2. What is Identity Theft?
Identity theft happens when someone uses
your personally identifying information, like
your name, social security number, or credit
card number, without your permission, to
commit fraud or other crimes.
It can cost you time and money
It can destroy your credit and ruin your good
name
10. More Ways To Protect Yourself
Protect your social security number.
Verify sources before sharing information.
Safeguard wallet or purse.
Store private information in secure locations.
Implement a credit freeze on your credit report.
Invest in identity theft insurance or credit monitoring.
More Ways To Protect Yourself Continued
Never write down your password or share it with others.
Change your passwords at least every six months.
Only friend people you know and trust on your social media networks.
When disposing your old computer, make sure you use data erasing
software before you remove it.
If you have multiple passwords you cannot remember make an encrypted
file with a very strong password to protect it.
Have the Postal Service hold your mail when you leave town.
11. Data security breaches that could lead to identity theft are
occurring at a higher pace as computer network systems become
more and more vulnerable from attacks by hackers and viruses.
Organizations should employ better encryption and robust
authentication methods and employees must be educated and
trained on how to handle sensitive and confidential information.
Cyber insurance could play an important role not only in managing
the risk of a data breach but also in enhancing the security
position of the company.
Finally, an efficient response to a breach and containment of the
damage could significantly diminish the cost of breach. Thus,
companies should consider having an incident response and crisis
management plan in place as a preventive measure to data
breach and damage control when one occurs. Note that the
organizational responses to the threat of data breaches examined
in this paperare equally applicable to any organization that needs
to protect people‘s PID.
CONCLUSION: