www.mcafee.com Open in urlscan Pro
104.102.58.198  Public Scan

Submitted URL: https://mcafeeinc-mkt-prod2-t.adobe-campaign.com/r/?id=hde57e253,7372e39e,7373cd0f&e=cDE9RE0zMTExMzIwJnAyPTIwMjRfMDVfMjdfUkVUX05vbl9FTl9QT0NfRHlu...
Effective URL: https://www.mcafee.com/blogs/privacy-identity-protection/guide-protecting-your-digital-identity/
Submission: On June 01 via api from BE — Scanned from DE

Form analysis 4 forms found in the DOM

https://www.mcafee.com/blogs

<form class="desktop-search-form-v2" action="https://www.mcafee.com/blogs">
  <div><span class="search_icon_desktop"> <img src="/blogs/wp-content/themes/securingtomorrow-brillio/img/new-icons/search_icon_black.svg" alt="search grey icon"> </span></div>
  <div class="desktop-search-div"><input class="dsk-search" autocomplete="off" name="s" type="text" placeholder="Search"></div>
</form>

https://www.mcafee.com/blogs

<form class="desktop-search-form" style="display: none;" action="https://www.mcafee.com/blogs">
  <div class="desktop-search-div"><input class="dsk-search" autocomplete="off" name="s" type="text" placeholder="Type and hit enter..."></div>
  <div><span class="close_icon_desktop"> <img src="https://www.mcafee.com/blogs/wp-content/themes/securingtomorrow-brillio/img/new-icons/cross-grey-icon.svg" alt="close grey icon"> </span></div>
</form>

https://www.mcafee.com/blogs

<form class="form-inline my-2 my-lg-0" action="https://www.mcafee.com/blogs">
  <div class="input-group mb-3 search-div">
    <div class="input-group-append"><button class="sarch-btn" type="button"><span class="fa fa-search" title="Type and hit enter..."><span style="display: none;">.</span></span> </button>
    </div>
  </div>
</form>

https://www.mcafee.com/blogs

<form action="https://www.mcafee.com/blogs" class="desktop-search-form" style="display: none;">
  <div class="desktop-search-div">
    <input class="dsk-search" name="s" type="text" placeholder="Type and hit enter..." autocomplete="off">
  </div>
  <div><span class="close_icon_desktop">
      <img src="https://www.mcafee.com/blogs/wp-content/themes/securingtomorrow-brillio/img/new-icons/cross-grey-icon.svg" alt="close grey icon">
    </span>
  </div>
</form>

Text Content

 * Products
   
    * All-In-One Protection
      
      * NEW
        McAfee+ Individual Plans
        
        Complete privacy, identity and device protection for individuals.
      
      * NEW
        McAfee+ Family Plans
        
        Complete privacy, identity and device protection for up to 6 family
        members.
   
    * Other Products & Services
      
      * Antivirus
      * Scam Protection
      * Virtual Private Network (VPN)
      * Mobile Security
      * PC Optimizer
      * TechMaster Concierge
      * McAfee Assist
   
    * Free Tools & Downloads
      
      * Web Protection
      * Free Antivirus Trial
      * Device Security Scan
      * Password Generator

 * Features
   
    * Keep Me Private Online
      
      * Personal Data Cleanup
      * Online Account Cleanup
      * VPN (Virtual Private Network)
      * Social Privacy Manager
   
    * Safeguard My Identity
      
      * Identity Monitoring
      * Credit Monitoring
      * Security Freeze
      * Identity Theft Coverage & Restoration
      * Password Manager
   
    * Protect My Devices
      
      * Antivirus
      * Scam Protection
      * Web Protection
   
    * Protect My Family
      
      * Protection Score
      * Parental Controls
      * Family Plans

 * Resources
   
    * Stay Updated
      
      * McAfee Blog
      * Reports and Guides
      * McAfee on YouTube
      * Prevent Spam and Phishing
   
    * Learn More
      
      * Learn at McAfee
      * What is Antivirus?
      * What is a VPN?
      * What is Identity Theft?
   
