SlideShare a Scribd company logo
1. Did You Know?
Ø According to the studies done in the year 2015, 91 million people are
estimated to have become the prey to the identity theft in the 12 months span.
[Source: credit.com]
Ø That indicates an alarming 249,315 a day, 10,388 an hour, and 173 a minute.
2. What Is Identity Theft?
Imagine, one fine day you wake up to realize that you are not ‘you’ anymore. Isn’t
the thought in itself very creepy?
Becoming as common as the birth, death, and tax, the crime of identity theft is one
of the most vicious crimes in today’s times. Here, the impostor masquerades as the
victim, by and large for the financial gains or doing some fraudulent activity in that
individual’s name, by way of:
Ø Pilfering the personal identifying information (PII)
Ø Hacking the social media accounts
Ø Committing the breach of data such as the net-banking passwords, ATM &
credit card details, paper documents, etc.
3. Why Do You Need To Be Cautious Of Identity Theft?
“Care is an absolute. Prevention is the ideal.” –Christopher Howson
Can you count how many times in a day have you accessed your internet for
opening the social media account, e-commerce transactions, messaging, e-
governance or any other information technology (IT) enabled service?
Inestimable times, I suppose! That frequency is exactly parallel to the rates of
the malicious cyber crimes such as the spamming, phishing and most of all, the
identity theft, which can be plotted against you.
Along with the comfort that technology, the internet, and smartphones have
bestowed upon us, it has also turned into the spark plug of crimes. However,
there are 7 ‘tried & tested’ tips that will minimize the risk of identity theft and
render you a little piece of mind.
4. Be Identity-Theft Proof
I. Stay Heedful While Sharing Personal Identity Information
o Before sharing your PPI like the voter ID card, passport, ATM pins, or
other personal documents to a person, or on the internet, know how they’ll
be shared and used.
o Keep a track of bank and card statements, as well as the mail accounts
and insurances, see if there is any erroneousness.
o Destroy the sensitive files such as scanned copy of your PPI, etc. from
your computer/mobile phone, and store them off on any external drive, if
there is any need.
5. Be Identity-Theft Proof
II. Spill Out Less On Social Media Platforms
o Never reveal too much of your private information on the social
media platforms, like the picture post in ecstasy to show off your first
paycheck, or check-in to the banks, etc.
o Save yourself from the potential hackers by assimilating the true
information with the crumbs of misinformation, in order to make the
hacking all the more difficult.
6. Be Identity-Theft Proof
III. Be Wary Of The Phishing Websites
o If you are remotely suspicious or skeptical of the phishing website, then
call the organization on the contact number given on the main page.
o Don’t fulfill the unsolicited requests from the websites like sharing the
health insurance id, credit card number, bank account number, social
security number, etc.
7. Be Identity-Theft Proof
IV. Craft Impervious Passwords
o Prevent your passwords from the assaults of the impostors by creating
the strong passwords of 8-16 characters length that entail uppercase,
lowercase, numeric figures, and the special characters.
o Keep different passwords for every social account.
o Update them yearly.
8. Be Identity-Theft Proof
V. Transact With Bona Fide Sources
o Check for the scandalous websites as they may inflict your tech devices
with the Trojans, backdoors, or nasty virus that are difficult to be dealt with.
o Avoid the use of credit cards for online transactions and go for the online
wallets or Paypal instead, which will save you from entering your credit card
details every now and then.
o Also, these wallets are not fully secure, so guard them with a good
password and don’t access them on the public platform.
9. Be Identity-Theft Proof
VI. Lock Your Wi-Fi
o Steer clear from accessing the financial details etc. on the public wi-fi that
doesn’t need the passwords.
o Log out from the connection once you’re finished with the task.
o Remember to keep your wi-fi connection password protected, so that you
remain aware whenever your device is connected to another foreign device.
10. Be Identity-Theft Proof
VII. Update Antispyware Protection To Your Devices
o Install firewall software or anti-malware to protect the entrée of the
backdoors, keyloggers, and other harmful elements to protect information on
your tech gadgets.
o Keep these anti-spyware updated from time to time.
11. Be Safe!
These were the tips you can implement in your everyday life to secure yourself from
the identity thefts! Get started there and of course, if you find yourself stuck in any
perturbing situation, don’t hesitate to contact the cyber crime cell.
Thank You
Our Contact
Phone : +91-11-47282233
: + 91 - 8860619931
Fax : +91-11-41427820
Email : info@weblinkindia.net
Website :- WeblinkIndia.net
Tips to secure yourself from identity thefts

