O'Reilly logo

Identity Theft Alert: 10 Rules You Must Follow to Protect Yourself from America’s #1 Crime by Steve Weisman

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

8. The Dangers of Data Breaches

Identity theft depends on the security of your personal information. When you provide this information to an identity thief as a result of a phishing scam, you set yourself up for a disastrous identity theft experience. Unfortunately, just as a chain is only as strong as its weakest link, so is the security of your personal information, and in turn your identity, only as safe as the security of the many places that have and store your personal information. Identity thieves are well aware of this and often find it more simple and effective to hack into companies and institutions that store large amounts of personal information on a great many people. Being aware of this threat should make you more hesitant to share ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required