Identity theft involves the unau­tho­rized use and therefore abuse of one’s personal data. Names, addresses, telephone numbers, e-mail addresses, online access data to banking and credit card in­for­ma­tion; these are just a few examples of types of personal data that can be used against you when left unguarded. When access is gained to just a few of these afore­men­tioned items, fraud­sters - whether in the virtual world or in reality - are able to inflict con­sid­er­able financial damage on their victims. All too often this in­for­ma­tion falls into the wrong hands faster than one expects. 

How do criminals get ahold of my data?

There are different ways for a criminal to gain access to sensitive online data. A security breach cannot always be chalked up to careless security: some tricks are so well or­ches­trat­ed that even the most careful of users sometimes fall victim.

  • Hacker attacks: Accounts reg­is­tered with poorly secured passwords are easy prey for hackers, and using the same password for every account makes users es­pe­cial­ly vul­ner­a­ble targets for attacks. Hacked passwords belonging to social media profiles can be used to log in to an online store where financial data is commonly stored. Customers are powerless to protect them­selves if online retailers or other service providers have security lapses. Time and again tales of large-scale data thefts go around; most often such stories revolve around the loss of customer data, including payment data.
  • Phishing mail: This in­creas­ing­ly popular method involves employing a special type of spam mail. Re­cip­i­ents of such mail are brought via link to a forged web site, such as an online payment service, that resembles the user interface of a known business. Users who fall for this ploy and enter their customer data or log-in password are directly for­feit­ing their personal in­for­ma­tion to fraud­sters.
  • Trojans: Down­load­ing freeware or other files carries with it the risk of infecting your PC with a Trojan virus. The down­loaded-software is able to intercept sensitive data and forward them to third parties. Enclosed files from spam mails are also known to contain such malware.  
  • Social En­gi­neer­ing: The long-lost “grandson” suddenly decides to come and visit his elderly grand­par­ent and swindle the possibly demented senior out of all the money he can. This tried and true criminal tactic can also be applied online. Fraud­sters simply create a fake profile on a social media platform, and, by posing as a friend or family member, they then try to extract sensitive data or passwords through con­ver­sa­tions or messages.

The con­se­quences of identity theft

The un­pleas­ant con­se­quences of identity theft are generally financial in nature. Once criminals gain access to online profiles, banks, auction portals, etc., multiple financial in­stru­ments are at their disposal. Using the name of another person, fraud­sters can make large orders and have these shipped directly to their address. PayPal can also be used to make purchases, and in the worst scenario, victims’ entire bank accounts or credit cards can be maxed out. When a hacker is granted access to such data, it is the equiv­a­lent of a thief getting their hands on someone’s wallet: IDs, credit cards and debit cards – nothing stands in the way of their next shopping spree.

Spam in my name

Not all cyber criminals are after payment in­for­ma­tion. Mere access to e-mail accounts or other com­mu­ni­ca­tion channels, like Skype or Facebook, are enough to satisfy many of their needs. Creating a botnet is the goal of this mis­chie­vous un­der­tak­ing. By using the stolen address of millions of different users, the botnet is able to spread spam en mass, and most of the time the victims remain unaware that their computer or e-mail address has been infected until it is too late.

Cyber bullying and defama­tion

Identity theft is not always just about financial gain. Data is also often misused for the purpose of harassing others online. By hijacking a social media account, hackers are able to spread rumors or lies, thereby damaging the victim’s rep­u­ta­tion or the rep­u­ta­tion of others. Mis­lead­ing messages can be drafted, con­tro­ver­sial political views can be expressed, or malev­o­lent state­ments can be published in the name of the victim. State­ments reported as hate speech make the victim appear to be the per­pe­tra­tor, and, in serious cases, may call the attention of au­thor­i­ties. The resulting damaged rep­u­ta­tion is not limited to one’s private life; work-related con­se­quences can also arise from attacks. These types of attacks are very difficult to explain and often involve very long and drawn-out legal action.

Online shops under false names

Another type of scam has been a growing source of much frus­tra­tion over the past few months. Cyber criminals are using stolen personal data to found and register online shops. Such platforms are commonly used to sell fake mer­chan­dise. This par­tic­u­lar­ly ruthless form of identity theft puts victims at risk of being legally con­front­ed by man­u­fac­tures whose goods are being coun­ter­feit­ed. Victims should notify au­thor­i­ties as soon as they can in order to increase the chances of their name being cleared. Cases are only very rarely solved, and most of the time the per­pe­tra­tors leave behind little or no trace of their deeds.