More Related Content

What's hot

Internet secutity ppt by vaishnavi khandelwal
Internet secutity ppt by vaishnavi khandelwalInternet secutity ppt by vaishnavi khandelwal
Internet secutity ppt by vaishnavi khandelwal
VaishnaviKhandelwal6
 
Yassa edt finalproject
Yassa edt finalprojectYassa edt finalproject
Yassa edt finalproject
Yassa Washington
 
Social Engineering By Rakesh Nagekar
Social Engineering By Rakesh NagekarSocial Engineering By Rakesh Nagekar
Social Engineering By Rakesh Nagekar
nforceit
 
Safeguarding Yourself from Identity Theft
Safeguarding Yourself from Identity TheftSafeguarding Yourself from Identity Theft
Safeguarding Yourself from Identity Theft
Sentinel Background Checks
 
Computer&Internet Safety Digital Story
Computer&Internet Safety Digital StoryComputer&Internet Safety Digital Story
Computer&Internet Safety Digital Story
Sandra Sammarco
 
Internet security tutorial
Internet security tutorialInternet security tutorial
Internet security tutorial
iuvmtech
 

What's hot (6)

Internet secutity ppt by vaishnavi khandelwal
Internet secutity ppt by vaishnavi khandelwalInternet secutity ppt by vaishnavi khandelwal
Internet secutity ppt by vaishnavi khandelwal
 
Yassa edt finalproject
Yassa edt finalprojectYassa edt finalproject
Yassa edt finalproject
 
Social Engineering By Rakesh Nagekar
Social Engineering By Rakesh NagekarSocial Engineering By Rakesh Nagekar
Social Engineering By Rakesh Nagekar
 
Safeguarding Yourself from Identity Theft
Safeguarding Yourself from Identity TheftSafeguarding Yourself from Identity Theft
Safeguarding Yourself from Identity Theft
 
Computer&Internet Safety Digital Story
Computer&Internet Safety Digital StoryComputer&Internet Safety Digital Story
Computer&Internet Safety Digital Story
 
Internet security tutorial
Internet security tutorialInternet security tutorial
Internet security tutorial
 

Viewers also liked

Resume of Masum Email
Resume of Masum EmailResume of Masum Email
Resume of Masum Email
Md. Masum Billah
 
Percobaan kimia
Percobaan kimiaPercobaan kimia
Percobaan kimia
Eni Endang Sari Sari
 
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
IJSRD
 
On The Homogeneous Biquadratic Equation with 5 Unknowns
On The Homogeneous Biquadratic Equation with 5 UnknownsOn The Homogeneous Biquadratic Equation with 5 Unknowns
On The Homogeneous Biquadratic Equation with 5 Unknowns
IJSRD
 
Mass propagation of Musa varieties in Odisha
Mass propagation of Musa varieties in OdishaMass propagation of Musa varieties in Odisha
Mass propagation of Musa varieties in Odisha
IJSRD
 
AUAF UNIVERSITY Reference for Mark Wood
AUAF UNIVERSITY Reference for Mark WoodAUAF UNIVERSITY Reference for Mark Wood
AUAF UNIVERSITY Reference for Mark WoodMARK WOOD
 
