Skip to main content
Social Sci LibreTexts

14.7: Defending against Attack- Securing Your Identity and Accounts

  • Page ID
    219036
  • \( \newcommand{\vecs}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)

    \( \newcommand{\vecd}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash {#1}}} \)

    \( \newcommand{\id}{\mathrm{id}}\) \( \newcommand{\Span}{\mathrm{span}}\)

    ( \newcommand{\kernel}{\mathrm{null}\,}\) \( \newcommand{\range}{\mathrm{range}\,}\)

    \( \newcommand{\RealPart}{\mathrm{Re}}\) \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\)

    \( \newcommand{\Argument}{\mathrm{Arg}}\) \( \newcommand{\norm}[1]{\| #1 \|}\)

    \( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\)

    \( \newcommand{\Span}{\mathrm{span}}\)

    \( \newcommand{\id}{\mathrm{id}}\)

    \( \newcommand{\Span}{\mathrm{span}}\)

    \( \newcommand{\kernel}{\mathrm{null}\,}\)

    \( \newcommand{\range}{\mathrm{range}\,}\)

    \( \newcommand{\RealPart}{\mathrm{Re}}\)

    \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\)

    \( \newcommand{\Argument}{\mathrm{Arg}}\)

    \( \newcommand{\norm}[1]{\| #1 \|}\)

    \( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\)

    \( \newcommand{\Span}{\mathrm{span}}\) \( \newcommand{\AA}{\unicode[.8,0]{x212B}}\)

    \( \newcommand{\vectorA}[1]{\vec{#1}}      % arrow\)

    \( \newcommand{\vectorAt}[1]{\vec{\text{#1}}}      % arrow\)

    \( \newcommand{\vectorB}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)

    \( \newcommand{\vectorC}[1]{\textbf{#1}} \)

    \( \newcommand{\vectorD}[1]{\overrightarrow{#1}} \)

    \( \newcommand{\vectorDt}[1]{\overrightarrow{\text{#1}}} \)

    \( \newcommand{\vectE}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash{\mathbf {#1}}}} \)

    \( \newcommand{\vecs}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)

    \( \newcommand{\vecd}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash {#1}}} \)

    \(\newcommand{\avec}{\mathbf a}\) \(\newcommand{\bvec}{\mathbf b}\) \(\newcommand{\cvec}{\mathbf c}\) \(\newcommand{\dvec}{\mathbf d}\) \(\newcommand{\dtil}{\widetilde{\mathbf d}}\) \(\newcommand{\evec}{\mathbf e}\) \(\newcommand{\fvec}{\mathbf f}\) \(\newcommand{\nvec}{\mathbf n}\) \(\newcommand{\pvec}{\mathbf p}\) \(\newcommand{\qvec}{\mathbf q}\) \(\newcommand{\svec}{\mathbf s}\) \(\newcommand{\tvec}{\mathbf t}\) \(\newcommand{\uvec}{\mathbf u}\) \(\newcommand{\vvec}{\mathbf v}\) \(\newcommand{\wvec}{\mathbf w}\) \(\newcommand{\xvec}{\mathbf x}\) \(\newcommand{\yvec}{\mathbf y}\) \(\newcommand{\zvec}{\mathbf z}\) \(\newcommand{\rvec}{\mathbf r}\) \(\newcommand{\mvec}{\mathbf m}\) \(\newcommand{\zerovec}{\mathbf 0}\) \(\newcommand{\onevec}{\mathbf 1}\) \(\newcommand{\real}{\mathbb R}\) \(\newcommand{\twovec}[2]{\left[\begin{array}{r}#1 \\ #2 \end{array}\right]}\) \(\newcommand{\ctwovec}[2]{\left[\begin{array}{c}#1 \\ #2 \end{array}\right]}\) \(\newcommand{\threevec}[3]{\left[\begin{array}{r}#1 \\ #2 \\ #3 \end{array}\right]}\) \(\newcommand{\cthreevec}[3]{\left[\begin{array}{c}#1 \\ #2 \\ #3 \end{array}\right]}\) \(\newcommand{\fourvec}[4]{\left[\begin{array}{r}#1 \\ #2 \\ #3 \\ #4 \end{array}\right]}\) \(\newcommand{\cfourvec}[4]{\left[\begin{array}{c}#1 \\ #2 \\ #3 \\ #4 \end{array}\right]}\) \(\newcommand{\fivevec}[5]{\left[\begin{array}{r}#1 \\ #2 \\ #3 \\ #4 \\ #5 \\ \end{array}\right]}\) \(\newcommand{\cfivevec}[5]{\left[\begin{array}{c}#1 \\ #2 \\ #3 \\ #4 \\ #5 \\ \end{array}\right]}\) \(\newcommand{\mattwo}[4]{\left[\begin{array}{rr}#1 \amp #2 \\ #3 \amp #4 \\ \end{array}\right]}\) \(\newcommand{\laspan}[1]{\text{Span}\{#1\}}\) \(\newcommand{\bcal}{\cal B}\) \(\newcommand{\ccal}{\cal C}\) \(\newcommand{\scal}{\cal S}\) \(\newcommand{\wcal}{\cal W}\) \(\newcommand{\ecal}{\cal E}\) \(\newcommand{\coords}[2]{\left\{#1\right\}_{#2}}\) \(\newcommand{\gray}[1]{\color{gray}{#1}}\) \(\newcommand{\lgray}[1]{\color{lightgray}{#1}}\) \(\newcommand{\rank}{\operatorname{rank}}\) \(\newcommand{\row}{\text{Row}}\) \(\newcommand{\col}{\text{Col}}\) \(\renewcommand{\row}{\text{Row}}\) \(\newcommand{\nul}{\text{Nul}}\) \(\newcommand{\var}{\text{Var}}\) \(\newcommand{\corr}{\text{corr}}\) \(\newcommand{\len}[1]{\left|#1\right|}\) \(\newcommand{\bbar}{\overline{\bvec}}\) \(\newcommand{\bhat}{\widehat{\bvec}}\) \(\newcommand{\bperp}{\bvec^\perp}\) \(\newcommand{\xhat}{\widehat{\xvec}}\) \(\newcommand{\vhat}{\widehat{\vvec}}\) \(\newcommand{\uhat}{\widehat{\uvec}}\) \(\newcommand{\what}{\widehat{\wvec}}\) \(\newcommand{\Sighat}{\widehat{\Sigma}}\) \(\newcommand{\lt}{<}\) \(\newcommand{\gt}{>}\) \(\newcommand{\amp}{&}\) \(\definecolor{fillinmathshade}{gray}{0.9}\)

