SlideShare ist ein Scribd-Unternehmen logo
1 von 1
Downloaden Sie, um offline zu lesen
ID THEFT
DO’s & DON’Ts

DO:
DON’T:

CLICK ON ATTACHMENTS AND LINKS WITHOUT
KNOWING THEIR TRUE ORIGIN. What looks like a harmless
video or image can actually be malicious software designed to
steal your data. Even opening a spam email can put your address
on a spammer’s hit list for the future.

tips & advice to
prevent identity
theft happening
to you
IDENTITY THEFT IS BIG BUSINESS. PERSONAL AND
FINANCIAL DATA STOLEN ONLINE IS SOLD IN THE
UNDERGROUND ECONOMY, AND IS MISUSED BY
CRIMINAL ORGANISATIONS ALL OVER THE WORLD.
PROTECTING YOUR DATA DOESN’T JUST SAVE YOU
THE INCONVENIENCE OF HAVING TO CHANGE YOUR
PASSWORDS AND CREDIT CARDS. IT ALSO HELPS IN THE
FIGHT AGAINST ORGANISED CRIME AND TERRORISM.
TO MARK EUROPEAN DATA PROTECTION DAY, EUROPOL’S
OPERATIONS DEPARTMENT AND DATA PROTECTION
OFFICE HAVE LAUNCHED A JOINT INITIATIVE ON CYBER
CRIME & DATA PROTECTION. ON THE RIGHT, EXPERTS
FROM THE EUROPOL CYBER CRIME CENTRE SHARE SOME
TIPS FOR PREVENTING IDENTITY THEFT.

GIVE
AWAY
MORE
INFORMATION THAN
IS
NECESSARY. Your bank and credit card provider already know
your pin number and address. They don’t need you to tell them via
email, phone or web page.
ACCESS ONLINE BANKING FROM SHARED OR PUBLIC
COMPUTERS. You never know what might be lurking on its hard
drive.
SHARE PASSWORDS, EMAIL ACCOUNTS, OR ANY
OTHER ONLINE PERSONAL DATA WITH OTHER PEOPLE. It’s
so much harder to protect when more than one person has access.
SAVE CREDENTIALS IN BROWSERS. Would you store
your password on a sticky note? Saving them in a browser is just
as dangerous.
TAKE ANYTHING FOR GRANTED. If an offer in an email
or on social media sounds too good to be true, it probably is.
It’s also really easy for criminals to fake company logos and the
identity of senders.

BE AWARE. Treat unsolicited emails or pages asking for
personal information with suspicion, particularly those claiming
to be from banks and credit card companies. A quick web
search can tell you if the email you’ve received is a known scam.
Remember that you can always check with your bank or credit
card company if you receive an email claiming to be from them.
UPDATE YOUR SOFTWARE REGULARLY. Many malware
infections are the result of criminals exploiting bugs in software
(web browsers, operating systems, common tools, etc.). Keeping
these up to date can help to keep you safe.
USE ANTI-VIRUS SOFTWARE. Anti-virus software can
help keep your computer free of the most common malware;
there are even many free options. Always check downloaded files
with AV software. Do not install programs or applications on your
computer if you don’t know where they have come from.
RESTRICT ACCESS TO YOUR PERSONAL DETAILS ON
SOCIAL MEDIA. The more information criminals have access to,
the more effectively they can target you. Limiting the amount you
share and to whom makes their job harder.
ALWAYS USE STRONG PASSWORDS. Computers can
crack most common passwords very quickly. Making sure that
your password is strong (above 8 characters and using numbers,
letters and symbols) can help.
REPORT IT. If you are a victim of ID theft, report it
immediately to your local police and the company affected (bank,
online service, etc.). Law enforcement agencies throughout the
EU and around the world work together to disrupt the activities
of identity fraudsters and bring scammers to justice. The more
information you give to the authorities, the more effectively they
can target the most dangerous criminal organisations.

po box 90850; 2509 lw the hague; the netherlands; phone: +31 70 302 5000; e-mail: dpo@europol.europa.eu

Weitere ähnliche Inhalte

Mehr von - Mark - Fullbright

Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018
- Mark - Fullbright
 

Mehr von - Mark - Fullbright (20)

Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
 
2018 IC3 Report
2018 IC3 Report2018 IC3 Report
2018 IC3 Report
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018
 
Credit Score Explainer
Credit Score ExplainerCredit Score Explainer
Credit Score Explainer
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015
 
Identity Theft - Proactive / Reactive First Steps
Identity Theft - Proactive / Reactive First Steps Identity Theft - Proactive / Reactive First Steps
Identity Theft - Proactive / Reactive First Steps
 
DATA BREACH CHARTS
DATA BREACH CHARTSDATA BREACH CHARTS
DATA BREACH CHARTS
 
Fifth Annual Study on Medical Identity Theft
Fifth Annual Study on Medical Identity TheftFifth Annual Study on Medical Identity Theft
Fifth Annual Study on Medical Identity Theft
 