Infografía doc
Infografía docInfografía doc
Infografía doc
manelmuntada
 
Immobili, vendita al palo. Incassato un milione su 8 - Metropolis Napoli
Immobili, vendita al palo. Incassato un milione su 8 - Metropolis NapoliImmobili, vendita al palo. Incassato un milione su 8 - Metropolis Napoli
Immobili, vendita al palo. Incassato un milione su 8 - Metropolis Napoli
Alfredo Romeo
 
Gestão do conhecimento
Gestão do conhecimentoGestão do conhecimento
Gestão do conhecimento
www.debatendoadm.blogspot.com
 

Viewers also liked (11)

Resume of Masum Email
Resume of Masum EmailResume of Masum Email
Resume of Masum Email
 
MOD testimonial
MOD testimonialMOD testimonial
MOD testimonial
 
Percobaan kimia
Percobaan kimiaPercobaan kimia
Percobaan kimia
 
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
 
On The Homogeneous Biquadratic Equation with 5 Unknowns
On The Homogeneous Biquadratic Equation with 5 UnknownsOn The Homogeneous Biquadratic Equation with 5 Unknowns
On The Homogeneous Biquadratic Equation with 5 Unknowns
 
Mass propagation of Musa varieties in Odisha
Mass propagation of Musa varieties in OdishaMass propagation of Musa varieties in Odisha
Mass propagation of Musa varieties in Odisha
 
AUAF UNIVERSITY Reference for Mark Wood
AUAF UNIVERSITY Reference for Mark WoodAUAF UNIVERSITY Reference for Mark Wood
AUAF UNIVERSITY Reference for Mark Wood
 
მშვიდობით იარაღო ერნესტ ჰემინგუეი
მშვიდობით იარაღო   ერნესტ ჰემინგუეიმშვიდობით იარაღო   ერნესტ ჰემინგუეი
მშვიდობით იარაღო ერნესტ ჰემინგუეი
 
Infografía doc
Infografía docInfografía doc
Infografía doc
 
Immobili, vendita al palo. Incassato un milione su 8 - Metropolis Napoli
Immobili, vendita al palo. Incassato un milione su 8 - Metropolis NapoliImmobili, vendita al palo. Incassato un milione su 8 - Metropolis Napoli
Immobili, vendita al palo. Incassato un milione su 8 - Metropolis Napoli
 
Gestão do conhecimento
Gestão do conhecimentoGestão do conhecimento
Gestão do conhecimento
 

Similar to Tips to secure yourself from identity thefts

Youth Protection Guide - Canada
Youth Protection Guide - CanadaYouth Protection Guide - Canada
Youth Protection Guide - Canada
- Mark - Fullbright
 
Protect your data while travelling
Protect your data while travellingProtect your data while travelling
Protect your data while travelling
UMS Conferences
 
Identity theft in the internet
Identity theft in the internetIdentity theft in the internet
Identity theft in the internet
mohmd-kutbi
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
Maria Taylor
 
Identity theft
Identity theftIdentity theft
Identity theft
bhabagrahi dash
 
Identity Theft ppt
Identity Theft pptIdentity Theft ppt
Identity Theft ppt
Angela Lawson
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things
The Center for Identity
 
Identity Theft and You
Identity Theft and YouIdentity Theft and You
Identity Theft and You
- Mark - Fullbright
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
Rubi Orbeta
 
Online Fraud and Identity Theft: Transact Safely - Symantec Corp.
Online Fraud and Identity Theft: Transact Safely - Symantec Corp. Online Fraud and Identity Theft: Transact Safely - Symantec Corp.
Online Fraud and Identity Theft: Transact Safely - Symantec Corp.
mariotoronto
 
Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology
- Mark - Fullbright
 
Ftc identity theft kit
Ftc identity theft kitFtc identity theft kit
Ftc identity theft kit
upsettinginfo
 
ID Theft and Computer Security 2008
ID Theft and Computer Security 2008ID Theft and Computer Security 2008
ID Theft and Computer Security 2008
Donald E. Hester
 
Cyber Law (Identity Theft)
Cyber Law (Identity Theft)Cyber Law (Identity Theft)
Cyber Law (Identity Theft)
Jermaine Smith
 
