So you decided not to buy the new Iphone online because you just couldn’t feel comfortable about your security eh? Should you really be that concerned about your identity being stolen online through purchases that, lets face it, are put through secure connections utilizing ‘https’ at the beginning of the address? Here are a few things to think about before having that bit of paranoia online.

You’re driving just a few miles from home when a police unit comes into your rear view mirror. Not thinking much of it you continue on your way, eager to get home on that cushioned new couch to watch the football game. What you aren’t aware of however is the fact that the police unit on your six is now running your registration, wirelessly, through a server located at a dispatch center. Within a few seconds the officer is now reading and reviewing your entire drivers information which includes your address, date of birth, and other pertinent information via laptop. You apparently are operating your vehicle ok so you continue on your way home, undeterred by the mere encounter with a police car. So lets go one step further. Where was your personal information sent and received just now? It went from a mobile laptop, to a remote server, across a direct connection to a central server in your state, and back through the same process. This was all done with the help of the infamous ‘wireless’ network our world so closely relies upon now. Your information was probably then faxed to a printer, only to be thrown into a garbage can with a few folds in it, then to be shipped off to a dump to lie in the open fields of refuse.

Without having direct knowledge of the entire setup of this operation, does your next purchase of the latest mystery novel on Amazon sound like such a scary ordeal, or are you just as much as risk of having your identity stolen without even having a hand in the process? Just remember, sometimes even wireless information leads to paper. The only true preventative measure against identity theft is perhaps the use of a credit monitoring subscription, and of course it always pays to shred those nasty credit card offerings you receive that openly list your personal information.

We may rely upon wireless information, but there is always a paper trail. Got any examples, let us know!

Digg It! Bookmarks Stumble It! Google Bookmarks