Cybercriminals tend to target vulnerable people who are easy to exploit. These are individuals who may be less technically savvy or lack the necessary security measures to protect themselves. Unfortunately, the Covid-19 pandemic has created a perfect storm for cybercriminals to prey on unsuspecting victims. With the increasing number of people working from home and relying on digital channels, it has become easier for cybercriminals to launch attacks and steal sensitive information.
One of the most common forms of cybercrime is identity theft, which can have devastating consequences for victims. Identity theft occurs when cybercriminals steal personal information such as social security numbers, credit card details, and passwords to access financial accounts or commit other fraudulent activities. Once a victim's identity is stolen, it can take an enormous amount of time, effort, and money to regain control of their identity and financial records. Victims may also experience plummeting credit scores and difficulty obtaining loans or credit cards in the future.
Therefore, it is crucial to take proactive measures to protect yourself against cybercrime. This includes using strong and unique passwords, enabling two-factor authentication, and avoiding suspicious emails or links. It is also important to monitor your financial accounts regularly and report any suspicious activity immediately. By taking these steps, you can reduce the risk of falling victim to cybercrime and safeguard your personal and financial information.
The following suggestions are best practices for anyone who wants to proactively guard against identity theft:
Use a password manager
The average person has around 70 to 80 passwords, which inevitably results in hand-written notes. Worse still, according to a Harris Poll conducted by Google, two out of three users admit to reusing passwords across multiple accounts. A password manager is your friend here, helping create strong, unique passwords for each account. It also encrypts and stores them in a secure password vault – you only need to remember one master password. Attackers can hack a password manager app, but your encrypted passwords will be useless to them. If you keep your master password safe, you should be, too.
Those still unconvinced about password managers should, at the very least, start creating unique passphrases that use the maximum number of characters allowed. Remember to reset a password immediately if an account is breached. As a general rule, don’t allow your browser to memorize passwords for accounts, and never use your credentials from one site (such as social media) to create an account or sign in to other (third-party) sites. Wherever possible, create usernames that do not include your name, email address, or birth date clues. This gives cybercriminals half of the information they need to crack your accounts.
Use multifactor authentication
Get over being annoyed by the “inconvenience” of multifactor authentication, which requires you to enter a code sent via text message after supplying a username and password. It’s an effective additional layer of security that should be used for every account that makes it available to you.
Stop oversharing online
It's important to rethink what and how you share information online to protect yourself from identity theft. Criminals can easily assume your identity by using the personal information you've shared online along with the data that's been collected behind the scenes.
To stay safe, it's recommended to remove personal information such as your date or place of birth, maiden name, mother's maiden name, address, phone number, pet's name, hobbies, etc. from social media and networking accounts. Use the highest level of privacy settings and be careful when adding new friends or accepting friend requests. Avoid social media quizzes or games that ask for personal information, and don't download apps from unknown sources or click on suspicious links and ads.
Disable location tagging and avoid sharing photos or content when you're not at home. It's impossible to list every precaution, so always ask yourself why the information is needed, who it benefits, and could it compromise your privacy or identity.
Protect your privacy at home
Secure your home wireless network, only use IoT devices that let you change the password and manage security settings, and securely dispose of old phones, laptops, and storage devices.
Furthermore, it is crucial not to overlook “lo-tech” measures like securing your mailbox, collecting your mail daily, opting out of direct mail advertising, and using a crosscut or micro-cut shredder to discard all documents with personal information (including junk mail). Double-check that you don’t leave valuables (i.e., passports, ID cards, wallets) in cars or other publicly accessible places.
Protect your privacy in public
It’s hard to believe anyone needs this reminder, but public Wi-Fi is incredibly susceptible to eavesdropping. Never use it for online banking, shopping (any activity that involves a credit card), or medical- and health-related services. Do not share private information (such as credit card numbers, date of birth, social security number, or membership numbers) on voice calls when in public places. When using point-of-sale systems, you should also protect PINs, membership numbers, and other identifiers. Pay attention when you swipe a card (beware of hard-to-spot skimmers!), and remember, cash still works in most places.
Avoid being an easy target
Consumers are often confused, frustrated or shocked by the various schemes that fraudsters come up with in order to scam them. Due to the constant flow of news on this issue, an average person may feel overwhelmed and helpless. However, with a few simple steps, such as the ones listed above, anyone can make a huge difference. Scammers like easy targets, so the more obstacles you put in their way, the better. The key is to avoid becoming an easy target. It's important to know what you need to do (within your realm of possibility) and remain vigilant about doing it. Nowadays, doing nothing is not an option.
More from TechRadar Pro
- Here’s our list of the best antivirus services on the market
- We’ve built a list of the best ransomware protection around
- Check out our list of the best malware removal services on the market
- Check out our list of the best encrypted messaging services around