ipl-logo

Persuasive Essay On Identity Theft

1103 Words5 Pages

The United States Department of Justice defines identity theft as any type of crime in which someone wrongfully obtains and uses another person data in someway that involves fraud or deception, typically for economic gain. Hackers, someone who exploits weaknesses in a computer system or network, currently tend to target stealing peoples identity under the persona of a new job, or free cruise. However, currently hackers barely have to try to obtain personal information. We live in a world that is technology based and the majority of our information is online for anybody to see. We must protect our information and identity.

Hackers try everyday to take technology users personal information, to aid them in ultimately stealing their identity. …show more content…

We upload everything online, from our name, to the school we go to, from our current location, to our phone numbers, full name, maiden name; everything is uploaded to Twitter, Instagram, or Facebook. This not only makes us an easier target for identity theft, but also provides hackers with every detail they need to continue on with their illegal actions. Not many Internet users are aware of the concept that once they have uploaded or posted something online, it will always be there. According to the Washington Post, the United States Military social media accounts were hacked by ISIS sympathizers. Social media is easy to hack and the fact that we continue to upload everything to our accounts only further allows us to higher our chances in becoming a victim of identity …show more content…

We often become victims of hacking and viruses due to our inability or unwillingness to apply software that stops viruses. There are plenty trustworthy anti virus software such as McAfee. Paying the extra buck or going the extra mile can make the difference between having to drop hundreds on a new computer, and getting your old computer fixed. It can also serve as the safety behind the disappearance of years of work by opening a single email. If we become more aware and take the steps in protecting our computer and the information within it we stand a chance against the

Open Document