Cyber law (identity theft)
Cyber law (identity theft)Cyber law (identity theft)
Cyber law (identity theft)
Jermaine Smith
 
The Identity Theft Checklist – Guidance for the general public.nz
The Identity Theft Checklist – Guidance for the general public.nzThe Identity Theft Checklist – Guidance for the general public.nz
The Identity Theft Checklist – Guidance for the general public.nz
- Mark - Fullbright
 
Users guide
Users guideUsers guide
Users guide
Darren Thomas
 
Internet security
Internet securityInternet security
Internet security
Mohamed El-malki
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
charlesgarrett
 
Internet fraud and identity theft
Internet fraud and identity theftInternet fraud and identity theft
Internet fraud and identity theft
Sara Gallaher Richardson
 

Similar to Tips to secure yourself from identity thefts (20)

Youth Protection Guide - Canada
Youth Protection Guide - CanadaYouth Protection Guide - Canada
Youth Protection Guide - Canada
 
Protect your data while travelling
Protect your data while travellingProtect your data while travelling
Protect your data while travelling
 
Identity theft in the internet
Identity theft in the internetIdentity theft in the internet
Identity theft in the internet
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Identity Theft ppt
Identity Theft pptIdentity Theft ppt
Identity Theft ppt
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things
 
Identity Theft and You
Identity Theft and YouIdentity Theft and You
Identity Theft and You
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 
Online Fraud and Identity Theft: Transact Safely - Symantec Corp.
Online Fraud and Identity Theft: Transact Safely - Symantec Corp. Online Fraud and Identity Theft: Transact Safely - Symantec Corp.
Online Fraud and Identity Theft: Transact Safely - Symantec Corp.
 
Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology
 
Ftc identity theft kit
Ftc identity theft kitFtc identity theft kit
Ftc identity theft kit
 
ID Theft and Computer Security 2008
ID Theft and Computer Security 2008ID Theft and Computer Security 2008
ID Theft and Computer Security 2008
 
Cyber Law (Identity Theft)
Cyber Law (Identity Theft)Cyber Law (Identity Theft)
Cyber Law (Identity Theft)
 
Cyber law (identity theft)
Cyber law (identity theft)Cyber law (identity theft)
Cyber law (identity theft)
 
The Identity Theft Checklist – Guidance for the general public.nz
The Identity Theft Checklist – Guidance for the general public.nzThe Identity Theft Checklist – Guidance for the general public.nz
The Identity Theft Checklist – Guidance for the general public.nz
 
Users guide
Users guideUsers guide
Users guide
 
Internet security
Internet securityInternet security
Internet security
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
Internet fraud and identity theft
Internet fraud and identity theftInternet fraud and identity theft
Internet fraud and identity theft
 

Recently uploaded

快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
3a0sd7z3
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
cuobya
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
wolfsoftcompanyco
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
Donato Onofri
 
Design Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptxDesign Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptx
saathvikreddy2003
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
cuobya
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
zoowe
 
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
k4ncd0z
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
ysasp1
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
cuobya
 
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
zyfovom
 
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
ukwwuq
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
uehowe
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
Paul Walk
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
fovkoyb
 
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
bseovas
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
vmemo1
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
Trish Parr
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
xjq03c34
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
Toptal Tech
 

Recently uploaded (20)

快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
 
Design Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptxDesign Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptx
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
 
