• Latest
  • All
  • How To
Security

6 Ways to Prevent Identity Theft

March 21, 2024
Why Can'y You Register a Safaricom SIM Card After 7 PM

Why You Cannot Register a Safaricom SIM Card After 7 PM

July 10, 2025
Former Safaricom Chief Enterprise Business Officer, Cynthia Karuri-Kropac

Frankline Okata Takes Over as Cynthia Karuri-Kropac Exits Safaricom PLC

July 10, 2025
AI

OpenAI and Perplexity Launch Browsers to Rival Google Chrome

July 10, 2025
Vivo-Y29-4G

Vivo Y29 Launches in Kenya at KES 23,999

July 10, 2025
DHgate Tablet Cases deals
galaxy z fold7-galaxy z flip7-samsung

Samsung Unveils Galaxy Z Fold7 and Z Flip7 with Bigger Screens

July 10, 2025
GTA VI

Rockstar May Be Testing 96-Player Servers for GTA 6

July 10, 2025
Former X CEO, Linda Yaccarino

Linda Yaccarino Steps Down as CEO of X After Two Years

July 9, 2025
Apple-WWDC25-iOS-26

iPhone Users Are Not Too Happy With the iOS 26 Liquid Glass Design

July 9, 2025
Official document handover by Bernard Mwonyonyo and Habib Lukaya from Roam.

E-Mobility in Kenya Gets a Lift with New Bike Financing Program

July 9, 2025
Samsung

This Samsung Security Update Could Change How You Use Your Phone

July 9, 2025
tecno ultimate g fold concept

TECNO Joins Tri-Fold Race With Ultimate G Fold Concept Phone

July 10, 2025
Microsoft Edge browser

Microsoft Makes Edge 40% Faster in a Bid to Lure Chrome Users

July 8, 2025
Techweez | Tech News, Reviews, Deals, Tips and How To
  • News
  • Entertainment
  • Reviews
  • Features
  • Editorial
No Result
View All Result
Techweez | Tech News, Reviews, Deals, Tips and How To
  • News
  • Entertainment
  • Reviews
  • Features
  • Editorial
No Result
View All Result
Techweez | Tech News, Reviews, Deals, Tips and How To
No Result
View All Result

6 Ways to Prevent Identity Theft

Samuel K Itotia by Samuel K Itotia
March 21, 2024
in How To
Reading Time: 4 mins read
253
0
Security

Identity is, without doubt, an essential thing for any individual, and taking into account the mechanisms of the modern world, it has become even more critical. With millions of identity theft cases being witnessed and reported in the US alone every year, it has become ever more important to take measures to protect your identity. Keep in mind that if you lose your identity, you will lose your most valuable possession, and that is ‘you.’ Here are some steps you should follow to prevent identity theft:

1 – Password Security

Over the last couple of decades, passwords have become a significant part of our lives, and we use them for various purposes. One of the primary reasons behind the increasing number of identity theft cases is that the majority of people adopt a lackluster approach when it comes to password security. If someone gets access to any of your online accounts or your computer because you do not have a strong password, you are definitely at significant risk of losing your identity. Like most people, you are likely to have extremely sensitive information in such accounts.

We highly recommend creating and maintaining strong passwords; do not opt for guessable or easy passwords. Make sure your passwords are a mixture of numbers, symbols, capital, and small letters. On top of that, you should change your passwords after every three to four months and must not use the same passwords for multiple accounts. You should also password-protect your cell phone and not share your passwords or pins, even with your family or friends.

The UK’s IT support provider, Mustard IT, has also shared some good password practices, reminding users to create strong passwords to ensure adequate protection of their online accounts. We can summarize generally accepted password practices into the following points:

  1. Never check the “Keep Me Logged In” option while using public computers.
  2. Use strong passwords with a mix of letters, numbers, and punctuation marks.
  3. Lengthy but easy-to-remember code is an effective tool to make your password least guessable. Using phrases as passkeys that hold a meaning for you is also a strong password.
  4. Don’t stick with one password for a more extended period.
  5. Never repeat the same password for different accounts, i.e., bank account, email, or social networking accounts.
  6. Flush out your browser cookies and cache regularly.

It is a consideration for all business managers, with employees handling the company’s business and social media accounts. If they adopt good password practices, they can help themselves by securing their accounts against hackers who usually exploit our malpractices to sneak into our accounts.

2 – Avoid Giving Sensitive Information on the Phone

Nowadays, most people receive dozens of telemarketing calls every day, and some of us have a habit of buying things over the phone. In any case, we advise you not to give sensitive information such as social security numbers, credit card numbers, or bank account information on your phone, as it may lead to identity theft.

3 – Mail Outgoing Bills from the Post Office

Instead of using a mailbox for outgoing mail, especially to financial institutions or mail that carry important data, we guide people to use the post office or a secure US Postal Service dropbox. Criminals use mailboxes for hunting for identities.

4 – Tear up Expired Credit Cards

If any of your credit or debit card has expired, you should cut them into pieces before throwing them away. You can expect anything from thieves as they may even go through the garbage to steal someone’s identity.

5 – Check Your Credit Report & Bank Statements Regularly

In order to check for fraudulent accounts and other information, you should obtain your credit report regularly to be on the safer side. If you witness errors on the credit report, you must report those errors to the credit bureau immediately in order to avoid any future hassle. Most people tend to ignore the bank statements they receive every month. We suggest you carefully review the statements you receive from your creditors. It will help you a great deal in avoiding identity theft.

6 – Beware of Phishing ScamsPhishing scams are one of the most typical techniques thieves adopt to steal the identity of innocent people. Therefore, you must not click on links given in random emails. Remember that if you have never participated in a lottery or competition, you can never win it. Therefore, you should avoid all these fake emails because they aim to steal your personal information.

