Understanding Identity Theft
Every computer user should understand how identity theft takes place and which information to protect to avoid being an identity theft victim. Currently there many cases of identity theft and unless a computer user employs measures to protect his/her information, he may be at risk of identity theft. Identity theft is the process in which an individual's personally identifiable information can be obtained by fraudsters to benefit financially, commit crimes or take advantage of the affected. For a computer user to reduce the chances of being identity theft target, they can use a number of ways as it will be discussed in the paper.
Minimizing the Risk of Identity Theft
The things that a computer user can do to minimize their chances of becoming victims of identity theft include;
1. Keeping security software updated
Keeping security software such as antivirus, antispyware and antispam updated. The software protects a computer user's sensitive information by detecting and preventing different attacks.
2. Using strong passwords
Using strong passwords for financial accounts, banking services, and online transactions and changing them regularly can help reduce identity theft risk. A computer user should also not store the passwords in documents which can be easily accessed. The passwords should also not be auto-saved in the different websites the user visits.
3. Protecting sensitive information
Protecting sensitive information in the computer. A computer user should not make use of the file-sharing software. He/she should not visit sites which are not secure like porn sites and others which are usually indicated in the browsers tabs like google. A computer user should not open attachments from unknown or untrusted people. An individual should not "click in links on the email that purports to be from a financial institution, government agency, online merchant or auction service. Use the browsers address box to go directly to the relevant site" (Henderson, 2009). Sensitive information should not be stored on the computer. If necessary, one can use external media like a memory card or flash drive to store it but use them when necessary. If one sells or gives out a computer, he/she should "use an overwriting program to get rid of the information from the drive or even better, remove and destroy the hard disk and let the new owner install another one" (Shinder, 2006). A computer owner should only install software from legitimate suppliers. One should also not use public computers for services such as financial transactions as they may have spyware and viruses which can put a computer user's personal information at risk of being accessed or misused by fraudsters.
4. Dealing with reputable online merchants
For online business or transactions, one should only deal with online merchants who are reputable. A computer user can also use a debit card rather than a debit card or check as one is usually covered for fraud losses if they occur. This is because "federal law limits consumer losses to a maximum of $50, but credit card companies rarely enforce this" (Utica College, 2009).
What to do if you're a victim of identity theft
If a computer user suspects that he/she is a victim of identity theft and does not know what to do, he should visit sites like identity theft resource center or the private house clearinghouse to learn ways of stopping further losses and establish credit and accounts (Henderson, 2009). One can also report the matter to the local police department, fraud agencies, and the federal trade commission.
With the increased use and availability of the internet, the fraudsters are always inventing new ways of accessing others' information for impersonation purposes. Computer users should then make use of any available ways to protect their personal and sensitive information all the time.
References
Henderson, H. (2009). Encyclopedia of computer science and technology. Infobase Publishing.
Shinder, D. (2006). 10 ways to avoid being the victim of identity theft. Retrieved from https://www.techrepublic.com/article/10-ways-to-avoid-being-the-victim-of-identity-theft/
Utica College. (2009). Prevention Methods - Identity Crimes - Center for Identity Management and Information Protection (CIMIP) - Utica College. Retrieved from https://www.utica.edu/academic/institutes/cimip/idcrimes/prevention.cfm
[i]
Technology has influenced e-commerce, electronic billing system and increased exchange and sharing of information online. It has in turn resulted to increased identity theft yet it is only a few computer users who know ways to use to protect their personal and sensitive information. In this tech-world, one should not assume that everything is working well but a computer user should always be up to date on the ways he/she can use to reduce identity theft risk.