    * Press & News
      
      * McAfee Newsroom
      * AI News & Scams

 * About Us
   
    * Our Company
      
      * Company Overview
      * Awards & Reviews
      * Investors
   
    * Our Efforts
      
      * Inclusion & Diversity
      * Integrity & Ethics
      * Public Policy
   
    * Join Us
      
      * Careers
      * Life at McAfee
      * Our Teams
      * Our Locations

 * Why McAfee

Products

All-In-One Protection

NEW McAfee+ Individual Plans

Complete privacy, identity and device protection for individuals.

NEW McAfee+ Family Plans

Complete privacy, identity and device protection for up to 6 family members.

Other Products & Services

Antivirus

Scam Protection

Virtual Private Network (VPN)

Mobile Security

PC Optimizer

TechMaster Concierge

McAfee Assist

Free Tools & Downloads

Web Protection

Free Antivirus Trial

Device Security Scan

Password Generator

Features

Keep Me Private Online

Personal Data Cleanup

Online Account Cleanup

VPN (Virtual Private Network)

Social Privacy Manager

Safeguard My Identity

Identity Monitoring

Credit Monitoring

Security Freeze

Identity Theft Coverage & Restoration

Password Manager

Protect My Devices

Antivirus

Scam Protection

Web Protection

Protect My Family

Protection Score

Parental Controls

Family Plans

Resources

Stay Updated

McAfee Blog

Reports and Guides

McAfee on YouTube

Prevent Spam and Phishing

Learn More

Learn at McAfee

What is Antivirus?

What is a VPN?

What is Identity Theft?

Press & News

McAfee Newsroom

AI News & Scams

About Us

Our Company

Company Overview

Awards & Reviews

Investors

Our Efforts

Inclusion & Diversity

Integrity & Ethics

Public Policy

Join Us

Careers

Life at McAfee

Our Teams

Our Locations

Why McAfee
Support

Help

Customer Support

Support Community

FAQs

Contact Us

Activation

Activate Retail Card

Region

Asia Pacific

Australia - English

New Zealand - English

Singapore - English

Malaysia - English

Philippines - English

India - English

대한민국 - 한국어

日本 - 日本語

中国 - 简体中文

香港特別行政區 - 繁體中文

台灣 - 繁體中文

Europe

Česká Republika - Čeština

Danmark - Dansk

Suomi - Suomi

France - Français

Deutschland - Deutsch

Ελλάδα - Ελληνικά

Ireland - English

Magyarország - Magyar

ישראל - עברית

Italia - Italiano

Nederland - Nederlands

Norge - Bokmål

Polska - Polski

Portugal - Português

Россия - Русский

España - Español

Sverige - Svenska

Suisse - Français

Schweiz - Deutsch

Türkiye - Türkçe

العربية - العربية

United Kingdom - English

North America

United States - English

Canada - English

Canada - Français

South America

Argentina - Español

Brasil - Português

Chile - Español

Colombia - Español

México - Español

Perú - Español

Sign in
 * Support
   
    * Help
      
      * Customer Support
      * Support Community
      * FAQs
      * Contact Us
   
    * Activation
      
      * Activate Retail Card

 *  * Asia Pacific
      
      * Australia-English
      * New Zealand-English
      * Singapore-English
      * Malaysia-English
      * Philippines-English
      * India-English
      * 대한민국-한국어
      * 日本-日本語
      * 中国-简体中文
      * 香港特別行政區-繁體中文
      * 台灣-繁體中文
   
    * Europe
      
      * Česká Republika-Čeština
      * Danmark-Dansk
      * Suomi-Suomi
      * France-Français
      * Deutschland-Deutsch
      * Ελλάδα-Ελληνικά
      * Ireland-English
      * Magyarország-Magyar
      * ישראל-עברית
      * Italia-Italiano
      * Nederland-Nederlands
   
