Cisco CloudCenter: Get the Hybrid IT Advantage

Identity Theft

Definition - What does Identity Theft mean?

Identity theft is the unauthorized collection of personal information and its subsequent use for criminal reasons such as to open credit cards and bank accounts, redirect mail, set up cellphone service, rent vehicles and even get a job. These actions can mean severe consequences for the victim, who will be left with bills, charges and a damaged credit score.

There are many ways in which an individual's identity can be stolen, but people may be particularly vulnerable to this crime online, where savvy criminals can gain access to personal information through a number of avenues. According to the U.S. Federal Trade Commission, approximately nine million Americans have their identities stolen each year. This theft is increasingly being perpetrated electronically.

Techopedia explains Identity Theft

Identity thieves have a number of avenues for stealing personal information via electronic means. These include:

  • Retrieving stored data from discarded electronic equipment such as PCs, cellphones and USB memory sticks
  • Stealing personal information using malware such as keystroke logging or spyware
  • Hacking computer systems and databases to gain unauthorized access to large amounts of personal data
  • Phishing, or impersonating trusted organizations (such as the IRS, a bank or large retailer) via email or SMS messages and prompting users to enter personal financial information
  • Compromising weak login passwords (often through calculated guesswork) to gain access to a user's online accounts
  • Using social networking sites to attain enough personal details to guess email passwords or impersonate the victim in other ways online
  • Diverting victims' emails to attain personal information such as bank and credit card statements, or to prevent the victim from discovering that new accounts have been opened in his or her name

There are some steps consumers can take to protect their identities, including ensuring that any transactions they make online use secure data encryption, limiting the amount of personal information they share online, remaining alert to phishing scams and keeping a close eye on their banking and credit card statements.

Share this:

Connect with us

Email Newsletter

Join thousands of others with our weekly newsletter

The 4th Era of IT Infrastructure: Superconverged Systems
The 4th Era of IT Infrastructure: Superconverged Systems:
Learn the benefits and limitations of the 3 generations of IT infrastructure – siloed, converged and hyperconverged – and discover how the 4th...
Approaches and Benefits of Network Virtualization
Approaches and Benefits of Network Virtualization:
Businesses today aspire to achieve a software-defined datacenter (SDDC) to enhance business agility and reduce operational complexity. However, the...
Free E-Book: Public Cloud Guide
Free E-Book: Public Cloud Guide:
This white paper is for leaders of Operations, Engineering, or Infrastructure teams who are creating or executing an IT roadmap.
Free Tool: Virtual Health Monitor
Free Tool: Virtual Health Monitor:
Virtual Health Monitor is a free virtualization monitoring and reporting tool for VMware, Hyper-V, RHEV, and XenServer environments.
Free 30 Day Trial – Turbonomic
Free 30 Day Trial – Turbonomic:
Turbonomic delivers an autonomic platform where virtual and cloud environments self-manage in real-time to assure application performance.