Featured Article | A Pothole in Your Pathway: Pieces of Information
Think About It: What types of personal information do you share in your social media profile and posts? Have you ever shared your phone number?
Consider the type of information that is stored inside of your account: your name, your date of birth and your e-mail address. If your account’s security is breached, the hacker can gain access to this information.
Tip: Consider using a nickname and making your birthday private.
Research has shown that teens are more comfortable with sharing their personal information on social media than ever before (Pew, 2013). But did you know that sharing information about yourself on your favorite social networks can also lead to identity theft? Social networks are global platforms, and pieces of personal information on your Instagram, Facebook, and other accounts that can make you an easy target; information such as your full name, birthday, and hometown (Lewis, nd). Did you know that three pieces of personal information are sufficient to commit identity theft? Depending on the uniqueness of your name, many people might have the same first and last name as you, yet by combining other identifiers, a criminal can narrow the search for your ID. In this case, an identity thief can pair your name up with your birthday; one day out of 365 ¼ days in the year. Additional pieces of information such as e-mail address, hometown, phone number serve to isolate your ID when linked together. Some social media users share this information on their public profile while others only share these types of identifying information with the social media service when creating their accounts. Consider how much information you share on your social media profile and in your posts. Are you aiding in your own identity theft by giving away pieces of your information?
Think that identity theft is just for “old folk?” Think again. Discover why teens are prime targets for this online crime.
Go to Article → Featured Article | A Pothole in Your Pathway: Teen Identity Theft
Find out how your online actions can allow a devious individual to access your account as easily as saying “Open Sesame.”
Go to Article → Featured Article | A Pothole in Your Pathway: Open Sesame
Whether you are shopping online or interacting with friends on social networks, you hold the key to protecting your identity. Take note of these Social Media Privacy Pointers.
Go to Article → Featured Article | A Pothole in Your Pathway: Social Media Privacy Pointers
Follow these 8 tips to prevent identity theft, and then share them on social media!
Go to Article → iDrive Agent: 8 Tips to Prevent Identity Theft on Social Media
iDrive wants to hear from you!
Want to start your own iDrive campaign or have a topic that you want iDrive to address? Send us a direct message on social media or send an e-mail at advisoryboard@isafe.org
Want to contribute social media content to future iDrive campaigns? Submit your application to join the iDrive Student Advisory Board here
Are you reading this article, but you’re not yet an iDrive Agent? Sign up here
Follow iDrive on Facebook, Twitter and Instagram.
Related Stories:
- Featured Article | A Pothole in Your Pathway: Teen Identity Theft
- Featured Article | A Pothole in Your Pathway: Open Sesame
- Featured Article | A Pothole in Your Pathway: Social Media Privacy Pointers
- iDrive Agent: 8 Tips to Prevent Identity Theft on Social Media
- iDrive Student Advisory Board: Advocate for Cyber Security & Education
References:
Brenner, Joanna. “73% of Teens Have Access to a Smartphone; 15% Have Only a Basic Phone.” Pew Research Center: Internet, Science & Tech. 08 Apr. 2015. Web. www.pewinternet.org/2015/04/09/teens-social-media-technology-2015/pi_2015-04-09_teensandtech_06/
Carrns, Ann. “Why, and When, Your Child Should Have a Debit Card.” The New York Times. The New York Times, 14 Oct. 2016. Web. www.nytimes.com/2016/10/15/your-money/why-and-when-your-child-should-have-a-debit-card.html
Grant, Kelli B. “Identity Theft, Fraud Cost Consumers More than $16 Billion.” CNBC. CNBC, 01 Feb. 2017. Web. www.cnbc.com/2017/02/01/consumers-lost-more-than-16b-to-fraud-and-identity-theft-last-year.html
Identity Theft Resource Center. “Teen Space FAQs.” ID Theft Center. Web. http://www.idtheftcenter.org/Protect-yourself/teen-faq.html
Lathrop, Steve. Democrat-Herald, Albany. “Albany Teen Victim of ID Theft.” Albany Democrat Herald.19 Dec. 2011. Web. www.democratherald.com/news/local/albany-teen-victim-of-id-theft/article_c42188cc-2828-11e1-ae48-0019bb2963f4.htm
Lewis, Kent. How Social Media Networks Facilitate Identity Theft and Fraud. “Octane Magazine: Special Features.” Entrepreneurs’ Organization. Nd. Web. https://www.eonetwork.org/octane-magazine/special-features/social-media-networks-facilitate-identity-theft-fraud
Moyer, Phillip. “Rip-Off Alert: Social Media Habits Make Teens Easy ID Theft Targets.” KSNV. Web. http://news3lv.com/archive/rip-off-alert-social-media-habits-make-teens-easy-id-theft-targets
“News Room – ID Analytics.” ID Analytics. Web. news3lv.com/archive/rip-off-alert-social-media-habits-make-teens-easy-id-theft-targets
Pascual, Al, Marchini, K., Miller, S. “2017 Identity Fraud: Securing the Connected Life.” Javelin. N.p., 01 Feb. 2017. Web. www.javelinstrategy.com/coverage-area/2017-identity-fraud
Pipl.com.Web. www.pipl.com
“Teens, Social Media, and Privacy.” Pew Research Center: Internet, Science & Tech. 21 May 2013. Web. www.pewinternet.org/2013/05/21/teens-social-media-and-privacy-3/