Spyware runs automatically without the user's knowledge and transmits vital information. Spyware can also record your keystrokes and one might end up revealing all usernames, passwords and other details to identity thieves. (Atlantic Publishing, 2008); (Schwabach, 2005)
Identity thieves have also found novel ways to steal and use identities. For instance, cyber criminals recently hacked Facebook, a popular social networking site, and changed a user's page asking people to help him. Even though the matter was resolved with the help of Facebook; the fact remains that identity theft can have far-reaching and diverse consequences. (Caroll, 2009) the damage caused by identity theft can take years to be rectified. The consequences of the fraudulent practices initiated by the identity thief can continue to reach the victim and credit companies long after the thief has been apprehended and the abuse of the victim's identity stopped. Therefore, consumers must take utmost precautions to protect their identities at all costs. (Schwabach, 2005)
An identity theft can dog a person for the rest of his life and reclaiming one's life can be an uphill task. As they say, "prevention is better than cure." Prevention of identity theft just requires a few extra precautions while dealing with one's personal data and belongings. In most cases, it is the irresponsibility of victims that results in their identities being stolen. (Atlantic Publishing, 2008)
With identity theft becoming one of the fastest growing crimes in the U.S., here are a list of preventive steps that consumers can take to protect themselves:
(i) Check credit reports: one must make it a habit to request for a copy of credit report annually. The credit report gives information whether somebody else has misused your credit account or changed your billing address. (Atlantic Publishing, 2008); (the Silver Lake, Loberg, Silver Lake Publishing, 2004); ("Identity Theft Prevention," n. d.)
(ii) Secure your password and PINs: Password and PINs are extremely important and utmost precaution should be taken that no one has access to them. Writing them down or putting those in a hidden file are very dangerous habits. Passwords should be chosen in a way that is difficult for people to guess them. Having spouse's or child's name as a password, or using your birth date can be extremely foolish as these are the first things that an identity thief may try. It is better to have a random combination of alphabets and numbers which can be remembered but hard to guess. While using passwords or PINs, it is better to make sure nobody is looking over your shoulder. Identity thieves often observe their victims over a long time noting keystrokes, etc. It is a good habit to change your passwords periodically and not to use the same password everywhere. (Atlantic Publishing, 2008); (the Silver Lake, Loberg, Silver Lake Publishing, 2004); ("Identity Theft Prevention," n. d.)
(iii) Protect credit cards: one should make it a habit to sign new cards immediately upon receipt and treat them as one would treat cash because that is what they actually are. One should not write down the PIN on the card itself. Carry only those cards that are likely to be used. After making a purchase, one should always check that the card is actually yours. (Atlantic Publishing, 2008); (the Silver Lake, Loberg, Silver Lake Publishing, 2004); ("Identity Theft Prevention," n. d.)
(iv) Protect mail: In case one is going out of town, it would be a good idea to notify the post office to hold the mail till one comes back. It is better not to choose pre-approved credit offers. One should not be so daft as to write down one's social security number or credit card number on the outer part of an envelope or on a postcard. In case the home mailbox remains unattended, it would be a good idea to use collection boxes for outgoing mail. Moreover, it is better to collect mail immediately upon arrival rather than wait for unscrupulous...
In one case in 2000, two-20-year-olds hacked into the Lowe's credit card mainframe from a white Pontiac Grand Prix parked outside a store, synching a single laptop to the wireless system that was meant for employees to use to locate products. The hackers, obviously to blame for the crime, played on the flaws of a computer system that should not have allowed for a security breach. While the same hackers
Identity Theft: Managing the Risk Management What's New for the Future of Identity Theft Prevention In this paper I examine the basics of identity theft in today's age of widespread and accessible information. The fundamental problem is that while information technologies continue to make aspects of our lives as simple as "point and click," they tend to make certain forms of crime equally simple. The internet, in particular, makes information not only
Identity theft has always been possible, but the internet and technology have made it something that can often be accomplished far too easily. According to Hoar (2001), identity theft is the "crime of the new millennium." Stealing someone's identity can cause them countless problems, thousands of dollars, and literally years to correct. Problems are not limited to credit reports, either. Some people even file tax returns using the social security
Pharmers now not only small local servers operated by Internet service providers (ISP) but they also target the 13 servers on which all other DNS servers depend. Implications Businesses & Large Organizations: Among large scale businesses that get affected includes the financial sector other than individuals. Electronic banking services have been greatly affected by these criminals who are euphemistically called hackers or crackers who conduct phishing or pharming. They not only
Criminals don't always need to have shotguns and masks to threat and rob money; it only takes a social security number, or a pre-approved credit card application from trash to make things according to their wicked way (ID Theft, 2004). Some consumers have had credit card numbers and Social Security numbers stolen and used fraudulently or identity theft. By taking reasonable steps to protect your personal information, this can mitigate the
Of course, most people will call their banks, credit card companies, and other institution at the first sign that identity theft has occurred, but what happens to those victims who do not realize it immediately? People need to be aware of what identity theft is, how it is committed, what can happen when such information is stolen, and what should be done when identity theft has occurred. It is not
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now