SlideShare une entreprise Scribd logo
1  sur  11
Protecting your identity online
Pseudo Identity
Go Pseudo!
Advocate Tip
 Creating an pseudonym for online surfing is the
safest way to remain anonymous to website
tracking, online marketing, data brokers and
identity thieves.
 Don’t be fooled by Social Media websites that
claim to not track or store your identity. They all
do!
 Remember your ‘real’ identity is a commodity to
these data stealers. They make huge profits from
selling your information to marketers and put you
at risk for identity theft.
Create your Pseudo
 Before you set up your accounts, think about what
you want to create;
 Name:
 User Name:
 Gender:
 Age: Location, State, City:
 Caricature
 Make sure you don’t use someone else's real identity to
impersonate or commit crimes. That is illegal!
Pseudo - Emails
 Gmail
 Inbox
 Live
 AOL
 Mail.com
 GMX
 Yahoo
 Keep it easy to remember and
try to use some of the social
media account its linked to.
Examples:
F@cB00k4u@gmail.com
@_0_L@AOL.com
 Exchange letters for characters,
example: identity (!d@nt!ty).
 Use: !=i, @=a,$=s etc.
 Don’t forget to underscore_
 Have a few extra ready as
backup. You never know when
you’ll need to replace one. Be
prepared!
Pseudo – Social Media
 Facebook
 MySpace
 Twitter
 YouTube
Pseudo – Online Records
 Using Pseudonyms online will eventually create
online records in search engines like:
 White Pages
 Google Search
 This is the purpose of going Pseudo! It’s better
they gather information about a fake identity, than
your real information.
 Periodicity search for your Pseudo name to see
how far it’s grown in popularity with the online
aggregators.
 Use Google Alerts to follow your Pseudo Identity
Resources
 Slideshare.net
≈ A Guide to Safe Surfing on the Internet
≈ Check Your Privacy Settings
≈ Remove Your Personal Information from Public
Websites
≈ Secure Social Media
≈ Specialty Credit Reports
Company names mentioned herein are the property of, and
may be trademarks of, their respective owners and are for
educational purposes only.
This document is not an endorsement of any of the products
mentioned.
I do not condone the use of using Pseudonyms for the
purpose of committing fraud and/or identity theft. If you
Catfish you will be caught!
I have not received any payment or compensation for
mentioning any products in this document.
Privacy in the news..
 Major Internet Security Flaw Exposes Millions Of
Usernames, Passwords
 Yahoo fixes Flickr invitation bug that leaked real
names and email addresses
 Data Brokers Sell Information About Rape
Survivors, Alcoholics, Mentally Ill People, And
More
 Social media sites hacked, information stolen
 The Data Brokers: Selling your personal
information
Stay Safe, Stay Secure
Created and designed by Mark Fullbright , Certified
Identity Theft Risk Management Specialist™ (CITRMS) as a
free service for consumers to protect themselves online and
reduce their exposure to identity theft
Updated
05/25/2014

Contenu connexe

Plus de - Mark - Fullbright

Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018
- Mark - Fullbright
 

Plus de - Mark - Fullbright (20)

Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
 
2018 IC3 Report
2018 IC3 Report2018 IC3 Report
2018 IC3 Report
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018
 
Credit Score Explainer
Credit Score ExplainerCredit Score Explainer
Credit Score Explainer
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015
 
Identity Theft - Proactive / Reactive First Steps
Identity Theft - Proactive / Reactive First Steps Identity Theft - Proactive / Reactive First Steps
Identity Theft - Proactive / Reactive First Steps
 
DATA BREACH CHARTS
DATA BREACH CHARTSDATA BREACH CHARTS
DATA BREACH CHARTS
 
Fifth Annual Study on Medical Identity Theft
Fifth Annual Study on Medical Identity TheftFifth Annual Study on Medical Identity Theft
Fifth Annual Study on Medical Identity Theft
 
