Home Blog Featured Article | A Pothole in Your Pathway: Open Sesame
formats

Featured Article | A Pothole in Your Pathway: Open Sesame

Published on October 26, 2017 by in Blog, Newsletter

Featured Article | A Pothole in Your Pathway: Open Sesame

Have you ever been tempted to use the exact same, or at least similar, usernames and passwords for multiple online accounts? Well, as you may have guessed, this practice gives an identity thief easy access to your information in various places in one fell swoop. First of all, if you use a similar username or the same e-mail address for various online accounts, they will be easier to find. The major misstep is in using the same password. Your password acts as a key. Should an unauthorized party gain access to that key, he or she can unlock the account to grab any and every bit of information that you have stored inside the site or service. Moreover, the hacker may attempt to access your other accounts using that same password. Unauthorized access to your account may lead to impersonation. The hacker may use your online account to spread malicious links that, when clicked, cause a security breach thus exposing your social media contacts to identity theft. Financial fraud is not the only motive for identity theft. Someone that seeks to damage a person’s reputation might commit identity theft by hacking into the account and impersonate the owner. Fake or imposter accounts are another example of identity theft that occurs on social media. The goal may range from cyber bullying to extortion. Remember to periodically change your passwords to further decrease the chances of someone hacking into your account in the long term. Report imposter accounts to the social networking service.

Do you think that unauthorized access to your online account is as easy as saying “Open Sesame?”

Tip: Vary passwords and usernames for all online accounts and change them periodically.

Think that identity theft is just for “old folk?” Think again. Discover why teens are prime targets for this online crime.
Go to Article → Featured Article | A Pothole in Your Pathway: Teen Identity Theft

Consider how much information you share on your social media profile and in your posts. Are you aiding in your own identity theft by giving away Pieces of Information?
Go to Article → Featured Article | A Pothole in Your Pathway: Pieces of Information

Whether you are shopping online or interacting with friends on social networks, you hold the key to protecting your identity. Take note of these Social Media Privacy Pointers.
Go to Article → Featured Article | A Pothole in Your Pathway: Social Media Privacy Pointers

Follow these 8 tips to prevent identity theft, and then share them on social media!
Go to Article → iDrive Agent: 8 Tips to Prevent Identity Theft on Social Media

iDrive wants to hear from you!

Want to start your own iDrive campaign or have a topic that you want iDrive to address? Send us a direct message on social media or send an e-mail at advisoryboard@isafe.org

Want to contribute social media content to future iDrive campaigns? Submit your application to join the iDrive Student Advisory Board here

Are you reading this article, but you’re not yet an iDrive Agent? Sign up here

Follow iDrive on Facebook, Twitter and Instagram.

  • facebook
  • Twitter
  • Instagram

Related Stories:

References:

Brenner, Joanna. “73% of Teens Have Access to a Smartphone; 15% Have Only a Basic Phone.” Pew Research Center: Internet, Science & Tech. 08 Apr. 2015. Web. www.pewinternet.org/2015/04/09/teens-social-media-technology-2015/pi_2015-04-09_teensandtech_06/

Carrns, Ann. “Why, and When, Your Child Should Have a Debit Card.” The New York Times. The New York Times, 14 Oct. 2016. Web. www.nytimes.com/2016/10/15/your-money/why-and-when-your-child-should-have-a-debit-card.html

Grant, Kelli B. “Identity Theft, Fraud Cost Consumers More than $16 Billion.” CNBC. CNBC, 01 Feb. 2017. Web. www.cnbc.com/2017/02/01/consumers-lost-more-than-16b-to-fraud-and-identity-theft-last-year.html

Identity Theft Resource Center. “Teen Space FAQs.” ID Theft Center. Web. http://www.idtheftcenter.org/Protect-yourself/teen-faq.html

Lathrop, Steve. Democrat-Herald, Albany. “Albany Teen Victim of ID Theft.” Albany Democrat Herald.19 Dec. 2011. Web. www.democratherald.com/news/local/albany-teen-victim-of-id-theft/article_c42188cc-2828-11e1-ae48-0019bb2963f4.htm

Lewis, Kent. How Social Media Networks Facilitate Identity Theft and Fraud. “Octane Magazine: Special Features.” Entrepreneurs’ Organization. Nd. Web. https://www.eonetwork.org/octane-magazine/special-features/social-media-networks-facilitate-identity-theft-fraud

Moyer, Phillip. “Rip-Off Alert: Social Media Habits Make Teens Easy ID Theft Targets.” KSNV. Web. http://news3lv.com/archive/rip-off-alert-social-media-habits-make-teens-easy-id-theft-targets

“News Room – ID Analytics.” ID Analytics. Web. news3lv.com/archive/rip-off-alert-social-media-habits-make-teens-easy-id-theft-targets

Pascual, Al, Marchini, K., Miller, S. “2017 Identity Fraud: Securing the Connected Life.” Javelin. N.p., 01 Feb. 2017. Web. www.javelinstrategy.com/coverage-area/2017-identity-fraud

Pipl.com.Web. www.pipl.com

“Teens, Social Media, and Privacy.” Pew Research Center: Internet, Science & Tech. 21 May 2013. Web. www.pewinternet.org/2013/05/21/teens-social-media-and-privacy-3/

 
 Share on Facebook Share on Twitter Share on Reddit Share on LinkedIn
No Comments  comments 

Leave a Reply