    Questions to consider:

    • How should you manage passwords and online security?
    • What’s the best way to deal with identity theft?
    • How can you get help and avoid scams?

    Identity theft is one of the fastest growing crimes in the United States, and the FBI estimates that more than 10 million new victims are harmed each year.22 Among the problems contributing to this rapid increase in identity theft are the significant amount of data stored online and the poor security practices of both individuals and companies. In 2017, Equifax announced that their security had been breached and the data of every adult in the country was likely compromised.23

    Passwords and Security

    The first line of defense to prevent identity theft is to create strong passwords and take other security measures with your online accounts. An important factor in the strength of a password is the length of the password.24 This means a password of 12 characters or more is desirable. Consider using pass phrases, or short sentences, rather than passwords. You should vary your pass phrases for each site so a hacker that gets your password can only use it for a single site. Government agencies and security experts are recommending password management software such as LastPass to help with remembering all of these differing passwords.

    Another important strategy is to implement two-factor authentication (TFA) on all your online accounts. TFA adds another method of identifying you in addition to your password. Many TFA systems use your cell phone and will text you a code to allow you to log in to your account. A criminal would then need both your password and access to your cell phone to log in. Check the settings on your email, bank website, and other accounts to see how to enable two-factor authentication.

    Preventing and Dealing with Identity Theft

    Setting strong passwords and enabling two-factor authentication will help keep criminals out of your online banking, email, and other important accounts. Many criminals use lower-tech methods of stealing your identity, however, including tricking or scaring you into giving out information or simply digging through your trash to find account statements.

    Never Give Info to Someone Who Contacts You

    Never provide a person with personal information unless you initiated the contact. If someone calls you asking for personal information, tell them you’ll call them back. Then ignore the phone number or website they give you, and instead look up the phone number for the organization on their official website. A legitimate company or government agency will never require you to stay on the line with them to solve the problem.

    Shred Everything

    You should also purchase an inexpensive cross-cut shredder and get in the habit of shredding all paperwork and mail before you throw it away. A good rule of thumb is that if the paper has your name on it, you should shred it before throwing it out.

    Order Your Credit Report Annually

    At least once per year, you should get your credit report from the credit reporting agencies through annualcreditreport.com, which is the only website approved by the Federal and State governments. The three major agencies -- Transunion, Equifax, and Experian -- all provide the legally mandated free report through this website. Learn how to read a credit report from one of these agencies.

