SlideShare a Scribd company logo
1 of 3
Download to read offline
7 Tips for College Students to Prevent Identity Theft 
Identity theft is on the rise among college students, and safeguarding personal information and 
identity is more important than ever. Personal information such as date of birth and social security 
number is easily stolen from accessible documents. Unsecure dorm rooms provide easy access to 
passports, social security cards, bank statements, and medical records. 
Personal information is also commonly stolen from electronic devices, including laptops, cell 
phones and non-secure wireless networks, along with information gleaned from social media 
profiles. 
College students are especially vulnerable to identity theft. In fact, a college student is at a greater 
risk for identity theft than the general population. This is mainly because they live in close quarters, 
and are often lax with handling and protecting their personal information—including their 
information online. 
According to the latest Bureau of Justice report, the majority of identity theft incidents (85%) 
involved the fraudulent use of existing account information, such as credit card or bank 
account information. 
Your risk of identity theft can be reduced greatly by following these 7 tips: 
1. Keep documents with personal information out of sight and locked in a dorm room safe. 
Keep your drivers’ license, social security card, bank statements, medical records, and other types 
of documents that include your personal information out of site. Better yet, keep them locked 
securely in a dorm room safe. This affordable security precaution has the additional advantages of 
protecting these important documents from theft and from fire or water damage.
2. Don’t post personal information on social media. 
Posting personal information on social media can leave you vulnerable to identity theft. Thieve can 
use your social profile to gain access to your personal information, including your full name, 
hometown, current location, phone number, and school locations. It’s also advisable to not post 
where you are on your social media profile. 
3. Use secure passwords and logins for computers, laptops and mobile devices. 
Set up a username/password login on your laptop or computer and a password on your mobile 
phone to avoid providing easy access to these devices. Hackers can easily access your personal, 
medical and financial information through weak passwords and logins. Always choose a secure 
password and change it frequently to avoid getting your information in the wrong hands. 
4. Make sure all online activity is performed on a secure router and network. 
In addition to having secure passwords, it’s essential that your online activity is being performed on 
a secure router and network. Hackers and identity thieves can easily gain access to your info 
through a non-secure wireless network or unsecured router. This is especially true at coffee shops 
and other places with public Wi-Fi networks. 
5. Keep checkbooks, bank statements, credit cards and credit information hidden. 
Your financial records, including credit card and bank statements provide easy access for identity 
thieves. Keep checkbooks, debit and credit cards, and financial statements and information hidden. 
If you bank online, or when buying things online, look for the SSL secure icon in the URL and never 
perform financial activities over public Wi-Fi. 
6. Keep antivirus and malware software up to date for all devices. 
Antivirus and malware software can keep hackers and identity thieves from accessing your 
information. Keep your computer OS, installed programs, and all antivirus and malware software 
up to date. 
7. Install a security lock on laptops. 
It’s a good idea to install a security lock for your laptop to prevent thieves from taking off with it and 
accessing your information.
Following the above tips can help you protect your personal information, so you won’t fall victim to 
identity theft. 
http://www.supercircuits.com/resources/blog/7-tips-for-college-students-to-prevent-identity-theft

More Related Content

Viewers also liked

Siandien
SiandienSiandien
Siandienzigius
 
Sweaty palms, quivering voice and brain cramps delivering a painless presenta...
Sweaty palms, quivering voice and brain cramps delivering a painless presenta...Sweaty palms, quivering voice and brain cramps delivering a painless presenta...
Sweaty palms, quivering voice and brain cramps delivering a painless presenta... Colorado State Library
 
Z patton dayinlife
Z patton dayinlifeZ patton dayinlife
Z patton dayinlifezpattonp2
 
Nacho’s photo album
Nacho’s photo albumNacho’s photo album
Nacho’s photo albumdiheanachop3
 
What chemistry admissions tutors are looking for in a personal statement
What chemistry admissions tutors are looking for in a personal statementWhat chemistry admissions tutors are looking for in a personal statement
What chemistry admissions tutors are looking for in a personal statementTeam MyRSC
 
'They've still not finished the bloody game yet: Fan anticipation and 'untici...
'They've still not finished the bloody game yet: Fan anticipation and 'untici...'They've still not finished the bloody game yet: Fan anticipation and 'untici...
'They've still not finished the bloody game yet: Fan anticipation and 'untici...Ruth Deller
 
28 Nov 2012 1ABCT Weekly Newsletter
28 Nov 2012 1ABCT Weekly Newsletter28 Nov 2012 1ABCT Weekly Newsletter
28 Nov 2012 1ABCT Weekly NewsletterNoel Waterman
 
