Safeguard your personal information on video game consoles
Video game consoles don’t just let you play games both online and offline – they have lots of other features too. Depending on the make and model, you may also be able to surf the internet, stream videos and do more things online through your console.
This connectivity can have downsides, though, like putting your personal information at the risk of identity theft. A hack into the Playstation Network in 2011 saw 77 million users’ personal details potentially compromised. This included names, addresses, dates of birth, email addresses, and passwords to the network – information that identity thieves could use to sell on to other cybercriminals, or to use to pretend to be you in order to commit crimes. If the console is used by a child, there could be extra safety worries involved.
How can identity thieves access your information?
When you’re connected to a network through your gaming device, you run the risk of Trojan horses, viruses, worms and spyware. These can help identity thieves to collect personal data about you.
How to protect yourself
There are several ways in which you can try to minimise the risk of identity theft through your video game console. These include the following:
- Make sure that your passwords are strong and secure.
- Use a separate email address for gaming.
- Make sure that you have antivirus software installed, and make sure you get regular updates.
- Only purchase games and other goods and services through reputable sellers.
- Monitor your credit report regularly to ensure that your financial details haven’t been stolen and used to apply for credit in your name.
- If your children use video game consoles, make sure to educate them on the risks of sharing information online, as well as how to safeguard these details.
Your Equifax Credit Report & Score – which is free for the first 30 days then £7.95 a month – gives you unlimited access to the information on your report. You’ll also get weekly alerts of any significant changes on your report. This can help you to check that you’re aware of all of the activity on your report, and to seek help if you spot anything suspicious.
- Infographic: What is a money mule?
- What is money laundering?
- What is a Ponzi scheme?
- How to report identity theft
- How to protect older people from being scammed
- Using contactless mobile payments and apps
- Safeguard your personal data when using smart home assistants
- Safeguarding your family’s personal data on smart toys
- Infographic: Avoiding festival fraud: crime statistics and festival security
- How your identity could be stolen offline
- Protect against ID theft when making mobile payments
- e-book: Staying safe online
- Infographic: Protecting your children online
- Online Fraud Terminology
- What is anonymous browsing?
- Distributed Denial of Service explained
- How secure is your email?
- Identity theft and fraud explained
- Financial fraud explained
- Best practices for avoiding identity theft
- Stay safe online: Creating a secure password
- Scam avoidance: A few ways to help stay secure
- Infographic: Are smart gadgets putting you at risk of identity theft?
- Helping your children stay safe online
- Should you share your location on social media?
- Would you do internet banking on your smart TV?
- How fraudsters use Wi-Fi hotspots to steal data
- How to avoid email fraud
- Preventing your child’s identity from being stolen
- Keeping your personal information secure when moving home
- Protect yourself from becoming a victim of SMS phishing
- Protect against identity theft when sharing photos online
- Safeguard your identity on mobile apps
- Your social media profile and identity theft
- What is credit card fraud – can you prevent it from happening to you?
- How fraudsters can hijack your browser
- Safeguard your identity on Facebook and other social media sites
- Going on holiday - keeping your identity safe
- How to prevent smartphone identity theft
- Shopping online – staying safe against identity theft
- How to spot and avoid romance scams
- Facial recognition and identity risk
- Dealing with phishing phone scams
- How cyber attacks happen
- Safer Internet Day – protecting children online
- 7 Signs of Identity Theft
- How to avoid contactless card fraud
- What Are Data Breaches?
- How to Spot a Phishing Email
- ID Fraud Overview
- How Financial Crimes Are Hidden in The Dark Web
- How much do you know about the Dark Web?
- Are you losing your identity?