• About Us
  • Advertising
  • Digital Magazine
  • Supplements
  • Media Pack
  • Privacy Policy
  • Contact us
CXO Insight Middle East
  • News
  • Opinion
  • Business
    • Industries
      • Transport
      • Retail
      • Government
      • Real Estate
      • Education
      • Energy
      • Banking and Finance
    • Channel
  • Future
    • Tech
    • Gadgets
    • Science
    • Space
    • Sustainability
  • Events
    • CXO50 Oman
    • CXO50
    • ICT Awards
      • Dubai
      • Saudi Arabia
    • Cyber Strategists Summit
    • Cloud Connect
    • Channel Awards 2024
    • All events
  • GITEX
  • Digital Magazine
No Result
View All Result
CXO Insight Middle East
  • News
  • Opinion
  • Business
    • Industries
      • Transport
      • Retail
      • Government
      • Real Estate
      • Education
      • Energy
      • Banking and Finance
    • Channel
  • Future
    • Tech
    • Gadgets
    • Science
    • Space
    • Sustainability
  • Events
    • CXO50 Oman
    • CXO50
    • ICT Awards
      • Dubai
      • Saudi Arabia
    • Cyber Strategists Summit
    • Cloud Connect
    • Channel Awards 2024
    • All events
  • GITEX
  • Digital Magazine
No Result
View All Result
CXO Insight Middle East
No Result
View All Result

How to Guard Against Identity Theft

by CXO Staff
August 27, 2020
in Opinions

Mohammed Abukhater, Vice President, Middle East, Turkey & Africa, F5, shares best practices to proactively guard against identify theft.

identity theft security
Mohammed Abukhater, F5 Networks
Mohammed Abukhater, F5 Networks

Everyone is fair (and likely) game when it comes to identity theft.

Statistically, most cybercriminals tend to avoid “important” and high-value targets. It’s the vast numbers of easy targets that are most prominently in their crosshairs. That is true at the best of times, but the COVID-19 pandemic has only intensified and emboldened their hunt for the susceptible and vulnerable.

The following suggestions are best practices for anyone that wants to proactively guard against identity theft:

  • Use a password manager.The average person has around 70 to 80 passwords, which inevitably results in hand-written notes. A password manager is your friend here, helping to create strong, unique passwords for each account. It also encrypts and stores them in a secure password vault – you only need to remember one master password.
  • Practice password hygiene. Those still unconvinced about password managers should, at the very least, start creating unique passphrases that use the maximum number of characters allowed, and remember to reset a password immediately if an account is breached. As a general rule don’t allow your browser to memorise passwords for accounts, and never use your credentials from one site to create an account or sign in to other (third-party) sites.
  • Use multi-factor authentication. Get over being annoyed by the “inconvenience” of multi-factor authentication, which requires you to enter a code sent via text message after supplying a username and password. It’s an effective, additional layer of security that should be used for every account that makes it available to you.
  • Stop oversharing online. Rethink how and what you share online. Nothing makes you an easier target for identity thieves than a wealth of voluntarily shared personal information. Combine that digital bounty with all the “quiet” data that’s been piling up behind the scenes, and there are criminals that can assume your identity in minutes.
  • Protect your privacy at home.Secure your home wireless network (try these tips from Norton), only use IoT devices that let you change the password and manage security settings, and securely dispose of old phones, laptops, and storage devices.
  • Protect your privacy in public. It’s hard to believe anyone needs this reminder, but public Wi-Fi is incredibly susceptible to eavesdropping. Never use it for online banking, shopping (any activity that involves a credit card), or medical- and health-related services. Do not share private information (such as credit card numbers, date of birth, social security number, or any membership numbers) on voice calls when in public places. You should also protect PINs, membership numbers, and other identifiers when using point-of-sale systems. Pay attention when you swipe a card (beware of hard-to-spot skimmers!) and, remember, cash still works in most places.

Avoid Being an Easy Target

Scammers don’t like obstacles, so the more stumbling blocks you put in their way, the better. The key is to avoid becoming an easy target. Know what you need to do (within your realm of possibility) and remain vigilant about doing it. Nowadays, doing nothing is not an option.

Tags: F5featuredidentity theftMohammed AbukhaterMulti-Factor Authentication
ShareTweet

Related Posts

Oracle integrates NVIDIA AI Enterprise with OCI to drive innovation in the enterprise
Opinions

Oracle integrates NVIDIA AI Enterprise with OCI to drive innovation in the enterprise

NVIDIA AI Enterprise software, which includes over 100 NVIDIA NIM microservices for popular models, is now included with OCI instances accelerated by...

April 11, 2025
Harnessing AI to transform customer experience management in an omnichannel world
Opinions

Harnessing AI to transform customer experience management in an omnichannel world

In the contemporary business environment, customer experience (CX) has emerged as the linchpin of competitive advantage. With customers interacting with...

April 2, 2025

Discussion about this post

Latest Issue

IBM z17: The first mainframe fully engineered for the AI Age

IBM z17: The first mainframe fully engineered for the AI Age

April 11, 2025
stc Group to spearhead multicloud tech innovation in MENA with Kyndryl

stc Group to spearhead multicloud tech innovation in MENA with Kyndryl

April 11, 2025
Oracle integrates NVIDIA AI Enterprise with OCI to drive innovation in the enterprise

Oracle integrates NVIDIA AI Enterprise with OCI to drive innovation in the enterprise

April 11, 2025

The most trusted source of strategic intelligence for IT decision makers in the Middle East.

About

  • About Us
  • Advertising
  • Digital Magazine
  • Supplements
  • Media Pack
  • Contact Us

Policies

  • Privacy Policy

© 2024 – CXO Insight Middle East. All Rights Reserved.

Facebook-f X-twitter Linkedin
Separated they live in Bookmarksgrove right at the coast of the Semantics, a large language ocean. A small river named Duden.

About

  • About Us
  • Site Map
  • Contact Us
  • Career

Policies

  • Help Center
  • Privacy Policy
  • Cookie Setting
  • Term Of Use

Join Our Newsletter

© 2024 – CXO Insight Middle East. All Rights Reserved.

Facebook-f Twitter Youtube Instagram

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Join our mailing list
Sign up here to get the latest news, updates and special offers delivered directly to your inbox.
No Result
View All Result
  • News
  • Opinions
  • Business
    • Industries
      • Transport
      • Retail
      • Government
      • Real Estate
      • Education
      • Energy
      • Banking and Finance
  • Channel
  • Future
    • Tech
    • Gadgets
    • Science
    • Space
    • Sustainability
  • Events
    • CX50 Oman
    • CXO50
    • ICT Awards
      • Dubai
      • Saudi Arabia
    • Cyber Strategists Summit
    • Cloud Connect
    • Channel Awards 2023
    • All events
  • Videos
  • GITEX GLOBAL
  • Digital Magazine

© 2024 - CXO Insight Middle East. All Rights Reserved.