Tips: Be Proactive To Protect From Identity Theft

Since performing financial transactions online is becoming an increasingly common way to do business, a Purdue University expert says it is more important than ever to employ a proactive approach to preventing the theft of personal data.

"Many individuals don't consider security action plans until after an intruder has penetrated their personal information," said Beverly J. Davis, an associate professor of organizational leadership and supervision at the College of Technology. "The result is a reactive and ineffective approach that fails to take into account the technology of today. Today's intruders are savvy, and preventative measures must be taken in order to prevent intrusion into personal space. A few simple, yet effective steps can make all the difference."

To help people protect themselves, Davis has created what she calls the Security Penetration Prevention Action Plan. It contains a series of questions that she says everyone should ask themselves on a regular basis, even if they have no reason to suspect someone might have accessed their information.

"The Federal Trade Commission has reported that the average victim of identity theft is unaware of the problem for 12 months, and the reality is that waiting that long to realize there is a problem could be a destructive and devastating mistake," Davis said. The key is to prevent such an occurrence in the first place, and the best way is by essentially working backwards and asking the questions that a perpetrator might ask."

Davis said some questions include:

What are the intended goals of a potential predator?

Most likely, the intruder wants to access your personal banking account, credit card information and Social Security numbers to 'become you' and financially benefit. Give personal information only to associations and organizations you feel confident have strong security measures in place to protect your data."

What means will potential intruders take to achieve their goal?

One of the most common techniques used is social engineering, where the intruder uses psychological tricks to gain the confidence of you or a family member. It relies on the human tendency to trust and assist others. Examples include spam or phishing, which uses sophisticated e-mails and fake Web sites designed to mimmick those from legitimate financial institutions or organizations. It is important to be aware of this technique, make sure all family members are aware of it and stay current on the latest scams that are out there."

What extent might an intruder go to in order to succeed?

Davis said it is important to realize that psychological tricks used by identity thieves might include going so far as contacting your financial institution and claming to have lost a debit card or credit card.

"Often, all that is needed to obtain account-related information is easily obtained security information, such as your mother's maiden name. If at all possible, ask any institution that holds your personal information to require a harder-to-obtain method or password," she said.

Davis said failing to stay on top of who might be accessing your information can have dire consequences, such as a damaged credit history that will take years to clean up.

"The most important thing that anyone can do is monitor their credit report regularly through free sources such as http://www.annualcreditreport.com to detect errors and make sure all members of the family are aware of some of the pitfalls identity thieves are using to try to trick consumers," she said. "As technology improves, so do the devious tactics of potential intruders. That's why it's so important to follow these steps. Prevention starts with awareness."

Featured

  • Brivo, Eagle Eye Networks Merge

    Dean Drako, Chairman of Brivo, the leading global provider of cloud-native access control and smart space technologies, and Founder of Eagle Eye Networks, the global leader in cloud AI video surveillance, today announced the two companies will merge, creating the world’s largest AI cloud-native physical security company. The merged company will operate under the Brivo name and deliver a truly unified cloud-native security platform. Read Now

  • Security Industry Association Announces the 2026 Security Megatrends

    The Security Industry Association (SIA) has identified and forecasted the 2026 Security Megatrends, which form the basis of SIA’s signature annual Security Megatrends report defining the top 10 factors influencing both near- and long-term change in the global security industry. Read Now

  • The Future of Access Control: Cloud-Based Solutions for Safer Workplaces

    Access controls have revolutionized the way we protect our people, assets and operations. Gone are the days of cumbersome keychains and the security liabilities they introduced, but it’s a mistake to think that their evolution has reached its peak. Read Now

  • A Look at AI

    Large language models (LLMs) have taken the world by storm. Within months of OpenAI launching its AI chatbot, ChatGPT, it amassed more than 100 million users, making it the fastest-growing consumer application in history. Read Now

  • First, Do No Harm: Responsibly Applying Artificial Intelligence

    It was 2022 when early LLMs (Large Language Models) brought the term “AI” into mainstream public consciousness and since then, we’ve seen security corporations and integrators attempt to develop their solutions and sales pitches around the biggest tech boom of the 21st century. However, not all “artificial intelligence” is equally suitable for security applications, and it’s essential for end users to remain vigilant in understanding how their solutions are utilizing AI. Read Now

New Products

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.