Get All Access for $5/mo

The Technologies Consumers Can Use to Combat Fraud Consumer identity theft and online fraud are at an all-time high.

By Dmitry Dragilev

Opinions expressed by Entrepreneur contributors are their own.

Cybersecurity has always been a hot topic, and 2021 is no exception. As more consumers go online for banking, shopping and other transactions during the pandemic, fraudsters are ramping up their efforts as well.

While consumer fraud targets consumers, the focus of most of these attacks is to obtain personal identity information. From business owners to the average consumer, protecting yourself against fraud, identity theft and other scams is always on the brain.

Much like all entrepreneurs out there, I am a consumer as well. Last week I received a notification that my login information for Banana Republic, L.L.Bean, Dropbox and several other accounts was found up for sale on the dark web — and I had no idea. Unfortunately, these types of problems are a norm these days. A survey by identity protection company Aura found that 87% of U.S. adults see cybercrime being a threat to their safety more so than global warming (77%) and Covid-19 (81%).

How consumers can protect themselves from fraud

Protecting yourself against fraud should be your top priority. If you aren't quite sure where to start, consider these five technologies that fight fraud consistently.

1. VPNs

A VPN is not just some technology for businesses to use. It is one of the most overlooked ways consumers and individuals can protect themselves against fraud. In fact, a survey found that only 30% of people reported owning a VPN amongst their personal digital security products.

If you're unsure how a VPN works to combat fraud, it's simple. Let's say you connect to WiFi at a cafe, library, doctor's office, airport or any public place. If you're not using a VPN, your connection passes through a public WiFi internet service provider service, where hackers on the same network can intercept all your data. When a VPN is involved, your internet traffic is redirected through a configured remote server, hiding your IP address and encrypting your data, location, browsing history and more.

It's also important to remember that if your IP address falls into the hands of a hacker that understands geolocation technology, they can easily track down the physical location of your company's office or home and all of the devices connected. Most VPN software can also offer customers robocall and spam call protection for an extra level of security against fraud.

Using a VPN is becoming more popular as a surplus of organizations move towards a remote-first environment. For instance, at JustReachOut our team is 100% remote. Since we don't have a physical office and we have teams across the US, Europe, and Asia working from public WiFis all the time, security is our number one priority. Using a VPN to mask our IP address and other secure data was one of the first security practices we put in place.

2. Password managers

You have heard this advice before: Make sure you have a secure password. Most of us just change the password once and try to make sure we remember it. We typically reuse passwords and just add a few numbers to the end of the old one to make it easier to remember them. But that doesn't cut it anymore in this day and age of cybersecurity.

Here are some helpful password tips to follow:

  • Use a password manager to store your passwords

  • Use two-factor authentication on all accounts

  • Give each password a minimum of 12 characters

  • Include symbols, numbers and both capital and lowercase letters

  • Steer clear of obvious words

  • Avoid common substitutions

  • Refrain from keyword paths

  • Do not use your birth date, street address or any obvious pieces of information about yourself in the password

3. Identity theft protection services

Identity theft protection services scan the dark web and public records to detect your information up for sale or any high-risk and fraudulent transactions that you have made online.

Because they constantly monitor the dark web and user behavior to identify potentially fraudulent purchases, access or transactions, it's easier to keep hackers at bay. These services are designed to constantly search for your information and notify you once they find a breach.

You can link your bank accounts, credit cards, loyalty cards and accounts, IRAs, savings account and virtually any online account and have an identity theft protection service scan for any compromised information constantly.

These tools give consumers peace of mind as they monitor for high-risk activity, determine a transaction risk score as a way to determine if something is legitimate, detect fraudulent behavior and provide alerts when suspicious activity is detected.

In our day and age having one of these services protecting your identity is a must.

Related: How Much Does Cybersecurity Really Cost?

4. Malware protection services

Hackers use a lot of tactics to commit fraud, and one common one is malware.

Malware is malicious software that hackers use to break into a device, gain unauthorized access to private data or complete their illicit motives. Malware encompasses a variety of malicious programs, like viruses, worms, trojans, spyware or ransomware that was designed to wreak havoc on your device.

Protecting against malware is an absolute must on your computer and smartphone, regardless of whether it's for business or personal use. Hackers use malware to hack into your device by tricking you into opening a malicious link or installing a program from an untrusted source. These links are often disguised as a standard file or attachment in an email through a phishing scam.

Malware can do more than steal, modify, encrypt or even delete your data. It can also hijack your device's core functionality, feed on your battery life or drain your network speed. To protect the devices that you use for business and personal use, it's in your best interest to consider malware analysis tools.

Most VPN tools include malware protection as well, so you just need to check and make sure they do. These types of protection software are used to investigate and isolate malware as it's detected on your computers, laptops or smartphones.

Finding software to safeguard your personal information can be the difference between falling victim to fraud and stopping it before it occurs.

Related: How CISOs are Building a Modern Cybersecurity Partnership

5. SSL - Secure online websites and apps

There are a few simple things to watch out for when shopping or transacting online. Using a website with an HTTPS URL is one of the most overlooked security measures we all forget about.

If you are using a banking website or buying anything on the web, look for a green padlock in the URL bar to signify the webpage is secure. It should always have a secure HTTPS URL. If you are using a mobile app to bank or transact, it should be from the official banking account and never from a third party asking to connect to your bank account. Otherwise, you can be the victim of overpayment scams, check-cashing fraud, phishing, unsolicited check fraud or automatic withdrawal scams.

In addition, this may sound trivial, but we all fall for these sooner or later, knowing how to spot a URL designed by hackers is crucial, too. If you receive a phishing attempt in their email with a URL designed by hackers, the URLs will look slightly odd, and entering your credit card information is bound to lead to fraudulent charges on your card. On top of a secure URL with the proper spelling and domain, being able to combat fraud is possible by only using secure mobile apps when making purchases.

For instance, secure mobile apps prompt users to input login information and use biometric data like a fingerprint or facial recognition. Always read the description of a mobile application before downloading it from an app store.

Protection at all costs

Whether you're a big-time CEO, small-time entrepreneur or employee, your identity is up for grabs online and it's your job to protect it. I cannot stress enough the importance of educating yourself on the signs of fraudulent behavior. Having this knowledge can prevent and combat fraud on both a personal and professional level.

Related: A Business Leader's Beginner Guide to Cybersecurity

Dmitry Dragilev

Founder @

Dmitry Dragilev has helped 300+ brands like Realtor & HubSpot rank #1 on Google. His company finds problems in Google search results and recommends specific keywords you should target for your website.

Want to be an Entrepreneur Leadership Network contributor? Apply now to join.

Editor's Pick

Side Hustle

She Grew Her Side Hustle Sales From $0 to Over $6 Million in Just 6 Months — and an 'Old-School' Mindset Helped Her Do It

Cynthia Sakai, designer and founder of the luxury personal care company evolvetogether, felt compelled to help people during the pandemic.


Make a Real Difference in Your Community with a Huntington Franchise

For nearly 50 years, Huntington Learning Center's mission-driven approach has positively impacted over one million students. Huntington's commitment is to its students and to the families they serve enables them to make a meaningful difference across the country.

Business News

Paramount+ to Increase Prices Again In Cost-Cutting Iniative After Failed Merger

This is the second summer in a row that the streaming service will hike monthly prices for subscribers.

Business News

A Microsoft-Partnered AI Startup Is Being Sued By the Biggest Record Labels in the World

The company is allegedly profiting from AI without compensating the human work that fed the technology, the lawsuit says.

Business Ideas

Free Webinar | July 18: How to Design, Manufacture and Sell Your Product Idea

Join us for our webinar with Jordan Nathan, founder of the kitchenware brand Caraway. Jordan will share the strategies he used to develop, manufacture and sell his products that grew Caraway's annual revenue by over 500% in just 4 years. Register now!

Growing a Business

How Businesses Can Thrive Without a Physical Office in Today's World

The benefits of transitioning to a fully remote work model