Download presentation
Presentation is loading. Please wait.
Published bySabrina Patterson Modified over 9 years ago
1
Protecting Your Identity © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering
2
More than 50% of employers now use social media to screen candidates Why Protect Your Public Persona Why Protect Your Private Data Identity theft: Predators borrow money in your name Malware uses your personal data to attack your friends Most identity theft from 18-29 year olds
3
Malware steals your data and makes your devices slow or non-functioning Criminals attack others from your devices More than 30% of devices are compromised, but most attacks can be prevented with simple measures Why Protect Devices and Software
4
Assume digital data are "forever" Assume digital data are public How to Protect Your Privacy
5
Don’t reveal personal information Don't share name and address Be skeptical Review and adjust privacy settings when creating an account Beware default settings Remember posts are permanent and public Safety on Social Sites
6
Use strong passwords: mix cases, numbers, and symbols use many characters, not just words Use different passwords on different systems Memorable doesn't have to be easy to guess. E.g., use mnemonic passphrases: Nd!2singsonGs (No doubt! to sing songs) Good Passwords
7
Never send or use password "in the clear," i.e., unencrypted Don't share passwords Don't store passwords in the browser Look away when someone types a password Respect Passwords
8
Read your bank statement Check your credit report annually annualcreditreport.com but beware spoofs of that address Monitor for Identity Theft
9
Use credit card rather than debit card Use a secondary email for public use Safe Shopping
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.