Here’s a new term to fear: SIM-swapping.
In short, a cybercriminal steals a certain amount of your personal data, including your phone number. He contacts a different carrier, pretending to be you, and claims to have lost “his” phone. He convinces the carrier to supply a new phone and SIM, disconnects the “old” line, then transfers “his” apps and information from the cloud.
It gets worse. In theory, you have two-factor authentication, which would help prevent a security breach. Not sure how 2FA works? Tap or click to learn how to set up 2FA on your Google, Facebook, Twitter and your other accounts.
In SIM-swapping, the criminal controls your phone using a different device. So the 2FA text message that would typically alert you to the thief’s presence never reaches you.
Suddenly, your phone doesn’t work. While you’re trying to figure out what’s wrong with it – without being able to make calls – the hacker is quickly digging through your apps and files, gorging himself on your private data and probably even your bank account information.
By the time you’ve caught up, your passwords have been changed, and you are stuck desperately trying to regain control of your own accounts.
More than 3,000 people have lost access to critical accounts because of SIM-swapping, and some reported being blackmailed and having their identities stolen. It’s one of the most difficult cybercrimes to prevent and fight.
Here are a few ways to stay safe:
Keep your personal information safe
One thing makes SIM-swapping possible: the leaking of personal data.
In many cases, this data is stolen through major breaches and sold on the dark web. Cybercriminals use fake IDs or cherry-pick public records. They may even bribe retail employees into providing the information they need. These kinds of leaks may be beyond your control.
Related: You’re at the airport, the mall or waiting for an appointment and your phone is dying. Then you spot a free charger! Great news, right? Not so much. Tap or click to find out why you need to avoid public charging stations.
Phishing scams, in the form of emails and texts, are designed to trick unsuspecting users into exposing private data. Deflecting these attempts is your first line of defense.
You should always investigate suspicious emails or unexpected correspondences to prevent identity theft. Tap or click here to find out which companies are the biggest targets when it comes to email spoofing.
Invest in a security key
Security keys are a new way to authenticate your identity online, and they’ve received acclaim from cybersecurity experts across the board. These small, USB-powered devices act as a physical key to your account and must be inserted into your computer when you log in.
Two of the most popular brands on the market are Yubico and Google Titan, both of which provide keys that work with computers and mobile products. The phone-based products are Bluetooth-compatible and give you the same benefits a USB key would for a desktop machine.
Unfortunately, not every platform supports security keys. Click or tap here to confirm whether a given website works with these products. Look through the categories listed or type your website into the search field to see if your platform of choice is compatible.
Set up a two-factor authentication app
As I mentioned, SIM-switching is designed to circumvent 2FA but only if your 2FA relies on text messages on your phone. A 2FA application will help you protect yourself because you can often use this app without your phone or by using Wi-Fi.
One example: Gmail users can enjoy a free 2FA protection plan by signing up for Google’s in-house Authenticator app. This app essentially replaces the need for your phone number and generates a one-time code for you to enter each time you log in. This is one of the most direct ways to circumvent SIM-swapping.
Related: Security isn’t the only thing to consider when it comes to your emails. Need help managing your overflowing inbox? Tap or click for 5 pro tips to keep your inbox in check.
To use Authenticator, you’ll need to set up 2FA on your Gmail account. Once you’ve set up Authenticator, you’ll stop receiving text messages when you try to log in.
Keep in mind: If you lose your phone, you’ll have difficulty getting back into your account; however, this is by far the most ironclad protection against SIM-swapping.
Tap or click here to learn more about using Google Authenticator on your iOS or Android device.
Create a PIN
You can work with your carrier to catch potential identity thieves. One of the most popular ways is setting up a passcode or PIN for your mobile account.
Don’t get lazy and settle for an easy-to-crack PIN or password. Tap or click for 5 ground rules to create secure passwords.
Some carriers, such as T-Mobile, require a PIN to make any changes to your account by default. If you’re not sure whether your account has a PIN, call your carrier and explain you want to set up an authentication passcode or PIN to verify your identity.
Once your carrier has set up a code, any would-be impostor will need to provide this number to gain access to your phone number. Make sure to write your PIN down and keep it in a safe place where nobody else can access it. We recommend not storing this digitally and choosing a number no one can guess.
Notify your carrier
If all these defenses fail and your SIM is compromised, you’ll have to act fast. Contact your carrier, either in person or by using a trustworthy phone. Notify the company that your SIM has been stolen and you need to switch off the new phone immediately.
You want to remotely log out of any accounts that have been accessed by said cybercriminal. This kind of invasion can cause ripple effects for months and years, but the faster you act, the less damage you’ll need to control.
What digital lifestyle questions do you have? Call Kim’s national radio show. Tap or click here to find it on your radio. You can listen to or watch “The Kim Komando Show” on your phone, tablet, television or computer.
Learn about all the latest technology on “The Kim Komando Show,” the nation’s largest weekend radio talk show. Kim takes calls and dispenses advice on today’s digital lifestyle, from smartphones and tablets to online privacy and data hacks. For her daily tips, free newsletters and more, visit her website at Komando.com.