VIDEO How to Prevent Online Identity Theft: An Early Look


Windows Forum Admin
Staff member
Premium Supporter

A recent look at computer security shows online identity theft scams becoming easy for nefarious individuals who prey on those who lack essential security updates. Anyone experienced in the business need only to look at the serious manner of many, many businesses still running Windows XP without any group policy, domain controller policies, or end-of-life cycle goals. Many of these companies are simply unaware of the fate that will befall their entire network. Others have no problem incurring massive invoices, bills, and charges as a potential tax write-off at the end of the year for providing maintenance for ancient computers.

In this video we took at the specific incidents that lead to identity theft. Particularly in the area of fraudulent telephony, scareware, inefficiently secured systems, and our goal, ultimately, is to educate the audience. This video lacks essential terminology, including a glossary of information as well as an overall view of the problem from a macro perspective.

But what it does offer is the user the ability to take a look at just a small sample of scams out there, and start thinking critically. Like it or not, most adults lack critical thinking skills: Either they forgot them after years of not using them, they lack the intellectual capacity for it, or they were simply never taught it. This video teaches you to view with suspicion and not to trust someone just because they seem to act as an authority figure.

There is much more to talk about regarding this subject, but here is a start. Enjoy the video and beware of these threats. They are very real. Anecdotal story-telling has been used to explain the danger, concrete isolation of cause and effect has taken place. The bottom line is that the theft of information, especially from people in North America and Western Europe is a dream for many cybercriminals in developing areas of the world.

As we begin to understand this, we can talk even more about cyber-security in our videos. I hope that this has genuinely been helpful to you and that you enjoy the presentation.

The goals set forth in this video demonstration and presentation:
  • Help end-users understand the seriousness of online identity theft and how prevalent it has become that even a computer voice or real person will actually call you.
  • Help end-users find ways to mitigate these attacks, using many common sense tactics.
  • Help end-users shed some light on this subject, enticing them to think critically about the issue and take a pro-active stance against cyber-crime, cyber-bullying, and information theft.
  • Help the end-users develop an understanding that is owned by an ethical professional and operated by highly accredited individuals as well. This means data security, concrete privacy policies, and no unauthorized information disclosures.
  • We will start with the basics and look at ways to make future presentations about security vulnerabilities that can often plague very active members of the Internet community.
  • Internet users who can honestly classify themselves as novices who find computers difficult to use could be the most at risk. In this case, it is very important to know what to do if you are plagued with these kinds of problems.
Again, this video is the tip of the iceberg. But I personally hope it will help someone out there. And with time, we will continue to document ways to save information from data miners, aggregates, and the perpetrators of online fraud. This clearly goes above and beyond e-mails from Nigeria about a king's inheritance and bounty. We are now talking about real life consequences if one were to lose a SmartPhone connected to many different accounts, and so forth. This is why the necessity of such discussion will be extraordinarily important in the future if we are to take security risks seriously.

Last edited:
This website is not affiliated, owned, or endorsed by Microsoft Corporation. It is a member of the Microsoft Partner Program.