
Each day brings news of data breaches and personal information losses by companies across the world. How do you protect your data? Follow these guides and learn how to guard your personal identity.
Protect Myself
1. Be a password genius
2. Be careful what you reveal
3. Keep a secondary email address and credit card
4. Never send sensitive information in an email
5. Check addresses before submitting information online
1. Customize your social network privacy settings
2. Remember, it's public
3. Use discretion
4. Talking about locations
5. The Grandma Rule
6. Be responsible
7. Realize that you can't take it back
Identity Theft
Who can become a Victim of Identity Theft?
Identity theft is usually a crime of opportunity, so you may become a victim simply because your information is available. Thieves target companies for a variety of reasons such as ease of accessibility or appealing customer demographics. If your information is stored in a database that is compromised, you may become a victim of identity theft.
You can be a victim of identity theft even if you never use a computer. Malicious people may be able to obtain personal information (such as credit card numbers, phone numbers, account numbers, and addresses) by stealing your wallet, overhearing a phone conversation or rummaging through your trash. If a thief has enough information, he or she may be able to impersonate you to purchase items, open new accounts or apply for loans. Most companies and other institutions store information about their clients in databases. If a thief can access that database, he or she can obtain information about many people at once rather than focus on one person at a time.
What Do Attackers Look for When Picking a Target?
Attackers target weak passwords to gain access to any network. Although it can be tempting to use the same password (or a minor variation of it) multiple times, doing so gives hackers one key to many doors. The best way to manage your passwords is to find a balance between choosing a complex password that it is difficult for hackers to guess and easy for you to remember.
Strong passwords contain the following:
You should also change your password every 60 to 90 days, and avoid sharing your password with anyone.
How Do I Avoid Identity Theft?
Unfortunately, there is no way to guarantee that you will not be a victim of identity theft. However, there are ways to minimize your risk:
How Do I Put a Credit Freeze on My Account?
A credit (or security) freeze is designed to prevent the information in your credit file from being reported to others. This means that creditors will not be able to open new lines of credit in your name while the freeze is in place. This is the only sure way to protect yourself from identity theft. To place a credit freeze on your account, you will need to contact all three credit bureaus (Equifax, Experian, Transunion) to put a freeze on your credit. For more information visit the Federal Trade Commission Credit Freeze consumer information page.
How Do I Set Up a Fraud Alert?
A fraud alert can make it harder for an identity thief to open more accounts in your name by alerting you when a check for credit is attempted. To learn more about setting up fraud alerts, visit the Federal Trade Commission Fraud Alert consumer information page.
How Do I Set Up Bank Account Alerts?
A withdrawal alert will notify you when money is removed from your bank account. Visit your bank’s website to learn more about its alert service.
How Do I Know If My Identity has been Stolen?
The following are examples of changes that could indicate that someone has accessed your information:
What Do I Do When My Identity has been Stolen?
Recovering from identity theft can be a long, stressful, and potentially costly process. Many credit card companies have adopted policies that try to minimize the amount of money you are liable for, but the implications can extend beyond your existing accounts. To minimize the extent of the damage, take action as soon as possible:
Phishing
Phishing Emails and Internet Scams
Reporting a phishing attempt protects the St. Norbert College network, including your personal data and important research. One compromised account can negatively impact all accounts.
What if I spot a phishing email?
First, forward the email to sevicedesk@snc.edu. We may be able to prevent other users from seeing it.
Second, mark it as phishing.
Signs you received a phishing email
What do I do when I've given out information?
What does spam look like?
Spam emails will often try to imitate the look and tone of legitimate financial institutions in hopes of convincing you to trust them with confidential or sensitive information. To avoid being fooled by a fraudulent email, follow these steps:
Never give away your personal information via email - Legitimate institutions will never ask you to disclose your address, birthday or PIN through email correspondence.
Never click a link to a login page - A fake email might contain a link to a login page that looks very similar to your bank's login page. Do not be fooled. If you receive an email from your bank telling you to log into your account, ALWAYS type your bank’s URL directly into your browser.
If it sounds too good to be true, it is - Many phishing emails will try to entice you with exciting offers and deals. Do not open emails that seem suspicious.
How can you reduce the spam in your inbox?
There are some steps you can take to significantly reduce the amount of spam you receive:
File Sharing
Copyright Infringement Policies and Sanctions
St. Norbert College strongly discourages file sharing copyrighted material. Users who have committed unauthorized sharing or distribution of copyrighted files could be in violation of the College’s policies. Furthermore, distributors may be violating the Digital Millenium Copyright Act of 1998 (DMCA).
Risks with P2P file sharing
In addition to legal issues, P2P file sharing can put your computer at risk.
NOTE: File sharing consumes a lot of bandwidth, which can slow campus network response time, especially in the residence halls.
What You Can Do?
Do not download copyrighted material if you don't have the owner's permission. If you have installed file-sharing programs on your computer, disable file sharing over the internet on these programs. If you must share files, create one folder for shared files and limit all file sharing to it.
Remove any illegally obtained copyrighted material from your computer and make sure there are no potentially infringing files in your shared folder. Use legitimate services for obtaining media.
If you do need to have open shares, protect both your machine and the campus network by doing the following: