Identity theft  What and How to protect ourselves? ▷ 2020

As Internet users, we should all pay close attention to security measures when browsing. This is because problems such as identity fraud, where a subject impersonates another person in order to be able to carry out any type of criminal act, including making any type of purchase or attempting an attack.

This modality is applied more and more by cyber criminals, who take advantage to carry out different types of transactions on behalf of another person, being that this can be done because there are apps that do not provide the necessary security. In this post we teach you everything you need to know to stay safe from unwanted episodes.

This type of crime has been increasing at present, since the computer criminals They seek to take advantage of the indisputable boom in the use of the Internet and social networks.

What is spoofing and with what intention is it done?

Identity theft is one by which a third party steals your personal information in order to carry out an unlawful act, such as: the theft of money, a fraud, a purchase, among others.

It should be noted that your identity is composed of your personal data such as your name, bank account information, room address, your telephone number or any type of data that can identify you.

Criminals use this methodology in order to contract some type of service, make an expense with your credit card, perform any type of illegal act or buy things online.

What are the main risks of a person taking our identity as theirs?

As has been said in the previous points, identity theft can bring with it several types of risks, which can cause infinities of inconveniences, within which we can achieve:

  • Instability.
  • Falsification of your identity.
  • Create brands in the electronic space.
  • Uncertainty.
  • Management of minds and actions.

To avoid them, it is essential that programs are formed that provide adequate security, with the intention of creating processes that make these cases do not exist, apart from prevent the things we do from being recorded on the network and our privacy is violated, much less our personal information.

Phishing, how does identity substitution work on the Internet?

Before describing this point, it is important to indicate that “phishing” or identity theft is when a unknown person uses your data without your permission for a specific purpose.

However, this criminal method allows criminals to steal your personal information and trespass the limits of your security to commit any kind of scam, slander or libel, which are the most common crimes that a hacker executes, therefore its type of attack can be:

  • Against a public service, this person impersonates the identity of the person who works in a certain company to ask you to provide your personal information, and then take it to make transactions to their bank account.
  • Against social pages, where a third party sends you a message through any network with an external link, and when you click it, your personal data is stolen and stolen.

In case you think this has happened to you, it is important that you constantly verify your bank accounts and your social networks.

How can I protect myself from phishing so that no one takes my identity online?

Phishing can lead to your passwords being breached and your accounts being fraudulent. That is why when you enter a website it is essential that you check the URL, for that you can place the mouse over the link. However, links are covered with fake domain names or letters so you can enter a page that is not legitimate.

To protect our personal data when we surf the net, it is essential that:

Be cautious with certain websites

There are pages that are managed by criminals with the intention of stealing information and committing fraud, which is why when entering a we must make sure it is safe and always be attentive when they require information about our bank account, telephone or room to be provided.

*Note: It is important that the URL address is verified with the intention of ensuring that it is legitimate.

Use an antivirus

Antimalware vs Antivirus How are both tools different?

A good option is that analyze your computer constantly with the intention of verifying that there is no type of malware or virus.

Constantly modify your passwords

protect-files-on-a-USB-pendrive-with-a-secure-password

People who are dedicated to stealing information can enter your email, so you must choose a good password to prevent this from happening. It is recommended that you use multiple passwords and change them several times.

Be careful where you shop online

gafam-company-amazon

By using the Internet you can find different sites where you get many products. In the event that you like to buy online, you should be careful as information thieves can make you believe that there are problems with your account and thus scam you.

Don’t spread a lot of data

When registering on a page try to not provide as much information personal, since there are people who take the same to commit illicit acts.

Crime of identity theft What is the penalty for a person posing as another in Spain?

There are many cases where people have been impersonated, because today this is constantly happening, so criminals create any type of profile with which violate security.

In Spain, this type of crime itself is not established in the Penal Code, but it is stipulated when marital status is supplanted, which is typified in the Article 401 of the Penal Code, which establishes that:

“Whoever impersonates the civil status of another person will be punished with a prison sentence of 6 months to 3 years”

Likewise, this type of crime is punishable by Article 402, which reads the following:

“Whoever carries out any illegal act invested in the figure of an official or public authority will be punished with a prison sentence of 1 to 3 years.”

Now, this punishment seeks to protect the identity of the people apart from the public faith, since so that it can be consummated it is essential that the identity of another person is usurped and that this person commits some type of fraud that harms the victim.

For example, one of the crimes that is most used by these criminals is the violation of the right to one’s image, established in the Article 18 of the Spanish Constitution, where a third party establishes a fake profile with the information they take from another subject, such as their name.

Likewise, it may happen that this criminal steals a password or the account of another person and accesses it, meaning that a third party gets into a profile of another subject stealing their passwords or their accounts and where they access them, which is why which must serve a sentence of 1 to 4 years, as well as with a fine of 12 to 24 months, according to article 197 of the Penal Code.

If you have any questions, leave them in the comments, we will answer you as soon as possible, and it will also be of great help to more members of the community. Thank you! 😉

You may be interested:

Rate this post

Leave a Comment