Protecting Your Identity Online

11

Click here to load reader

description

8 rules to help protect you identity online. online identity theft is a growing problem but there are ways to protect one's self to make sure online identity theft doesn't happen to them.

Transcript of Protecting Your Identity Online

Page 1: Protecting Your Identity Online

B Y J O N L O Y D

W I Z A R D S C O M P U T E R R E P A I R

A N G I E R N C

H T T P : / / W W W . W I Z A R D S C O M P U T E R . C O M

Protecting Your Identity Online

Page 2: Protecting Your Identity Online

Your smartphone and computer store passwords, emails and other personal information

Page 3: Protecting Your Identity Online

Protect your phone and computer with antivirus software

More Information: Antivirus Basics

Page 4: Protecting Your Identity Online

Use the Windows firewall to block attacks from the internet

Page 5: Protecting Your Identity Online

Use strong passwords

Numbers: 1 – 9

CApitAl LEttErs

&_Symb@ls

Page 6: Protecting Your Identity Online

Use two factor authentication where possible

ID + Password + Something elseTime sensitive codesText messagesSecurID USB dongles

Page 7: Protecting Your Identity Online

Encryption protects your personal data in the event of physical theft

Even weak encryption will deter most identity thieves

Page 8: Protecting Your Identity Online

Lock your CreditRequire additional information open new credit lines

Experian cedit freeze

Trans Union credit freeze

Equifax credit freeze

Page 9: Protecting Your Identity Online

Learn to spot scams and phishing attacks

No one reputable will ask for your personal information via email

Page 10: Protecting Your Identity Online

References

http://www.webroot.com/us/en/home/resources/tips/getting-started/beginners-how-can-i-protect-myself-from-identity-theft-online

https://www.experian.com/freeze/center.html

http://www.transunion.com/personal-credit/credit-disputes/credit-freezes.page

Page 11: Protecting Your Identity Online

Image references

http://www7.pcmag.com/media/images/445346-how-to-use-your-smartphone-for-two-factor-authentication.jpg?thumb=y&width=740&height=426

http://fc07.deviantart.net/fs71/i/2010/106/f/3/Avast_Antivirus_by_cr1t1cal.jpg https://openclipart.org/image/300px/svg_to_png/169487/seguridad.png http://upload.wikimedia.org/wikipedia/commons/9/98/SafeWalletLogo.png http://upload.wikimedia.org/wikipedia/commons/8/8f/RSA_SecurID_SID800.jpg http://4.bp.blogspot.com/-

_RMfizJiuks/UQ6hxlAKQNI/AAAAAAAAQds/5jB8C9STQ-Q/s1600/teten-govt-security-cartoon.png

http://upload.wikimedia.org/wikipedia/commons/d/db/MoSYS_SGRAM.jpg http://pixabay.com/p-1778/?no_redirect https://openclipart.org/image/300px/svg_to_png/188461/gesloten_slot.png https://c2.staticflickr.com/2/1373/1276202472_875ce2a422.jpg