Logo

10 Practical Steps to
Stay Safe Online

Identity theft isn’t just a “someone stole my credit card” problem anymore. Today, cybercriminals can stitch together your identity from dozens of small data points—an old password from a past breach, your mobile number from a leaked database, a photo of your driver’s licence you sent to “verify” an account, or even the oversharing that happens on social media without anyone noticing.

As more everyday tasks move online—banking, shopping, government services, healthcare portals, school accounts, and work tools—the amount of personal information tied to your digital life grows. That convenience is great… until someone else tries to use it.

This guide explains what identity theft is, how it happens in the real world, and the most effective ways to reduce your risk. It also includes a practical response plan (because prevention is ideal, but preparation is powerful).

What is identity theft?

Identity theft happens when someone uses your personal information without permission to impersonate you, gain financial benefits, commit fraud, or perform illegal activities. It might look like:

Identity crime can be quick and obvious (a large fraudulent purchase), or slow and quiet (small test transactions, a new service opened, or a password changed you didn’t notice).

If you want an Australian-government starting point for what to do when identity theft or a data breach happens, myGov’s recovery guidance and cyber.gov.au’s identity theft recovery pages are solid references.

How identity theft happens today

Cybercriminals usually don’t “hack you” in a dramatic movie-style way. In practice, identity theft is typically enabled by one (or more) of these situations:

1) Data breaches (your information leaks without your fault)

Organisations get breached and customer data is exposed—emails, phone numbers, addresses, dates of birth, and sometimes ID documents. Australia’s Notifiable Data Breaches (NDB) reporting highlights how frequently breaches occur across industries. Why this matters: criminals can use leaked info to target you with convincing scams or to answer “security questions” used by poorly-designed services.

2) Phishing and impersonation (you’re tricked into handing it over)

Phishing emails, fake login pages, SMS “security alerts,” calls pretending to be banks or government agencies—these are designed to create urgency so you act before thinking.

Australia’s ACCC Scamwatch and the ACCC scams guidance explain how scams attempt to steal personal information for fraud and identity theft.

3) Credential stuffing (reused passwords are tested everywhere)

If you reuse passwords, a breach on one site can lead to account takeovers on others. Attackers use automation to try leaked username/password combos at scale.

4) Malware, fake apps, and risky downloads

Malicious apps or software “clones” can steal keystrokes, harvest data, or hijack sessions—especially if installed from untrusted sources.

5) SIM swapping and number hijacking

If attackers can take over your mobile number, they may intercept SMS-based login codes or password resets. This is one reason security teams prefer app-based authenticators or hardware security keys over SMS where possible.

What information do criminals actually want?

Beware of suspicious and unknown links-Computing Australia Group

Not every piece of personal information is equally valuable. High-risk data includes:

The goal is often account takeover (email is the biggest prize), because once someone controls your email they can reset passwords for many other services.

Ways to prevent identity theft (updated, practical strategy)

Below are the most effective controls—prioritised by impact.

1) Secure your devices like they’re wallets

Your phone and laptop hold your life: saved passwords, banking apps, emails, identity photos, and authentication codes.

Do this:

Extra protection: keep your lock screen notifications limited (so one-time codes or sensitive previews don’t show when your phone is locked).

2) Use a password manager and stop reusing passwords

Strong passwords aren’t just “complex”—they need to be:

A password manager helps you create and store unique passwords without relying on memory.

Modern best practice: Don’t rotate passwords on a schedule unless there’s a reason. NIST’s Digital Identity Guidelines recommend focusing on length, screening for compromised passwords, and changing passwords when compromise is suspected—not arbitrary periodic resets.

What to do in real life:

3) Turn on MFA everywhere—prefer phishing-resistant options

Multi-factor authentication (MFA) adds a second proof beyond your password. Even if someone steals your password, MFA can stop the login.

The Australian Cyber Security Centre (ACSC) strongly recommends MFA as a key protective control.