ソーシャルメディアマーケティング、6つの誤解
ソーシャルメディアマーケティング、6つの誤解ソーシャルメディアマーケティング、6つの誤解
ソーシャルメディアマーケティング、6つの誤解Goro Kosaka
 
English central
English centralEnglish central
English centralimchichen
 
Scavenger hunt
Scavenger huntScavenger hunt
Scavenger huntbportisp7
 
14 Nov 2012 1ABCT Weekly Newsletter
14 Nov  2012 1ABCT Weekly Newsletter14 Nov  2012 1ABCT Weekly Newsletter
14 Nov 2012 1ABCT Weekly NewsletterNoel Waterman
 
Home away from home sjc-shopping-observation lab
Home away from home   sjc-shopping-observation labHome away from home   sjc-shopping-observation lab
Home away from home sjc-shopping-observation labViroo Mirji
 
CSL In Session - Colorado Public Library Trends
CSL In Session - Colorado Public Library Trends CSL In Session - Colorado Public Library Trends
CSL In Session - Colorado Public Library Trends Colorado State Library
 

Viewers also liked (17)

Siandien
SiandienSiandien
Siandien
 
Sweaty palms, quivering voice and brain cramps delivering a painless presenta...
Sweaty palms, quivering voice and brain cramps delivering a painless presenta...Sweaty palms, quivering voice and brain cramps delivering a painless presenta...
Sweaty palms, quivering voice and brain cramps delivering a painless presenta...
 
Z patton dayinlife
Z patton dayinlifeZ patton dayinlife
Z patton dayinlife
 
time_management_handout(goerzen_2011)
time_management_handout(goerzen_2011)time_management_handout(goerzen_2011)
time_management_handout(goerzen_2011)
 
Nacho’s photo album
Nacho’s photo albumNacho’s photo album
Nacho’s photo album
 
What chemistry admissions tutors are looking for in a personal statement
What chemistry admissions tutors are looking for in a personal statementWhat chemistry admissions tutors are looking for in a personal statement
What chemistry admissions tutors are looking for in a personal statement
 
'They've still not finished the bloody game yet: Fan anticipation and 'untici...
'They've still not finished the bloody game yet: Fan anticipation and 'untici...'They've still not finished the bloody game yet: Fan anticipation and 'untici...
'They've still not finished the bloody game yet: Fan anticipation and 'untici...
 
Learning inandfor21stcentury kalmon
Learning inandfor21stcentury kalmonLearning inandfor21stcentury kalmon
Learning inandfor21stcentury kalmon
 
28 Nov 2012 1ABCT Weekly Newsletter
28 Nov 2012 1ABCT Weekly Newsletter28 Nov 2012 1ABCT Weekly Newsletter
28 Nov 2012 1ABCT Weekly Newsletter
 
ソーシャルメディアマーケティング、6つの誤解
ソーシャルメディアマーケティング、6つの誤解ソーシャルメディアマーケティング、6つの誤解
ソーシャルメディアマーケティング、6つの誤解
 
English central
English centralEnglish central
English central
 
time_management_slides(goerzen_2011)
time_management_slides(goerzen_2011)time_management_slides(goerzen_2011)
time_management_slides(goerzen_2011)
 
Scavenger hunt
Scavenger huntScavenger hunt
Scavenger hunt
 
probability
probabilityprobability
probability
 
14 Nov 2012 1ABCT Weekly Newsletter
14 Nov  2012 1ABCT Weekly Newsletter14 Nov  2012 1ABCT Weekly Newsletter
14 Nov 2012 1ABCT Weekly Newsletter
 
Home away from home sjc-shopping-observation lab
Home away from home   sjc-shopping-observation labHome away from home   sjc-shopping-observation lab
Home away from home sjc-shopping-observation lab
 
CSL In Session - Colorado Public Library Trends
CSL In Session - Colorado Public Library Trends CSL In Session - Colorado Public Library Trends
CSL In Session - Colorado Public Library Trends
 

More from Christian Watson

6 Steps to Install Analog Security Cameras Like a Pro
6 Steps to Install Analog Security Cameras Like a Pro6 Steps to Install Analog Security Cameras Like a Pro
6 Steps to Install Analog Security Cameras Like a ProChristian Watson
 
DVR Networking: How to Connect Your DVR to the LAN
DVR Networking: How to Connect Your DVR to the LANDVR Networking: How to Connect Your DVR to the LAN
DVR Networking: How to Connect Your DVR to the LANChristian Watson
 
Dallas PD Nabs Car Thieves with Covert Vehicle Monitoring Program
Dallas PD Nabs Car Thieves with Covert Vehicle Monitoring ProgramDallas PD Nabs Car Thieves with Covert Vehicle Monitoring Program
Dallas PD Nabs Car Thieves with Covert Vehicle Monitoring ProgramChristian Watson
 
