Sponsor Robert Siciliano as he runs the Boston Marathon for Miles for Miracles, Children's Hospital Boston
ROBERT SICILIANO is fiercely committed to informing, educating, and empowering Americans so they can be protected from violence and crime in the physical and virtual worlds.


Check here if you're human


FTC: Identity Theft Top Complaint Once More

Pin It

Last year, 2012, marks the first year in which the FTC received more than two million complaints overall, and 369,132, or 18 percent, were related to identity theft—an increase of 30% over 2011. Of those, more than 43 percent related to tax- or wage-related fraud.

As the internet grows ever more pervasive and essential, we find ourselves conducting most of our business online. We use the internet to shop, pay bills and manage bank accounts. We will increasingly rely on the electronic exchange of personal information as the internet continues to evolve and become even more consumer friendly. Subsequently, criminals will also evolve, working day and night to find and exploit vulnerabilities within our networks. These hackers will not sleep until they gain access to all of our information, which they can utilize to steal our identities or gain access to our financial accounts.

Statistics show that one in four American adults has been notified by a business or organization that his or herinformation has been compromised due to a data breach. This means that you could be taking all the necessary precautions to keep your information safe, but by simply doing what every other person in the world does—sharing your Social Security number or credit card information with a trusted organization—you put yourself and your security at risk. So, how do you protect yourself?

  • Lock down your PC with antivirus, antispyware, antiphishing and a firewall.
  • Always keep your devices’ OS and critical security patches updated.
  • Consider getting a credit freeze and/or identity theft protection.
  • Shred—don’t just throw away—personal information.
  • Lock down your wireless network with WPA2 encryption.
  • Protect data on wireless devices, particularly when using a public WiFi network, with a free VPN such as Hotspot Shield.

By following these guidelines, you will keep your identity safer. You know who you are; don’t let anyone else think he can be you.

Robert Siciliano is an Identity Theft Expert to Hotspot Shield VPN. He is the author of 99 Things You Wish You Knew Before Your Identity Was Stolen See him discussing internet and wireless security on Good Morning America. Disclosures.

About the Author
ROBERT SICILIANO, CEO of IDTheftSecurity.com is fiercely committed to informing, educating, and empowering Americans so they can be protected from violence and crime in the physical and virtual worlds. His "tell it like it is" style is sought after by major media outlets, executives in the C-Suite of leading corporations, meeting planners, and community leaders to get the straight talk they need to stay safe in a world in which physical and virtual crime is commonplace. Siciliano is accessible, real, professional, and ready to weigh in and comment at a moment's notice on breaking news.

Similar Posts

  • Securing Your Mobile in Public Places
    What would cause you more grief: your wallet being lost or stolen, or your mobile phone? I’ve read studies that showed that more people would be at a loss without their mobile device. This makes sense for a number of reasons. Your wallet itself might cost 20 bucks and the cards and IDs are free
  • 10 Million Mobile VPN Users Can’t Be Wrong
    A virtual private network (VPN) is a network set up to communicate privately over a public network. For example: You occasionally want to or need to work from home and your employer knows that if you do, the data that travels between your PC and an office PC needs to be protected. Another example is
  • Crack Your WiFi Password To Protect Yourself
    Ever wanted to be a hacker? Today, anyone can learn code and understand the ins and outs of all the technology we are simultaneously blessed and cursed with. But once you know how all this technology works to the point of calling yourself a hacker (which, by the way, isn’t necessarily a bad word), then
  • School WiFi Often Open and Insecure
    Many elementary, middle and high schools are offering WiFi, and of course colleges and universities provide it as well. Some provide the networks with a required login access, and for others it’s open, unencrypted and free for anyone to jump on. Traditionally, when we think “login,” we believe that also means encrypted and secure. However, logging
  • WiFi Security Truths and Falsehoods
    Security truths evolve—meaning, they change, and you must keep up with this, particularly with wireless security. Advice for wireless security can quickly become outdated. There are actually three big wireless security myths swirling around. #1. Limit the IP address pool to restrict number of devices that can connect. Even if your cable company tech recommends this, it’s

Leave a Comment

You must be logged in to post a comment.

Xtreme School

Featured in

Anderson Cooper John Stossel Robert Siciliano Featured in
Browse by Month

Browse by Category