Skip to main content
HomeThe WWS Daily

- News, tips, inspiration you can trust to thrive in today’s digital age.

Search form

Main menu

  • Home
  • News & Features
  • Business & Economy
  • Tech & Trends
  • Health & Style
  • Arts & Culture
  • Contact Us

How to Protect Yourself from the Scary World of Online Identity Theft

David Share November 27, 2019

david-share.png  Co-founder & Director, Amazing Support. 

  WWS contributor.


How to Protect Yourself from the Scary World of Online Identity Theft

Online identity theft is a serious crime that happens to millions of people across the globe.

According to Cifas, the UK's national fraud prevention service, identity fraud has reached a record level in the UK, rising fastest for victims over 60 and under 21. Cifas recorded 189,108 cases last year, including 82,608 reports of plastic card fraud.

In the US, more than 12 million Americans are victim of identity fraud every year, and the average financial loss per identity theft incident is just over $5,000. Identity theft occurs so frequently that the Federal Bureau of Investigation cites it as "America's fastest growing crime problem."

At our North London IT support company, we hear about cases of this identity theft often. Amazing Support takes cybercrime prevention seriously, working with all our clients to ensure their online identities are protected.

As an expert IT support company, we can offer our best advice on how to avoid the world of online identity theft, which will come in handy to keep yourself safe online.

 

What Is Online Identity Theft?

 

Identity theft is a crime that results in loss of personal information, which is then used for fraudulent purposes. Personal information can include account usernames and passwords, profile images, bank information, credit card numbers, or other ID numbers. If you’re not careful, this information can be taken from you while you’re online and used to commit crimes.

man-laptop-online_identity_theft.jpg

Sometimes identity theft is easily resolved – if you notice something amiss and contact the relevant bank or institution right away. Other times, though, online identity theft can result in huge complications costing a lot of money to fix.

It’s important to remain vigilant, starting with educating yourself on how online identity theft works.

 

How Can Your Identity Be Stolen?

 

Online identity theft can occur through any digital platform, including social media. Fraudsters use scams like phishing or pharming to redirect you to illegitimate websites to extract your info.

Unsecured websites, weak passwords, malware downloaded to your device, public Wi-Fi networks and data breaches are also common ways for criminals to steal your identity.

stolen-identity-fishing.jpg

 

Best Ways to Prevent Online Identity Theft

 

Online identity theft is scary and has serious repercussions. There are plentiful ways for hackers to get your information. If you stay alert and look out for scams, though, you can prevent this.

Here are 6 tips to help you prevent online identity theft.

 

#1 Use Security Software

 

Your computer, smartphone, tablet, or any device that connects to the internet should have the latest security software installed. You can use cybersecurity apps and programs that protect your device from malicious attacks when using Wi-Fi.

Once hackers break into your device, they have access to all of your online activity. They can also exploit holes in operating systems that are out of date, so always run updates.

 

#2 Learn to Spot Scams

 

Know how to spot suspicious activity when surfing the web. This is especially important for avoiding phishing scams, which are attempts to get you to click on nefarious links via email or a messaging platform.

If a link is sent to you through any means, always be cautious and never click on it immediately. If you don’t fully trust where it came from, do some digging.

An email from your anti-virus company or bank might look real. But you should still access your account with these institutions via their websites, not by clicking the link in an email.

 

#3 Use Strong Passwords

 

The number of people who use simple passwords is staggeringly high. Don’t make things any easier for hackers and use difficult and different passwords for every online account.

Passwords should be at least 10 characters long and contain uppercase and lowercase letters, numbers, and special characters. Using a password generator or a 2-factor authentication app secures your accounts as well. It can be a hassle keeping track of all those different passwords, but protecting your personal data is worth it.

 

#4 Secure Your Online Shopping

 

Only complete online shopping transactions on secure websites. Before entering your bank or credit card info, check that the website’s URL has HTTPS – Hypertext transfer protocol secure rather than just HTTP, hypertext transfer protocol.

If you’re unsure about a business’s website, do some research on them before making a purchase.

 

#5 Be Cautious on Social Media

 

Be extremely wary of the personal data you share on social media and set your accounts to private. Vet your friends list, to ensure that you personally know everyone you’re sharing information with. Fake social media profiles are one of the most common ways online identity theft is committed.

 

#6 Read User Agreements

 

Nobody likes to plow through long user agreements when signing up for a new app or service. But reading these terms will help you prevent online identity theft. These agreements will state how your personal information is used; if anything seems fishy, don’t sign up.

Final Word

Don’t let online identity theft ruin your life. It’s more than an inconvenience when your personal data is stolen – it can have major financial and legal repercussions.


