Cyber Security Awareness - Identity Theft

Identity Theft

Identity Theft is defined as the fraudulent acquisition and use of an individual's personally identifying information, usually for financial gain. Key pieces of personally identifying information include such items as social security, insurance, or driver's license numbers. Thieves who steal such information may then use it to obtain credit, merchandise, or medical drugs and services, all in the name of the victim.

The identity you save may be your own.

  • Cancel unused credit cards
  • Never needlessly carry around your social security card, passport or birth certificate
  • Never write down PIN numbers or passwords
  • Order and review your credit report at least once a year
  • Review your financial statement immediately and report any unauthorized purchases

Helpful Information

Here are some common examples of identity theft scenarios and how they play out:

  • Tax-Related Identity Theft
  • Child Identity Theft
  • Medical  Identity Theft

Because security doesn't stop at a strong password, it takes multiple layers to keep us all safe.

Visit the links below to learn how to  you protect your identity.

  • How To Keep Your Personal Information Secure
  • Disposing of Old Computers
  • Disposing of Mobile Devices
  • Signs of Identity Theft
  • Immediate Steps to Repair Identity Theft
     
Many thanks to the University of Georgia's Office of Information Security department for allowing us to use their image concepts for our campaign to help combat cybercrime. It is this type of shared governance and shared responsibility that will hopefully slow down the attackers and create a safer environment for us all.
Was this helpful?
0 reviews
Print Article

Related Articles (4)

Malware is a general term for any software that can interrupt computer operations, gather sensitive information, or gain access to a system of computers. Malware may include computer viruses, worms, trojan horses, ransomware, spywear, adware, and scareware to name a few.
Mobile Security refers to security of personal and business-related information stored on mobile devices such as smartphones and tablets. These mobile devices are targets for attacks because a lot of people leave them on all the time, unlike regular computers.
Always use a strong password to protect your computer, mobile device and online accounts. Select a strong password with a mix of upper and lower case letters, numbers and special characters.
Phishing attacks are attempts to collect sensitive information such as social security numbers, passwords, usernames, credit cards (and sometimes cash - usually in the form of a wire transfer) in the form of an electronic communication. When attackers get the victim to bite the bait then phishing succeeds.