The Shortest Distance Between and Identity Thief and You is Your Computer

Identity thieves use many different methods to carry out their crimes.  One of their most effective tools just happens to be a computer.  The introduction and evolution of the internet has made it that much easier for identity theft to be committed by way of computer.  Several online predators seek out the innocent on fraudulent web sites or via email.  They often claim to be IRS agents or members of a banking institution, trying to persuade recipients out of residential addresses, Social Security numbers and bank account information.  Those individuals who choose to meet these requests are swindled instantly as the scammer immediately assumes their identity by charging up credit cards and possibly cleaning out their bank accounts.   

These facts are very unsettling when thinking how computers have become a way of life for many of us.  What is even more alarming is the fact that so many people unknowingly put themselves at the risk of identity theft with no involvement from the internet.  This occurs when someone gives away their computer or sells it at a trade show.  Several of these discarded computers have a hard drive full of personal information.  This makes it very easy for a criminal minded individual to thieve your hard earned money and possibly assume your identity. 

You would be surprised to learn what may still be on your computer even after you think it has been removed.  A computer-savvy thief may easily be able to retrieve email messages, your name, age, birth date and other sensitive information. 

Eluding Computer Identity Theft

It is very unfortunate that several identity thieves know how to operate your computer better than you.  While they are skilled in their methods of deception, there are few things that can be done to protect your personal information:

          Always remove the hard drive on a computer you are selling or giving away.                                    

          Keep it in safe place or destroy it

           Inquire within a reliable computer supplier about how to safely overwrite the files

           Use a quality hard disk cleaning program. 

There are also a few items you should delete individually.  Though it may be some what of a task, recovering from identity theft is even more of a challenge.  Here are the files that must be deleted before selling or giving your computer away: 

 

           all email contacts

           all email messages

           all important word documents

           all files in the recycle bin or trash folder of the operating system

           all temporary internet files

           your internet search history 

           the cache of your web browser

           any non-transferable software that may be installed on the hard drive

You should also make sure that trusted users of your computer are practicing identity theft prevention as well.  Children should protect themselves from identity theft by never using their real name in an email account and limiting personal details on social networking sites.  Being that children are often prime targets of internet predators, it is very important to protect the contents of your computer to prevent identity theft and ensure their safety.    

 

(0 Comments)
Log in or sign up to comment.

Post a comment

Log in or sign up to comment.
Identity theft comes in many forms.

A person\92s identity can be 'borrowed' for the purpose of creating fictional credit cards or a person\92s entire identity can be usurped to the point where they can have difficulty proving that they really are who they claim to be.

Up to 18% of identity theft victims take as long as four years to realize that their identity has been stolen.

There are many ways to protect your personal identity and many steps you can take to prevent your identity from being stolen:

*Never give out unnecessary personal information
*Never provide bank details or social security numbers over the Internet
*Always remain aware of who is standing behind you when you type in your personal credit codes at ATM machines and at supermarket checkout swipe machines.