Identity Theft is Real CREDIT: Graphic Design by Karen Clay

Today we increasingly rely on digital contact with others as much as or more than in-person human contact. The advent of the global quarantine in 2020 accelerated the use of already available technologies to remotely conduct business on many fronts, including, but not limited to banking, health appointments, employment, and visits with friends and family. Vast amounts of personal information are exchanged and stored online every second. Online privacy has now become more than just a concept—it’s a critical aspect of maintaining personal security and autonomy. In part two of our identity management series, we are focusing on the importance of online privacy, the threats to it, and recommended effective strategies to manage and protect our identity.

In an age where data is a valuable commodity, our behaviors, preferences, and intimate details are constantly tracked and analyzed by corporations for targeted advertising and other profit-driven motives. This not only questions the concept of consumer choice but also raises ethical concerns about the manipulation of social and political landscapes through data-driven insights. Therefore, we have a personal responsibility to participate in the securing of our data. From everyday interactions like internet searches and social media usage to more discrete activities such as online shopping and banking, each action leaves a digital footprint that is vulnerable to interception. Large-scale data breaches, where sensitive information is exposed, are increasingly common.

The Federal Trade Commission (https://www.identitytheft.gov/) identifies several clues to alert you that someone may have stolen your identity. They include:

  • You see withdrawals from your bank account that you can’t explain.
  • You don’t get your bills or other mail.
  • Merchants refuse your checks.
  • Debt collectors call you about debts that aren’t yours.
  • You find unfamiliar accounts or charges on your credit report.
  • Medical providers bill you for services you didn’t use.
  • Your health plan rejects your legitimate medical claim because the records show you’ve reached your benefits limit.
  • A health plan won’t cover you because your medical records show a condition you don’t have.
  • The IRS notifies you that more than one tax return was filed in your name, or that you have income from an employer you don’t work for.
  • You get notice that your information was compromised by a data breach at a company where you do business or have an account.

Here are some suggestions to consider in managing your online identity:

Understanding and Adjusting Privacy Settings: One of the first steps in protecting online privacy is understanding the privacy settings of applications and websites. Most platforms allow you to control what is shared and who it is shared with. Customizing these settings to limit exposure, opting out of data sharing and tracking whenever possible is a first step.

Using Secure and Private Tools: Using tools designed with privacy in mind is essential. This may include:

  • Using privacy-focused browsers such as Mozilla Firefox which is designed to block trackers and cookies that spy on browsing activities. 
  • Using Virtual Private Network (VPN) which encrypts internet traffic, making it difficult for hackers or ISPs to monitor your online activities.
  • Using encrypted communication apps such as Signal or Telegram, which offer end-to-end encryption, ensures that messages, calls, and data sent are only readable by the intended recipient.

Being Aware of Phishing and Scams: Understanding the common tactics used by scammers is crucial. Phishing attempts, where fraudulent emails or messages mimic legitimate sources to steal data, are prevalent. Use caution when clicking on links or providing information online, especially in unsolicited communications.

Regular Monitoring and Updates: Regularly checking financial statements, using credit monitoring services, and ensuring that all software is up-to-date with the latest security patches are critical practices. Software updates often include security enhancements that protect against newly discovered vulnerabilities.

Managing the Information You Share: Both publicly on social media and privately through online services, be mindful of the data you disclose to mitigate risks from social engineering or data breaches.

Managing Credit Card Information on Websites: It can be tempting to save your credit card information on Google or at e-commerce sites you frequent. However, you should consider avoiding this practice, as it potentially provides hackers with access to your personal information in the case of a data breach.

Securing Your Accounts: Employ strong, unique passwords and two-factor authentication to safeguard your online accounts from unauthorized access.

Educating Yourself and Others: Staying informed about the latest privacy issues and sharing this knowledge with friends and family can help create a more privacy-conscious community. Educational resources and awareness campaigns can empower individuals to take control of their digital identities.

Karen Clay, Clay Technology and Multimedia
Courtesy, Karen Clay
Karen Clay
Click Here to See More posts by this Author