Protecting Your Identity © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering
More than 50% of employers now use social media to screen candidates Why Protect Your Public Persona Why Protect Your Private Data Identity theft: Predators borrow money in your name Malware uses your personal data to attack your friends Most identity theft from year olds
Malware steals your data and makes your devices slow or non-functioning Criminals attack others from your devices More than 30% of devices are compromised, but most attacks can be prevented with simple measures Why Protect Devices and Software
Assume digital data are "forever" Assume digital data are public How to Protect Your Privacy
Don’t reveal personal information Don't share name and address Be skeptical Review and adjust privacy settings when creating an account Beware default settings Remember posts are permanent and public Safety on Social Sites
Use strong passwords: mix cases, numbers, and symbols use many characters, not just words Use different passwords on different systems Memorable doesn't have to be easy to guess. E.g., use mnemonic passphrases: Nd!2singsonGs (No doubt! to sing songs) Good Passwords
Never send or use password "in the clear," i.e., unencrypted Don't share passwords Don't store passwords in the browser Look away when someone types a password Respect Passwords
Read your bank statement Check your credit report annually annualcreditreport.com but beware spoofs of that address Monitor for Identity Theft
Use credit card rather than debit card Use a secondary for public use Safe Shopping