You are on page 1of 6

IS102 ISSUES AND TRENDS IN IS

What's Your Digital Identity?

Your digital identity could be a juicy target for identity thieves. If you don’t know what
your digital identity is, then you may not know what’s at stake—or how to help protect
yourself.

Digital identity defined

Your digital identity consists of various pieces of information about you—in digital
form—that, when put together, point to you. Such pieces of information are often
called “data attributes.” They can be something obvious, such as a user name or
Social Security number, or something less apparent, such as your online comments or
search activities.

You might regularly share some of your data attributes to make an online purchase or
access your bank account, for instance. But if you share certain types of your personal
data—such as your full name, date of birth, and Social Security number—and they're
somehow exposed, you’re at risk of an identity thief using them to pretend to be you.
In a world as technology-oriented as ours, it can be a challenge to limit not only what
we share, but also how we share it. And even if you take every possible precaution, a
data breach at a company with whom you do business could possibly result in identity
theft. Still, it’s worth trying to stay on top of how you handle your personal
information.

Page 1 of 6
IS102 ISSUES AND TRENDS IN IS

What are your digital attributes?


We touched on a few of these earlier, but let’s take a look at some of the personal
data that, either alone or when put together, can point in your direction. This can also
include your online activity.
• Login credentials (usernames and passwords)
• Date of birth
• Social Security number
• Medical history
• Online search activities
• Online accounts
• Comments on articles and social media
• Likes, posts, reposts, and shares on social networks
• Signed online petitions

How can you help protect your digital identity?


There is no simple solution to keep your digital identity safe, but here are some tips
that can help you protect some of the data attributes that make it up:
• Limit sharing your Social Security number—whether in a doctor’s office, at
school, or online
• Use strong and unique passwords on each of your online accounts
• Make sure you’re on a secure network or using a VPN, a virtual private network,
when banking, shopping or making other online transactions
• Don’t share your login credentials with others
• Shred documents containing personal information before discarding
• Secure your home Wi-Fi network with a strong password
The digital world provides tremendous convenience and can make life easier in many
ways. Having access to our bank accounts and a global social media network gives us
connectivity we couldn’t have imagined even just a few years ago. But it’s important to
keep in mind that such access and reach involves trade-offs. And it remains as critical
as ever to protect your identity—digital or otherwise.

Page 2 of 6
IS102 ISSUES AND TRENDS IN IS

Page 3 of 6
IS102 ISSUES AND TRENDS IN IS

Online Identity Theft: What It Is and How It Happens

Gone are the days when my biggest concern related to financial crime was having my
wallet stolen on the packed Metro in Washington, D.C. Now? We also face
technology-based crimes, including online identity theft.

In our cyber-focused 21st century, cool digital products and the Internet open a world
of easy access to information, entertainment, and other services. But this cyber
gateway also presents the possibility of our personal information falling into the
wrong hands—and to becoming victims of online identity theft. Even a child's
seemingly innocent interactive doll can give our personal information to third parties.
In this article, we’ll share what online identity theft is and how it happens, so you can
help protect yourself in our increasingly connected environment.

What Is online identity theft?


Identity theft affects millions of Americans every year and occurs when a fraudster
steals your identity—by gaining access to your personally identifiable information (PII)
—to commit fraud. While ID theft can happen a number of ways, online ID theft occurs
when someone steals your digital PII using scams like planting malicious software on
your computer—as opposed to the old, simple technique of, say, stealing your purse.
Your digital PII can include your driver’s license and bank account numbers, as well as
any sensitive personal information that can be used to distinguish your identity—and
could allow fraudsters to present themselves as you. If a thief gains access to unique

Page 4 of 6
IS102 ISSUES AND TRENDS IN IS

personal information like your Social Security number, they can fill out employment
forms and even file for a tax refund—all in your name.

How online ID theft happens and what you can do


As we share our personal information online via social media and other digital
formats, we may be putting that info at risk of falling into the wrong hands.
Fraudsters use high-tech and other ways to steal digital PII. Knowing what these
tactics are may help you protect yourself:
• Phishing occurs when cybercriminals send emails purporting to be from a
fi nancial institution or other trusted organization, trying to trick you into
opening attachments or clicking on links and providing your PII. Ignore
unsolicited emails and online requests for information. If you want to visit, say,
your bank’s website to provide information, type in the URL rather than clicking
on an emailed link.
• Pharming occurs when your browser, compromised by a virus, is hijacked
without your knowledge. You type a legitimate website URL into the address
bar, but you’re redirected to a fake site that looks legitimate. There,
cybercriminals are able to collect any PII you may type into the website.
• Malicious software. Fraudsters may try to trick you into downloading
“malware” that can attack your computer and, possibly, reveal your PII.
Consider purchasing online security software for your computer, and keep it—
and your computer operating system software—up to date.
• Unsecure websites. Avoid online shopping and other activities on websites
that aren’t secure, and be cautious about the apps you use. Make sure you use
only offi cial, secure websites with the “https:” prefi x—not “http:”.
• Weak passwords used for both social and fi nancial accounts can leave you
vulnerable. Strive to use unique, long, and strong passwords for each of your
accounts. And when possible, activate multi-factor authentication, which
requires you to enter both your log-in credentials and a secret code sent to
your smartphone or other device before giving you access to your account.
• Discarded computers and mobile devices that haven’t been wiped of your
PII can be another point of access for a thief.
• Targeting children online. Kids can give away personal information online
without realizing it. Help protect your children online; be vigilant in monitoring
the information they share when using an Internet-connected device.
We’ve all received emails saying we’ve won a too-good-to-be-true prize—redeemed
by providing our personal information. As with anything in life, when something
online seems too good to be true, it probably is. Don’t respond to emails from
someone you don’t know. Don’t click on unknown links or attachments.

Page 5 of 6
IS102 ISSUES AND TRENDS IN IS

The bottom line? You can never be too careful when sharing your personal
information online.

Page 6 of 6

You might also like