As we live an increasing amount of our lives online, successfully protecting oneself from identity theft is, for lack of a better word, difficult. Difficult, but not impossible.
Why, exactly, is identity theft on the rise?
This data we blindly hand over is eminently valuable, as “it serves as the basis for obtaining credit cards, mortgages, loans, and government assistance,” Lee noted. Although many criminals use the information gathered to apply for the services themselves, others sell the details on the dark web, a murky digital underworld that requires special software to access.
What’s so disconcerting is the fact that cybercriminals needn’t be wizards to steal valuable information. As Lee explained, “offenders can obtain personally identifiable information using low-tech and high-tech methods.” The former involves techniques as simple as taking personal information out of mailboxes and garbage cans. However, he said, the sharp rise in cases of identity theft is more attributable to criminals using high-tech means “due to the ease with which individual offenders can compromise the personally identifiable information of thousands of victims at once.”
In 2023, data, very much the new oil, has never been more valuable. Hence the reason why the methods of extraction are becoming more sophisticated. At the same time, however, protection methods are still extremely primitive.
As Lee explained, “instead of targeting a specific person and their sensitive data,” hackers target major institutions that “have hundreds of thousands, if not millions, of sensitive documents and files that can be easily monetized in some way.” Mass data breaches, Lee warned, have become increasingly common over the past decade.
Who’s responsible for these attacks?
Lee told me that, when exploring potential offenders based on geographic location, “recent reports point to Russia and China as two of the biggest cybersecurity threats to America.” One of the major reasons why, he noted, involves “the lack of extradition agreements between the United States and both Russia and China,” which allows offenders “to conduct their illicit operations within geographic safe havens.”
Protecting Yourself
Rather alarmingly, people still fall for the “Nigerian Prince” scam, which involves an individual receiving an unsolicited email from someone pretending to be a foreign dignitary or high-level executive. The elderly are particularly at risk.“Since numerous instances of identity theft are a result of interacting with socially engineered emails where offenders claim to be legitimate retailers, banks and financial providers, or delivery services,” Lee said, “it would be wise for consumers to be cautious about accepting what they see in online messages at face value.”
One thing that individuals can do to keep themselves safe from fraudulent emails, he suggested, is to look “for signs of foul play.” This, at first, may appear challenging simply because offenders regularly use the same logos and symbols used by legitimate vendors. They also tend to stress that the issue (or issues) raised in the email is time-sensitive. An urgent response, the recipient is told, is of prime importance.
People should always carefully read and scrutinize emails before interacting with them. For example, Lee said, “a fraudulent email from FedEx may contain a subject line/title comprised of a collection of nonsensical numbers (such as ‘No. 17283’) or include language that emphasizes a time-sensitive matter (such as ‘URGENT: PERSONAL INFORMATION WAS SENT TO YOU’).”
Moreover, the email address may also be hosted on a public email domain, such as Gmail or Yahoo. As obvious as it sounds, legitimate organizations will never send emails using public email domains. Large organizations, Lee stressed, “tend to have their corporate name within the email domain itself (for example, @paypal.com), so even if their legitimate corporate name is listed in the front end of the email address, it is good practice to check if their domain name has it as well.”
Another aspect worth analyzing is the quality of writing. Spelling and grammar mistakes in emails are instant red flags that you, the reader, can identify rather quickly. Moreover, fraudulent emails often address recipients using generic terms, such as “Dear Customer” and “Dear Friend.”
Finally, when it comes to your personal data, try your very best to keep as much of it offline as possible. Again, try not to outsource your information to Big Tech companies if possible. You can request that your social media platform, health care provider, bank, university, and so forth never, under any circumstances, share your information with a third party without your explicit consent.
Although it’s becoming increasingly difficult to protect ourselves in these digitally infused times, exercising vigilance may prove to be the difference between being safe and becoming just another hapless victim of identity theft.