Unit 2 Career Readiness
Copyright Goodheart-Willcox Co., Inc.
Be cautious of how much information you share on social media.
If you suspect your identity has been stolen, visit the Identity Theft
website provided by the Federal Trade Commission for resources
and guidance. Time is of the essence, so if this unfortunate situation
happens to you, act immediately. Tips for protecting yourself from
identity theft are listed in Figure 10-3.
Create a Security Plan
A security plan should be in place for your computer. This also
applies to any databases you maintain and any mobile devices
you have. If you have any suspicions about communicating with
someone or giving your information via a website, do not proceed.
Investigate the person or the company with whom you are dealing.
You may be able to avoid a scam before it is too late.
Download and run antivirus software for your mobile device.
Many people rely on mobile devices. It is important to guard
them against viruses. An infected mobile device may disrupt a
primary means of communication. It may also expose personal
data to theft.
You must also plan to protect your mobile devices from theft.
If you become careless and leave your smartphone or other device
somewhere, your identity can be stolen. You may also be stuck with
a large telephone bill. If the device is owned by your employer, you
may be responsible for replacing it using your own money. Use a
password to lock your mobile device. This will help prevent it from
being used if it is stolen. Have the number of your mobile device in
a safe place so that if the unexpected happens, you can contact your
service provider and have the device disabled.
Social media is commonly used by organizations
to reach customers and find new ones. Because it is
so available and easy to use, those who are writing
communications for the organization must be prudent
when using sites such as Facebook or Twitter for
business purposes. Remember that it is unethical to spam customers
who have not requested to be on an organization’s mailing list. Keep
your messages honest and return messages from those who have
taken time to respond to your communication. Use good judgment and
represent the organization in a professional manner.