Tips: Protect Your Identity While Holiday Shopping Online

Online holiday sales are projected to increase 21 percent in 2007, according to Forrester Research. But while consumers continue to increase their use of holiday shopping, there is also widespread fear that they will be the victims of identity theft. That's why Huntington Bank has developed 10 tips that shoppers can follow to make for a safe and secure holiday season whether consumers are celebrating Christmas, Hanukkah or Kwanzaa.

"At Huntington we understand how time-starved our customers are and how convenient online shopping can be," said Timothy J. Scholten, senior vice president responsible for Huntington's online banking. "Huntington's online banking site continues to be one of the top 10 sites in the country. We want to share our expertise with shoppers to give them peace of mind about their online transactions."

1. Check your accounts daily for any activity you did not initiate. This is especially needed during the busy holiday shopping season. You should be able to log on quickly and check to see if there is any unusual activity in your bank or credit card account that you did not initiate. If there is, contact your bank immediately.

2. Do business with companies you know and trust. Research a company before revealing personal or financial information online. Confirm an online seller's physical address and phone number in case you need to get in touch with them. If you get an email or pop-up message from the seller while you're browsing that asks for financial information, don't reply or click on the link in the message. Legitimate companies don't ask for this information via e-mail or pop-ups.

3. Watch out for fake "look-alike" sites. Some con artists disguise their Web site as a well-known company's site. Check your browser's address bar to make sure you're always using the correct Web site address. If the Web site seems suspicious, leave it immediately and call the company.

4. Check a company's privacy policy before doing business with it. A company should allow you to know what personal information its Web site is collecting, why and how it will be used. If you can't find a privacy policy -- or if you can't understand it -- consider taking your business to another site that's more security-conscious and accommodating to customers.

5. Only provide personal information if you're on a secure Web site. Once you are logged in, make sure the Web address starts with "https" ("s" means it's secure). For added safety, check for a site certificate before submitting information on a secure page. Confirm the owner of the certificate by clicking on the padlock icon at the bottom of most browsers. You should see the owner listed as well as the site address. This address should match the Web site address at the top of the page; if they do not match, you may be at a fraudulent Web site and should not enter personal data.

6. Never respond to emails asking you to "confirm" recent transactions after you shop. These likely are "phishing" scams sent to lure private information from you.

7. Maintain a paper trail. Print and save records of your online transactions, including the product description and price, the online confirmation/receipt, and copies of any e-mail(s) you exchange with the seller.

8. Do not share your passwords with anyone and never provide your Social Security number, birth date, or mother's maiden name in an e-mail.

9. Make sure all of your security software is up-to-date before you do your online shopping. That includes anti-virus software, anti-spyware and firewalls.

10. Use a separate e-mail account for your online shopping. You can set up a free e-mail account online through several different services.

Featured

  • The Evolution of IP Camera Intelligence

    As the 30th anniversary of the IP camera approaches in 2026, it is worth reflecting on how far we have come. The first network camera, launched in 1996, delivered one frame every 17 seconds—not impressive by today’s standards, but groundbreaking at the time. It did something that no analog system could: transmit video over a standard IP network. Read Now

  • From Surveillance to Intelligence

    Years ago, it would have been significantly more expensive to run an analytic like that — requiring a custom-built solution with burdensome infrastructure demands — but modern edge devices have made it accessible to everyone. It also saves time, which is a critical factor if a missing child is involved. Video compression technology has played a critical role as well. Over the years, significant advancements have been made in video coding standards — including H.263, MPEG formats, and H.264—alongside compression optimization technologies developed by IP video manufacturers to improve efficiency without sacrificing quality. The open-source AV1 codec developed by the Alliance for Open Media—a consortium including Google, Netflix, Microsoft, Amazon and others — is already the preferred decoder for cloud-based applications, and is quickly becoming the standard for video compression of all types. Read Now

  • Cost: Reactive vs. Proactive Security

    Security breaches often happen despite the availability of tools to prevent them. To combat this problem, the industry is shifting from reactive correction to proactive protection. This article will examine why so many security leaders have realized they must “lead before the breach” – not after. Read Now

  • Achieving Clear Audio

    In today’s ever-changing world of security and risk management, effective communication via an intercom and door entry communication system is a critical communication tool to keep a facility’s staff, visitors and vendors safe. Read Now

  • Beyond Apps: Access Control for Today’s Residents

    The modern resident lives in an app-saturated world. From banking to grocery delivery, fitness tracking to ridesharing, nearly every service demands another download. But when it comes to accessing the place you live, most people do not want to clutter their phone with yet another app, especially if its only purpose is to open a door. Read Now

New Products

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.