The PRIVATE WiFi Blog

Search By Topic:

Popular Topics:



PRIVATE WiFi

The PRIVATE WiFi Blog

News & Features | Oct 6th, 2011

Encryption Counts: Simple Steps to Avoid Having Your Identity Stolen

Elaine Rigoli

Michael Roberts, the founder of www.howsafeareyou.org, says a lot of people do not realize that their information is breached and that they are at risk identity theft and financial fraud.

Roberts – who started his website to feature new security products -- recommends that consumers take the following steps to protect their identity:

  1. Get your credit report and analyze it for any suspicious activity; pay attention to any accounts or inquiries that were not initiated by you.
  2. If you've discovered that your credit was used fraudulently, freeze your account until you can determine the extent of the breach.
  3. Contact the credit bureaus and place a fraud alert on your file. This will last for three months, and then you can determine whether to renew it. The fraud alert will force companies that seek to extend credit toward you to perform a more detailed verification process than usual.
  4. Notify the companies that you currently have accounts with that your identity has been stolen. You may need to have new cards issued and you may want to have them block transactions automatically that are out of your geographic region. This will help to flag suspicious activity.
  5. Change all your passwords and user names. Do not access any of your financial records online without your information and privacy encrypted.

Perhaps his last tip is his most important – encryption via a personal VPN is critical to outsmarting hackers and online identity thieves!

Also, Roberts thinks "it's amazing” how many people who are victims do not file a police report, since failing to take this step makes it more difficult to dispute the privacy breach.

In addition, check out this video we’ve created that is a step-by-step explanation of how hacking happens. It explains the ramifications beyond financial data theft and explores issues like “social media hacking” or when you or your friends’ Facebook or email accounts get hacked. Most of all, it reminds you to stay safe in wireless hotspots.

Associated Topics:

Associated Topics:

Comments

Related Posts

Cyber Security Training Just As Important at C-Level

Thought Leadership
Eva Velasquez | Mar 24th, 2015

The need for better online safety training to prevent data breaches is a hot topic right now. Coupled with stronger computer and network policies, companies want to prevent the hacking events that leave businesses susceptible to a data breach. While it’s no secret that employees in both the private sector and government service can unintentionally expose organizations to hackers, what is surprising is a report by Wombat Security that shows that 33% of CEOs fell for phishing attacks that led to network access. Why are they falling for this kind of internet activity? Read More

E-filing: The Fastest and Safest Way to File Taxes?

Thought Leadership
Eva Velasquez | Mar 9th, 2015

E-filing your annual return to the IRS offers speed and convenience and when coupled with industry-approved software that can plug in the values for you, a lot of the headaches traditionally associated with doing your taxes are eliminated. However, there are some potential dangers that you should be aware of, such as insecure public WiFi networks and online tax fraud. Read More

FTC Says Hotel WiFi is Dangerous

Thought Leadership
Kent Lawson | Feb 23rd, 2015

Recently, the FTC posted an article on their website stating that hotel WiFi is dangerous and that users should not assume that just because they pay for Internet access that their connection is secure.

We couldn’t agree more. In fact, I have been stating this fact since we launched PRIVATE WiFi nearly five years ago.  This is an important topic because hotel traveler’s rank WiFi access at hotels as the number one amenity that they look for when booking hotel rooms. Read More

Managing BYOD Security Threats: VPNs Mitigate The Risks

Thought Leadership
Kent Lawson | Jan 28th, 2015

It’s clear that the era of BYOD is here to stay. Workers are no longer confined to an office desk and computer, and instead are able to do work from anywhere: home, their local coffee shop, and while taking public transportation. The proliferation of public wireless networks has made this possible, and while this has freed employees up to do work from nearly everywhere, it also has introduced many security challenges. Read More

X

Thank you for subscribing to our newsletters

Your email has been added to our system. You will be e-mailed shortly with a request to confirm your membership. Please make sure to click the link in that message to confirm your subscription.