Proactive Practices to Protect Your Online Lifestyle
IDShield can help you protect your online lifestyle and ensure the security of your personal information
Review Requests for Information Thoroughly
Don’t Share Data Just Because You’ve Been Asked!
Phishing scams, in which cybercriminals pose as legitimate people or companies to trick you into sharing sensitive information, are another common security vulnerability. Recent research found that 68% of all phishing attacks impersonate well-known brands or trusted individuals in an attempt to elicit a feeling of confidence. Luckily, there are some common red flags that can alert you to a potential phishing attempt.
We’ve all heard of the “Nigerian Prince” scam, yet this and similar emails falsely claiming to be from royalty cost Americans more than $700,000 in 2018. These scams illustrate another common phishing red flags —generic greetings such as “Dear Sir” or “Hello Friend.” Grammar or spelling mistakes should also be cause for concern. It’s always possible that some of these signs could appear in a legitimate communication, however, it’s important to err on the side of caution and contact the company directly if you harbor any doubts before clicking on any links.
- Dark web surveillance
- Unlimited consulting with fraud experts
- 24/7 access for emergency support
- Monthly credit score tracker
- Support with credit report disputes
- Scan your social media for unwanted images and posts
- Watch your financial accounts for unwanted activity
Common Phishing Red Flags
Overly Urgent and Personal Subject Line
Of course, friends, family and co-workers may often send you emails with subjects that are personal in nature and convey a sense of urgency. However, if you receive communication like this from someone not in your contacts or a sender purporting to be a business entity, it’s always best to investigate further before opening the email.
2Check the Sender
Checking the specifics of the sender’s email address can also help you determine whether or not an email is legitimate. To do this, right-click on your keyboard or hover your mouse over the “from” and check for things like numbers, characters or additional letters that don’t seem right.
Phishing attempts will direct you to a URL where you can sign up for the service in question. It’s important that you review these links before you click on them and check for anything suspicious like misspelled names or extra characters.
In the digital age, an increasing amount of activity is taking place online. Whether it’s ordering a last-minute gift item from Amazon, streaming the latest Netflix release, or logging on to corporate resources from your personal computer, it’s safe to say that the Internet is playing a more prominent role in your life now than ever before. And in this environment, it’s also safe to say that the threat to your online security has never been greater.
Cybercriminals are continually looking for ways to capitalize on our digital lives, and every new innovation brings with it an array of tactics they can exploit. The following are a few common risk areas and what you can do to address them.
Online Account Takeover—Don’t Reuse Passwords!
Account takeover is an extremely common means by which cybercriminals can obtain unauthorized access to your accounts and, from there, your financial data and other sensitive information. If you’re like most people, you probably reuse passwords across multiple accounts or use easy-to-guess variations. One survey found that though 91% of respondents recognize that this practice poses security risks, 59% do so anyway.
Password reuse is a problem because data breaches are a reality of modern life. Equifax, LinkedIn, Marriott International, and Yahoo are just a few of the high-profile breaches to make headlines in recent years. However, data breaches happen multiple times every single day. The credentials exposed in these attacks are available for sale on the dark web, a shadowy part of the internet that isn’t visible to search engines and can be easily obtained by cybercriminals to utilize in other breach attempts. That’s why one of the most important things you can do to safeguard your information online is to create strong, unique passwords for every one of your accounts. As part of this, it’s also a good idea to invest in a password manager tool as it’s nearly impossible to remember the passwords for every online account.
Blogs, Articles and Other Related Links
Criminal identity theft happens when someone who is cited or arrested for a crime uses someone else’s personal information as ID. The result: a criminal record now exists in the name of the person whose ID was hijacked. This can have all sorts of repercussions, and...
Synthetic identity theft occurs when a fraudster combines real and fake personal information to create a new identity—as opposed to stealing an existing one. A thief can use a real Social Security number combined with a fake name and date of birth to ‘Frankenstein’...
As the Fab Four sang, you can’t avoid the tax man. But if you’re careful, you can avoid tax identity theft. What is tax identity theft? It’s when someone steals your identity and fraudulently files taxes or works in your name. Translation: someone else can end up with...