SendShare146Tweet92
Samuel K Itotia

Samuel K Itotia

IT Project Consultant, Bachelor of Computer Science holder, Microsoft Certified IT Professional. Certified Google Apps Cloud Deployment specialist and Trainer. Passionate on the new trends of Technology. He will always share it with the world.

Related Posts

Why Can'y You Register a Safaricom SIM Card After 7 PM

Why You Cannot Register a Safaricom SIM Card After 7 PM

July 10, 2025
Former Safaricom Chief Enterprise Business Officer, Cynthia Karuri-Kropac

Frankline Okata Takes Over as Cynthia Karuri-Kropac Exits Safaricom PLC

July 10, 2025
AI

OpenAI and Perplexity Launch Browsers to Rival Google Chrome

July 10, 2025
Vivo-Y29-4G

Vivo Y29 Launches in Kenya at KES 23,999

July 10, 2025
galaxy z fold7-galaxy z flip7-samsung

Samsung Unveils Galaxy Z Fold7 and Z Flip7 with Bigger Screens

July 10, 2025
GTA VI

Rockstar May Be Testing 96-Player Servers for GTA 6

July 10, 2025

Latest

Why Can'y You Register a Safaricom SIM Card After 7 PM

Why You Cannot Register a Safaricom SIM Card After 7 PM

July 10, 2025
Former Safaricom Chief Enterprise Business Officer, Cynthia Karuri-Kropac

Frankline Okata Takes Over as Cynthia Karuri-Kropac Exits Safaricom PLC

July 10, 2025
AI

OpenAI and Perplexity Launch Browsers to Rival Google Chrome

July 10, 2025
Vivo-Y29-4G

Vivo Y29 Launches in Kenya at KES 23,999

July 10, 2025
galaxy z fold7-galaxy z flip7-samsung

Samsung Unveils Galaxy Z Fold7 and Z Flip7 with Bigger Screens

July 10, 2025
GTA VI

Rockstar May Be Testing 96-Player Servers for GTA 6

July 10, 2025

Best devices

budget smartwatches 2025

Best Budget Smartwatches To Buy in Kenya 2025

February 13, 2025

Best Infinix Smartphones To Buy in Kenya 2024

February 13, 2025

Best Laptops for Battery Life in 2024

August 21, 2024

Best “Battery Warrior” Smartphones To Buy in 2024

August 22, 2024

Why You Cannot Register a Safaricom SIM Card After 7 PM

July 10, 2025

Frankline Okata Takes Over as Cynthia Karuri-Kropac Exits Safaricom PLC

July 10, 2025

Techweez is a fast growing influential source of technology news, reviews and analysis by leading tech geeks in the industry.

Follow Us

Editorials

Abductions and Arrests! Kenyan Government’s Fear and Hate of X Users Makes No Sense

Actors and Film Crews Are Worried About Veo 3 Taking Their Jobs

Samsung QLED TVs Now Officially Certified for Real Quantum Dot Technology

Trump’s Tariffs Will Be the End of Affordable Tech

5 Ways to Prep Your Tech for Resale

The Weaponization of PDFs: How Cybercriminals Are Exploiting a Trusted Format

More News

Linda Yaccarino Steps Down as CEO of X After Two Years

iPhone Users Are Not Too Happy With the iOS 26 Liquid Glass Design

E-Mobility in Kenya Gets a Lift with New Bike Financing Program

This Samsung Security Update Could Change How You Use Your Phone

TECNO Joins Tri-Fold Race With Ultimate G Fold Concept Phone

Microsoft Makes Edge 40% Faster in a Bid to Lure Chrome Users

  • Terms Of Use
  • Techweez Brand
  • Privacy & Policy
  • Contact Us

© 2024 Techweez - Palahala Media Group may earn a commission when you buy through links on our sites.
A Palahala Media Group Brand. All rights reserved.
.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

Techweez | Tech News, Reviews, Deals, Tips and How To
Crunchy Cookies 🍪 Ahead!

Hey there! Just a heads-up: we're big fans of cookies - both the digital and edible kind! 🍪 We use our cookies and some from third parties to ensure your browsing experience on our site is smooth sailing and secure.

 

But wait, there's more! We also use cookies to gather stats and insights on how you navigate our site. It's like getting a behind-the-scenes peek at your digital adventures!

 

Don't worry, you're in control. You can adjust your cookie settings anytime to suit your preferences. Feeling curious? Dive into our Privacy Policy for all the juicy details. Happy browsing! 🚀

Functional Always active
Listen, this legal stuff is about as exciting as watching paint dry. But it basically says we only use your stuff for what you asked us to do, and nobody else gets to peek!
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
It's those sneaky cookie crumbs websites leave behind to count visitors, like counting ants at a picnic! Totally harmless, just for fun facts. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
Hey there! Just letting you know we use some fancy gizmos to remember your preferences. This way, we can show you ads that are, well, not completely bananas.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Make cookies
{title} {title} {title}
Techweez | Tech News, Reviews, Deals, Tips and How To
Crunchy Cookies 🍪 Ahead!
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
Listen, this legal stuff is about as exciting as watching paint dry. But it basically says we only use your stuff for what you asked us to do, and nobody else gets to peek!
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
It's those sneaky cookie crumbs websites leave behind to count visitors, like counting ants at a picnic! Totally harmless, just for fun facts. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
Hey there! Just letting you know we use some fancy gizmos to remember your preferences. This way, we can show you ads that are, well, not completely bananas.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Make cookies
{title} {title} {title}
No Result
View All Result
  • News
  • Reviews
  • Features
  • Editorial
  • Automotive
  • Entertainment

© 2024 Techweez - Palahala Media Group may earn a commission when you buy through links on our sites.
A Palahala Media Group Brand. All rights reserved.
.