    Look for incorrect information or accounts you don’t recognize. If you see accounts you didn’t open on your credit report, file a report with the local police and the local FBI field office. You can also file a complaint with the Federal Trade Commission and Internet Crime Complaint Center.

    ANALYSIS QUESTION

    Think about your account passwords and your habits related to your identity security. Identify mistakes you have made in the past with your security. What can you start doing today to protect yourself from identity theft or financial fraud?

    ACTIVITY

    Credit Report Review

    Using the sample credit reports below, write an analysis of the person’s credit and how they are managing and using debt. Go through the factors that affect credit, and determine how this person is doing with each factor. What in the report is beneficial, and what is harmful? Carefully review each page for accuracy. Pay particular attention to the personal information, negative credit, and any notes about the person or their credit activity.

    fig-ch01_patchfile_01.jpg
    Figure \(\PageIndex{12}\): A sample credit report. (Credit: Based on information from Experian.)

    Creating Strong Alliances: Getting Help and Avoiding Scams

    As a college student, you are a prime target for predatory practices designed to make the adviser or company rich at your expense.

    As you’ve read through this chapter, it may have dawned on you that this personal finance stuff is a lot more complicated than it seems. There are people who have devoted their entire educations and careers to mastering single areas of personal finance, such as taxes, investing, and estate planning. When you feel it’s time to get professional help, there are many qualified professionals who can assist you. Not everyone who calls themselves a financial adviser is actually looking out for your best interest, however.

    The terms financial adviser, financial planner, wealth manager, and many other impressive-sounding job titles are not regulated by the government. Anyone can put these job titles on their business cards. You need to be able to differentiate between a qualified professional and those who are untrained product salespeople, predatory financial businesses, or outright scams.

    Predatory Practices Aimed at College Students

    As a college student, you are a prime target for predatory practices designed to make the adviser or company rich at your expense.

    Annuities and Life Insurance

    Annuities and life insurance products are often aggressively sold to college students. They are generally inappropriate for college students and even most college graduates because they have high fees and lower returns than many other investment options, and the benefits are rarely needed by young people.25

    Investment Schemes

    Regulators identify specialized investments, such as promissory notes, real estate, oil and gas, and gold, as a major threat to investors. Investing systems, including stock picking and buying or selling strategies, are also a concern. Academic research has continually disproven these strategies.26

    If someone is pitching you on their special system or secret strategy, be extremely skeptical. Legitimate investments are regulated by government agencies and are therefore never a secret.

    Table 10.11
    Scam or Scheme Characteristics or Promises Issues and Reasons to Avoid

    “Cash Value” Life Insurance

    Often sold as “7702 Plans”

    Cash value life insurance and similar programs promise that a certain amount of the insurance premiums are set aside as a fund that can be used for expenditures such as college. If they are ever paid out, the consumer must pay taxes and may also pay fees up to 50 percent, losing much of the built-up value.
    Investment Schemes These highly optimistic “sure thing” / “can’t miss” opportunities are specifically geared toward quick rewards or paying for college. They are often specialized investments such as real estate, gold, or oil. Sellers often rely on students’ lack of resources and experience to prevent them from thoroughly investigating the opportunity or properly evaluating the contract terms.

    Advertising, Sales, or Data Entry Opportunities

    “I make $40 an hour working from home. . . .”

    Offers of high pay for what seems like little work are likely too good to be true. “Car wrap” opportunities (driving around with ads on your car), data entry, and online sales opportunities are typical examples. The advertised salaries are often very difficult to achieve and come with significant conditions. Some “pay first” programs utilize fake checks to mislead students.
    Financial Aid Services or Debt Consolidation These services offer to find advantageous financial aid packages for a fee.27 The offers usually do not return as beneficial a package as they promise, and most financial aid can be discovered without paying for it.

    Phone Scams

    “The IRS has detected tax fraud. . . .”

    “This will be an attempt to avoid an initial appearance before a grand jury for a criminal offense. . . .”

    Phone scammers use threatening, official-sounding messages to scare recipients. They often demand immediate return calls or request account or identifying information. These scams are not unique to college students. As official as they sound, these are scams. The perpetrators will use any account information you provide to invade your privacy or steal your money.
    Too-Good-to-Be-True Credit Cards Credit cards with very low introductory interest rates, a promise of points, or other impressive-sounding benefits may be offered to students on college campuses, especially during events. Low rates can explode into high rates or incur fees after a brief period or a single late payment. This is not technically fraudulent, but be very careful when reading the terms.
    Freebie or Social Media Survey Scams Many legitimate companies will offer free products or ask students to complete surveys, but high-risk offerings will ask for personal information or account information. Free products or compensation may not arrive, and even if they do, they may not offset the risk of giving up account information.
    Fake Universities or Degree Programs (Diploma Mills) Offers may sound very legitimate and similar to real colleges. They often promise significant financial aid or degrees in just weeks or months.28 A certificate from a school with no accreditation or a poor reputation is a waste of time and money. Be certain that any college or certificate program is formally accredited; review the credentials of current faculty, and determine the job placement of alumni.

