Identity Theft: What to Do If Your Personal Information Has Been Compromised

1 | 2 | 3 | 4 | 5 | 6 | 7
Previous Next

Click through for the steps you should take if your personal information has been compromised, as outlined by OnGuard Online.

The bottom line for online threats like phishing, spyware, and hackers is identity theft. ID theft occurs when someone uses your name, Social Security number, credit card number or other personal information without your permission to commit fraud or other crimes. That's why it's important for your users to protect their personal information. To find out how to deter and detect identity theft, visit

If personal information is accidentally disclosed or deliberately stolen, taking certain steps quickly can minimize the potential for the theft of identity. OnGuard Online has provided the following tips you can share with your users to help them limit the damage done when personal data has been exposed.

More Slideshows:

Top FREE Android Productivity Applications A list of 15 of the hottest free Android productivity applications.

10 Steps to an Ergonomic Workstation Steps you can take to improve the ergonomics of your workstation.

Top 10 Well-Compensated Execs of ‘09 Take a look at technology’s top 10 highest-paid executives in 2009.


Related Topics : Symantec, Spyware, Supercomputing, HIPAA, Privacy

More Slideshows

security43 Protecting Corporate Identities Through Password Management

One of the best ways to keep corporate identities safe is to practice proper password management. From an IT perspective, this entails determining the types of passwords that are acceptable and where they are housed on the company's systems. ...  More >>

Security70-190x128 What to Look for in an IAM Solution

A number of new capabilities available in IAM solutions greatly increase security, while improving employees' productivity. ...  More >>

Misc38-190x128 Five Critical Tenets of Identity and Access Management

The identity and access management (IAM) market is experiencing a renaissance with the emergence of new options for how and where to deploy IAM technology, both on-premises and as a service. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.