Protect Your Identity, Credit Card Information, and Computer
Learn how to protect your identity, credit card information, and computer.
- Are your identity and credit card information safe?
- Are your online activities being watched?
- Is your computer safe from viruses?
- Are your documents and files easily accessible to others?
Are your identity and credit card information safe?
Phishing is when you receive an email that appears to be from a well-known company, but is actually attempting to steal your credit card numbers and other personal information!
- Learn how to spot phishing emails from PayPal.
- Learn what to do, if you think your identity has been stolen from the FTC (Federal Trade Commission).
Are your online activities being watched?
Spyware is a type of malware that is installed on computers and collects little bits of information at a time about users without their knowledge. The presence of spyware is typically hidden from the user, and can be difficult to detect. Typically, spyware is secretly installed on the user's personal computer. Sometimes, however, spywares such as keyloggers are installed by the owner of a shared, corporate, or public computer on purpose in order to secretly monitor other users.
Read the full definition from Wikipedia.
How do I remove malware and spyware from my Windows computer?
Learn how to install and use Malwarebytes software (free), which can detect and remove malware, including spyware and adware, from your Windows computer.
Note: It is recommended that you clean your computer after removing malware by using CCleaner (free) for Windows.
Is your computer safe from viruses?
An unprotected computer can become infected within 15 minutes of being on the Internet. Do not let your computer be a target!
- Learn about your options to back-up your documents and files at Boston College.
- Learn how to stay safe online from OnGuardOnline.gov.
Are your documents and files easily accessible to others?
Use of unsecured wireless networks can put you at risk.
Wireless networks broadcast and retrieve data through the air using radio frequencies, similar to those used by cordless phones. Data, such as credit card numbers, passwords, email or instant messages, transmitted “in the clear” over an unencrypted wireless service can be intercepted and viewed by a malicious user without your knowledge. Data that is submitted via an unsecure Web site or application is even more vulnerable. We recommend that you use the BC secure wireless network (BC sign-in required).
When you are connected to file-sharing programs for music, games, or software, you may unknowingly allow others to copy private files you never intended to share.
- Learn about the risks of filesharing from the FTC (Federal Trade Commission).
Want to learn more?
Learn more about protecting yourself online from stopthinkconnect.org.
Note: The Anti-Phishing Working Group (APWG) and National Cyber Security Alliance (NCSA) led the development of the STOP. THINK. CONNECT. campaign. The U.S. Department of Homeland Security provides the Federal Government's leadership for the STOP. THINK. CONNECT. campaign.