7-Eleven Catches Thieves and Reduces Merchandise Shrink in Stores
7-Eleven Catches Thieves and Reduces Merchandise Shrink in Stores7-Eleven Catches Thieves and Reduces Merchandise Shrink in Stores
7-Eleven Catches Thieves and Reduces Merchandise Shrink in StoresChristian Watson
 
Audubon Starr Ranch NestCam Video Aids Bird Sanctuary Conservation
Audubon Starr Ranch NestCam Video Aids Bird Sanctuary ConservationAudubon Starr Ranch NestCam Video Aids Bird Sanctuary Conservation
Audubon Starr Ranch NestCam Video Aids Bird Sanctuary ConservationChristian Watson
 
Be Prepared: Get the Real Facts on Crime
Be Prepared: Get the Real Facts on CrimeBe Prepared: Get the Real Facts on Crime
Be Prepared: Get the Real Facts on CrimeChristian Watson
 
Top 7 benefits of an led monitor
Top 7 benefits of an led monitorTop 7 benefits of an led monitor
Top 7 benefits of an led monitorChristian Watson
 
Alvin ISD Employs IP Cameras to Monitor Activities at 13 Schools
Alvin ISD Employs IP Cameras to Monitor Activities at 13 SchoolsAlvin ISD Employs IP Cameras to Monitor Activities at 13 Schools
Alvin ISD Employs IP Cameras to Monitor Activities at 13 SchoolsChristian Watson
 
6 Steps To protect your baby’s IP camera from HACKERS
6 Steps To protect your baby’s IP camera from HACKERS6 Steps To protect your baby’s IP camera from HACKERS
6 Steps To protect your baby’s IP camera from HACKERSChristian Watson
 
White Paper: Border Security: The Other Story
White Paper: Border Security: The Other StoryWhite Paper: Border Security: The Other Story
White Paper: Border Security: The Other StoryChristian Watson
 
Birds are Video Stars at Audubon’s Starr Ranch
Birds are Video Stars at Audubon’s Starr RanchBirds are Video Stars at Audubon’s Starr Ranch
Birds are Video Stars at Audubon’s Starr RanchChristian Watson
 
For Dallas Police, Video Evidence Was The Key to Convicting Car Thieves
For Dallas Police, Video Evidence Was The Key to Convicting Car ThievesFor Dallas Police, Video Evidence Was The Key to Convicting Car Thieves
For Dallas Police, Video Evidence Was The Key to Convicting Car ThievesChristian Watson
 

More from Christian Watson (14)

6 Steps to Install Analog Security Cameras Like a Pro
6 Steps to Install Analog Security Cameras Like a Pro6 Steps to Install Analog Security Cameras Like a Pro
6 Steps to Install Analog Security Cameras Like a Pro
 
DVR Networking: How to Connect Your DVR to the LAN
DVR Networking: How to Connect Your DVR to the LANDVR Networking: How to Connect Your DVR to the LAN
DVR Networking: How to Connect Your DVR to the LAN
 
Dallas PD Nabs Car Thieves with Covert Vehicle Monitoring Program
Dallas PD Nabs Car Thieves with Covert Vehicle Monitoring ProgramDallas PD Nabs Car Thieves with Covert Vehicle Monitoring Program
Dallas PD Nabs Car Thieves with Covert Vehicle Monitoring Program
 
Covert Audio and the Law
Covert Audio and the LawCovert Audio and the Law
Covert Audio and the Law
 
7-Eleven Catches Thieves and Reduces Merchandise Shrink in Stores
7-Eleven Catches Thieves and Reduces Merchandise Shrink in Stores7-Eleven Catches Thieves and Reduces Merchandise Shrink in Stores
7-Eleven Catches Thieves and Reduces Merchandise Shrink in Stores
 
Sanluisobispo casestudy
Sanluisobispo casestudySanluisobispo casestudy
Sanluisobispo casestudy
 
Audubon Starr Ranch NestCam Video Aids Bird Sanctuary Conservation
Audubon Starr Ranch NestCam Video Aids Bird Sanctuary ConservationAudubon Starr Ranch NestCam Video Aids Bird Sanctuary Conservation
Audubon Starr Ranch NestCam Video Aids Bird Sanctuary Conservation
 
Be Prepared: Get the Real Facts on Crime
Be Prepared: Get the Real Facts on CrimeBe Prepared: Get the Real Facts on Crime
Be Prepared: Get the Real Facts on Crime
 
Top 7 benefits of an led monitor
Top 7 benefits of an led monitorTop 7 benefits of an led monitor
Top 7 benefits of an led monitor
 
