23 Jun Research the most current ways to prevent identity theft. List the pro’s and con’s of the one you feel would be the most effective.? – The initial post must include at
QUESTION: Research the most current ways to prevent identity theft. List the pro's and con's of the one you feel would be the most effective.
– The initial post must include at least one (1) scholarly source for support. You can use your textbook or current research articles (published within the past 5 years). Cite and reference in APA. (at least 250 words)
– Reply to one of your classmates at least 125 words. Add to the discussion. Do not just say, good job, way to go, etc. Your discussion question responses should reflect an understanding of the situation and the reading materials.
by Dilshad Hudda
During the pandemic situation of Covid-19, many financial institutions are facing many financial issues and scams, this is because of the high level of stress due to many users to prefer unsecured links instead of using Gmail conversations. The following are the most recent ways for preventing the identifying thefts, the steps include, should be careful while using the public internet like Wi-Fi, public wi-fi is affected the hacking when compared to organizations' Wi-fi network. Should be aware of data breaches, should not share the sensitive information of any individual through smartphone, also need to maintain the password as strongly by using different credentials, care should be maintained during clicking of unnecessary links, this is because most of the malware attacks are happening only by sending unsecured links to the users to trap their banking details. While doing the online shopping care should be maintained while selecting the web application need to shop only by using the secured web applications.
The following are the advantages and disadvantages of identifying theft, there are many advantages of keeping the identifying theft, which include it can promote the data storage in a secured manner throughout the data lifecycle, it is the best way to maintain individual users' logins for the employees in the organization. This identifying theft is also playing an important role in preparing the risk assessment report, theft identifying factors can also be used to minimize risk causing factors of the organization. While coming from the disadvantages point of view, requires high-security controls and a software system for identifying the theft-causing factors in the organization. Also, many terms and conditions are included while performing this theft-identifying activity. In some cases, much theft-identifying software and system will not be secured and could be aligned with various kinds of vulnerabilities and required high qualified staff for performing this theft identifying activities (Morris, 2018).
Morris, R. G. (2018). Information Technology Manager Characteristics and Information Security Breaches in Publicly Traded Companies: A Correlational Study Using Secondary Data (Doctoral dissertation, Capella University).