Your Guide to Identity Theft Awareness and Avoidance
Identity theft is big business in Australia with the Australian Institute of Criminology placing the cost at $2.2 billion annually. Perhaps you or someone you know has fallen victim to what has become one of Australia’s fastest-growing crimes. But with this expert advice, you will know the specific steps you can and should take — before and after the fact — to greatly reduce your potential risk.
1. Beware of the Word ‘Prevent’
No person and no product can 100 percent prevent identity theft. As long as criminals can benefit from stealing, there will be theft. Sensitive personal information (SPI), such as Social Security numbers and banking or credit card account information, is everywhere, housed and archived in a mind-boggling variety of ways. Individuals and companies can reduce access to SPI and improve safeguards around it by working to change how we share, collect, store and dispose of information. As a general rule, CareerOne does not collect SPI. When it comes to protecting SPI, exercising vigilance is always your best bet. And be sure to research any product or service that guarantees identity theft prevention — buyer beware.
2. There Are No ‘Guarantees’
This mantra holds true for a lot of things in life, and dealing with identity theft is no exception. While a number of instances of fraud can be restored to pre-theft status, some identity dilemmas simply can’t be fixed. If you’re on the ‘no-fly list’ thanks to an imposter or error, you’ll stay there. A third-party solution cannot deliver a remedy. Once again, research any product or service before enlisting their help in restoring your pre-theft status. You also must realise this restoration takes time, and you need to work through the system for reparation.
3. Watch for ‘Shoulder Surfers’ and ‘Skimmers’
Shield the entry of personal identification numbers (PINs) and be aware of people standing entirely too close by when using your credit or debit card in public. Especially with the advent of cell phone cameras, a sneaky, shoulder-surfing thief can get your private information pretty easily if you’re not careful. It’s also advisable to use teller machines that are familiar to you, so you are in a better position to identify when the equipment looks different or doesn’t feel right. Your increased awareness may reveal a skimmer’s attempt to steal PINs and banking details at that site.
4. Destroy Before You Dump That Old Computer
Erasing data just enables the computer to write over that space again; it doesn’t actually eliminate the original bits and bytes. Physically remove the hard-drive to ensure you’re not tossing out or passing along your personal details.
5. Choose ‘Forget Me’ Instead of ‘Remember Me’
How many Web sites do you frequent that invite you to enable an automatic log on the next time you visit? Don’t check that box! When convenience trumps confidentiality, you’re asking for trouble. The harder you make it for hackers to follow your trail into an online store or bank account, the better.
6. Practice Prudent Posting
Online social networking sites enable individuals around the world to chat, share photos, recruit employees, date, post resumes, auction property and more. Because the Web makes it possible for any posted document to link with another, any information you put online has the potential to stay there for what amounts to electronic eternity.
7. Keep the Key
When you check out of a hotel where you were issued a card-key to unlock the door to your room, don’t leave the card-key behind. Hold on to it until you’re safely home and can shred or otherwise discard it safely. Some say it’s an urban myth that card-keys hold vital details like credit card numbers, while others report having tested and confirmed the presence of private data coded into the magnetic strip. Even if there’s no definitive answer, why risk it?
8. What’s in Your Wallet?
Make photocopies of the personal material in your wallet: driver’s license, credit cards, credit cards, all of it — front and back. Should your wallet be lost or stolen, you won’t be left wondering what was actually taken, and you’ll be able to quickly notify the appropriate agencies about what has happened.
9. Identify and Avoid Phishing Email
Phishing emails are used to fraudulently obtain personal identification and account information. They can also be used to lure you into downloading malicious software. The message will often suggest the recipient’s account has an issue that requires immediate attention. A link will also be provided to a spoof Web site, asking the recipient to provide personal/account information or download malicious software.
10. Conduct a Safe Job Search
Be mindful about the type of information you include on your resume, especially if it will be posted online. For example, you should never include the follwing:
- Driver’s license number.
- Bank account information.
- Credit card information.
- Passwords.
- Date of birth.
You should also never share the personal information listed above with a prospective employer until you are confident the employer and employment opportunity are legitimate. While it’s reasonable in the early stages of the hiring process for employers to ask you for information about your education, training and qualifications related to a prospective job, don’t provide proprietary information until you’re farther down the road and have conducted due diligence to review the company’s background.