5 Ways to Protect Your Identity

Saturday, March 16, 2013

5 Ways to Protect Your Identity



In the world we live in today, identity protection has become so crucial. With the nexus of digital interaction all around us, it can sometimes seem as though opportunities for catastrophe are everywhere. And, in fact, they are.

There are certainly many large agencies out there that will assist with identification security, but most cannot easily afford these services. So what are some other options? We examine 5 powerful ways to protect your own identity without paying for the services of a large agency.

 ONLINE

1.       Get a Good Firewall and Antivirus

It can be tempting to use free antivirus programs or even risk running none at all. Trust us, neither is a good idea. Do your homework, and research on reviews of a product you can afford. This will be well worth it in the end.
2.                   Cycle Passwords

Because there are people with unlimited time and resources aimed at getting your personal info, it is never a good idea to keep a password for too long. The more often you change them, the better. To keep up, try keeping a hidden text document on your hard drive, where you record password info as needed.
3.                   Check Site Credibility

Frequenting or transacting with a less than reputable site can lead to viruses, malware, data and identity theft and much more. If it is a .com site, what are its credentials?
OFFLINE

4.            Look Out for Impersonators

Impersonation is one of the oldest and most reliable tricks in the books for the bad guys. Impersonators may present themselves in person, perhaps at your front door, acting as a survey associate or utility worker. They can also present themselves over the phone or via mail, pretending to be a social security worker, utility worker, DMV or IRS agent, and countless others.
5.             Responsibly Dispose of Information
Information about you is in the items all around you. Shred unneeded personal documents. Keep personal notes and paperwork secure. Empty phones and other digital devices of personal information when not in use or when being disposed of, recycled, traded, sold, or even lent out. Simple oversights of things like these can lead to serious consequences.
 Post-Intrusion
If your data or computerized devices do become compromised, there are many things that still can be done in response. This, however, depends on the situation and damages done. For example, a virus intrusion may seize your data and computer, and then lock you out altogether. It doesn’t matter where you live, you should look up specialists of data recovery to recover your drive contents and make them available again.
These are some of the best and most basic tips for personal identity protection. 

Author: Vicky Hyde

No comments:

Related Posts Plugin for WordPress, Blogger...
UA-24898320-1