This website uses cookies to ensure you get the best experience. More info

How to Avoid Online Identity Theft: 12 Tips From Information Security Experts

How to Avoid Online Identity Theft

“The average American Internet user faces serious vulnerability to identity theft 4-5 times each day,” says Jen Martinson of internet security company Secure Thoughts.

With so many important interactions and transactions moving into an online forum, identity thieves are making the Internet their hunting ground. In the midst of all of this virtual interaction it’s easy to lose sight of the fact that there are strangers lurking behind the codes on the other side. Greg Scott of Infrasupport Corporation sees many people lulled into a false sense of security online.

“All the devices we have today—phones, tablets, computers—interact with the world, somehow,” Scott explains. “So with every interaction, no matter from what device, think about how a bad guy can use it to steal from you and guard yourself accordingly.”

We polled IT security experts to identify some tips and tricks to help you avoid online identity theft.

1. Lock down your social media

“Criminals don't need you to click on links in order to steal your identity,” says Ashley Schwartau of the Security Awareness Company. “There's plenty of information on many of our social network profiles they could use to answer security questions and guess their way into your financial accounts.”

"Criminals don't need you to click on links in order to steal your identity."

Schwartau warns social media users to steer clear of sharing common security information, including your mother’s maiden name, birthday and home address. She also advises regular privacy setting checks to ensure you aren’t sharing information accessible to everyone. Don’t accept friend requests from unknown individuals and never post a photo of a credit card, driver’s license or paycheck.

2. Take advantage of security software

It’s always a smart idea to add antivirus software to your web browser, according to Roberto Rodriguez of Human Firewalls. Many devices come with firewalls and other useful security measures, but if users disable or neglect to update protection on their computers, they make themselves vulnerable.

Scott urges users to consistently update computers and phones when updates become available. Cybercriminals detect security vulnerabilities often and software vendors react accordingly. If your device is prompting you to install a software update, there’s probably a reason for it!

3. Password like a pro

“Do not make the same mistake as 80 percent of Americans and use the same password for everything,” Martinson warns. She recommends creating unique passwords for each account and never incorporating generic information like a birthday or a pet’s name.

(Check out our Safe Password Checklist to see how your password habits rate!)

4. Limit online shopping to secure websites

Many financial transactions are taking place online these days, opening the door to virtual pickpocketing. Shopping on an unprotected website leaves your credit card information vulnerable to interception by cybercriminals. Martinson suggests looking for the padlock symbol next to your URL before making any transactions, which signifies that the site is secure.

5. Treat your inbox like a knock on your front door

“Most online identity theft occurs when victims are lured into clicking on links or downloading attachments in emails, text messages or on social media,” says Steven Weisman, lawyer, professor and author of Identity Theft Alert. In the same way anyone could walk up to your front door and ring the bell, anyone could be behind the emails entering your inbox. Use discretion when opening links sent in emails.

6. Check the website URL

Weisman says you should never send enter personal information to a website unless the URL begins with ‘https’ rather than just ‘http.’ The extra letter signifies that the data you are sending is encrypted, making it more difficult to intercept on its journey.

7. Beware of public & free Wi-Fi

“Just because you can connect to the internet doesn't mean your connection is secure,” Martinson says. She says the public Wi-Fi networks offered in hotels or coffee shops have become easy targets for identity thieves.

"Just because you can connect to the Internet, doesn't mean your connection is secure."

Because the networks are largely open, any information you send is at risk of ending up in the wrong hands. The especially-clever hackers can even use a shared network to access information stored on your device. While this doesn’t mean you should shun public Wi-Fi, it does mean that you shouldn’t do you online banking at Starbucks.

8. Think before you click

Most of the time malicious viruses are deployed upon clicking a link, pop up box or attachment, says Scott. It might be flashing or noisy, but take a second to think before reacting and clicking. Rodriguez suggest hovering over any links you’re skeptical about. This will allow you to see where the link is connecting to so you can determine if that’s a place you really want to go.

9. Check your credit card statements & credit reports

Good old fashioned financial awareness can also help protect you from online identity theft. Schwartau suggests keeping a close eye on your accounts regularly so you can act swiftly on any incongruities.

10. Beware of free apps

Sometimes the word free encourages us to let our guard down when it comes to apps and software. Weisman urges app users to verify the legitimacy of free apps before downloading, as they may come infected with malware.

11. Don’t forget about your kids

The unfortunate truth is that children are not immune to online identity theft. Cybercriminals can commit fraud or rack up debt under an adolescent’s name and it may not be detected until they turn 18, says Schwartau. She suggests calling your credit reporting agencies to freeze your child’s credit files.

12. Don’t drop your guard for tech help

Even reaching out for tech support, to get system advice or to fix a problem can be an opportunity for online identity theft. Scott describes a scenario that’s becoming increasingly popular among cybercriminals.

“The idea is, you submit a help question to a community chat service and maybe an answer comes back to call a tech support phone number. You call the toll free number and the person on the other end of the phone convinces you to give him remote access into your device. Game over. They now have access to everything you have inside that device.” Scott’s advice is to stay vigilant with your identity and device information—no matter who you’re dealing with.

Better safe than sorry

Now you have some expert tips and tricks to help you avoid falling victim to online identity theft. With so many important conversations and transactions happening online, you can never be too safe. Check out our Tech Tutorial Series for some helpful how-to video demonstrations on how to stay safe online.

