P.R.O.T.E.C.T. Y.O.U.R. I.D.E.N.T.I.T.Y.

P-asswords should be long, this makes them harder to crack. Use different passwords for         different accounts.

R-eputation after victimization is injured and can be costly to repair. 

O-nline security on social networking sites, shopping, mobile and online banking 

T-urn off your computer when it’s not in use. Being connected 24/7 gives hackers a chance to         access your computer and install malware/commit cyber crimes.

E-ntry points:  online accounts, public Wi-Fi, discarded or intercepted mail, overhearing or     “shoulder surfing” in public.

C-ybercrime is on the rise, with billions of dollars stolen each year.

T-rash cans may contain old mail, statements, documents with your information. Shred instead! 

 

Y-our wallet…carry the bare minimum with you. 

O-nline shopping and banking should NEVER be done on a public network.

U-pdate your computer regularly to prevent 

R-eport a stolen identities or cyber crime to the Internet Crime Complaint Center and to your         local law enforcement.

 

I-f it looks suspicious, it’s best to delete or mark as junk mail:  Links in email, tweets, posts, and         online advertising are often ways in for cyber criminals

D-on’t over share on social sites i.e. where you are/when you’re out of town/away from home.

E-mails are not secure, never send personal data through emails.

N-ever leave your laptop or device unattended.

Targeted, advanced attacks are taking place. Always be cautious.

infosecurty.com:  news, topics, webinars and all the information you need to protect your identity

Technology is a gateway to identity theft. Always be careful with your technology.

Young & Free Maine can help you prevent identity theft! Check out more tips about preventing         victimization here, at www.youngfreemaine.com 

 

P.R.O.T.E.C.T. Y.O.U.R. I.D.E.N.T.I.T.Y.

and keep living young & free,

Mallory

Sources:

http://www.staysafeonline.org/stay-safe-online/protect-your-personal-information/online-shopping#sthash.xoWfu2Ap.dpuf

http://www.infosecurity-magazine.com