    *  
      
      * Norge-Bokmål
      * Polska-Polski
      * Portugal-Português
      * Россия-Русский
      * España-Español
      * Sverige-Svenska
      * Suisse-Français
      * Schweiz-Deutsch
      * Türkiye-Türkçe
      * العربية-العربية
      * United Kingdom-English
   
    * North America
      
      * United States-English
      * Canada-English
      * Canada-Français
   
    * South America
      
      * Argentina-Español
      * Brasil-Português
      * Chile-Español
      * Colombia-Español
      * México-Español
      * Perú-Español

 * Sign in


 * 
 * Blog
 * Topics
   How To Guides and Tutorials Internet Security Mobile Security Family Safety
   Privacy & Identity Protection Security News
 * At McAfee
   McAfee News Executive Perspectives McAfee Labs Life at McAfee Hackable?
   Podcast


 * English
   * Portuguese (BR)
   * Spanish
   * French(FR)
   * German
   * Italian
   * Japanese
   * French(CA)
   * Portuguese (PT)
   * Spanish (MX)
   * Dutch


   
 * 
   
 * Blog
 * Topics
   How To Guides and Tutorials Internet Security Mobile Security Family Safety
   Privacy & Identity Protection Security News
 * At McAfee
   McAfee News Executive Perspectives McAfee Labs Life at McAfee Hackable?
   Podcast
   

 * .
 * Portuguese (BR) Spanish French(FR) German Italian Japanese French(CA)
   Portuguese (PT) Spanish (MX) Dutch



Blog Privacy & Identity Protection Guide: Protecting Your Digital Identity


HOW TO PROTECT YOUR DIGITAL IDENTITY



Amy Bunn

Mar 28, 2024

7 MIN READ

People under 60 are losing it online. And by it, I mean money—thanks to digital
identity theft. 

In its simplest form, your digital identity is made up of a whole host of
things that can be traced back to you and who you are. That can range anywhere
from photos you post online to online shopping accounts, email accounts to
telephone numbers, and bank accounts to your tax ID.  

In this way, your digital identity is like dozens upon dozens of puzzle
pieces made up of different accounts, ID numbers, and so forth. When put
together, they create a picture of you. And that’s why those little puzzle
pieces of your identity are such attractive targets for hackers. If they get the
right combination of them, you can end up a victim of theft or fraud.  


PEOPLE UNDER 60 ARE MAJOR TARGETS FOR FRAUD 

Here’s what’s happening: people under 60 were twice as likely to report losing
money while shopping online. The spotlight also shows that adults under 60 are
more than four times more likely to report losing money to an investment scam,
and the majority of those losses happened in scams involving some form of
cryptocurrency investments.

And it’s no surprise younger adults get targeted this way. They’re far more
likely than any other age group to use mobile apps for peer-to-peer payments,
transfer money between accounts, deposit checks, and pay bills. In short,
there’s a lot of money flowing through the palms of their hands thanks to their
phones, as well as their computers. 

Protecting yourself from hackers and fraud means protecting
your digital identity. And that can feel like a pretty huge task given all the
information your digital identity includes. It can be
done, though, especially if you think about your identity like a puzzle. A piece
here, another piece there, can complete the picture (or complete it just
enough) to give a hacker what they need to separate you from your money. Thus,
the way to stay safe is to keep those puzzle pieces out of other people’s
hands.  


SIX WAYS YOU CAN PROTECT YOUR DIGITAL IDENTITY FROM HACKERS AND FRAUD 

It’s actually not that tough. With a few new habits and a couple of apps to help
you out, you can protect yourself from the headaches and flat-out pain of fraud.
Here’s a list of straightforward things that you can get started on right away: 

1. Start with the basics—security software  

Protect yourself by protecting your stuff. Installing and using security
software on your computers and phones can prevent all kinds of attacks and make
you safer while you surf, bank, and shop online. I should emphasize it
again—protect your phone. Only about half of people protect their phones even
though they use them to hail rides, order food, send money to friends, and more.
Going unprotected on your phone means you’re sending all that money on the
internet in a way that’s far, far less safe than if you use online protection. 