Want to help combat the cybercriminals these tips are protecting you from? Learn about careers in information security!

Brianna Flavin

Brianna is a content writer for Collegis Education who writes student focused articles on behalf of Rasmussen College. She earned her MFA in poetry and teaches as an adjunct English instructor. She loves to write, teach and talk about the power of effective communication.

female writer

Related Content

This piece of ad content was created by Rasmussen College to support its educational programs. Rasmussen College may not prepare students for all positions featured within this content. Please visit for a list of programs offered. External links provided on are for reference only. Rasmussen College does not guarantee, approve, control, or specifically endorse the information or products available on websites linked to, and is not endorsed by website owners, authors and/or organizations referenced. Rasmussen College is a regionally accredited private college.

logo-accreditation-acen logo-accreditation-ccne chart-credential-laddering-healthcare-management 0 Credits 90 Credits 180 Credits 48 Credits Start Here HIGH SCHOOL GRADS Start Here TRANSFER STUDENTS Start Here SECOND DEGREE PURSUERS End Here ASSOCIATE’S DEGREE Start Here MASTER’S DEGREE PURSUERS End Here BACHELOR’S DEGREE End Here MASTER’S DEGREE chart-credential-laddering-rsb 0 Credits Start Here HIGH SCHOOL GRADS Start Here TRANSFER STUDENTS 90 Credits Start Here SECOND DEGREE PURSUERS End Here ASSOCIATE'S DEGREE 180 Credits End Here BACHELOR'S DEGREE chart-credential-laddering-rsd 0 Credits Start Here HIGH SCHOOL GRADS Start Here TRANSFER STUDENTS 91 Credits Start Here SECOND DEGREE PURSUERS End Here ASSOCIATE'S DEGREE 181 Credits End Here BACHELOR'S DEGREE chart-credential-laddering-rsjs 0 Credits Start Here HIGH SCHOOL GRADS Start Here TRANSFER STUDENTS 91 Credits Start Here SECOND DEGREE PURSUERS End Here ASSOCIATE'S DEGREE 180 Credits End Here BACHELOR'S DEGREE chart-credential-laddering-rsn 0 Credits Start Here HIGH SCHOOL GRADS Start Here TRANSFER STUDENTS 91 Credits Start Here SECOND DEGREE PURSUERS End Here ASSOCIATE'S DEGREE 181 Credits End Here BACHELOR'S DEGREE icon-colored-outline-bank icon-colored-outline-certificate icon-colored-outline-circle-dollar-sign icon-colored-outline-folder-search icon-colored-outline-hand-heart icon-colored-outline-head-blocks icon-colored-outline-head-cog icon-colored-outline-head-heart icon-colored-outline-health-plus-leaves icon-colored-outline-hospital icon-colored-outline-light-bulb-analytics icon-colored-outline-magnifying-glass icon-colored-outline-monitor-healthcare icon-colored-outline-monitor-paper-search icon-colored-outline-nurse-rays icon-colored-outline-padlock-shield icon-colored-advance icon-colored-arrows-cross-curve icon-colored-build icon-colored-bulb-analytics icon-colored-certificate icon-colored-continual-developement icon-colored-folder-mortarboard icon-colored-globe-pen icon-colored-growth icon-colored-hand-bubble icon-colored-head-blocks icon-colored-head-cog icon-colored-laptop-cbe-skyscraper icon-colored-laptop-webpage icon-colored-location-pin icon-colored-monitor-paper-scan icon-colored-national icon-colored-person-whiteboard icon-colored-police-light icon-colored-prep icon-colored-presenter icon-colored-regional icon-colored-save-time icon-colored-skyscraper icon-colored-state icon-colored-student-centered icon-colored-support icon-colored-world-experience icon-camera icon-filter icon-info-circle icon-mail-forward icon-play-solid icon-quote-mark-left icon-quote-mark-right icon-share-square-o icon-spinner icon-tag ras-logo-flame ras-logo-horizontal ras-logo-stacked icon-bank icon-general-chart icon-general-connect icon-general-degree icon-general-discuss icon-general-email icon-general-find icon-general-hat icon-general-heart icon-general-laptop-building icon-general-laptop icon-general-leader icon-general-map icon-general-money icon-general-paperwork icon-general-people icon-general-phone icon-general-speak-out icon-head-heart icon-mglass icon-scales icon-simple-chat icon-simple-desktop icon-simple-find icon-simple-hamburger icon-simple-phone icon-testimonial-quotes icon-social-facebook-square-colored icon-social-facebook-square icon-social-facebook icon-social-google-plus-square icon-social-google-plus icon-social-instagram icon-social-linkedin-square-colored icon-social-linkedin-square icon-social-linkedin icon-social-pinterest-p icon-social-twitter-square icon-social-twitter icon-social-youtube-play-colored icon-social-youtube-play icon-util-checkbox-white icon-util-checkbox icon-util-checked-white icon-util-checked icon-util-chevron-down icon-util-chevron-left icon-util-chevron-right icon-util-chevron-up icon-util-language-switch icon-util-loading icon-util-open-window-button icon-util-open-window-link icon-util-pdf-button icon-util-pdf-link icon-util-refresh icon-util-x