SlideShare uma empresa Scribd logo
1 de 1
Baixar para ler offline
Protecting Your Online Identity:
5 Steps for
Better Security
Identity theft is on the rise. As noted by the Insurance Information
Institute, $16 billion was stolen from more than 15 million U.S. consumers
in 2017 alone — that’s $2 million more than 2016. Why the uptick? As
users shift to mobile devices and spend more time connected to Internet
services, opportunities for hackers are growing. By compromising online
accounts, cybercriminals can gain access to credit card data, banking
information and personal details that could impact victims for months or
even years. Your best bet is to take the time now to protect your online
identity. Here are five simple steps to help you get started.
www.arkusinvestigators.com
Improve Passwords
Passwords remain the go-to security protection for online accounts
— users are familiar with login/password requirements, and these
protections may deter low-level attackers. The problem is attackers
easily guess many passwords. For example, in 2016 the top two
passwords were “123456” and “password”.
The solution is to start stronger. Use something that contains at least one
capital, one number and one special character, and don’t reuse the password
on another site. Change the password at least once every six months. It’s also
a good idea to implement multifactor authentication wherever possible. The
simplest form is two-factor authentication, which uses a one-time text or
app code that users must provide to access their accounts.
Forget “Free” Wi-Fi
As noted by Forbes, free Wi-Fi hotspots are an easy way for hackers to grab
personal information. Why? Because all they need to do is set up shop in
a public place and create dummy networks called “Coffee Shop Wi-Fi” or
“Customer Wi-Fi Access” — and then wait for users to join. Once connected,
cybercriminals can gain total access to your device. There’s a simple answer
here: Don’t use free Wi-Fi. Opt for LTE or 4G on your mobile device, or
wait until you’re connected to a secure network.
Obscure Your Origins
If hackers know your IP address, they can start backtracking your
connection. If they discover you’re not encrypting data in transit, they could
eavesdrop on any network connection and grab critical account data such
as usernames and passwords. It’s a good idea to consider a virtual private
network (VPN) or other means to obscure your information from prying
eyes. VPNs obscure your IP and encrypt traffic, while options such as the
Tor Internet browser help ensure hackers don’t know where you’re located.
Know Your Audience
In the age of social media, mobile collaboration and always-on
connections, it’s easy to share too much with too many people. The result
is hackers could use your social media posts or unencrypted emails
to compromise accounts via brute force or by sending you “warning”
messages that demand immediate action but carry malware infections.
The rule here: Share sparingly. Don’t post personal details on social
media sites, and ensure you check all privacy settings to make sure
you’re not sending public updates. In addition, avoid opening any
emails from senders you don’t know.
Ask for Help
If you are compromised online, your best bet is to ask for help. The
longer you wait, the more time cybercriminals have to exploit your identity
and cause ongoing problems. First, leverage a reputable antivirus solution
to ensure your device isn’t carrying malware, then contact a digital
investigator to determine if stolen data can be recovered and whether
details about your attacker can be discovered.

Mais conteúdo relacionado

Último

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 

Destaque

Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellGood Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Saba Software
 

Destaque (20)

Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy Presentation
 
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellGood Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
 

Protecting Your Online Identity

  • 1. Protecting Your Online Identity: 5 Steps for Better Security Identity theft is on the rise. As noted by the Insurance Information Institute, $16 billion was stolen from more than 15 million U.S. consumers in 2017 alone — that’s $2 million more than 2016. Why the uptick? As users shift to mobile devices and spend more time connected to Internet services, opportunities for hackers are growing. By compromising online accounts, cybercriminals can gain access to credit card data, banking information and personal details that could impact victims for months or even years. Your best bet is to take the time now to protect your online identity. Here are five simple steps to help you get started. www.arkusinvestigators.com Improve Passwords Passwords remain the go-to security protection for online accounts — users are familiar with login/password requirements, and these protections may deter low-level attackers. The problem is attackers easily guess many passwords. For example, in 2016 the top two passwords were “123456” and “password”. The solution is to start stronger. Use something that contains at least one capital, one number and one special character, and don’t reuse the password on another site. Change the password at least once every six months. It’s also a good idea to implement multifactor authentication wherever possible. The simplest form is two-factor authentication, which uses a one-time text or app code that users must provide to access their accounts. Forget “Free” Wi-Fi As noted by Forbes, free Wi-Fi hotspots are an easy way for hackers to grab personal information. Why? Because all they need to do is set up shop in a public place and create dummy networks called “Coffee Shop Wi-Fi” or “Customer Wi-Fi Access” — and then wait for users to join. Once connected, cybercriminals can gain total access to your device. There’s a simple answer here: Don’t use free Wi-Fi. Opt for LTE or 4G on your mobile device, or wait until you’re connected to a secure network. Obscure Your Origins If hackers know your IP address, they can start backtracking your connection. If they discover you’re not encrypting data in transit, they could eavesdrop on any network connection and grab critical account data such as usernames and passwords. It’s a good idea to consider a virtual private network (VPN) or other means to obscure your information from prying eyes. VPNs obscure your IP and encrypt traffic, while options such as the Tor Internet browser help ensure hackers don’t know where you’re located. Know Your Audience In the age of social media, mobile collaboration and always-on connections, it’s easy to share too much with too many people. The result is hackers could use your social media posts or unencrypted emails to compromise accounts via brute force or by sending you “warning” messages that demand immediate action but carry malware infections. The rule here: Share sparingly. Don’t post personal details on social media sites, and ensure you check all privacy settings to make sure you’re not sending public updates. In addition, avoid opening any emails from senders you don’t know. Ask for Help If you are compromised online, your best bet is to ask for help. The longer you wait, the more time cybercriminals have to exploit your identity and cause ongoing problems. First, leverage a reputable antivirus solution to ensure your device isn’t carrying malware, then contact a digital investigator to determine if stolen data can be recovered and whether details about your attacker can be discovered.