Consumer Sentinel Network Report 2014
Consumer Sentinel Network Report 2014Consumer Sentinel Network Report 2014
Consumer Sentinel Network Report 2014
 
The Human Right to Privacy in the Digital Age
The Human Right to Privacy in the Digital Age The Human Right to Privacy in the Digital Age
The Human Right to Privacy in the Digital Age
 
DEBT RELIEF SERVICES & THE TELEMARKETING SALES RULE: A Guide for Business
DEBT RELIEF SERVICES & THE TELEMARKETING SALES RULE: A Guide for BusinessDEBT RELIEF SERVICES & THE TELEMARKETING SALES RULE: A Guide for Business
DEBT RELIEF SERVICES & THE TELEMARKETING SALES RULE: A Guide for Business
 
CONSUMER PERCEPTIONS ON SECURITY: DO THEY STILL CARE?
CONSUMER PERCEPTIONS  ON SECURITY: DO THEY STILL CARE?CONSUMER PERCEPTIONS  ON SECURITY: DO THEY STILL CARE?
CONSUMER PERCEPTIONS ON SECURITY: DO THEY STILL CARE?
 

Kürzlich hochgeladen

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 

Kürzlich hochgeladen (20)

APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 

ID THEFT - Europol - Europa

  • 1. ID THEFT DO’s & DON’Ts DO: DON’T: CLICK ON ATTACHMENTS AND LINKS WITHOUT KNOWING THEIR TRUE ORIGIN. What looks like a harmless video or image can actually be malicious software designed to steal your data. Even opening a spam email can put your address on a spammer’s hit list for the future. tips & advice to prevent identity theft happening to you IDENTITY THEFT IS BIG BUSINESS. PERSONAL AND FINANCIAL DATA STOLEN ONLINE IS SOLD IN THE UNDERGROUND ECONOMY, AND IS MISUSED BY CRIMINAL ORGANISATIONS ALL OVER THE WORLD. PROTECTING YOUR DATA DOESN’T JUST SAVE YOU THE INCONVENIENCE OF HAVING TO CHANGE YOUR PASSWORDS AND CREDIT CARDS. IT ALSO HELPS IN THE FIGHT AGAINST ORGANISED CRIME AND TERRORISM. TO MARK EUROPEAN DATA PROTECTION DAY, EUROPOL’S OPERATIONS DEPARTMENT AND DATA PROTECTION OFFICE HAVE LAUNCHED A JOINT INITIATIVE ON CYBER CRIME & DATA PROTECTION. ON THE RIGHT, EXPERTS FROM THE EUROPOL CYBER CRIME CENTRE SHARE SOME TIPS FOR PREVENTING IDENTITY THEFT. GIVE AWAY MORE INFORMATION THAN IS NECESSARY. Your bank and credit card provider already know your pin number and address. They don’t need you to tell them via email, phone or web page. ACCESS ONLINE BANKING FROM SHARED OR PUBLIC COMPUTERS. You never know what might be lurking on its hard drive. SHARE PASSWORDS, EMAIL ACCOUNTS, OR ANY OTHER ONLINE PERSONAL DATA WITH OTHER PEOPLE. It’s so much harder to protect when more than one person has access. SAVE CREDENTIALS IN BROWSERS. Would you store your password on a sticky note? Saving them in a browser is just as dangerous. TAKE ANYTHING FOR GRANTED. If an offer in an email or on social media sounds too good to be true, it probably is. It’s also really easy for criminals to fake company logos and the identity of senders. BE AWARE. Treat unsolicited emails or pages asking for personal information with suspicion, particularly those claiming to be from banks and credit card companies. A quick web search can tell you if the email you’ve received is a known scam. Remember that you can always check with your bank or credit card company if you receive an email claiming to be from them. UPDATE YOUR SOFTWARE REGULARLY. Many malware infections are the result of criminals exploiting bugs in software (web browsers, operating systems, common tools, etc.). Keeping these up to date can help to keep you safe. USE ANTI-VIRUS SOFTWARE. Anti-virus software can help keep your computer free of the most common malware; there are even many free options. Always check downloaded files with AV software. Do not install programs or applications on your computer if you don’t know where they have come from. RESTRICT ACCESS TO YOUR PERSONAL DETAILS ON SOCIAL MEDIA. The more information criminals have access to, the more effectively they can target you. Limiting the amount you share and to whom makes their job harder. ALWAYS USE STRONG PASSWORDS. Computers can crack most common passwords very quickly. Making sure that your password is strong (above 8 characters and using numbers, letters and symbols) can help. REPORT IT. If you are a victim of ID theft, report it immediately to your local police and the company affected (bank, online service, etc.). Law enforcement agencies throughout the EU and around the world work together to disrupt the activities of identity fraudsters and bring scammers to justice. The more information you give to the authorities, the more effectively they can target the most dangerous criminal organisations. po box 90850; 2509 lw the hague; the netherlands; phone: +31 70 302 5000; e-mail: dpo@europol.europa.eu