2. Create strong passwords  

You hear this one all the time and for good reason—strong, unique passwords
offer one of your best defenses against hackers. Never re-use them (or slight
alterations of them) across the different platforms and services you use. Don’t
forget to update them on the regular (that means at least every 60 days)! While
that sounds like a lot of work, a password manager can keep on top of it all for
you. And if your platform or service offers the use of two-factor
authentication, definitely make use of that. It’s a further layer of security
that makes hacking tougher for crooks. 

3. Keep up to date with your updates  

Updates have a way of popping up on our phones and computers nearly every
day, resist the urge to put them off until later. Aside from making
improvements, updates often include important security fixes. So, when you get
an alert for your operating system or app on your devices, go ahead and update.
Think of it as adding another line of defense from hackers who are looking to
exploit old flaws in your apps.   

4. Think twice when you share  

Social media is one place hackers go to harvest personal information because
people sometimes have a way of sharing more than they should. With info like
your birthday, the name of your first school, your mother’s maiden name, or even
the make of your first car, they can answer common security questions that could
hack into your accounts. Crank up the privacy settings on your accounts so only
friends and family can see your posts—and realize the best defense here is not
to post any possibly sensitive info in the first place. Also, steer clear of
those “quizzes” that sometimes pop up in your social feeds. Those are other ways
that hackers try to gain bits of info that can put your identity at risk. 

5. Shred it  

Even though so many of us have gone paperless with our bills, identity theft by
digging through the trash, or “dumpster diving,” is still a thing. Things like
medical bills, tax documents, and checks still might make their way to your
mailbox. You’ll want to dispose of them properly when you’re through with them.
First, invest in a paper shredder. Once you’ve online deposited that check or
paid that odd bill, shred it so that any personal or account info on there can’t
be read (and can be recycled securely). Second, if you’re heading out of town
for a bit, have a friend collect your mail or have the post office put a
temporary hold on your mail. That’ll prevent thieves from lifting personal info
right from your mailbox while you’re away. 

6. Check your credit  

Even if you don’t think there’s a problem, go ahead and check your credit. The
thing is, someone could be charging things against your name without you even
knowing it. Depending on where you live, different credit reporting
agencies keep tabs on people’s credit. In the U.S., the big ones are Equifax,
Experian, and TransUnion. Also in the U.S., the Fair Credit Reporting Act (FCRA)
requires these agencies to provide you with a free credit check at least once
every 12 months. Canada, the UK, and other nations likewise offer ways to get a
free credit report. Run down your options—you may be surprised by what you
find. 


HOW DO I KNOW IF MY IDENTITY HAS BEEN STOLEN?  

As I just mentioned, the quickest way to get sense of what’s happening with your
identity is to check your credit. Identity theft goes beyond money. Crooks will
steal identities to rent apartments, access medical services, and even get
jobs. Things like that can show up on a credit report, such as when an unknown
address shows up in a list of your current and former residences or when a
company you’ve never worked for shows up as an employer. If you spot anything
strange, track it down right away. Many businesses have fraud departments with
procedures in place that can help you clear your name if you find a charge or
service wrongfully billed under your name. 

Other signs are far more obvious. You may find collection agencies calling or
even see tax notices appearing in your mailbox (yikes). Clearly, cases like
those are telltale signs that something is really wrong. In that case, report it
right away: 

 * If you live in the U.S. and think that someone is using your personal
   information, visit IdentityTheft.gov. 
 * In Canada, visit antifraudcentre-centreantifraude.ca for help.  
 * And in the UK, check out CIFAS, the UK’s fraud prevention service, at
   cifas.org.uk. 

Likewise, many nations offer similar government services. A quick search will
point you in the right direction. 

