Search
  • Videos
  • Windows 10
  • 5G
  • Best VPNs
  • Cloud
  • Security
  • AI
  • more
    • TR Premium
    • Working from Home
    • Innovation
    • Best Web Hosting
    • ZDNet Recommends
    • Tonya Hall Show
    • Executive Guides
    • ZDNet Academy
    • See All Topics
    • White Papers
    • Downloads
    • Reviews
    • Galleries
    • Videos
    • TechRepublic Forums
  • Newsletters
  • All Writers
    • Preferences
    • Community
    • Newsletters
    • Log Out
  • Menu
    • Videos
    • Windows 10
    • 5G
    • Best VPNs
    • Cloud
    • Security
    • AI
    • TR Premium
    • Working from Home
    • Innovation
    • Best Web Hosting
    • ZDNet Recommends
    • Tonya Hall Show
    • Executive Guides
    • ZDNet Academy
    • See All Topics
    • White Papers
    • Downloads
    • Reviews
    • Galleries
    • Videos
    • TechRepublic Forums
      • Preferences
      • Community
      • Newsletters
      • Log Out
  • us
    • Asia
    • Australia
    • Europe
    • India
    • United Kingdom
    • United States
    • ZDNet around the globe:
    • ZDNet France
    • ZDNet Germany
    • ZDNet Korea
    • ZDNet Japan

15 tips for staying safe online and preventing identity theft

13 of 15 NEXT PREV
  • Stay clear of sending sensitive data across public Wi-Fi networks

    Stay clear of sending sensitive data across public Wi-Fi networks

    As Europol recently warned, public Wi-Fi networks are, by nature, not secure. However, as we sit in Starbucks and browse the Web, check our email or log in to Facebook, security is often far off our list of priorities.

    For hackers who monitor free networks or set up similarly-named hotspots to dupe users in to connecting before grabbing sensitive data including account information, passwords or financial details, such services are easy game. 

    In addition, keep in mind that public computers can have software installed on them which monitor you or your keystrokes without your knowledge. 

    Published: March 11, 2014 -- 08:55 GMT (01:55 PDT)

    Caption by: Charlie Osborne

  • Use double verification systems

    Use double verification systems

    It might take a little longer, but using double verification methods can prevent accounts being accessed if you fall prey to a phishing campaign or your original password is guessed. 

    PayPal and Google, for example, allow you to link your account with your mobile device. In the case of the former, you must input your password as well as a code sent to your mobile in order to access your account. 

    Published: March 11, 2014 -- 08:55 GMT (01:55 PDT)

    Caption by: Charlie Osborne

  • Shred documents while at home

    Shred documents while at home

    Banking statements and utility bills all display personal, sensitive information that give "dumpster divers" dollar signs in their eyes. People are not below wading through your garbage in order to get their hands on this data, which can then be used to fake your identity, steal it, or potentially access your accounts. 

    In addition, pre-approved credit card offers could be used by thieves for applying for credit at a different address -- potentially wrecking your credit score and leaving you with the bill further down the line.

    The solution? Invest in a shredder. 

    Published: March 11, 2014 -- 08:55 GMT (01:55 PDT)

    Photo by: Ministry of Tech

    Caption by: Charlie Osborne

  • Do not share your passwords or leave them lying around

    Do not share your passwords or leave them lying around

    It might seem simple enough, but do not share passwords for your online bank accounts, payment systems, social media accounts or email inboxes with anyone. Furthermore, writing down passwords can also lead to a breach of privacy.

    Published: March 11, 2014 -- 08:55 GMT (01:55 PDT)

    Caption by: Charlie Osborne

  • Keep an eye on your credit score

    Keep an eye on your credit score

    If your identity has been stolen or financial details sold on, whether through a fault of your own or if you were a customer of a firm that fell prey to a cyberattack -- such as Target -- your credit score is likely to be affected. Signing up for a 30 day free trial on occasion or maintaining a subscription so you are alerted when changes take place will help you act quickly if something goes wrong. 

    Published: March 11, 2014 -- 08:55 GMT (01:55 PDT)

    Caption by: Charlie Osborne

  • Watch out for phishing websites and fake campaigns

    Watch out for phishing websites and fake campaigns

    Phishing campaigns are popular methods for cybercriminals to fleece you of your savings and steal personal information. Often found in the form of spam emails that pretend to be reputable companies, a victim clicks on a link and is sent to a website that appears to be legitimate. Once you arrive, the website may ask you to submit forms containing sensitive information including (but not limited to) your social security number, bank account details, full name, address and phone number. 

