Simple steps to protect yourself against identity theft

1 January 2020 Access Control & Identity Management

Are you doing enough to reduce the risk of having your identity stolen? As you start the new year, this is a good time to reflect on what kind of measures you should take to prevent thieves from stealing and using your Personally Identifiable Information (PII) for fraudulent activities.


Carey van Vlaanderen.

As more of our personal information is online and cybercriminals target everything from bank accounts to tax refunds, identity theft is a growing concern. With your sensitive information in their hands, crooks can make fraudulent purchases, open new accounts or apply for loans in your name, says Carey van Vlaanderen, CEO at ESET South Africa.

Taking steps to protect your identity on and offline is important. ESET offers some tips on securing your devices and identity.

Personal Information: Every time you are asked for personal information make sure the request is legitimate and question whether it is necessary and avoid oversharing on social media.

Monitor accounts: Frequently monitor your financial accounts and open physical mails in a timely fashion and watch for any strange transactions.

SIM swapping: Don’t forget to protect your mobile phone account. There is a growing issue of SIM swapping. This is where someone takes control of your phone number by getting a replacement SIM with very little information about the subscriber the phone companies will issue a new SIM. Once the cybercriminals control your phone number, they reset passwords and emails for online services. Your phone is the way many companies including banks confirm your identity to secure the account with a PIN number and any other way that they provide security on the account.

Passphrases: Anything connected to your home network needs to have unique passwords. Use passphrases not just simple passwords or use a password manager that creates complex passwords for you.

Multi-factor: Implement multi-factor authentication, this is where something you have and something your know are used to add security – it’s the option to use an app or SMS messenger to receive or generate a number that confirms your identity when logging in or transacting, an app is more secure than SMS.

Anti-malware: Make sure you have anti-malware software installed and updated on all your devices – even your Smart TVs.

Encryption: Switch on whole device encryption so that if a device gets stolen, they won’t be able to access the data.

Shred documents: Shred documents that have personal information on them even if it’s just your name and address on it.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Defending against SIM swap fraud
Access Control & Identity Management
Mobile networks must not be complacent about SIM swap fraud, and they need to prioritise the protection of customers, according to Gur Geva, Founder and CEO of iiDENTIFii.

Read more...
Access Selection Guide 2024
Access Control & Identity Management
The Access Selection Guide 2024 includes a range of devices geared specifically for the access control and identity management market.

Read more...
Biometrics Selection Guide 2024
Access Control & Identity Management
The Biometrics Selection Guide 2024 incorporates a number of hardware and software biometric identification systems aimed at the access and identity management market of today.

Read more...
Smart intercoms for Sky House Projects
Nology Access Control & Identity Management Residential Estate (Industry)
DNAKE’s easy and smart intercom solution has everything in place for modern residential buildings. Hence, the developer selected DNAKE video intercoms to round out upmarket apartment complexes, supported by the mobile app.

Read more...
Authentic identity
HID Global Access Control & Identity Management
As the world has become global and digital, traditional means for confirming authentic identity, and understanding what is real and what is fake have become impractical.

Read more...
Research labs secured with STid Mobile ID
Access Control & Identity Management
When NTT opened its research centre in Silicon Valley, it was looking for a high-security expert capable of protecting the company’s sensitive data. STid readers and mobile ID solutions formed part of the solution.

Read more...
Is voice biometrics in banking secure enough?
Access Control & Identity Management AI & Data Analytics
As incidents of banking fraud grow exponentially and become increasingly sophisticated, it is time to question whether voice banking is a safe option for consumers.

Read more...
Unlocking efficiency and convenience
OPTEX Access Control & Identity Management Transport (Industry)
The OVS-02GT vehicle detection sensor is the newest member of Optex’s vehicle sensor range, also known as ‘virtual loop’, and offers reliable motion detection of cars, trucks, vans, and other motorised vehicles using microwave technology.

Read more...
Protecting our most vulnerable
NEC XON Access Control & Identity Management Products & Solutions
In a nation grappling with the distressing rise in child kidnappings, the need for innovative solutions to protect our infants has never been more critical. South Africa finds itself in the throes of a child abduction pandemic.

Read more...
Understanding the power of digital identity
Access Control & Identity Management Security Services & Risk Management Financial (Industry)
The way we perceive business flourishing is undergoing a paradigm shift, as digital identity and consumer consent redefine the dynamics of transactions, says Shanaaz Trethewey.

Read more...