- Use a public computer to shop online
- Use card in manual swiping machines
- Give out personal info on the Net
- Visit porn sites
- Click any hyper-link in vague e-mails
- Run .exe files attached with e-mails
- Delete communications that induce suspicion. They can provide vital information about the individuals behind them