Best → okay options (roughly):

1. Security keys (hardware keys; highly phishing-resistant)

2. Passkeys (where supported—very strong, user-friendly)

3. Authenticator app codes (time-based codes or push approvals)

4. SMS codes (better than nothing, but weaker than the above)

Where to enable MFA first:

4) Be ruthless about links, attachments, and “urgent” messages

This is where most identity theft starts.

Safer habits:

If you’re unsure about a link on desktop, hovering to preview the URL can help—but note that modern phishing can still look convincing. The safest approach is: don’t use embedded links for logins.

5) Download apps and software only from trusted sources

Criminals clone apps that look legitimate, then use them to steal login details.

Do this:

6) Keep antivirus/anti-malware and browser protection up to date

On modern systems, built-in protections are often strong (e.g., Windows Security), but whatever you use must be updated. Malware is frequently delivered through:

7) Use public Wi-Fi carefully (and understand what a VPN does—and doesn’t)

A VPN can protect your traffic on untrusted networks and reduce some forms of tracking. But a VPN does not:

Use a VPN as a privacy and network-safety tool, not an identity theft shield. Your biggest wins still come from MFA, password hygiene, and scam detection.

8) Lock down social media (oversharing fuels targeted fraud)

Criminals use social media to answer common “verification” questions and craft convincing impersonation scams.

Reduce your exposure:

Consider switching accounts to private and reviewing follower lists—especially on platforms where you accept unknown requests.

9) Turn on banking alerts and monitor transactions

Real-time alerts shorten the time between compromise and action.

Enable notifications for:

Even if a transaction is small, it may be a “test” charge.

10) Protect your credit file (Australia: consider a credit ban if needed)

If you believe you’re at risk—or if your identity information has been exposed—placing a credit report ban can help stop new credit being opened in your name.

Equifax describes credit report bans/freezes and how they prevent credit providers from accessing your report without permission.
IDCARE also provides guidance on credit bans in Australia.

A simple “identity theft prevention checklist”

If you do nothing else, do these 8 things:

  1. Enable MFA on email + banking + myGov (use authenticator app or passkeys if available)/p>

  2. Use a password manager and make passwords unique

  3. Update phone/laptop automatically

  4. Stop clicking login links from messages—use bookmarks/apps instead

  5. Review social privacy settings and remove public DOB/address

  6. Turn on transaction and login alerts

 7. Store recovery codes offline (not in email)

 8. Know where to get help fast (IDCARE + cyber.gov.au + your bank)

What to do if you suspect identity theft (response plan)

Speed matters. Here’s a practical order of operations.

Step 1: Secure your “core” accounts immediately

Step 2: Contact your bank and payment providers

Step 3: Get tailored help (Australia)

IDCARE is Australia and New Zealand’s national identity and cyber support service, and is referenced by Australian Government guidance as a key support pathway.

Step 4: Report it

Depending on the situation:

Step 5: Protect your credit

Step 6: If government services are involved (myGov/ATO, etc.)

myGov provides guidance on scams and recovery pathways, and the ATO also provides specific identity theft help guidance.

Jargon Buster

Phishing – a fraudulent attempt where the attacker impersonates as a trustworthy entity to obtain sensitive information via digital communication.

VPN – Virtual Private Network is an encrypted connection across a public network that provides online anonymity.

Antivirus – is a program that helps a device prevent, detect, and remove malware.

MFA – Multi-Factor Authenticator- an authentication method that requires the user to provide two or more verification factors to gain access to their data.

Blake Parry-Computing Australia Group

Blake Parry

FAQ

Yes. MFA is one of the highest-impact controls you can enable, and is strongly promoted by the ACSC.

A VPN can help on untrusted networks and for privacy, but it won’t stop phishing or account takeover if you share credentials with a fake site.

Focus on unique, long passwords and change them when compromise is suspected. Modern guidance (including NIST) generally discourages forced periodic resets without cause.

Your email account. It’s the password reset gateway for many other services.

Unexpected password reset/MFA codes, unfamiliar bank transactions, being locked out of accounts, new credit enquiries, debts you don’t recognise, or your phone losing service unexpectedly (possible SIM swap). If you notice these, secure your email first, then contact your bank and check your credit report.