Information Security Awareness for Women

What is Identity theft?

Identity theft is the crime of acquiring another person’s personal or financial information in order to conduct fraud, such as making unlawful transactions or purchases. Identity theft occurs in a variety of ways, leaving victims with harm to their credit, income, and reputation.


Phoney profile or Fake Profile:

  • A false profile creation occurs when cyber criminals build a social media profile using the victim’s identification credentials such as name, address, email address, photograph, and so on without their knowledge
  • Fraudsters establish bogus profiles with the purpose of harming the victim
  • The fraudsters utilise the phoney profile to distribute misleading or fabricated information, harm the victim’s reputation, and may even send friend requests to the victim’s other friends in order to get financial profit

Why should we be worried?

  • A bogus social media profile made in someone’s name might harm their public reputation
  • Furthermore, any contact made by the perpetrator to the genuine account holder’s friends and family via this phoney account might render them exposed to cyber assaults such as phishing, financial scams, and so on, since they can be deceived into disclosing their information by the fraudster

The Risks of Creating Fake Social Media Profiles:

  • The fraudster may conduct crimes by using the bogus profile he or she created
  • Spreading incorrect and misleading information
  • Victim’s reputation suffers
  • Sending bogus friend requests
  • Use a false personal to entice youngsters and teenagers
  • Makes the victim’s friends and family susceptible to cyber-attacks such as phishing, bogus links, malware assaults, and so on
  • Financial fraud can also occur when money is requested over messenger/messaging systems

Modus operandi:

  • The fraudsters create a bogus profile using available or collected identity-related information via various means such as
    • social engineering tactics
    • phishing
    • recent photographs from events, functions, achievements, family and etc.
  • They can use the fake social media presence they created to
    • send friend invites to the victim in order to catch them
    • send bogus messages in order to harm the individual being impersonated’s the reputation
    • solicit money/gifts; pretend to have love interests in exchange for money; try to sell fraudulent goods/items

How can we protect ourselves?

  • Enable the social media networks’ two-factor (2FA) or multifactor authentication (MFA)
  • Avoid revealing personal information such as your address, cellphone number, personal email address, and other sensitive identifying information on social media and limit access
  • Do not publicly disclose your personal high-resolution photos on social media platforms
  • Share group photos rather than individual photos, and only share minimal information on social networking channels
  • Never give money in response to demands made on social media accounts
  • Never accept friend requests from unfamiliar people without proper verification and confirmation, and always call to check before paying
  • Never click on suspicious links or download anything unless you have verified the source’s validity
  • Use unique passwords for each social media account and email account
  • Be on the lookout for any inquiries regarding your internet activities that you are not aware of
  • Report any phoney profiles on social media and on the cybercrime portal
  • Be mindful of and enable security and privacy options on social media accounts

How to report?

The following laws apply to this offence:

  • Indian Penal Code – IT act 2000
    • Section 66, Section 66C, Section 67, Section 67A, Section 67B
    • It may also attract Section 13 & 14 under POCSO Act, 2012
LinkedIn Feeds


Jayakrishnan is the perfect personification of a highly-skilled technology professional, turning out to be a versatile business leader, over the 25 years of his career span.

During the late ’90s, in his early years in the Indian Navy, he was pivotal in building and operating the best-in-class Network & cybersecurity solutions for the Naval Commands, apart for designing and implementing networking & wireless infrastructure and communication technology for Naval Air stations & Naval Aircraft carriers. Later in his corporate career, Jay has been instrumental in running and transforming globally dispersed IT operations, comprising of millions of endpoints and thousands of technology professionals, leading the entire Program Delivery, Technology Adoption and the Digital transformation. In Tesco Fresh & Easy – his past employers – he has led the design and implementation of complex and enterprise-wide IT Transformation Projects worth Millions of Dollars – And adding a feather to his coat of excellence, he has worked as the Head of Data Centre, Platforms and IT Security for QuEST Global Engineering – world’s Third largest engineering Services organisation. Jay has also been integral part of designing, building and transforming the global IT Infrastructure & mobility solutions across multiple Geographies, for various fortune 100 Organisations.

At Tecplix, as the co-founder and Director, Jay’s charter would be to lead and grow the Consulting Practices and the Technology Services Business. His focus areas would be Cyber Security, Hyper-Converged Platforms, AI, Dev Sec Ops, Advanced Cloud Services, Data Centres, Mobility, Automation, and IT Service Management, as Tecplix is well poised to lead large scale Consulting and Managed Services engagements in these areas.

Being a technology enthusiast, Jay spends most of his leisure time, bringing himself up-to-date on latest in the ICT domain. Jay is married to Reshmi and is the proud father of Suthirth.