email provider or whichever service has been compromised and get to the bottom of it. Identity theft, usually financially motivated, can have disastrous effects, especially on your credit.<\/p>\n<p><b>Get a Safety Package<\/b>: It\u2019s always a smart idea to have a security solution like <a href=\"https:\/\/usa.kaspersky.com\/products-services\/home-computer-security\/pure?0&amp;domain=kaspersky.com\" target=\"_blank\" rel=\"noopener\">Kaspersky PURE 3.0<\/a> whose <a href=\"https:\/\/www.kaspersky.com.au\/blog\/financial-security-in-a-connected-world-with-pure-3-0\/\" target=\"_blank\" rel=\"noopener\">Safe Money<\/a> system helps confirm the validity of a website\u2019s reputation and protects your transactions during online shopping. And since you\u2019ll have lots of unique passwords for all of your various online accounts, you can use the PURE Advanced Password Manager to help you store and track them.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The general public should be well aware at this point that identity theft is increasingly common and has calamitous effects that are far more serious than the half-baked Melissa McCarthy<\/p>\n","protected":false},"author":41,"featured_media":1785,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[260,315],"class_list":{"0":"post-1783","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-data-protection","9":"tag-identity-theft"},"hreflang":[{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/prevent-identity-theft\/1783\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/prevent-identity-theft\/1783\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/prevent-identity-theft\/1783\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/prevent-identity-theft\/1783\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/prevent-identity-theft\/1783\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/prevent-identity-theft\/1783\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/prevent-identity-theft\/5891\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/prevent-identity-theft\/799\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/prevent-identity-theft\/1783\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.au\/blog\/tag\/data-protection\/","name":"data protection"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/1783","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/users\/41"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/comments?post=1783"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/1783\/revisions"}],"predecessor-version":[{"id":25940,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/1783\/revisions\/25940"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media\/1785"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media?parent=1783"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/categories?post=1783"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/tags?post=1783"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}