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
 
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
 
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
 
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
 

Tips to secure yourself from identity thefts

  • 1.
  • 2. 1. Did You Know? Ø According to the studies done in the year 2015, 91 million people are estimated to have become the prey to the identity theft in the 12 months span. [Source: credit.com] Ø That indicates an alarming 249,315 a day, 10,388 an hour, and 173 a minute.
  • 3. 2. What Is Identity Theft? Imagine, one fine day you wake up to realize that you are not ‘you’ anymore. Isn’t the thought in itself very creepy? Becoming as common as the birth, death, and tax, the crime of identity theft is one of the most vicious crimes in today’s times. Here, the impostor masquerades as the victim, by and large for the financial gains or doing some fraudulent activity in that individual’s name, by way of: Ø Pilfering the personal identifying information (PII) Ø Hacking the social media accounts Ø Committing the breach of data such as the net-banking passwords, ATM & credit card details, paper documents, etc.
  • 4. 3. Why Do You Need To Be Cautious Of Identity Theft? “Care is an absolute. Prevention is the ideal.” –Christopher Howson Can you count how many times in a day have you accessed your internet for opening the social media account, e-commerce transactions, messaging, e- governance or any other information technology (IT) enabled service? Inestimable times, I suppose! That frequency is exactly parallel to the rates of the malicious cyber crimes such as the spamming, phishing and most of all, the identity theft, which can be plotted against you.
  • 5. Along with the comfort that technology, the internet, and smartphones have bestowed upon us, it has also turned into the spark plug of crimes. However, there are 7 ‘tried & tested’ tips that will minimize the risk of identity theft and render you a little piece of mind.
  • 6. 4. Be Identity-Theft Proof I. Stay Heedful While Sharing Personal Identity Information o Before sharing your PPI like the voter ID card, passport, ATM pins, or other personal documents to a person, or on the internet, know how they’ll be shared and used. o Keep a track of bank and card statements, as well as the mail accounts and insurances, see if there is any erroneousness. o Destroy the sensitive files such as scanned copy of your PPI, etc. from your computer/mobile phone, and store them off on any external drive, if there is any need.
  • 7. 5. Be Identity-Theft Proof II. Spill Out Less On Social Media Platforms o Never reveal too much of your private information on the social media platforms, like the picture post in ecstasy to show off your first paycheck, or check-in to the banks, etc. o Save yourself from the potential hackers by assimilating the true information with the crumbs of misinformation, in order to make the hacking all the more difficult.
  • 8. 6. Be Identity-Theft Proof III. Be Wary Of The Phishing Websites o If you are remotely suspicious or skeptical of the phishing website, then call the organization on the contact number given on the main page. o Don’t fulfill the unsolicited requests from the websites like sharing the health insurance id, credit card number, bank account number, social security number, etc.
  • 9. 7. Be Identity-Theft Proof IV. Craft Impervious Passwords o Prevent your passwords from the assaults of the impostors by creating the strong passwords of 8-16 characters length that entail uppercase, lowercase, numeric figures, and the special characters. o Keep different passwords for every social account. o Update them yearly.
  • 10. 8. Be Identity-Theft Proof V. Transact With Bona Fide Sources o Check for the scandalous websites as they may inflict your tech devices with the Trojans, backdoors, or nasty virus that are difficult to be dealt with. o Avoid the use of credit cards for online transactions and go for the online wallets or Paypal instead, which will save you from entering your credit card details every now and then. o Also, these wallets are not fully secure, so guard them with a good password and don’t access them on the public platform.
  • 11. 9. Be Identity-Theft Proof VI. Lock Your Wi-Fi o Steer clear from accessing the financial details etc. on the public wi-fi that doesn’t need the passwords. o Log out from the connection once you’re finished with the task. o Remember to keep your wi-fi connection password protected, so that you remain aware whenever your device is connected to another foreign device.
  • 12. 10. Be Identity-Theft Proof VII. Update Antispyware Protection To Your Devices o Install firewall software or anti-malware to protect the entrée of the backdoors, keyloggers, and other harmful elements to protect information on your tech gadgets. o Keep these anti-spyware updated from time to time.
  • 13. 11. Be Safe! These were the tips you can implement in your everyday life to secure yourself from the identity thefts! Get started there and of course, if you find yourself stuck in any perturbing situation, don’t hesitate to contact the cyber crime cell.
  • 14. Thank You Our Contact Phone : +91-11-47282233 : + 91 - 8860619931 Fax : +91-11-41427820 Email : info@weblinkindia.net Website :- WeblinkIndia.net