You are now leaving Synchrony.com. Please note that because the site you are going to is not controlled by Synchrony, you will be subject to the terms of use and privacy policy of the website you are visiting.
Michelle Romero: Michelle.Romero@syf.com Tyler Allen: Tyler.Allen@syf.com
Article
October 29, 2019, 8:00 AM EDT
You may not always see it, but the information and data that makes up your online identity is spread across the internet. Identity thieves know this and seek out the traces that we leave wherever we go, both in the real world and online. And they use these traces to steal your identity. But you can limit your risk by knowing how attackers think and what they’re after. Here’s a peak into what they are after and how they operate.
Know What Identity Thieves Want
Identity thieves target your personal information. But at the end of the day—just like most other thieves—most of them want money. These ID pickpockets have evolved to take advantage of the wealth of personal information that most people have stored on the internet. In most cases, when they are looking to get your information, they either directly target you or focus on getting your information from a company with whom you do business. They may also impersonate a person or organization who you trust and try to trick you into turning over information. Some of the information that these thieves target is so common that we don’t always think to protect it. But by getting some information, they can then use that to bust through security measures that guard your more secure accounts.
Here are some of the things they are after:
Phishing for Data
Phishing scams are designed to use your trust in an organization to obtain information fraudsters need. These scams often come in the form of a request for information in an email that appears to be from an organization you know. Fraudsters may also create copycat websites for those organizations to better trick people into entering their information. Follow these simple rules to avoid falling victim to a phishing scam.
Phishing scams often go to great lengths to fool you. They may know personal details about you that they learned from social media or use the logos of organizations that you trust. Skepticism is your best defense against these threats.
Make a Better Password
Generally speaking, you want to use passwords that are long, complex and unique. The best passwords often have the following characteristics:
To help you remember all your complicated passwords, the Federal Trade Commission recommends that consumers consider using a password manager. These tools store your valuable information in encrypted digital vaults, which only you can access. The same caution you take with passwords should be applied to security questions, which can be used to access your account in the event of a lost password. Avoid things like your date of birth, ZIP code or mother’s maiden name, since these can often be discovered through public records or social media. Try to give answers only you would know or a random response that you can remember.
Use Multi-factor Authentication
Many organizations now use what’s called multi-factor authentication to add an extra layer of security in addition to your password. This typically involves entering a temporary code that is sent to your phone number or email address. The U.S. Department of Commerce recommends using multi-factor authentication “whenever possible,” especially for websites that contain valuable personal, financial or medical data.
Spot and Report Identity Theft
Remain vigilant for these signs that an identity thief might be targeting you.
In the event your identity is stolen, report the activity immediately to the FTC, local law enforcement and your bank, along with other financial institution you use. You may also want to consider freezing your credit report with the three major credit bureaus to ensure no new lines of credit can be opened. Then follow the advice of government agencies and your financial institutions to better secure your identity against future attacks.
Author bio: By James Thorne James Thorne is a freelance journalist who has written for CNBC and Reuters, among other publications. Sources: https://www.wired.com/story/you-may-have-forgotten-foursquare-it-didnt-forget-you/ https://cyberscout.com/sites/default/files/uploads/2012/03/PII-chart_FINAL.png https://www.lifelock.com/learn-identity-theft-resources-kinds-of-id-theft-using-social-security-number.html https://kb.iu.edu/d/arsf https://www.synchronybank.com/documents/wres026408.pdf https://www.consumer.ftc.gov/blog/2015/07/advanced-password-tips-and-tricks https://www.lifelock.com/learn-identity-theft-resources-students-guide-to-help-protect-against-identity-theft.html https://www.nist.gov/itl/tig/back-basics-multi-factor-authentication https://www.consumer.ftc.gov/articles/0271-warning-signs-identity-theft https://www.experian.com/blogs/ask-experian/7-steps-to-fight-back-against-identity-theft https://www.ftc.gov/policy/reports/policy-reports/commission-staff-reports/consumer-sentinel-network-data-book-2017/main/
Disclosures: This article was first published on the Synchrony Bank website
Tags
11/30/2024
Synchrony improves financial inclusion with Project REACh
03/16/2023
While working at a free clinic in college, Dr. Shad Hattaway, D.D.S., noticed a paradox: those who need quality healthcare the most are often unable to afford it.
03/09/2023
When visiting a substance use recovery program in his home state of Alabama, Dr. Michael McCracken, D.D.S., Ph.D., saw a clear need: Many
02/09/2023
How can investors increase opportunities for minority founders? At Synchrony, it starts with open conversations, and ends with clear initiatives.