Posts

The First Eight Steps to Bulletproof Your Identity

Think about it…slowly, over time, we have given away our privacy. Many times we don’t even realize we are giving it away. We commonly trade our personal information for access to website content (free songs, email), the chance to win a contest (iPods, vacations) or a one-time 10% discount at a clothing retailer. I call this slow and unnecessary leakage of our personal information identity creep. Our information is requested in a subtle way, and because the immediate benefits seem substantial and often feel harmless, we overlook the downside—that we are gradually broadcasting our identity to those who shouldn’t have it.

One source at a time, we must reverse our bad habits and guard information rather than give it out. Understandably, we cannot entirely give up sharing our information. But we must determine what to share and with whom. We must begin to accumulate our privacy over time. This incremental approach keeps prevention from being an overwhelming task and reminds you to consider the risk anytime identity is involved.

Here are Eight Steps to Start the Process: Read more