This content discusses the threat of identity theft, how criminals accomplish it, and what steps to take as a victim. It also discusses common types of computer risks, steps to prevent them, what to do as a victim, and strategies for connecting to secure devices.
IDENTIFY types of identity theft and ways to prevent them.
IDENTIFY steps to take if victimized by Identity theft.
IDENTIFY common computer risks and ways to prevent them.
RECALL strategies for securing your connected devices.