{"id":48,"date":"2007-02-16T15:22:48","date_gmt":"2007-02-16T15:22:48","guid":{"rendered":"http:\/\/blogs.wabash.edu\/technotes\/2007\/02\/16\/internet-security-and-identity-theft\/"},"modified":"2007-02-16T15:22:48","modified_gmt":"2007-02-16T15:22:48","slug":"internet-security-and-identity-theft","status":"publish","type":"post","link":"https:\/\/blog.wabash.edu\/technotes\/2007\/02\/16\/internet-security-and-identity-theft\/","title":{"rendered":"Internet Security and Identity Theft"},"content":{"rendered":"<p style=\"margin-top: 0\"><img decoding=\"async\" alt=\"\" src=\"http:\/\/blogs.wabash.edu\/www2images\/avoid.gif\" align=\"right\" \/>Last month I gave a talk on web security and identity theft to the Women on Campus group. While IT Services takes a number of steps to protect the Wabash community, each of us must do our part to protect our personal and College information.<\/p>\n<p style=\"margin-top: 0\">The <a target=\"_blank\" href=\"http:\/\/www.bbbonline.org\/idtheft\/safetyQuiz.asp\">2006 Identity Fraud Survey Report<\/a> &#8212; released by the Council of Better Business Bureaus and Javelin Strategy &amp; Research &#8212; estimates there were 8.9 victims of identity theft in 2006, for a total fraud amount of $56.6 billion. While identity theft is a big problem, there are a number of things you can do to stay safe online.<\/p>\n<p style=\"margin-top: 0\">To help the Wabash community, we\u2019ve created a one-stop resource on our web site. From tips to creating good passwords and detecting phishing scams, to links to government resources for reporting and recovering from identity theft, this page has something for everyone. Click the link below to check it out.<\/p>\n<p style=\"margin-top: 0\">&nbsp;&nbsp;&nbsp;&nbsp;<a target=\"_blank\" href=\"http:\/\/www.wabash.edu\/technology\/security\">Wabash&#8217;s Internet Security and Identity Theft Resources<\/a><\/p>\n<p style=\"margin-top: 0\">&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Last month I gave a talk on web security and identity theft to the Women on Campus group. While IT Services takes a number of steps to protect the Wabash community, each [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-48","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"w_featured_image_url":"","_links":{"self":[{"href":"https:\/\/blog.wabash.edu\/technotes\/wp-json\/wp\/v2\/posts\/48","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.wabash.edu\/technotes\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.wabash.edu\/technotes\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.wabash.edu\/technotes\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.wabash.edu\/technotes\/wp-json\/wp\/v2\/comments?post=48"}],"version-history":[{"count":0,"href":"https:\/\/blog.wabash.edu\/technotes\/wp-json\/wp\/v2\/posts\/48\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.wabash.edu\/technotes\/wp-json\/wp\/v2\/media?parent=48"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.wabash.edu\/technotes\/wp-json\/wp\/v2\/categories?post=48"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.wabash.edu\/technotes\/wp-json\/wp\/v2\/tags?post=48"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}