Identity thieves are nothing if not creative; they can take the most seemingly innocent item and turn it into the keys to unlocking your financial fortress. The more technology encroaches into our daily lives, the more access we give them to our personal information. (There are many different ways to be victimized through home ownership - learn how to identify and avoid these crimes. Check out Mortgage Fraud: Understanding And Avoiding It.)
TUTORIAL: Retirement Planning

Social Networks
Exactly how much information do you share on social networks? When you complete your profile or account information for a social networking site, they ask for personal information such as your date of birth, address, phone number and even your hometown or place of birth. While giving all of this information to a social networking site might enhance your ability to connect with other users, it also puts very important information out for potential thieves to use. Make their job harder by leaving these sections blank.

And it's not just about the information you give in your profile - you also need to consider what you say within your profile. For example, many financial websites like to use your mother's maiden name as a failsafe for identifying you when you log on or forget your password. But what happens if you happen to mention your mother's maiden name in a social network status update? Don't just watch what you put in your profile, watch what you mention in passing too - potential identity thieves certainly will.

Unsecured Websites
When you input information onto a website and submit it - let's say to the seller of an item in an online store - the data that you enter into the required fields must be transmitted to the receiving company. In between your computer (the data entry point) and the final recipient's, the data can be redirected to an identity thief unless the website is secured against such an action.

It's easy to tell the difference between a secured and unsecured website when you are entering personal information or credit card numbers into a site. The first is to look at the websites address in your address bar. A site that begins with, "HTTP://WWW" is not secure. When you see an "S" after HTTP (as in, HTTPS://WWW) then you know the site is secure.

Another way to find out if you are entering data into a secured site is to look at the bottom right or left side of your browser for a little padlock icon. This icon also indicates that the website transmission is secure. (Follow this sound advice and plan for a comfortable future. See 10 Tips For Achieving Financial Security.)

Cell Phones
As phones get "smarter", we leave more and more important information on them that enables thieves to easily steal our private financial data when we sell or donate old phones after an upgrade. If you use your phone to log in to your bank, billing or social networking accounts, then you need to erase any stored data before you let your cell phone leave your possession.

Potential Fraud
We've all heard the horror story of identity theft and how thieves have hacked into bank accounts and credit cards - or opened new bank accounts and credit cards in the names of those they've stolen from. But there are other ways in which thieves can apply your identity and steal from your good name, and that includes utilities fraud.

Utilities fraud involves the creation of utility company accounts in the name of the victim. This could include power, cable and other accounts. This type of fraud may not show up when you monitor your credit report, and you may not get bills for the service alerting you of the problem, so it is important to guard your information carefully in order to avoid becoming a victim.

The Bottom Line
One of the most important (and most basic) things you can protect is your identity. Because not only does this bleed into your financial life and situation, it also affects your reputation, credit report and ability to get certain employment positions. Take the necessary steps to fend off identity thieves before they get your information in their sites. (Make sure there are no errors holding you back from obtaining a loan. Check out Check Your Credit Report.)

Related Articles
  1. Economics

    Detecting Financial Statement Fraud

    Fraudulent financial statements account for about 10% of the white-collar crime incidents reported each year.
  2. Taxes

    5 Ways to Avoid Identity Fraud

    Identity theft was the number one consumer complaint in 2014. Here are some ways you can protect yourself.
  3. Credit & Loans

    How to Recover From Identity Theft

    Identity theft isn't going away, and fixing it can take time and money. But doing nothing isn't an option. Rather than become a victim, it is time to take action.
  4. Investing News

    This is the Fastest-Growing Consumer Complaint

    There’s no way to guarantee that your Social Security number won’t fall into the wrong hands. Here are some ways to make yourself less of a target.
  5. Professionals

    Prevent Employees From Hacking You Computer System

    Cyber security attacks from a current or ex-employee can cause a lot of pain. Here is how to avoid such attacks.
  6. Credit & Loans

    Are You A Target For Identity Thieves?

    The Americans at highest risk for identity theft and identity fraud aren't the ones you most expect. See if you're on the high-risk list.
  7. Credit & Loans

    Avoid Becoming An Identity Thief's Next Victim

    Use these 7 techniques to keep yourself under the radar and out of the way of identity thieves.
  8. Personal Finance

    Consumer Protection Laws You Need To Know

    Knowing these which consumer protection law can help you in particular situations can save you time, money and stress.
  9. Insurance

    Credit Scams To Watch Out For

    More than 30 million people were victims of fraud in 2007. Will you be next?
  10. Insurance

    What You Need To Know About Insurance Fraud

    Insurance fraud is as old as commerce. Discover the types of life insurance fraud and how they affect you.
  1. How should a whistleblower report unlawful or unethical behavior?

    Whistleblowing takes many forms. A whistleblower could expose government corruption, expose unethical business behavior or ... Read Full Answer >>
  2. How do insurance companies use a whistleblower?

    Fraudulent claims are among the most prevalent and serious business risks that insurance companies face. Many consumers have ... Read Full Answer >>
  3. What were the primary financial crimes involved in the ZZZZ Best case?

    ZZZZ Best was a company started by Barry Jay Minkow that claimed to be a carpet cleaning business. In fact, it was a Ponzi ... Read Full Answer >>
  4. Does identity theft or credit card fraud also occur with cash-on-delivery?

    While cash on delivery (COD) is a system intended to typically reduce risk and fraud, as with any type of financial transaction ... Read Full Answer >>
  5. What is the difference between an in-store and an online payday loan?

    There are several differences between in-store and online payday loans. They include: Interaction between borrower and lender. When ... Read Full Answer >>
  6. What are the most common scams regarding Social Security benefits?

    There are a number of common scams that target Social Security benefits. These scams generally involve criminals who impersonate ... Read Full Answer >>
Hot Definitions
  1. Presidential Election Cycle (Theory)

    A theory developed by Yale Hirsch that states that U.S. stock markets are weakest in the year following the election of a ...
  2. Super Bowl Indicator

    An indicator based on the belief that a Super Bowl win for a team from the old AFL (AFC division) foretells a decline in ...
  3. Flight To Quality

    The action of investors moving their capital away from riskier investments to the safest possible investment vehicles. This ...
  4. Discouraged Worker

    A person who is eligible for employment and is able to work, but is currently unemployed and has not attempted to find employment ...
  5. Ponzimonium

    After Bernard Madoff's $65 billion Ponzi scheme was revealed, many new (smaller-scale) Ponzi schemers became exposed. Ponzimonium ...
  6. Quarterly Earnings Report

    A quarterly filing made by public companies to report their performance. Included in earnings reports are items such as net ...
Trading Center