David Share - Director at Amazing Support has held positions as Operations Director and Head of IT in legal and professional firms for more than 10 years. He is a Director and co-owner of Amazing Support, an Award-Winning, Microsoft Silver & Cyber Essentials accredited specialist managed IT Support and Cyber Security Company.


 

Related stories

 

Cybersecurity Facts You Need to Know to Protect Your Business

Keys to Enhance Your Business Cybersecurity

Why Cybersecurity Alliances Are Being Formed

Cybersecurity Concerns Threating Businesses Online

How Blockchain Technology Can Bolster Your Business’ Cyber Security

 

 

SUBSCRIBE TO OUR NEWSLETTER  newsletter icon.png

Get our best content, news, tips, and inspiration in your inbox - free.

The subscriber's email address.
 

 

Join Over 20,000 Subscribers!

Get our best content, tips, and inspiration free in your inbox. Subscribe ››

Connect with us:  twitter.gif linkedin-gray.jpg email.gif RSS feed

 

 

 

 

 

Most read this week


Are You Using Getty Images’ 35 Million+ Free Images on Your Blog?
How Bloodborne Pathogen Training Works for Businesses
George Mathews

Best Ways to Prevent Bed Bugs from Ruining Your Sleep
The Best Ways to Prevent Bed Bugs from Ruining Your Sleep
Alan Williams

Trending Ecommerce Strategies Bringing BIG Results Right Now
Barry White

5 Dog Walking Rules for Safe and Enjoyable Walks
5 Dog Walking Rules for Safe and Enjoyable Walks
Gloria Flores

 

Got a story or tip for us?

 

Tips_0_0_0.png

Here's how to submit it →

 

 

 

 
 

STAY UPDATED ...

black-nav-bar1.png

News & Features  ›


Biden or Trump Must Urgently Secure Stable Relations with China

Biden or Trump Must Urgently Secure Stable Relations with China

Rulebook for Selling on Amazon - The A10 Algorithm Checklist

Rulebook for Selling on Amazon - The A10 Algorithm Checklist

How Traditional Office Spaces Are Expected to Change

Office Trends: How Traditional Office Spaces Are Expected to Change


Why Brands Pick Plastic Prints Ice Cream Boxes Over Paperboard

Understand and Plan Your Digital Afterlife

The Most Annoying Video Call Habits at Work - Are You Guilty?

hor-line-blue

Tech & Trends  ›


woman-working-laptop-coding-continuous-software-devops-testing

Continuous Testing in DevOps: What You Should Know

Image for How Cybercriminals Target and Abuse Privileged Accounts Undetected

How Cybercriminals Target and Abuse Privileged Accounts Undetected

app-dev-team-working-application-modernization-support-digital-transformation

How Application Modernization Supports Digital Transformation


Are You Using These Top Web Design Trends?

Should You Have a Dedicated Outsourced Development Team?

Tech Troubles? 4 Business Strategies To Avoid Tech Disasters
 

hor_line_yellow

Arts & Culture  ›


Girl in Pink Jacket Holding a Gift

7 Awesome Gifts Ideas for Kids

Modern Turntable - Image for Vinyl Revolution - Why It’s High Time You Bought a Modern Turntable

Vinyl Revolution: Why It’s High Time You Bought a Modern Turntable

female-writing-web-content-writing-rules

3 Core Rules of Web Writing to Remember Always


How (And Why) to Encourage Teens to Write More

How to Put a Stop to Procrastination Tendencies: 7 Effective Tips

What Your Handwriting Says About You

hor-line-brown

Business & Economy  ›


Lessons on Entrepreneurship from Kimin Tanoto

7 Ways to Accelerate Your Ecommerce Business Sales

7 Ways to Accelerate Your Ecommerce Business Sales

How to Build Up an Online Portfolio and Presence for Your Business

How to Build Up an Online Portfolio and Presence for Your Business


How to Restart Your Small Business After an Initial Failure

How Unique Product Packaging Shapes Influence Sales

Nudge Theory Examples to Reach Your Career & Life Goals

hor-line-green

Health & Style  ›


behavioral_health_services_frontier_of_hental_health

Embracing Behavioral Health Services: The New Frontier of Mental Health

8 Fashion Trends That Were Popular & Turning Heads Last Year

What Are the Benefits of Human Hair Ponytail Extensions?

hori-3.jpg

Did You Know Happiness Can Hurt and Make You Less Creative?

hori-3.jpg

6 Ways to Boost Your Performance in the Gym

hori-3.jpg

7 Health Habits for Seniors to Age Gracefully
 

Home | About Us | Contributors | Submissions | Advertise | Disclosure | Privacy Policy | Contact Us

Follow Us:

twitter_e.jpg linkedin-pg.jpg email-updates_icon.jpg

Committed to quality content and journalistic ethics.

RSS rss

Search WWS search-icon-trans_0_1.png

© 2026 The WWS Daily.