ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

24 Tips to Avoid Identity Theft

Updated on May 26, 2015

Steps to Keeping Your Identity Safe

With millions of identities stolen each year, it's no wonder that people have to take a pro-active approach to protecting their identity. By developing some key habits, individuals can minimize the risk of having their identity stolen and can avoid the financial and mental strain of having to repair their credit score and eliminate fraudulent debt.

Protecting Your Identity Online

Because the Internet Still Isn't 100% Secure

As much as technology has advanced throughout the years, the internet is still a haven for scammers and hackers to steal personal data. Even more, the better technology gets, the more creative the scams become. The internet is a great and convenient place to do a number of things; such as pay bills, purchase items, and apply for credit. However, it's still imperative to protect your information to the best of your ability when online.

  1. Memorize usernames and passwords as opposed to writing them down. If you have to write them down, keep them in a safe location where no one can access them.
  2. When creating passwords, choose something that is difficult to guess. It's a good rule of thumb to create secure passwords using a combination of letters, numbers, and special characters. If possible, you should also avoid using the same password for multiple websites.
  3. Don't provide personal or confidential information in an email, text, chat, or instant message. Furthermore, you shouldn't respond to unfamiliar messages from these sources or click on any provided attachments.
  4. Ensure you have up-to-date antivirus software installed and run scans regularly. Some types of malware utilize keyloggers to record login information or data entered in an online form, which can be used to access your accounts or obtain confidential information.
  5. Ensure websites that require personal information are secure before submitting information. Familiarize yourself with the site's privacy policy and find out what security measures (i.e., VeriSign) are used before providing data.
  6. Limit access to your computer. Because a home computer is typically one's primary storage unit, people who have access can easily obtain a great deal of information about you. To better protect your data, keep your computer password protected. If someone needs to use your computer, have a generic account handy they can use instead of your own. When at the office, keep your computer locked when away from your desk.
  7. Use your personal computer when paying bills or reviewing account data online. Public computers offer much less security.
  8. If you are using wireless internet at home, make sure it is secured and password protected

Snail Mail and Garbage

Because People Do Crazy Things to Get Your Personal Information

Of all the research and stories I have heard about identity theft, tactics with postal mail and trash are among the most sneaky and absurd that I've heard of. It's mildly concerning how cautious we have to be with our own mail nowadays and I'm strangely amused at the fact that perpetrators will dig through trash. Apparently, people dumpster dive for more than food and treasure! Luckily, there are steps available to help prevent even these forms of identity theft.

  1. One tactic used by identity thieves is to respond to marketing materials (such as pre-approved credit card offers) on your behalf. You can minimize the chance of this happening by limiting the number of unsolicited mailings you receive. You can do this contacting each of the three major credit bureaus and requesting to opt-out of their promotional contracts. Additionally, you can register with the Direct Marketing Association's (DMA) Mail Preference Service and asked to be placed on their "delete" file.
  2. For those unsolicited mailings you can't avoid, don't just throw them away. If a pre-approved credit card offer isn't snatched before you check your mail, it could be after you've tossed it. Amazingly enough, people will rummage through your garbage to get their hands on these offers and submit them in your name. Always shred those offers before throwing them away.
  3. The same principle applies for any document you wish to get rid of that contains confidential information. Never simply throw bills, statements, or official documents in the garbage. You should always shred them (or burn them) first.
  4. Mail bill payments or documents containing confidential information from the post office. This is a much more secure method than sending mail from your home.
  5. Unfortunately, it is possible for some random person to dig through your home mailbox. Ensure your mailbox is properly secured/locked or opt instead for a post office box.
  6. Consider signing up for "paperless billing" with your bank or credit card companies. This way, you can review your account information online (ensuring the website and your computer have security measures in place) and won't have to worry about your confidential data being stolen or misplaced in the mail.

When Out and About

People are Watching You

Not to make you paranoid or anything, but aside from the standard muggings we always hear about, people will try to sneak a peak at what you're doing, holding, and writing down. Wherever you are, these tips will help you keep your information safe.

  1. When writing down account information or entering PINs, be cautious of those around you. Believe it or not, some people will try to peak over your shoulder to see what you are writing down or what information you're entering at the ATM.
  2. Keep a close eye on your purse or wallet. As obvious as this should be, people still sometimes have a tendency to take their eyes off their belongings. Bottom line, keep your purse or wallet on you at all times.
  3. Only carry what you need on you. In the event that you are robbed, you can lessen the chance of identity theft by refraining from carrying all bank cards and identifying information at once. When taking a trip somewhere, if you aren't going to make any purchases, leave the credit cards at home and just carry a little cash in case of an emergency. Don't carry your social security card with you unless absolutely necessary.

