top of page

Identity Theft: Cyber Criminals

Identity Theft

Through our investigation into malware, phishing and spoofing, we understand how our information can be collected, but it is important to also understand how these cyber criminals use your information. Identity theft is the use of your personal information for criminal activity. Methods of identity theft range in magnitude, and with the new information technologies that exist, it is very easy to fall victim to this type of cybercrime. The most troubling of uses of your information typically involves your banking information. With the information these criminals are able to access, they can use your information to access bank accounts, open new ones, apply for lines and even make purchases. It can even go as far as obtaining your identification. 


Prevention

Credit: Unsplash

Again, awareness can not be stressed enough as the top preventative measure for any type of cybercrime. Knowing these risks exist should make you look closer at the websites you browse and the downloads you make online. Always think twice before providing your information anywhere online, and if you think that you may have provided your information somewhere by mistake, keep an eye on your banking information for changes, have your bank card numbers changed if necessary, and connect with your institution to make them aware of what you have done recently, and what things you have not done, and do not plan on doing, such as applying for loans or credit cards. Lastly, never provide your social insurance number or any other government identification information online, unless it is a secure government website that you have examined thoroughly.

Hopefully through these blog posts, you have developed a new sense of awarensss around cybercrime and risks that are associated with an online presence.  You should be able to look at the websites you use more critically, and be more protective of your information and your computer’s health regarding what you download and where you download from. Please also check out this great article (https://www.jisc.ac.uk/blog/how-do-you-keep-students-safe-from-cyber-crime-by-teaching-them-to-behave-like-a-stealth-bomber) which can help broaden your understanding of what has been discussed here.

Comments


bottom of page