    Sources of Good Information and Help

    With all the high-cost, predatory, and scam financial advice out there, it is important to know where to turn for help.

    Personal Finance Classes

    One option is to look for a personal finance class, which will take the concepts found in this chapter and expand on them for an entire semester. Your college may have a financial literacy, personal finance, or money management class available.

    Be wary of personal finance or investing classes offered through other sources, however, as many include hidden sales agendas and aggressive pitches to buy a company’s financial products. Never make an investment decision, buy a product, or sign a contract at a class, and always seek advice from others on any opportunity.

    Websites and Government Resources

    There are a ridiculous number of websites available to the public to help with your personal finances. When choosing a website for help, lean toward sites run by a legitimate government agencies or nonprofit organizations.

    The first place you should look for help with finances is the official website of related government agencies. If you have a question about insurance, look to your state’s insurance commissioner website. If you are having problems with your apartment, contact your city’s housing authority.

    Government agencies not only have the authoritative word on any legal matter, but are also generally unbiased. The downside to government websites is that they can be hard to understand, with legal wording taken directly from the law. Some government agencies are also prohibited from giving advice to the public, leaving it up to you to apply the information they provide.

    There are also many nonprofit organizations that have been established to assist the public with finances. Nonprofit organizations may have information that is easier to understand, and they may also be able to offer personal advice.

    Official Government Websites

    • Personal Finance: Consumer Financial Protection Bureau, consumerfinance.gov
    • Taxes: Internal Revenue Service, irs.gov
    • Retirement: Social Security Administration, ssa.gov
    • Investing: Securities Exchange Commission, sec.gov
    • Investing: North American Securities Administrators Association, nasaa.org (state and provincial investment regulators)

    Nonprofit Organization Websites

    • National Endowment for Financial Education, nefe.org
    • National Foundation for Credit Counseling, nfcc.org
    • Consumer Reports, consumerreports.org (national consumer advocacy organization)
    • Purposeful Finance, purposefulfinance.org (a nonprofit organization run by this chapter’s author)

    Your College’s Financial Aid Office

    The financial aid or student aid office of your college may also be a good place to look for financial help, especially surrounding student loans. It is important to realize, however, that a conflict of interest exists between you and the financial aid adviser. Your college’s financial aid office is charged with helping you find the money to go to college, but it isn’t charged with making sure you don’t take on too much student debt. It is possible to get good advice on getting money to pay for college that is also bad advice for your future finances.

    College financial aid counselors are also generally not trained in other areas of finance and should not be relied on for advice on investing, taxes, noncollege debt, or other financial matters. To get help with these areas, consult a qualified professional who can guide you with fewer conflicts of interest, such as the professionals listed below.

    ANALYSIS QUESTION

    Talk with your parents or other family members about their experience with finances, including financial advisers, taxes, legal issues, and investing. When could they have used professional advice in their past? Did they have bad experiences with getting advice that wasn’t best for them? How has a lack of good advisers harmed your family financially (even if just because they could have had more money)?

    Footnotes

    1. archives.fbi.gov/archives/ne...ventidt_102104
    2. https://www.purposefulfinance.org/ho...ecurity-breach
    3. Information Security Institute. “Password Security:Complexity Versus Length.” 2019. https://resources.infosecinstitute.c...ity-vs-length/
    4. North American Securities Administrators Association. Top Investor Threats. ttp://www.nasaa.org/top-investor-threats /
    5. Kadan, Maduriera, Wang and Zach. “Stock Picking, Industry Picking, and Market Timing in Sell-Side Research.” Singapore Management University. 2012.
    6. Boswell, Brian. “Don’t Get Suckered By These College Savings Plans.” Forbes.com. 2019.
    7. Creel, Wes. “How Cn I Tell if a Degree is Legitiamte or a Scam.” Abound/Finish College.

    This page titled 14.7: Defending against Attack- Securing Your Identity and Accounts is shared under a CC BY 4.0 license and was authored, remixed, and/or curated by OpenStax via source content that was edited to the style and standards of the LibreTexts platform.