Consumer Sentinel Network Report 2014
Consumer Sentinel Network Report 2014Consumer Sentinel Network Report 2014
Consumer Sentinel Network Report 2014
 
The Human Right to Privacy in the Digital Age
The Human Right to Privacy in the Digital Age The Human Right to Privacy in the Digital Age
The Human Right to Privacy in the Digital Age
 
DEBT RELIEF SERVICES & THE TELEMARKETING SALES RULE: A Guide for Business
DEBT RELIEF SERVICES & THE TELEMARKETING SALES RULE: A Guide for BusinessDEBT RELIEF SERVICES & THE TELEMARKETING SALES RULE: A Guide for Business
DEBT RELIEF SERVICES & THE TELEMARKETING SALES RULE: A Guide for Business
 
CONSUMER PERCEPTIONS ON SECURITY: DO THEY STILL CARE?
CONSUMER PERCEPTIONS  ON SECURITY: DO THEY STILL CARE?CONSUMER PERCEPTIONS  ON SECURITY: DO THEY STILL CARE?
CONSUMER PERCEPTIONS ON SECURITY: DO THEY STILL CARE?
 

Dernier

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
fonyou31
 

Dernier (20)

APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 

Pseudo Identity

  • 1. Protecting your identity online Pseudo Identity
  • 3. Advocate Tip  Creating an pseudonym for online surfing is the safest way to remain anonymous to website tracking, online marketing, data brokers and identity thieves.  Don’t be fooled by Social Media websites that claim to not track or store your identity. They all do!  Remember your ‘real’ identity is a commodity to these data stealers. They make huge profits from selling your information to marketers and put you at risk for identity theft.
  • 4. Create your Pseudo  Before you set up your accounts, think about what you want to create;  Name:  User Name:  Gender:  Age: Location, State, City:  Caricature  Make sure you don’t use someone else's real identity to impersonate or commit crimes. That is illegal!
  • 5. Pseudo - Emails  Gmail  Inbox  Live  AOL  Mail.com  GMX  Yahoo  Keep it easy to remember and try to use some of the social media account its linked to. Examples: F@cB00k4u@gmail.com @_0_L@AOL.com  Exchange letters for characters, example: identity (!d@nt!ty).  Use: !=i, @=a,$=s etc.  Don’t forget to underscore_  Have a few extra ready as backup. You never know when you’ll need to replace one. Be prepared!
  • 6. Pseudo – Social Media  Facebook  MySpace  Twitter  YouTube
  • 7. Pseudo – Online Records  Using Pseudonyms online will eventually create online records in search engines like:  White Pages  Google Search  This is the purpose of going Pseudo! It’s better they gather information about a fake identity, than your real information.  Periodicity search for your Pseudo name to see how far it’s grown in popularity with the online aggregators.  Use Google Alerts to follow your Pseudo Identity
  • 8. Resources  Slideshare.net ≈ A Guide to Safe Surfing on the Internet ≈ Check Your Privacy Settings ≈ Remove Your Personal Information from Public Websites ≈ Secure Social Media ≈ Specialty Credit Reports
  • 9. Company names mentioned herein are the property of, and may be trademarks of, their respective owners and are for educational purposes only. This document is not an endorsement of any of the products mentioned. I do not condone the use of using Pseudonyms for the purpose of committing fraud and/or identity theft. If you Catfish you will be caught! I have not received any payment or compensation for mentioning any products in this document.
  • 10. Privacy in the news..  Major Internet Security Flaw Exposes Millions Of Usernames, Passwords  Yahoo fixes Flickr invitation bug that leaked real names and email addresses  Data Brokers Sell Information About Rape Survivors, Alcoholics, Mentally Ill People, And More  Social media sites hacked, information stolen  The Data Brokers: Selling your personal information
  • 11. Stay Safe, Stay Secure Created and designed by Mark Fullbright , Certified Identity Theft Risk Management Specialist™ (CITRMS) as a free service for consumers to protect themselves online and reduce their exposure to identity theft Updated 05/25/2014