    Take a breath, relax, and do not act based on panic. If you receive an email supposedly from your bank, call them instead and confirm whether or not the email is fake. Keep in mind that most companies, and certainly the majority of banks, will never ask you for full passwords or account details via an email. 

    Published: March 11, 2014 -- 08:55 GMT (01:55 PDT)

    Caption by: Charlie Osborne

  • Use an antivirus program on desktop and mobile

    Use an antivirus program on desktop and mobile

    Installing anti-virus and anti-malware programs is not just a requirement for desktop PCs any longer -- with malware that targets mobile devices on the rise, you should consider downloading some form of protection on to your smartphones and tablets as well. 

    There are a number of options on the market, both free and paid, offered by vendors including Malwarebytes, Avast and Intego.

     

     

    Published: March 11, 2014 -- 08:55 GMT (01:55 PDT)

    Photo by: CNET

    Caption by: Charlie Osborne

  • Unique passwords and frequent changes

    Unique passwords and frequent changes

    When some of the most common and popular passwords currently in use include "password1," "qwerty" and "ninja," you know that there are basic security problems out there which are easily fixed.

    Use a combination of letters and numbers, and make sure you use unique passwords for different services online -- so if one account is compromised, you may be able to prevent unauthorized access to the rest. 

     

     

    Published: March 11, 2014 -- 08:55 GMT (01:55 PDT)

    Caption by: Charlie Osborne

  • Shop only at reputable websites

    Shop only at reputable websites

    If a clothing or gadget sale online looks too good to be true, it probably is. If you see a padlock next to your browser address, then a secure SSL encryption is in place, and so any financial details input will at least be encrypted. However, if you see none, steer clear. Fake websites, counterfeit boutiques -- any website which doesn't originate from a reputable source could place your bank account or identity at risk. 

    Published: March 11, 2014 -- 08:55 GMT (01:55 PDT)

    Caption by: Charlie Osborne

  • Keep data divulging on social networks to a minimum

    Keep data divulging on social networks to a minimum

    As my colleague Zack Whittaker discovered , sending out a single innocuous tweet containing sensitive information can lead to an avalanche of data which can be discovered and taken from you.

    To avoid giving hackers a digital trail, keep the sharing of personal information to a minimum on social networks, and make sure your privacy settings are set as highly as possible. From checking in to a bank and posting it on FourSquare to using GSP technology for sharing your home city or address, a single fact about you can lead to identity theft.

    When asked for security questions, consider using fake details, so even if facts about you are discovered they will not line up with the questions asked to access accounts. 

    Published: March 11, 2014 -- 08:55 GMT (01:55 PDT)

    Caption by: Charlie Osborne

  • Secure your wireless network

    Secure your wireless network

    Just because your wireless network is at home doesn't mean it is secure. Make sure you enable WPA encryption to prevent infiltrators from poaching your bandwidth or monitoring your network without consent -- which can lead to a detailed profile of your website visits. 

    Published: March 11, 2014 -- 08:55 GMT (01:55 PDT)

    Caption by: Charlie Osborne

  • Only download software from reputable sources

    Only download software from reputable sources

    In the same way that you should only shop from reputable online stores, do the same if you need to download software. If not, you may find your system compromised by trojans or backdoor malicious code. If you're not sure, consider using a search engine, typing in the name of the website and 'review.'

    Published: March 11, 2014 -- 08:55 GMT (01:55 PDT)

    Caption by: Charlie Osborne

  • Keep software up to date

    Keep software up to date

    It isn't just antivirus software that needs to be kept updated, but browsers, operating systems, and third-party software. From Windows machines to Java, keep software up-to-date to make sure exploits and vulnerabilities which could carve a path in to your system are patched in good time. 

    Published: March 11, 2014 -- 08:55 GMT (01:55 PDT)

    Photo by: Splashdata

    Caption by: Charlie Osborne

  • Be wary of social media-spread fake contests and links

    Be wary of social media-spread fake contests and links

    Facebook and Twitter are full to the gills with scams, contests and sweepstakes that are fake, but don't be fooled. Before submitting any personal information, check the validity of offers (hey, it's unlikely 4000 Samsung S5s are being given away, right?) and don't make any immediate decisions.