Another step you can take is to ask each credit bureau to freeze your credit,
which prevents crooks from using your personal information to open new lines of
credit or accounts in your name. Fraud alerts offer another line of protection
for you as well, and you can learn more about fraud alerts here. 


KEEPING YOUR DIGITAL IDENTITY IN YOUR HANDS 

With so many bits and pieces of information making up your digital identity, a
broader way of keeping it safe involves asking yourself a question: what could
happen if someone got their hands on this info? Further realizing that even
little snippets of unsecured info can lead to fraud or theft in your name
helps—even that un-shredded bill or innocuous refund check for a couple of bucks
could give a crook the puzzle piece they need. You can keep your digital
identity safe by keeping those pieces of info out of other people’s hands.    

INTRODUCING MCAFEE+

Identity theft protection and privacy for your digital life

Download McAfee+ Now



Stay Updated

Follow us to stay updated on all things McAfee and on top of the latest consumer
and mobile security threats.


Amy Bunn Chief Communications Officer

Amy Bunn is head of communications at McAfee and has worked in technology and
cybersecurity for over 15 years. During this time, Amy has witnessed the
changing technology landscape and...


MORE FROM PRIVACY & IDENTITY PROTECTION

Previous

HOW TO SPOT A FAKE FACEBOOK ACCOUNT

How do you manage your Facebook friends? Do you keep your list really tight and
only include...

May 15, 2024   |   7 MIN READ

HOW TO STOP PHONE SPOOFING

We all get them: phone calls that appear to come from someone we may know, but
turn...

May 13, 2024   |   5 MIN READ

HOW DO HACKERS HACK PHONES AND HOW CAN I PREVENT IT?

The threat of having your phone hacked has become a common fear. The truth is
that it...

May 10, 2024   |   7 MIN READ

HOW TO PROTECT YOUR INTERNET-CONNECTED HEALTHCARE DEVICES

The IoT in healthcare is new realm of care with breakthroughs big and small.
From the fitness tracker on your...

May 09, 2024   |   6 MIN READ

WHAT YOU NEED TO KNOW ABOUT ELECTION SECURITY

Voters are gearing themselves for the 2024 U.S. presidential elections. Whether
you’re a new voter or a parent looking to...

May 30, 2024   |   4 MIN READ

HOW TO PROTECT YOURSELF FROM A SPEAR PHISHING SCAM

As the name implies, spear phishing attacks are highly targeted scams. They
often occur in professional settings,...

May 30, 2024   |   4 MIN READ

WHAT PERSONAL DATA DO COMPANIES TRACK?

Private tech companies gather tremendous amounts of user data. Understand what
information is being collected by tech...

May 29, 2024   |   6 MIN READ

HOW A VPN CAN MAKE YOUR TIME ONLINE MORE PRIVATE AND SECURE

What is a VPN (virtual private network)? And how can it make your time online
more secure—and...

May 24, 2024   |   6 MIN READ

WHAT IS DOXING?

Imagine someone putting your personal information out online for thousands of
strangers to see—your home address, phone...

May 23, 2024   |   6 MIN READ

WHAT TO DO IF YOUR EMAIL IS HACKED

Email hacking is more common than you think. If you find yourself a victim of
email hacking here are a...

May 22, 2024   |   8 MIN READ

HOW TO PROTECT YOURSELF ON SOCIAL NETWORKS

There are now over 5 billion active social media users worldwide, representing
62.3% of the global population....

May 17, 2024   |   4 MIN READ

WHY YOU NEED A PERSONAL VPN

It used to be the case that only businesses used virtual private networks (VPNs)
to connect securely...

May 15, 2024   |   3 MIN READ

HOW TO SPOT A FAKE FACEBOOK ACCOUNT

How do you manage your Facebook friends? Do you keep your list really tight and
only include...

May 15, 2024   |   7 MIN READ

HOW TO STOP PHONE SPOOFING

We all get them: phone calls that appear to come from someone we may know, but
turn...

