31
Chapter 2 Protecting Your Online Identity
numbers, credit card numbers, Social Security
number, address, and birthday are information
hackers hope to gain. In order to protect your
online identity, develop a multi-tiered security
plan. Use the security plan checklist as shown in
Figure 2-1 as a tool.
Plan to protect your mobile devices from
hackers. Consider downloading and running
antivirus software for your mobile device. Even
though most are not susceptible to viruses, check
with your provider on a regular basis in the event
that conditions change. Because you rely on your
mobile devices, it is important to guard them
against theft and viruses that would disrupt your
primary means of communication.
One click can activate a code, and your computer
could be hacked or infected. An illegitimate
website may encourage visitors to download
applications or templates that contain malware.
A software virus is a computer program
designed to negatively impact a computer system.
A virus may destroy data on the computer, cause
programs on your computer to malfunction, or
collect information and transmit it to some other
location. Viruses can be introduced onto your
computer by downloading virus-infected programs
from an e-mail or from a website. Spyware is
software that spies on a computer. Spyware can
capture information such as Internet activity,
e-mail messages and contacts, usernames,
passwords, bank account information, and credit
card information. Often, affected users will not
be aware that spyware is on their computer.
Virus protection software purchased from a
reputable company will help protect a computer.
Virus protection software is also referred to as
antivirus or antimalware software. Once installed,
adjust the setting so that the software runs on a
regular basis. By selecting this option, the software
updates itself with the latest virus programs,
scans the computer for viruses, and deletes them
from the computer. After every Internet session,
it is advisable to scan your computer with your
virus protection software.
Your virus protection software should also
have a fi rewall. A fi rewall is a program that
monitors information coming into a computer
and helps assure that only safe information
gets through.
Create and Maintain a
Security Plan
Fortunately, there are steps you can take to
protect yourself while applying for jobs online. If
you have any suspicions about communicating
with someone or giving your information via a
website, do not proceed. Investigate the person
or the company with whom you are dealing. You
may be able to avoid a scam before it is too late.
Your online identity is yours alone. When
your information becomes public, it becomes
vulnerable to identity theft. Your bank account
Security Checklist
Secure passwords created for computer
Secure passwords created for mobile device
Password information stored in a safe place
Antivirus protection software installed and
running
Data back-up completed
Internet browser updated
Security settings set to high
Windows automatic updates in on position
Pop-up blocker turned on
Suspicious e-mails deleted
Unknown links avoided
Cookies deleted
Firewall turned on
Wireless router password set
Flash drives checked for viruses before using
Automatic wireless connections disabled
Free public hotspots avoided
Public hotspots or wireless connections
used with caution
Privacy settings on for social networks
Goodheart-Willcox Publisher
Figure 2-1 Consider the items in the security checklist
as you develop a security plan for your computer and
mobile device.
Previous Page Next Page