In this day and age, social media is everything. It is through channels like Facebook, Instagram, Twitter, LinkedIn and other platforms that we are able to communicate and connect with others around the globe. Unfortunately, that connection can leave us vulnerable to identity theft.
Whether sitting in a coffee shop, hotel lobby, doctor’s office, or airport, some users spend hours a day posting information into many different screens and have no idea the level of opportunity they give thieves who are waiting for exactly that type of information.
Because of how savvy bad actors in this field are, you can rest assured that at least one person in the establishment will fall victim to fraud faster than they can type the dot on their exclamation point and hit send.
Nonetheless, while the benefits and use of social media have grown tremendously over the last 15 years, there is no question that the need for increased security has grown with it.
Criminals have become quite sophisticated in the way they infiltrate and manipulate the internet to extract our PII (Personally Identifiable Information) as it travels across networks. For this reason, it is imperative that we protect our data as much as possible.
The starting advantage would be never to assume any public Wi-Fi is safe and secure. Public Wi-Fi is more unsafe now than most of us are even aware, yet, we consistently enter our personal information into the cybersphere believing it will reach it’s destination safely before being hacked and stolen, but often that is not the case.
In 2018, more than 45,000 persons per day submitted claims of identity theft to the FTC. That’s approximately 16.7M victims annually, who have had their information stolen and lives turned upside down due to fraudulent activity.
So, how, then, are you protecting you and your family’s information?
In this digital age, complacency is not an option – which is why having a comprehensive security plan to monitor your social media accounts is key to protecting your privacy, alleviating worry, and ensuring peace of mind for as long as you are using these platforms.
A solid security service will watch for vulnerabilities and any unauthorized use of your PII (such as your name and email, passport number, driver’s license, medical ID, payday loan info), and alert you immediately.
Take action to keep your family safe from Identity Theft.
Providing a defense around your family’s privacy is essential, yet simple. It only requires you to perform the necessary due diligence to find an extensive identity theft security service that includes social media monitoring, and that will work well for you and your family.
Perhaps, one that is affordable, easy to set up and that provides a way for you to stay in constant contact with an advisor, even in the event of an emergency. Most important, consider the identity restoration services offered. If your ID is stolen, this is how you will get it back. Make sure you only work with a company with FULL identity restoration services.
Then, pick one, sign up, subscribe, and that’s it!
Most importantly, DO NOT forget the extras.
A few other tips that are vital to keeping you and your family safe while posting in social media are:
- DO NOT geotag your location! Keep in mind, at the same time you are letting your friends know where you are, you are letting the criminals know where you are not. The thieves will now know that you are not home. So giving your location over social media may not be the best piece of information to broadcast.
- STOP OVERSHARING! While there is a strong tendency to overshare on social media, many go overboard and tell too much, inadvertently, giving extra detail to scammers, thieves, and trolls who are paying close attention and using that detail to invade your privacy further, and possibly ruin your reputation. Remember, there are some things better left off of social media.
- PAY ATTENTION TO WHO IS FOLLOWING / FRIENDING YOU! Keeping tabs on who is following or friending you may seem unimportant or perhaps an impossible task to perform, but a quick look at the type of content they are posting or responding to might serve you well in the long run. Because in an identity theft investigation, who is following you might be the answer to identifying a suspect.