Identity Management Day
Identity Management Day was launched in 2021 to promote awareness and understanding of how to protect your identity in the digital world, with a special focus on the dangers of not properly securing usernames, passwords, and access credentials. Research shows that 79% of companies have experienced an identity-related security breach in the last two years, and 99% believe their identity-related breaches were preventable. According to the Verizon Data Breach Investigations Report, as many as 81% of hacking-related breaches use weak, stolen, or otherwise compromised passwords. In today’s interconnected environment, it is more important than ever to stay safe and secure online. From never sharing or reusing passwords to recognizing and reporting phishing attempts, there are many ways you can safeguard your digital identity. Here are the top five identity security basics to help protect your online presence.
1. Never Share or Reuse Passwords and Create Strong Passwords
Creating a strong, unique password for each of your online accounts is critical for identity security. By using a different password for each site, you minimize the risk of a stolen password in a security breach resulting in the attacker getting access to multiple accounts. To help you create strong passwords:
Here are some additional quick tips to create a password. Remember to avoid sharing your passwords with anyone, even close friends or family members. If you need to let someone access an account, use a separate sharing feature or create a login specifically for them. To help you remember to check your passwords each year, the first Thursday in May is World Password Day. |
2. Recognize and Report Phishing
Phishing is the most common way attackers steal passwords. The phishing email usually tries to trick you into giving up sensitive information, such as login credentials or financial data. Be extra careful when opening emails, clicking on links, or downloading attachments. Here are some obvious signs of phishing:
You can quickly spot a phishing email with these obvious signs, phishing is getting harder to spot. There has been a huge increase in phishing using text messaging, iMessage, WhatsApp, Facebook Messenger and Instagram direct messages. These short messages also often lack context, making it harder to determine what’s legitimate and what is a phishing message. More than ever, it’s critical to watch out for scams and phishing messages everywhere, not just in your email box. It’s easy to simply delete these messages and move on, but reporting these phishing emails can also help prevent others from falling victim. If you have antivirus software on your computer . You can quickly and easily do this by reporting the malicious URL to multiple security companies. This flags the website as potentially malicious and can ultimately lead to its removal or deletion. |
3. Regularly Check for Security Updates
Most people know their computer and cell phone operating systems download and install updates automatically, but you shouldn’t wait for updates to come to you. Additionally, your computer and cell phone aren’t the only things that require regular updates and security patches. Software security updates are essential for protecting your devices from new security vulnerabilities targeted by attackers. Here’s how to stay on top of updates:
There are many other things in your home that you might be surprised require security updates. New vulnerabilities are discovered every day and hackers usually work quickly to try to exploit them. That’s why it’s so important to regularly check for – and install – new updates. Share this information with friends and relatives to help them avoid becoming a victim as well. |
4. Enable Multi-Factor Authentication (MFA)
Multifactor authentication (MFA) is a fancy term for a simple way to protect your online accounts. It’s like a secret handshake that only you and the other person know. Instead of just using a password, MFA requires you to verify your identity in at least one more way. For example, you might enter your password and then receive a short code on your phone that you also need to enter. In addition to a code, verification might include a phone call, a fingerprint, or a physical security key. It’s like having a double lock on your door, making it extra hard for the bad guys to break in! So if you want to keep your online accounts safe and sound, use MFA with accounts that enable it. Enabling MFA significantly reduces the risk of unauthorized access to your accounts. Here’s how to get started:
- Check the security settings of your online accounts for MFA options.
- Choose a method that best suits your needs, such as SMS codes, authentication apps, or hardware tokens.
- Ensure your backup methods are set up, in case your primary method is unavailable.
5. Use a Password Manager
A password manager is like having a personal assistant for all your online passwords. It’s a tool that helps you create strong and unique passwords for each account, saves them, and remembers them for you. You don’t have to remember all your passwords anymore – just one master password that unlocks your password manager. They usually work like magic, entering your username and password automatically when a website asks you for them. Plus, it helps you avoid using the same password for multiple accounts. So, if one password is stolen in a breach, you don’t have to worry about the bad guy getting into other accounts. If there is a security breach, or you forget your password, you can easily change them. Here are some of the main benefits of using a password manager:
- Automatically generate and store strong, unique passwords for each of your accounts.
- Easily access your passwords across multiple devices, using a master password or biometric authentication.
- Store other sensitive information, such as credit card details and secure notes.
There are numerous password managers available on the market, both free and paid. Here are some you may consider:
Choose one that meets your needs and preferences, and maintain a backup of your password database in a secure location.
Bonus Tip: Remove Personally Identifiable Information from the Web
One of the best things you can do to protect your identity on the web is to remove any personal data that’s out there. Use our guide for removing your personal information for free or consider one of several services you can subscribe to that will automatically remove personal information related to you from public websites (such as people search engines) and private databases. These services will regularly send requests to data brokers on your behalf, because records tend to reappear once removed. These services will also ask data brokers to add your profile to their suppression lists to make sure your name is never listed again.
Use a Virtual Private Network (VPN)
A virtual private network (VPN) is a technology that lets users create a secure and encrypted connection between their device and the internet. When a user connects to a VPN, their internet traffic is routed through the VPN server, and their IP address is replaced with the IP address of the VPN server – which could be located anywhere in the world. This makes it hard for anyone to track the user’s online activity and location, making VPNs increasingly popular among internet users wanting to protect their online privacy and security.
One of the key benefits of using a VPN is protecting users’ identities online. When a user connects to the internet without a VPN, their internet address is visible to anyone who knows how to intercept their internet traffic. This is how cybercriminals track a user’s online activity and steal their personal information. By using a VPN, users hide their internet address and encrypt their internet traffic, making it hard for anyone to track their online activity or steal their personal information. Additionally, a VPN can help users bypass internet censorship and access content that may be blocked in their geographical location.
There are many different VPN service providers, and you should consider the provider’s reputation, speed, and reliability. Some VPN providers may offer additional features such as ad blocking and malware protection. Carefully read the VPN provider’s privacy policy before signing up for their service because some providers may log user data or share user data with third parties. Here are a few VPN providers you may consider:
Using a VPN to bypass internet censorship or access geo-restricted content may be illegal in some countries. Users should also be aware of the legal implications of using a VPN in their country.
Remember, staying informed and proactive is the key to maintaining a secure online presence. Happy Identity Management Day!