Protecting yourself from identity theft online (ITSAP.00.033)

A digital identity is information about a person, or an organization that represents that entity uniquely within a domain. When you post or share information about yourself or your organization, you are building and adding to that identity. Your digital identity contributes to your reputation and credibility when engaging with people, products, and services online.

Personally identifiable information (PII) is a high-value target for cyber threat Cyber threatA threat actor, using the internet, who takes advantage of a known vulnerability in a product for the purposes of exploiting a network and the information the network carries. actors who look to sell this information or use it for fraudulent purposes. Threat actors can steal PII using unsophisticated techniques, like mail theft, or more sophisticated techniques, like phishing PhishingAn attempt by a third party to solicit confidential information from an individual, group, or organization by mimicking or spoofing a specific, usually well-known brand, usually for financial gain. Phishers attempt to trick users into disclosing personal data, such as credit card numbers, online banking credentials, and other sensitive information, which they may then use to commit fraudulent acts. or attacks on databases or online services. Once a threat actor has sufficient identity attributes, they can create fraudulent identity credentials or take control of existing credentials.

On this page

Your digital identity

Your digital identity includes all the personal identity attributes that are available about you online, such as your:

  • date of birth
  • social insurance number
  • medical information
  • phone number
  • login credentials

This data is collected and shared when you interact with online accounts like your social media accounts, online subscriptions, financial accounts and others. Your data is also collected when you use Internet browsers, cloud services and online databases, like health or academic platforms. Your digital identity attributes grow as you interact with more online services and as organizations you connect with in the physical world put more of their data online.

Threats to your digital identity

Any personal information shared online is at risk of being compromised or stolen. Some main threats to your digital identity include the following examples.

Phishing

A scammer calls you, sends you a text, emails you or uses social media to trick you into:

  • clicking a malicious link
  • downloading malware
  • sharing sensitive information

Further reading

Third-party data breaches

Third-party data breaches occur when a threat actor compromises your vendor’s network and sensitive data. External networks and information, like client data and credentials, handled by the compromised vendor are at risk. Threat actors may use compromised credentials to access other accounts, further spreading the attack.

Further reading - Third-party data breaches

Social engineering

A scammer uses a more personalized phishing attack to target you specifically. Social engineering Social engineeringThe practice of obtaining confidential information by manipulation of legitimate users. A social engineer will commonly use the telephone or internet to trick people into revealing sensitive information. For example, phishing is a type of social engineering. attacks often include personal details about you or your organization to trick you into sharing further personal details.

Further reading - Social engineering

Deepfakes

A threat actor uses synthetic media, like video, audio and photos, to impersonate you or your organization. They can also use this media as a form of authentication AuthenticationA process or measure used to verify a users identity. or misrepresentation to steal sensitive information or spread misinformation.

Further reading - Deepfakes

Protecting your digital identity

To protect your digital identity, you should implement basic cyber security Cyber securityThe protection of digital information, as well as the integrity of the infrastructure housing and transmitting digital information. More specifically, cyber security includes the body of technologies, processes, practices and response and mitigation measures designed to protect networks, computers, programs and data from attack, damage or unauthorized access so as to ensure confidentiality, integrity and availability. best practices.

Use a secure Wi-Fi network

Secure your Wi-Fi network by changing the default network name, known as the service set identifier, and password that came with your router and service account. Avoid using public Wi-Fi networks, especially if sending sensitive information or logging into sensitive accounts. If you must use a public Wi‑Fi network, use a virtual private networkto protect sensitive information.

Use security tools and software

Install a firewall FirewallA security barrier placed between two networks that controls the amount and kinds of traffic that may pass between the two. This protects local system resources from being accessed from the outside. to protect your network from external threats. A firewall filters and blocks malicious traffic. Install anti-virus software Anti-virus softwareSoftware that defends against viruses, Trojans, worms, and spyware. Anti-virus software uses a scanner to identify programs that may be malicious. Scanners can detect known viruses, previously unknown viruses, and suspicious files. to scan your devices for malware MalwareMalicious software designed to infiltrate or damage a computer system, without the owner's consent. Common forms of malware include computer viruses, worms, Trojans, spyware, and adware. , and anti-phishing software to block phishing content. Ensure you update all software and applications regularly.

Secure your accounts

Use strong passwords and passphrases with multi-factor authentication Multi-factor authenticationA tactic that can add an additional layer of security to your devices and account. Multi-factor authentication requires additional verification (like a PIN or fingerprint) to access your devices or accounts. Two-factor authentication is a type of multi-factor authentication. (MFA) and phishing-resistant MFA to secure all accounts. MFA adds a layer of security by protecting your account if your password is compromised.
Keep personal social media accounts private to restrict those who can see what you share. This can reduce the risks of deepfakes. For business social media accounts, remind employees who manage the accounts to be cautious about the information they are posting.

Share your personal information wisely

Before signing up for services and accounts, you may want to research who you are sharing data with. Review company privacy policies to find out how third parties handle your personal information.
If you get an unsolicited request, think twice before sharing personal information. Don’t click on links included in text or email messages. Verify the identity of the person or company asking for this information and the legitimacy of the request. When in doubt, contact the company by using the contact information posted on the official website.

Manage and monitor accounts

Review your online accounts regularly and monitor financial accounts for suspicious activity. If you no longer use an account, be sure to remove any personal information and delete the account.

Addressing digital identity theft

If your digital identity has been compromised, take immediate action:

  • Report the incident to the account source, as well as other associated or connected accounts
  • Determine which information could be affected, such as financial information or social insurance number
  • Change passwords and security questions on all accounts that are related to the compromised account, like partnered accounts and login emails, or that use the same password
  • Use Equifax and TransUnion to analyze your credit report and enable alerts to notify you of unauthorized inquiries
  • Report your incident to the Canadian Anti-Fraud Centre online or by phone at 1‑888-495-8501
  • Notify law enforcement of the incident
  • Contact the Cyber Centre to report organizational identity theft activity

Learn more

Date modified: