Thursday, June 13, 2002

Online Credit Safety

Online Credit Safety

The Internet can make the shopping experience more enjoyable, especially if you hate long lines and crowds. But once you enter your credit card information online, you run the risk of having your information stolen. Thieves use the Internet to search for personal data, and once they have this information, they can open accounts in your name or use your credit card number to make purchases. Fortunately, there are ways to protect yourself online.

Verify Website Safety

    Online retailers know the importance of keeping your personal information safe and out of the hands of online thieves. Still, you need to do your part and check each website for security logos. The website may feature a Verisign logo or a lock box on the web page that asks for your name and credit card information. When in doubt, don't buy from a website.

Install Software Protection

    Securing your personal computer with virus protection or a desktop firewall (software that blocks unauthorized use) helps reduce your chances of having your credit card information stolen while shopping online. Some computers include software to protect your information and block hackers. However, you have to keep your subscription current and renew software programs once they expire.

Recognize Scams

    Numerous online scams exist, and falling prey to a fraudulent email can result in giving another person access to your credit card information. Remember, credit card companies will never contact you through email and ask for your personal information. Emails of this nature are intended to trick you and gain access to your credit card account.

Storing Personal Information

    Some banks and online stores give you the option of storing your credit card and personal information online. This proves convenient if you regularly shop with a specific retailer. However, keeping your credit card information on file with a retailer can have disastrous results if a savvy hacker breaches their network security and gains access to sensitive data.

0 comments:

Post a Comment