    Published: March 11, 2014 -- 08:55 GMT (01:55 PDT)

    Caption by: Charlie Osborne

  • If a job seems too good to be true, it probably is.

    If a job seems too good to be true, it probably is.

    Working from home and flexible schedules are on the rise, but sadly, cybercriminals use the desperation of people seeking work to steal personal information from them. Any firm offering lucrative hours, incredible salaries and work-from-home positions should undergo a thorough background check, and do not pay any fees for processing or give away data involving your bank account, password, or home details. 

    Published: March 11, 2014 -- 08:55 GMT (01:55 PDT)

    Photo by: CNET

    Caption by: Charlie Osborne

13 of 15 NEXT PREV
Charlie Osborne

By Charlie Osborne for Zero Day | March 11, 2014 -- 08:55 GMT (01:55 PDT) | Topic: Security

  • Stay clear of sending sensitive data across public Wi-Fi networks
  • Use double verification systems
  • Shred documents while at home
  • Do not share your passwords or leave them lying around
  • Keep an eye on your credit score
  • Watch out for phishing websites and fake campaigns
  • Use an antivirus program on desktop and mobile
  • Unique passwords and frequent changes
  • Shop only at reputable websites
  • Keep data divulging on social networks to a minimum
  • Secure your wireless network
  • Only download software from reputable sources
  • Keep software up to date
  • Be wary of social media-spread fake contests and links
  • If a job seems too good to be true, it probably is.

What are some simple tips, tricks and best-practice methods of keeping yourself and your digital identity safe from hackers?

Read More Read Less

Keep software up to date

It isn't just antivirus software that needs to be kept updated, but browsers, operating systems, and third-party software. From Windows machines to Java, keep software up-to-date to make sure exploits and vulnerabilities which could carve a path in to your system are patched in good time. 

Published: March 11, 2014 -- 08:55 GMT (01:55 PDT)

Caption by: Charlie Osborne

13 of 15 NEXT PREV

Related Topics:

Security TV Data Management CXO Data Centers
Charlie Osborne

By Charlie Osborne for Zero Day | March 11, 2014 -- 08:55 GMT (01:55 PDT) | Topic: Security

Show Comments
LOG IN TO COMMENT
  • My Profile
  • Log Out
| Community Guidelines

Join Discussion

Add Your Comment
Add Your Comment

Related Galleries

  • 1 of 3
  • OnlyKey hardware security key

    This is the ultimate security key for professionals.

  • SoloKeys Solo V2

    Durable, fully reversible connectors, encapsulated in epoxy resin, and with updatable firmware.

  • iVerify: Added security for iPhone and iPad users

    I'm usually wary of security apps, but iVerify by Trail of Bits is different. It comes highly recommended and offers a lot of features in a small download. ...

  • iStorage datAshur BT hardware encrypted flash drive

    FIPS 140-2 Level 3 compliant storage drive with wireless unlock feature and remote management. IP57 rated for dust and water resistance.

  • Netgear BR200 small-business router

    The Netgear BR200 Insight Managed Business Router has been designed to be easy to set up, and features a built-in firewall, VLAN management, and remote cloud monitoring, and can be ...

  • YubiKey 5C NFC: The world’s first security key to feature dual USB-C and NFC connections

    The YubiKey 5C NFC can be used across a broad range of platforms -- iOS, Android, Windows, macOS and Linux -- and on any mobile device, laptop, or desktop computer that supports USB-C ...

  • Apricorn Aegis Secure Key 3NXC

    The new Aegis Secure Key 3NXC builds on Apricorn's Secure Key 3z and Aegis Secure Key 3NX, taking the same proven form-factor and physical keypad, and adding something that users have ...

ZDNet
Connect with us

© 2021 ZDNET, A RED VENTURES COMPANY. ALL RIGHTS RESERVED. Privacy Policy | Cookie Settings | Advertise | Terms of Use

  • Topics
  • Galleries
  • Videos
  • Sponsored Narratives
  • Do Not Sell My Information
  • About ZDNet
  • Meet The Team
  • All Authors
  • RSS Feeds
  • Site Map
  • Reprint Policy
  • Manage | Log Out
  • Join | Log In
  • Membership
  • Newsletters
  • Site Assistance
  • ZDNet Academy
  • TechRepublic Forums