If you haven’t had your identity stolen or compromised yet, just wait…… It’s only a matter of time until it happens to you unless you know what you’re protecting.
The Star Wars Cantina of cybercriminals targeting your identity, healthcare, finances and privacy today might seem like a movie you’ve seen so many times you could lip sync the entire thing. Nevertheless, cybercrime and identity-related scams change faster than trending hashtags on Twitter, and the fact is nobody knows whats going to happen next. Who would have thought Apples iCloud was vulnerable (much less to ransomware)? Or eBay? Data breaches are now the third certainty in life and sooner or later, you will become a victim.
You probably realize that identity thieves are after your email addresses and passwords, but thats not all they want. In particular, each of us is attached to various sets of numbers that, when cobbled together, enable sophisticated identity thieves to get their claws into you. The fraudster doesnt need all your information to complete the problem set. They just need enough to convince others that they are you. Here are eight numbers that they are gunning for.
You want people to be able to call you; you may even list your phone number on a public-facing site. If you do, bear in mind some companies use your phone number to identify you, at least in part. With caller ID spoofing, its not hard for a fraudster to make your number appear when they call one of those companies.
Birth, college attendance, employment, when you resided at a particular address, ZIP codes associated with open accounts these are all numbers that can help a scam artist open the door to your identity by cracks and creaks. Many people put this information on public websites, like personal blogs and social media sites. In the post-privacy era, it is imperative you grasp the concept that less is more. Another tactic worth trying is populating public-facing social media sites with inaccurate information though you might want to check each sites rules since some sites frown upon the practice.
Card-skimming operations use a device to capture your debit card information while a camera records you as you type in your PIN code, making it very easy for a thief to replicate. Cover your hands and be paranoid, because its possible someone actually is watching you.
Your Social Security number is the skeleton key to your personal finances. There are many places that ask for it but dont actually need it. Be very careful about who gets it and find out how they collect it, store it and protect it. Whenever you’re asked for your SSN, always consider whether the request is logical based upon the context of your relationship with them.
Your bank account number is on your checks, which makes a personal check one of the least secure ways to pay for something. Consider using a credit card. You get rewards, buyer protection and less of your information will be out there.
Scammers can use malware and a remote access tool to lock files on your computer and then demand a ransom in exchange for access. A message informing a user that his or her IP address is associated with online criminal activity is a common scare tactic used in ransomware scams. Dont fall for it. While its not difficult to track an IP address, there are a number of browsers that hide your IP address and associated searches from the bad guys, and there are fixes for ransomware.
These are critical elements of your personally identifiable information that represent major pieces of your identity puzzle and, once you have the number, these documents can be counterfeited. Countless times each day, millions of personal documents undergo major makeovers and suddenly feature new names, addresses and photographs of fraudsters.
Health insurance fraud is on the rise, and one of the biggest growth areas is identity-related health care crimes. This can jeopardize your life — not just your credit or finances, as the fraudsters medical information can be commingled with yours, precipitating blood type changes, and eliminating certain allergies to meds or presenting new ones. The results can be catastrophic when a course of treatment is prescribed based upon incorrect information in the file.
Its time to become a data security realist. Data breach fatigue is the enemy. Every new compromise and scam is potentially crucial news for you, since it may point to weak spots in your own behaviors and ways that your data hygiene might be putting you at risk. So keep reading articles about new threats to your personal data security, and read every single email alert that you receivethough be careful of the obviously fake emails and always verify directly with the institution.
While there is no way to avoid cybercrime and identity theft, there is plenty you can do to make sure the damage is minimized and contained, and that no matter what happens, your daily life can go on without too much disruption.
Read the full story on go.com