1. Clip the strip! Cash is not always the safest bet for lots of reasons. For instance, the ATM and credit card you use more than likely has a magnetic strip on the back of it which contains your sensitive information. This is how information was stolen in a major hack and bank run in 2013 and it was at issue in the Target breach as well. Push back on your bank or financial institution to cease use of such cards or select a provider who embeds your encrypted information in a chip instead of a strip. Major card providers are moving in this direction, but slowly.
2. Credit or debit. Use credit whenever possible. This may not be the best for financial purposes (assuming you do not pay off the balance), but it can provide better security as it does require a signature instead of a PIN. PIN information is often stolen with the card, so using only credit provides at least one layer of protection against outright theft in taking your card. Also, signing your card “SEE ID” instead of signing it with your name provides yet another step, at least with in-store purchases. More and more vendors are being trained to ask for ID.
3. Passwords still matter. Use strong passwords and demand strong passwords from those companies that house your sensitive information. A strong password, generally, is no less than eight characters in length, contains a letter (upper and lower case), a number, and a character (%$!@*). And don’t use words you find in a dictionary. Creating such passwords enhances the level of protection for your accounts against password-cracking programs. At a minimum, it buys time to enable you to cancel or freeze your account. Regularly change your passwords as well—no less than every six months and any time you think your account may have been compromised.
4. Get skinny in the New Year! Limit your accounts in number and monitor them regularly. Every account you have is another opportunity for your information to be stolen. Not only is limiting the number of credit cards a good financial decision, it can make good security sense. Use security protections provided by each company as a distinguishing factor on which accounts you keep open (i.e. choose only to use banks with two-factor authentication). Secondly, the less accounts you have, the easier it is to notice fraudulent activity. Indeed, with the Target breach, that was one of the first things recommended to all potential victims.
5. Take credit! Take advantage of your free annual credit report and keep up on accounts opened in your name.
In the end, these tips may do nothing to stop your information from being stolen, but they at least provide some layers of protection, maybe enough of a barrier to enable you to act and disable accounts in the event of a publicized breach. All you can do is all that you can do, but waiting on others to do it for you is not a good option. You truly are the first line of defense. Be vigilant in protecting your information. No measure is fail-safe, but being proactive can certainly frustrate those who are trying to steal your information. So, until the next security breach, kick back and relax in the comfort of your family room, pop in "Pineapple Express," and enjoy one of your five brand new flat screen televisions which, mysteriously, seem to have all the picture quality of staring at the wall.