The Shortest Distance Between and Identity Thief and You is Your Computer

Identity thieves use many different methods to carry out their crimes.  One of their most effective tools just happens to be a computer.  The introduction and evolution of the internet has made it that much easier for identity theft to be committed by way of computer.  Several online predators seek out the innocent on fraudulent web sites or via email.  They often claim to be IRS agents or members of a banking institution, trying to persuade recipients out of residential addresses, Social Security numbers and bank account information.  Those individuals who choose to meet these requests are swindled instantly as the scammer immediately assumes their identity by charging up credit cards and possibly cleaning out their bank accounts.   

These facts are very unsettling when thinking how computers have become a way of life for many of us.  What is even more alarming is the fact that so many people unknowingly put themselves at the risk of identity theft with no involvement from the internet.  This occurs when someone gives away their computer or sells it at a trade show.  Several of these discarded computers have a hard drive full of personal information.  This makes it very easy for a criminal minded individual to thieve your hard earned money and possibly assume your identity. 

You would be surprised to learn what may still be on your computer even after you think it has been removed.  A computer-savvy thief may easily be able to retrieve email messages, your name, age, birth date and other sensitive information. 

Eluding Computer Identity Theft

It is very unfortunate that several identity thieves know how to operate your computer better than you.  While they are skilled in their methods of deception, there are few things that can be done to protect your personal information:

          Always remove the hard drive on a computer you are selling or giving away.                                    

          Keep it in safe place or destroy it

           Inquire within a reliable computer supplier about how to safely overwrite the files

           Use a quality hard disk cleaning program. 

There are also a few items you should delete individually.  Though it may be some what of a task, recovering from identity theft is even more of a challenge.  Here are the files that must be deleted before selling or giving your computer away: 


           all email contacts

           all email messages

           all important word documents

           all files in the recycle bin or trash folder of the operating system

           all temporary internet files

           your internet search history 

           the cache of your web browser

           any non-transferable software that may be installed on the hard drive

You should also make sure that trusted users of your computer are practicing identity theft prevention as well.  Children should protect themselves from identity theft by never using their real name in an email account and limiting personal details on social networking sites.  Being that children are often prime targets of internet predators, it is very important to protect the contents of your computer to prevent identity theft and ensure their safety.    


Log in or sign up to comment.

Post a comment

Log in or sign up to comment.

With the advent of wireless Internet, more and more computer users are entering the world of cyber space.

Yet, while these users are well aware of the importance of the protection of their computer when hooked up to regular internet providers, they are often oblivious to the fact that the same cyber dangers, and in fact even more, exist in the world of WiFi.

What you may not know is that same Internet connection that makes it possible to check your email from the comfort of your bed also makes it easier for hackers to access your personal information.

It is for this reason, the sharing of the wireless Internet connection, that protecting your computer when wireless is even more important than ever before.