How cyber security can protect your digital identity

With so much of our personal information available online, criminals no longer need to go through our trash cans for important documents. a person with a stressed expression looking at a laptop, with a fingerprint, padlocks and cursors

Your digital identity is an online record of your personal information. It could include something as simple as your email address or social media Social mediaInternet-based tools that allow people to listen, interact, engage, and collaborate with each other. Popular social media platforms include Facebook, YouTube, LinkedIn, and Twitter. handle, or more sensitive information like your social insurance number (SIN), passwords and even your financial information. Every time you do something actionable online, like access your social media or sign up for an email subscription, your digital identity grows. This information says a lot about you, so protecting it is crucial.

Here are a few tips on how you can protect your digital identity to get cyber safe.

Watch out for phishing scams

Cyber criminals may use phishing scams to steal your digital identity. In a phishing PhishingAn attempt by a third party to solicit confidential information from an individual, group, or organization by mimicking or spoofing, a specific, usually well-known brand, usually for financial gain.  attack, a scammer will send you an email or text to trick you into sharing personal information by asking you to click a malicious link LinkSee Hyperlink. or download DownloadTransmission of data from a remote computer system onto a local computer system. a suspicious file.

Spear phishing scams are hyper-targeted phishing scams in which cyber criminals gather information about you to create a personalized message. This message might impersonate someone you know or be specific to your behaviours, likes or interests. Spear phishing Spear phishingThe use of spoof emails to persuade people within an organization to reveal their usernames or passwords. Unlike phishing, which involves mass mailing, spear phishing is small-scale and well targeted. messages can be especially dangerous as they may be harder to spot than generic phishing messages.

It’s always important to double-check the legitimacy of a message if anything seems off. Contact the company or person who is sending you the message through another medium, like a phone call, to confirm whether the message is real. Keep an eye out for suspicious language, like threats or rewards that seem too good to be true. Avoid clicking on links or opening attachments in suspicious messages.

Protect your information

When you share information online, you expect it to stay private – which is why you should always take steps to protect your information.

Cyber criminals can steal your data through an unsecured Wi-Fi Wi-FiWi-Fi refers to a set of wireless communication protocols that can transmit traffic to Wi-Fi enabled devices within a local area. A Wi-Fi enabled device such as a laptop or tablet can connect to the internet when within range of a wireless network connected to the internet. An area covered by one or more Wi-Fi access points is commonly called a hotspot. network NetworkSeveral computers that are connected to one another. , like the public Wi-Fi at your local coffee shop. Avoid accessing personal accounts or sending sensitive information on public Wi-Fi networks. If you really need to use a public Wi-Fi network, using a VPN will encrypt your data and can prevent it from being compromised.  

When it comes to your personal Wi-Fi network, you should always change the default DefaultA setting automatically chosen by a program or computer that remains until the user specifies another setting. name and password PasswordCombination of letters and numbers you select to secure an account or device. of your network. Setting up your home network properly can create a strong foundation for staying cyber safe.

You should install anti-virus software and firewalls on your personal devices. If your network is vulnerable, a virus VirusA computer program that can spread by making copies of itself. Computer viruses spread from one computer to another, usually without the knowledge of the user.  Viruses can have harmful effects, ranging from displaying irritating messages to stealing data or giving other users control over the infected computer. could infiltrate your system and expose valuable data. Anti-virus software Anti-virus softwareSoftware that defends against viruses, Trojans, worms and spyware. Anti-virus software uses a scanner to identify programs that are or may be malicious. Scanners can detect known viruses, previously unknown viruses and suspicious files. and firewalls serve as a shield in case a cyber threat Cyber threatA threat actor, using the internet, who takes advantage of a known vulnerability in a product for the purposes of exploiting a network and the information the network carries. breaks through your other defences. You should also ensure all of your devices and software SoftwareA computer program that provides instructions which enable the computer hardware to work. System software, such as Windows, Linux or MacOS, operate the machine itself, and applications software, such as spreadsheet or word processing programs, provide specific functionality. (including your anti-virus software) are updated regularly. Updates fix security issues and vulnerabilities, which will keep your devices and software working properly as they protect you and your digital identity.

Secure your accounts

Securing your online activity and accounts can give your digital identity extra protection.

Your accounts’ first line of defence is a strong password or passphrase. Use unique, complex passwords or passphrases for all of your different accounts. Using a password manager can be a great tool to help you create and organize all of your unique and strong passwords or passphrases. Just make sure you use an extra strong password or passphrase PassphraseCombination of random words you select to secure an account or device. for the password manager account!

Whenever it’s available, enable multi-factor authentication (MFA) on all of your accounts and devices. MFA requires more than one authentication AuthenticationA process or measure used to verify a user’s identity. factor to log into your account. This can be what you know (a PIN, password or security question), what you have (your phone or a fob), or what you are (your fingerprint, your face, your eyes, or your voice). Using MFA can stop cyber criminals from accessing your accounts — even if they do manage to get a hold of your password.

Avoid sharing personal information publicly on your social media accounts. You should also review the privacy and security settings on your social media accounts to control who can see what on your profile. Cyber criminals can find information about you through your social media accounts and use it for scams like spear-phishing and identity theft Identity theftThe crime of impersonating someone and using their private information, usually for financial gain. . Make sure you delete and block BlockTo stop a computer from reaching something on the internet, or, on social media, to stop a user from contacting you. any “friends” that you don’t know — they could be scammers trying to steal your info.

Accessing your accounts is an easy way for cyber criminals to gain access to all kinds of data. Keep your accounts secure so that your data stays private and out of their hands.

Conclusion

In the digital age, it’s nearly impossible to avoid having your personal information online. This makes it critical to protect your digital identity. By watching out for phishing scams, protecting your information and securing your accounts, you can stay cyber safe and help defend yourself against digital identity theft.

For more information on protecting your digital identity, check out the Canadian Centre for Cyber Security's publication Protecting Yourself From Identity Theft.

Date modified: