Skip to main content

Identity Is Everything: 10 Ways To Secure Your Personal Data

 I was recently the victim of a hack. My identity was impersonated and the information was used to steal my personal data from GoDaddy. How could this happen I asked myself? The cybercriminal got hold of my social security number, used it to locate my credit card number from my bank, then used that credit card number to access my
GoDaddy profile by socially engineering a customer service representative embedded at the hosting giant's offices.

Don't get me wrong here. I'm a huge GoDaddy fan. In fact, I've been with the company for over a decade. And, to GoDaddy's claim, they did give me a massive account credit to use towards any purchase. Clearly, I won't have to pay for domains or hosting for a very long time to come. However, it doesn't feel good being the victim of an identity theft. When it's a one-off situation, it feels even worse. This wasn't part of some greater scheme that infiltrated the company to release millions of records of consumers; it was a very personal and private attack.
Now, if you're thinking that I was silly by not utilizing two-factor authentication, you'd be wrong. My GoDaddy account was two-factor enabled. So what happened here? Aside from a major misstep on the part of GoDaddy to protect my data, which they've stated "was an isolated incident caused by human error when a representative failed to follow standard operating procedures," according to Todd Redfoot, Chief Information Security Officer, there's a larger question at play here.
The question is, how do you protect your identity from hackers and cyber-thieves who are hell-bent on penetrating and stealing your financial or personal records in an effort to profit or get rich from that data?
Protecting Your Identity From Theft
We've heard about major recent hacks in the news lately. From Sony's epic infiltration to Yahoo's security debacle and even Target's woes in the retail space, hacks are happening on a massive scale all around us. It's constantly in the news. In another article, where I discussed some of the top cybersecurity threats that exist online, I dove deep into all the different ways that criminals can access your personal information and what you can do to protect your identity.

Comments

Popular posts from this blog

An analysis of Anthony Joshua’s tattoo

 British- Nigerian boxer , Anthony Joshua , currently is basking in the euphoria of his victory over 41 - year -old Vladimir Klitschko but it is worthy to take a look at soft part of the man himself – his tattoo.

Grim Row in ABA

The Governorship Candidate of the Labour Party (LP). Hon. Alex Otti. Have cried, of the deplorable state of Faulks Road, Aba, which aptly captures the current reality in Abia. And stated that this should make the good people of the state more determined to reclaimed their state from those who have kept it in such pitiable state. He reiterated that state deserve better, and better governance they shall get come 2023. This Fueld a lot of replies: For more news; sign up and make your comments @: iykerom.blogspot.com

VP Prof. Yemi Osibanjo In EITI Conference.

Nigeria will remain on the board of EITI and ownership transparency train because they align with our national priorities. He also advised against, hidden ownership and underhand business practices, which He said will erode profitability and shareholders value. Masked or hidden corporate ownership is deeply implicated in the sad story of our underdevelopment. Because secrecy provides a convenient cover for the criminal and the corrupt. It is important to underscore the fact that opacity in one section of the globe undermines openness in the other. To Receive Alerts for more news; sign up now and make your comments @: iykerom.blogspot.com Whatsapp: +2347084045060 For Sponsored Advert Share your story with us: SMS: +2349066092265 Or Email Us: allegiance.gc@gmail.com