Tips: Protect Your Identity While Holiday Shopping Online

Online holiday sales are projected to increase 21 percent in 2007, according to Forrester Research. But while consumers continue to increase their use of holiday shopping, there is also widespread fear that they will be the victims of identity theft. That's why Huntington Bank has developed 10 tips that shoppers can follow to make for a safe and secure holiday season whether consumers are celebrating Christmas, Hanukkah or Kwanzaa.

"At Huntington we understand how time-starved our customers are and how convenient online shopping can be," said Timothy J. Scholten, senior vice president responsible for Huntington's online banking. "Huntington's online banking site continues to be one of the top 10 sites in the country. We want to share our expertise with shoppers to give them peace of mind about their online transactions."

1. Check your accounts daily for any activity you did not initiate. This is especially needed during the busy holiday shopping season. You should be able to log on quickly and check to see if there is any unusual activity in your bank or credit card account that you did not initiate. If there is, contact your bank immediately.

2. Do business with companies you know and trust. Research a company before revealing personal or financial information online. Confirm an online seller's physical address and phone number in case you need to get in touch with them. If you get an email or pop-up message from the seller while you're browsing that asks for financial information, don't reply or click on the link in the message. Legitimate companies don't ask for this information via e-mail or pop-ups.

3. Watch out for fake "look-alike" sites. Some con artists disguise their Web site as a well-known company's site. Check your browser's address bar to make sure you're always using the correct Web site address. If the Web site seems suspicious, leave it immediately and call the company.

4. Check a company's privacy policy before doing business with it. A company should allow you to know what personal information its Web site is collecting, why and how it will be used. If you can't find a privacy policy -- or if you can't understand it -- consider taking your business to another site that's more security-conscious and accommodating to customers.

5. Only provide personal information if you're on a secure Web site. Once you are logged in, make sure the Web address starts with "https" ("s" means it's secure). For added safety, check for a site certificate before submitting information on a secure page. Confirm the owner of the certificate by clicking on the padlock icon at the bottom of most browsers. You should see the owner listed as well as the site address. This address should match the Web site address at the top of the page; if they do not match, you may be at a fraudulent Web site and should not enter personal data.

6. Never respond to emails asking you to "confirm" recent transactions after you shop. These likely are "phishing" scams sent to lure private information from you.

7. Maintain a paper trail. Print and save records of your online transactions, including the product description and price, the online confirmation/receipt, and copies of any e-mail(s) you exchange with the seller.

8. Do not share your passwords with anyone and never provide your Social Security number, birth date, or mother's maiden name in an e-mail.

9. Make sure all of your security software is up-to-date before you do your online shopping. That includes anti-virus software, anti-spyware and firewalls.

10. Use a separate e-mail account for your online shopping. You can set up a free e-mail account online through several different services.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Featured Cybersecurity

Webinars

New Products

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3