Photo Credit: Got Credit, licensed under Creative Commons
Definition of Fraud:
Source: Merriam-Webster Dictionary
Definition of Identity Theft:
Source: Oxford Dictionaries
Definition of a Scam:
Sources: Oxford Dictionaries and Merriam-Webster Dictionary
Identity theft can be the result of fraudulent scams, malicious hacking, failure to secure personal information, or other online or physical activities. According to the Royal Canadian Mounted Police (RCMP):
"Identity theft refers to the preparatory stage of acquiring and collecting someone else' personal information for criminal purposes."
Source: Identity Theft and Identity Fraud
This act is illegal according to the Criminal Code of Canada. Identity theaves typicall look for the following information to steal funds, aquire fake passports/government benefits, or facilitate terrorist activites:
Source: RCMP Identity Theft and Identity Fraud
What do I do if I suspect identity theft or fraud?
Tips to Help Prevent Identity Theft:
Monitor your financial statements (bank account, phone bill, credit card, etc.)
What is data encryption?
Source:
Data encryption. (2015). In Encyclopædia Britannica. Retrieved from http://school.eb.com/levels/high/article/2217
Encryption is an effective method for securing your data, wheather it be on your phone, laptop, USB, external hard drive, cloud storage, or elsewhere; encryption exists for both hardware and software. Through encryption you are able to 'lock' your data, including things like your web/network traffic, file downloads, photos, contacts, phone numbers, and any other data that you can think of. Your data is scrambled so that only the authorized user, who has the encryption key, is able to access it (decrypt it) and view it.
To learn more about the key terms and general process of encryption please read the What is Encryption? article by The Electronic Frontier Foundation below.
Why you should consider encrypting your data:
Learn how to encrypt your data:
Source: The Government of Canada, Canada's Anti-Spam Legislation
Create Strong Passwords by:
Example: Weak Username & Password
Example: Strong Username & Password
Tips for Managing your Passwords:
Source of Images: Pixabay.com, licenced under Creative Commons
How could your cell get hacked?
Source of Image: Pixabay.com, licensed under Creative Commons
Tips for Keeping your Cell Secure:
Anonymous web browsing effectively enables a person to avoid online web trackers, which collect your personal data primarily through cookies. Read more about web trackers and datamining under Avoid Online Threats.
Delete Cookies:
One of the key ways that your personal information is collected when surfing the web is through cookies. Cookies are essentially small pieces of code stored on your machine that identify you and your habits to the websites that you visit. Cookies can be managed through your browser settings, as well as through other methods.
See the below links to get help deleting cookies from your web browser.