Simple steps to protect yourself against identity theft

1 January 2020 Access Control & Identity Management

Are you doing enough to reduce the risk of having your identity stolen? As you start the new year, this is a good time to reflect on what kind of measures you should take to prevent thieves from stealing and using your Personally Identifiable Information (PII) for fraudulent activities.

Carey van Vlaanderen.

As more of our personal information is online and cybercriminals target everything from bank accounts to tax refunds, identity theft is a growing concern. With your sensitive information in their hands, crooks can make fraudulent purchases, open new accounts or apply for loans in your name, says Carey van Vlaanderen, CEO at ESET South Africa.

Taking steps to protect your identity on and offline is important. ESET offers some tips on securing your devices and identity.

Personal Information: Every time you are asked for personal information make sure the request is legitimate and question whether it is necessary and avoid oversharing on social media.

Monitor accounts: Frequently monitor your financial accounts and open physical mails in a timely fashion and watch for any strange transactions.

SIM swapping: Don’t forget to protect your mobile phone account. There is a growing issue of SIM swapping. This is where someone takes control of your phone number by getting a replacement SIM with very little information about the subscriber the phone companies will issue a new SIM. Once the cybercriminals control your phone number, they reset passwords and emails for online services. Your phone is the way many companies including banks confirm your identity to secure the account with a PIN number and any other way that they provide security on the account.

Passphrases: Anything connected to your home network needs to have unique passwords. Use passphrases not just simple passwords or use a password manager that creates complex passwords for you.

Multi-factor: Implement multi-factor authentication, this is where something you have and something your know are used to add security – it’s the option to use an app or SMS messenger to receive or generate a number that confirms your identity when logging in or transacting, an app is more secure than SMS.

Anti-malware: Make sure you have anti-malware software installed and updated on all your devices – even your Smart TVs.

Encryption: Switch on whole device encryption so that if a device gets stolen, they won’t be able to access the data.

Shred documents: Shred documents that have personal information on them even if it’s just your name and address on it.

For more information contact ESET-SA, +27 21 659 2000,,

Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Secure vehicle access in residential estates
Issue 2 2020, Protoclea Advanced Image Engineering , Access Control & Identity Management
Can technology offer a cost-effective solution that will provide both secure access control and free-flowing traffic in estates?

Managing people’s attendance and time
Issue 2 2020, Secutel Technologies , Access Control & Identity Management
Managing people’s attendance, along with access control is a basic, yet critical challenge for any organisation.

Modular ANPR camera solution
Issue 2 2020 , Access Control & Identity Management
Videalert has announced the immediate availability of Stingray, a new modular ANPR camera solution designed for use with mobile enforcement vehicles.

Digital document revolution
Issue 2 2020 , Access Control & Identity Management
A new white paper that examines the implications of the transition from physical to digital security documents has been published by Reconnaissance International.

Facial access control for ministry
Issue 1 2020, ZKTeco , Access Control & Identity Management
The Ministry of Culture in Saudi Arabia has adopted ZKTeco’s facial recognition technology and fingerprint biometrics to manage access control into its building.

New Door Pilot app from dormakaba
Issue 1 2020, dormakaba South Africa , Access Control & Identity Management
With new dormakaba Door Pilot, automated doors can also now be operated on the basis of remote control technologies. The system, comprising the Door Pilot app for smartphones and a Wi-Fi interface for ...

Identity lifestyle
Issue 1 2020, Suprema , Access Control & Identity Management
Once the technology of the future, biometrics has quietly snuck into our daily lives through smartphones and access controls into our places of work.

Securing BP’s new head office
Issue 1 2020, ISF SFP , Access Control & Identity Management
ISF SFP was awarded the contract to secure the first development phase for Oxford Parks, the new head office for BP South Africa.

Combining aesthetics and access control
Issue 1 2020, Turnstar Systems , Access Control & Identity Management
Prestigious law firm Bowman Gilfillan recently upgraded its physical security with the addition of four Turnstar Speedgate Express access control lanes.

Video doorbells from Ring
Issue 1 2020 , Access Control & Identity Management
Ring has a number of video doorbells available in South Africa that run off batteries or power and enable users to answer their doors from anywhere.