How to prevent online identity theft

Every user can take pre­ven­ta­tive measures to ensure their data is safe:

Picking a secure password

Often the biggest security flaw are the users them­selves and one of the biggest problems is the topic of password selection. Passwords should be at least eight char­ac­ters long and should be composed of an arbitrary com­bi­na­tion of numbers, letters, and symbols. Every service should have its own in­di­vid­ual password and this should also be regularly changed. These password managers and useful tricks are helpful for managing secure passwords.

2-step ver­i­fi­ca­tion

Many online services like Google or Dropbox offer the user 2-step or two-factor ver­i­fi­ca­tion. Users can only log into their accounts after they receive a code that was sent to their mobile. Users are also able to set up the au­then­ti­ca­tion process in such a way that only allows known devices to be used for logging in. Different providers support apps that generate codes for log in. This is a simple and effective way of pre­vent­ing third parties form accessing accounts to which they possess both the username and password.

Regularly update software and devices

One common mistake that many users make is not thor­ough­ly making sure that their software has been updated. Browsers, operating systems, and es­pe­cial­ly anti-virus software should always be kept up to date. New security gaps are con­stant­ly being dis­cov­ered that can easily be filled by com­plet­ing the provided updates. Only those who regularly install these updates can benefit from such im­prove­ments.

Use public devices and networks with caution

Libraries, airports, or other highly fre­quent­ed public spaces, such cafés and restau­rants, often provide access to WiFi networks. Data traffic in these un­en­crypt­ed networks is public and can, under certain cir­cum­stances, be in­ter­cept­ed by third parties. Browser pages should always be accessed through the trans­mis­sion protocol “HTTPS”, and e-mails should only be sent under an encrypted con­nec­tion. VPN services offer ad­di­tion­al pro­tec­tion and allow data traffic to flow through an encrypted tunnel. Online banking and other sensitive trans­ac­tions should only transpire from privately owned devices, and, in order to minimize any un­nec­es­sary risk, an encrypted con­nec­tion should be used.  

Avoid data col­lec­tors

The level to which someone is an easy target for hackers depends on where and to what extent their data is exposed online. Thinking twice about every log-in and ques­tion­ing the rep­utabil­i­ty of the service provider being used is a good practice to get into. Checking the terms and con­di­tions, the data privacy policy, and site dis­claimer is a good way of spotting bad apples. Data should always be revealed with caution. Requests for sensitive data, such as bank account in­for­ma­tion, via e-mail or Facebook should raise a red flag. The same rules apply to apps, too. Users should always be aware of which data the program is trying to access. Free apps are often data col­lec­tors in disguise. A program seeking access to data that is ir­rel­e­vant to its function (for example a flash­light app re­quest­ing your contact data) is a further potential indicator of an un­trust­wor­thy service.

Rec­og­niz­ing data abuse early

It can take weeks for some in­di­vid­u­als to recognize that they have fallen prey to an online identity theft scheme. Only when mys­te­ri­ous bills, request for payment letters, or debt col­lec­tion notices begin arriving do the victims finally begin to realize what has happened. Being mindful of and quickly reacting to sus­pi­cious trans­ac­tions is the key to stopping fraud­sters before things get out of hand.

Those who fear that their name is being misused can verify their sus­pi­cions with just a few easy steps. Reg­is­ter­ing a Google Alert for your name is a good place to start. With this service, an automatic e-mail no­ti­fi­ca­tion is sent to the user anytime the name they are reg­is­tered with appears online. Google’s reverse image search further allows users to check if their photos have been un­right­ful­ly used by others.

Most often users are informed and warned in cases where customer data has been stolen from large companies. Ideally, the affected business creates a webpage where users can check to see if they are affected.

What victims of identity theft can do

All of the afore­men­tioned pre­cau­tions make it more difficult for criminals to gain unau­tho­rized access to personal in­for­ma­tion and data. 100 percent security, however, is never possible. In the case that an in­di­vid­ual becomes the victim of identity theft, it is best to react as quickly as possible. Unau­tho­rized financial trans­ac­tions are subject to grace periods by most financial in­sti­tu­tions. For this reason, it is best to adhere to the following measures:

  • reset all passwords (even the ones that are not from the affected provider)
  • inform the re­spec­tive provider of the security breach
  • freeze the accounts of the affected provider
  • inform friends and ac­quain­tances of the breach
  • check PC for viruses and Trojans 
  • keep an eye on bank trans­ac­tions
Tip

Want to make your website more secure? Learn more about SSL cer­tifi­cates from IONOS and how they increase your site’s trust­wor­thi­ness.

Go to Main Menu