I Was Robbed!

What Steps Did You Take to Protect Your Data After a Robbery?

See results

Random Steps that are Just as Imperative

Because You Never Can be too Careful

Aside from the options listed so far, there are a number of additional steps that people can take to protect their identity. Some are crucial and should be done without hesitation, while others may not necessarily be that important, but can be the difference between keeping your identity safe or becoming a victim. Hey, it's always better to be safe than sorry, right?

  1. Protect your social security number at all costs. This small piece of information is the #1 thing individuals seeking to steal your identity will try to obtain.
  2. Compile a list of account numbers and contact information. This may sound contradictory, but it’s a great way to save some time in the event you are robbed. If your purse or wallet is stolen, you need to act fast. By having this type of list handy, you can quickly and easily contact the appropriate parties to report the theft. Of course, only do this if you can store the list in a safe place; such as a lockbox.
  3. Review your credit report regularly for suspicious activity. If someone is attempting to open a new line of credit in your name, it will show up on your credit report. Because of this, it is important to review your report from all three major credit bureaus on a frequent basis. Everyone is entitled to a free copy of their credit report annually, so make a habit of taking advantage of this. If possible, try to review it up to three times a year so you can report any suspicious activity more quickly.
  4. Review your bank and credit card statements each month and contact the issuing company immediately if you notice any unusual charges. If someone is using your bank account or credit card to make purchases, you can catch it rather quickly be thoroughly reviewing your statements.
  5. Consider signing up for an identity protection or monitoring program. Companies like True Credit and LifeLock provide a variety of services to consumers so that they can monitor their credit reports and receive notification if a chance is made.

Scams to Watch Out For

Those Sneaky Devils Will Try Anything

Be on the lookout for:

  1. Phishing Emails - In a nutshell, phishing emails are messages from purportedly legitimate companies, asking you to reply or click on a supplied link in order to provide account information. Individuals can avoid falling victim to these types of scams by simply refusing to respond to the email and deleting it immediately. A majority, if not all, of businesses have security policies in place that prohibit the transfer of personal information via email. So, no matter how convincing the email looks or sounds, DO NOT respond to it. If you're unsure, contact the company directly (don't use any contact information provided in the email).
  2. Telephone Scams - Have you ever gotten a call from some random company claiming you've won a prize? How about from a collection agency claiming you owe money on a debt you don't recognize? Or maybe from your bank claiming that there was a system malfunction and they need to re-collect your account data? Ultimately, you receive a call from some unfamiliar company (or even from a well-known one) with some excuse as to why they need your personal information. To avoid being scammed, your best bet is to only provide your data if you initiated the call. Even if it is from a company you recognize, don't provide any details. Instead, hang up the phone, and dial the company directly (again, don't use any contact information provided by the original caller).

Guestbook Comments

    0 of 8192 characters used
    Post Comment

    • katemiya profile image


      7 years ago

      Great lens topic filled with a lot of information we need to be reminded of. Another type of item I've found useful are special identity protection rubber stamps. They have a special design that prevents type from being visible through it the way it often is if you simply scratch it out with a Sharpie. I use it often on the address labels on packages. And yes, your lens has been blessed!

    • Gypzeerose profile image

      Rose Jones 

      7 years ago

      I can't believe that identity theft is becoming so prevalent, it is a new crime to come up in my lifetime. Thanks for the suggestions.


    This website uses cookies

    As a user in the EEA, your approval is needed on a few things. To provide a better website experience, uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

    For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at:

    Show Details
    HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
    LoginThis is necessary to sign in to the HubPages Service.
    Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
    AkismetThis is used to detect comment spam. (Privacy Policy)
    HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
    HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
    Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
    CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
    Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the or domains, for performance and efficiency reasons. (Privacy Policy)
    Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
    Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
    Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
    Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
    Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
    VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
    PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
    Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
    MavenThis supports the Maven widget and search functionality. (Privacy Policy)
    Google AdSenseThis is an ad network. (Privacy Policy)
    Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
    Index ExchangeThis is an ad network. (Privacy Policy)
    SovrnThis is an ad network. (Privacy Policy)
    Facebook AdsThis is an ad network. (Privacy Policy)
    Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
    AppNexusThis is an ad network. (Privacy Policy)
    OpenxThis is an ad network. (Privacy Policy)
    Rubicon ProjectThis is an ad network. (Privacy Policy)
    TripleLiftThis is an ad network. (Privacy Policy)
    Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
    Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
    Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
    Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
    ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
    Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)