May 13, 2024   |   5 MIN READ

HOW DO HACKERS HACK PHONES AND HOW CAN I PREVENT IT?

The threat of having your phone hacked has become a common fear. The truth is
that it...

May 10, 2024   |   7 MIN READ

HOW TO PROTECT YOUR INTERNET-CONNECTED HEALTHCARE DEVICES

The IoT in healthcare is new realm of care with breakthroughs big and small.
From the fitness tracker on your...

May 09, 2024   |   6 MIN READ

WHAT YOU NEED TO KNOW ABOUT ELECTION SECURITY

Voters are gearing themselves for the 2024 U.S. presidential elections. Whether
you’re a new voter or a parent looking to...

May 30, 2024   |   4 MIN READ

HOW TO PROTECT YOURSELF FROM A SPEAR PHISHING SCAM

As the name implies, spear phishing attacks are highly targeted scams. They
often occur in professional settings,...

May 30, 2024   |   4 MIN READ

WHAT PERSONAL DATA DO COMPANIES TRACK?

Private tech companies gather tremendous amounts of user data. Understand what
information is being collected by tech...

May 29, 2024   |   6 MIN READ

HOW A VPN CAN MAKE YOUR TIME ONLINE MORE PRIVATE AND SECURE

What is a VPN (virtual private network)? And how can it make your time online
more secure—and...

May 24, 2024   |   6 MIN READ

WHAT IS DOXING?

Imagine someone putting your personal information out online for thousands of
strangers to see—your home address, phone...

May 23, 2024   |   6 MIN READ

WHAT TO DO IF YOUR EMAIL IS HACKED

Email hacking is more common than you think. If you find yourself a victim of
email hacking here are a...

May 22, 2024   |   8 MIN READ

HOW TO PROTECT YOURSELF ON SOCIAL NETWORKS

There are now over 5 billion active social media users worldwide, representing
62.3% of the global population....

May 17, 2024   |   4 MIN READ

WHY YOU NEED A PERSONAL VPN

It used to be the case that only businesses used virtual private networks (VPNs)
to connect securely...

May 15, 2024   |   3 MIN READ

HOW TO SPOT A FAKE FACEBOOK ACCOUNT

How do you manage your Facebook friends? Do you keep your list really tight and
only include...

May 15, 2024   |   7 MIN READ

HOW TO STOP PHONE SPOOFING

We all get them: phone calls that appear to come from someone we may know, but
turn...

May 13, 2024   |   5 MIN READ

HOW DO HACKERS HACK PHONES AND HOW CAN I PREVENT IT?

The threat of having your phone hacked has become a common fear. The truth is
that it...

May 10, 2024   |   7 MIN READ

HOW TO PROTECT YOUR INTERNET-CONNECTED HEALTHCARE DEVICES

The IoT in healthcare is new realm of care with breakthroughs big and small.
From the fitness tracker on your...

May 09, 2024   |   6 MIN READ

Next
 * 1
 * 2
 * 3

Back to top
 *  
 * 
 * 
 * 
 * 

--------------------------------------------------------------------------------


Corporate Headquarters
6220 America Center Drive
San Jose, CA 95002 USA

Products

McAfee+™ Individual
McAfee+™ Family
McAfee® Total Protection
McAfee® Antivirus
McAfee® Safe Connect
McAfee® PC Optimizer
McAfee® TechMaster
McAfee® Mobile Security


Resources

Antivirus
Free Downloads
Parental Controls
Malware
Firewall
Blogs
Activate Retail Card
McAfee Labs


Support

Customer Service
FAQs
Renewals
Support
Community


About

About McAfee
Careers
Contact Us
Newsroom
Investors
Legal Terms
Your Privacy Choices
System Requirements
Sitemap

--------------------------------------------------------------------------------

  United States / English Copyright © 2024 McAfee, LLC
Copyright © 2024 McAfee, LLC
United States / English

✓
Danke für das Teilen!
AddToAny
Mehr…







Feedback