Featured Article | A Pothole in Your Pathway: Open Sesame
Have you ever been tempted to use the exact same, or at least similar, usernames and passwords for multiple online accounts? Well, as you may have guessed, this practice gives an identity thief easy access to your information in various places in one fell swoop. First of all, if you use a similar username or the same e-mail address for various online accounts, they will be easier to find. The major misstep is in using the same password. Your password acts as a key. Should an unauthorized party gain access to that key, he or she can unlock the account to grab any and every bit of information that you have stored inside the site or service. Moreover, the hacker may attempt to access your other accounts using that same password. Unauthorized access to your account may lead to impersonation. The hacker may use your online account to spread malicious links that, when clicked, cause a security breach thus exposing your social media contacts to identity theft. Financial fraud is not the only motive for identity theft. Someone that seeks to damage a person’s reputation might commit identity theft by hacking into the account and impersonate the owner. Fake or imposter accounts are another example of identity theft that occurs on social media. The goal may range from cyber bullying to extortion. Remember to periodically change your passwords to further decrease the chances of someone hacking into your account in the long term. Report imposter accounts to the social networking service.
Do you think that unauthorized access to your online account is as easy as saying “Open Sesame?”
Tip: Vary passwords and usernames for all online accounts and change them periodically.
Think that identity theft is just for “old folk?” Think again. Discover why teens are prime targets for this online crime.
Go to Article → Featured Article | A Pothole in Your Pathway: Teen Identity Theft
Consider how much information you share on your social media profile and in your posts. Are you aiding in your own identity theft by giving away Pieces of Information?
Go to Article → Featured Article | A Pothole in Your Pathway: Pieces of Information
Whether you are shopping online or interacting with friends on social networks, you hold the key to protecting your identity. Take note of these Social Media Privacy Pointers.
Go to Article → Featured Article | A Pothole in Your Pathway: Social Media Privacy Pointers
Follow these 8 tips to prevent identity theft, and then share them on social media!
Go to Article → iDrive Agent: 8 Tips to Prevent Identity Theft on Social Media
iDrive wants to hear from you!
Want to start your own iDrive campaign or have a topic that you want iDrive to address? Send us a direct message on social media or send an e-mail at advisoryboard@isafe.org
Want to contribute social media content to future iDrive campaigns? Submit your application to join the iDrive Student Advisory Board here
Are you reading this article, but you’re not yet an iDrive Agent? Sign up here
Follow iDrive on Facebook, Twitter and Instagram.
Related Stories:
- Featured Article | A Pothole in Your Pathway: Teen Identity Theft
- Featured Article | A Pothole in Your Pathway: Pieces of Information
- Featured Article | A Pothole in Your Pathway: Social Media Privacy Pointers
- iDrive Agent: 8 Tips to Prevent Identity Theft on Social Media
- iDrive Student Advisory Board: Advocate for Cyber Security & Education
References:
Brenner, Joanna. “73% of Teens Have Access to a Smartphone; 15% Have Only a Basic Phone.” Pew Research Center: Internet, Science & Tech. 08 Apr. 2015. Web. www.pewinternet.org/2015/04/09/teens-social-media-technology-2015/pi_2015-04-09_teensandtech_06/
Carrns, Ann. “Why, and When, Your Child Should Have a Debit Card.” The New York Times. The New York Times, 14 Oct. 2016. Web. www.nytimes.com/2016/10/15/your-money/why-and-when-your-child-should-have-a-debit-card.html
Grant, Kelli B. “Identity Theft, Fraud Cost Consumers More than $16 Billion.” CNBC. CNBC, 01 Feb. 2017. Web. www.cnbc.com/2017/02/01/consumers-lost-more-than-16b-to-fraud-and-identity-theft-last-year.html
Identity Theft Resource Center. “Teen Space FAQs.” ID Theft Center. Web. http://www.idtheftcenter.org/Protect-yourself/teen-faq.html
Lathrop, Steve. Democrat-Herald, Albany. “Albany Teen Victim of ID Theft.” Albany Democrat Herald.19 Dec. 2011. Web. www.democratherald.com/news/local/albany-teen-victim-of-id-theft/article_c42188cc-2828-11e1-ae48-0019bb2963f4.htm
Lewis, Kent. How Social Media Networks Facilitate Identity Theft and Fraud. “Octane Magazine: Special Features.” Entrepreneurs’ Organization. Nd. Web. https://www.eonetwork.org/octane-magazine/special-features/social-media-networks-facilitate-identity-theft-fraud
Moyer, Phillip. “Rip-Off Alert: Social Media Habits Make Teens Easy ID Theft Targets.” KSNV. Web. http://news3lv.com/archive/rip-off-alert-social-media-habits-make-teens-easy-id-theft-targets
“News Room – ID Analytics.” ID Analytics. Web. news3lv.com/archive/rip-off-alert-social-media-habits-make-teens-easy-id-theft-targets
Pascual, Al, Marchini, K., Miller, S. “2017 Identity Fraud: Securing the Connected Life.” Javelin. N.p., 01 Feb. 2017. Web. www.javelinstrategy.com/coverage-area/2017-identity-fraud
Pipl.com.Web. www.pipl.com
“Teens, Social Media, and Privacy.” Pew Research Center: Internet, Science & Tech. 21 May 2013. Web. www.pewinternet.org/2013/05/21/teens-social-media-and-privacy-3/