Alvin ISD Employs IP Cameras to Monitor Activities at 13 Schools
Alvin ISD Employs IP Cameras to Monitor Activities at 13 SchoolsAlvin ISD Employs IP Cameras to Monitor Activities at 13 Schools
Alvin ISD Employs IP Cameras to Monitor Activities at 13 Schools
 
6 Steps To protect your baby’s IP camera from HACKERS
6 Steps To protect your baby’s IP camera from HACKERS6 Steps To protect your baby’s IP camera from HACKERS
6 Steps To protect your baby’s IP camera from HACKERS
 
White Paper: Border Security: The Other Story
White Paper: Border Security: The Other StoryWhite Paper: Border Security: The Other Story
White Paper: Border Security: The Other Story
 
Birds are Video Stars at Audubon’s Starr Ranch
Birds are Video Stars at Audubon’s Starr RanchBirds are Video Stars at Audubon’s Starr Ranch
Birds are Video Stars at Audubon’s Starr Ranch
 
For Dallas Police, Video Evidence Was The Key to Convicting Car Thieves
For Dallas Police, Video Evidence Was The Key to Convicting Car ThievesFor Dallas Police, Video Evidence Was The Key to Convicting Car Thieves
For Dallas Police, Video Evidence Was The Key to Convicting Car Thieves
 

Recently uploaded

How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfSrushith Repakula
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxFIDO Alliance
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Hiroshi SHIBATA
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Skynet Technologies
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideStefan Dietze
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...ScyllaDB
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfFIDO Alliance
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024Stephen Perrenod
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераMark Opanasiuk
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform EngineeringMarcus Vechiato
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandIES VE
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingScyllaDB
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxjbellis
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfFIDO Alliance
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxFIDO Alliance
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfFIDO Alliance
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfalexjohnson7307
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfFIDO Alliance
 

Recently uploaded (20)

How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 

7 Tips for College Students to Prevent Identity Theft

  • 1. 7 Tips for College Students to Prevent Identity Theft Identity theft is on the rise among college students, and safeguarding personal information and identity is more important than ever. Personal information such as date of birth and social security number is easily stolen from accessible documents. Unsecure dorm rooms provide easy access to passports, social security cards, bank statements, and medical records. Personal information is also commonly stolen from electronic devices, including laptops, cell phones and non-secure wireless networks, along with information gleaned from social media profiles. College students are especially vulnerable to identity theft. In fact, a college student is at a greater risk for identity theft than the general population. This is mainly because they live in close quarters, and are often lax with handling and protecting their personal information—including their information online. According to the latest Bureau of Justice report, the majority of identity theft incidents (85%) involved the fraudulent use of existing account information, such as credit card or bank account information. Your risk of identity theft can be reduced greatly by following these 7 tips: 1. Keep documents with personal information out of sight and locked in a dorm room safe. Keep your drivers’ license, social security card, bank statements, medical records, and other types of documents that include your personal information out of site. Better yet, keep them locked securely in a dorm room safe. This affordable security precaution has the additional advantages of protecting these important documents from theft and from fire or water damage.
  • 2. 2. Don’t post personal information on social media. Posting personal information on social media can leave you vulnerable to identity theft. Thieve can use your social profile to gain access to your personal information, including your full name, hometown, current location, phone number, and school locations. It’s also advisable to not post where you are on your social media profile. 3. Use secure passwords and logins for computers, laptops and mobile devices. Set up a username/password login on your laptop or computer and a password on your mobile phone to avoid providing easy access to these devices. Hackers can easily access your personal, medical and financial information through weak passwords and logins. Always choose a secure password and change it frequently to avoid getting your information in the wrong hands. 4. Make sure all online activity is performed on a secure router and network. In addition to having secure passwords, it’s essential that your online activity is being performed on a secure router and network. Hackers and identity thieves can easily gain access to your info through a non-secure wireless network or unsecured router. This is especially true at coffee shops and other places with public Wi-Fi networks. 5. Keep checkbooks, bank statements, credit cards and credit information hidden. Your financial records, including credit card and bank statements provide easy access for identity thieves. Keep checkbooks, debit and credit cards, and financial statements and information hidden. If you bank online, or when buying things online, look for the SSL secure icon in the URL and never perform financial activities over public Wi-Fi. 6. Keep antivirus and malware software up to date for all devices. Antivirus and malware software can keep hackers and identity thieves from accessing your information. Keep your computer OS, installed programs, and all antivirus and malware software up to date. 7. Install a security lock on laptops. It’s a good idea to install a security lock for your laptop to prevent thieves from taking off with it and accessing your information.
  • 3. Following the above tips can help you protect your personal information, so you won’t fall victim to identity theft. http://www.supercircuits.com/resources/blog/7-tips-for-college-students-to-prevent-identity-theft