10 SMART Ways To Protect Your Online Identity From Cybercriminals

Written by: Julian Evans, Identity Theft Expert and CEO from ID Theft ProtectUPDATED

1. Why use ID Theft Protect?
ID Theft Protect is a leading resource for individuals and small enterprises who want to protect themselves against Identity Theft, Identity Fraud and Data Privacy. The website is designed to identify how at threat individuals are personally, and provide information and solutions to both current and future threats to their privacy. The site is interactive allowing individuals to build their own personal profile, and take the steps necessary to protect themselves. Register with ID Theft Protect today to learn more on how to protect you and your family’s personal privacy!

2. Web filters and safe browsing – click the link opposite to find a solution
Web filtering software allows you and your family the opportunity to control content, blacklist or white list websites and set up passwords. Other powerful options included with some software include, popup and personal information blocking and chat room monitoring.
Safe browsing software allows you to control access to all but selected websites. If you want to control which websites your children see, then this is the solution for you. Other types of safe browsing tools include browser plug-ins which helps you avoid web pages with unwanted content and hidden threats, by rating each page and pages listed in Google, MSN and Yahoo for example.

3. Spam filter – click the link opposite to find a solution
Spam Filter software is an essential tool in today’s world as more and more of us are being spammed. This type of software can be purchased with an Internet Security Suite or as a standalone. Spam filters reduce not eliminate those annoying spam emails and place them into a quarantined folder before they reach your inbox. ID Theft Protect suggests you also consider using an Email Signature Generator which is a service that creates an image file that can be read by humans but not spammer’s robots.

4. Anti-virus – click the link opposite to find a solution
Anti-virus software is an essential tool in protecting your computer. Nearly everyone understands the need for anti-virus, but very few people understand what it does. Anti-virus software detects, repairs, cleans and removes malicious software from your computer. There are currently two types of anti-virus software – one which is signature based – relies on regular updates and the other is heuristic – which learns and adapts from user and application behaviour (i.e. monitors what you do and when and which applications are running and when)

5. Password Managers – click the link opposite to find a solution
Never have the same password for more than one computer program. Use a password manager software program. You can find information on password managers at ID Theft Protect. You are safe and secure to store your bank chip and pin, national insurance number (NINO), social security number (SSN), banking/checking account details and more in these programs.

6. Prepaid Credit cards and web cards – click the link opposite to find a solution
The prepaid credit card allows you to top your card up with money which you can use at retailers and online shopping websites. The main security advantages of these cards are you do not expose your bank and credit card accounts and you can also control the amount you wish to top up. Another card offered by some banks include what is called a ‘web card‘ – it’s not plastic (it’s a virtual online payment card) and best of all your card details are never exposed online. ID Theft Protect suggests individuals should use a ‘pre-paid’ or ‘web’ credit card when shopping on the internet.

7. Firewall – click the link opposite to find a solution
A firewall acts as a barrier between your computer and the internet. The barrier will open and close dependent on the rules set by the firewall. Most firewall programs use default settings as standard, and this will be sufficient to protect your computer from attack. For those of you wishing to have more control, most Firewall software allows you access to advanced settings. TIP: ID Theft Protect suggests you do not use the default Windows Firewall as it only filters incoming traffic. Outgoing traffic should also be filtered as your computer may already be compromised.

8. Anti-Malware – click the link opposite to find a solution
Malware (malicious software) is software that compromises computers to steal personal information or damage your computer system. Anti-Malware software will protect your computer from Adware, Bots, Root kits, Pharming and Spyware. Anti-Malware software should be used in addition to your anti-virus and firewall software.

9. Use Encryption Software – click the link opposite to find a solution
Instead of using your C and/or D drive to store your computer data, you should always use a software encryption program. This software program creates a secure drive in which to work from as well as protect your data from malicious programs, and best of all most work, look and feel the same as Windows XP. TIP: Store your outlook.pst and password manager file on the secure drive for added security!

10. Wi-Fi and Hotspot security – click the link opposite to find a solution
Make sure your home or office Wi-Fi network is secure using WPA encryption instead of the default WEP security setting. Refer to the user manual, or why not visit ID Theft Protect to learn more about the WPA setting. For those of you who use Wi-Fi hotspots in café’s, hotels and airports for example, ID Theft Protect suggests you use Hotspot security software.

TIP: Keep your Microsoft Windows and Office updated with the latest security updates. Remember to keep your security software (anti-Malware, anti-virus, anti-spam, anti-spyware and firewall) updated as well. Finally do not forget to visit ID Theft Protect for all the latest on identity fraud and data privacy.

Source: IDTP © 2007

This entry was posted in identity theft: identity fraud, privacy. Bookmark the permalink.

Leave a Reply

Your email address will not be published. Required fields are marked *