Some things are very clear cut in the cyber-security world: don't stay logged in on public computers, don't write down your passwords in a notebook by your desk, don't use public wi-fi for anything sensitive, don't click on weird links in emails.
But protecting your identity goes beyond these basic tenets. You need to be very cautious about how and when you're sharing information online! Here are some things to consider:
1. Avoid Social Media Games And Third Party Apps
These nasty little apps have a bad habit of "accidentally" requesting permissions they have no business requiring. Check very carefully what the app you're installing is asking to do, and consider if it's worth the risk.
The really bad versions of these programs will ask for a number of security questions as well, hoping you'll use the same answers as things like your online banking or email account. It is best to keep with trusted, secure apps, and frankly avoid all games on Facebook. Maybe avoid Facebook all together, in fact.
2. Avoid Friend Requests From People You Don't Know
If someone you don't know adds you on social media, do not add them back. These are most likely bots, bots that will then in turn mine your statuses for potentially lucrative information. This is a well-documented online scam, and frankly why are you adding people you don't know anyway?
3. Check Your Credit Report
If your identity has already been stolen, your credit report may be how you find out. If someone has a credit card, a line of credit, or a loan in your name -- you may have no idea until you check your credit report.
4. Keep All Your Tech Up To Date
The more up-to-date your operating system, apps, and other programs are, the less vulnerable they are to data breaches. Make sure you're not using an operating system that has ceased to offer security updates and technical support, like Windows XP.
5. Think About What You're Posting
Things we post on the internet have a way of coming back to haunt us when we least expect. Make sure that you're not sharing sensitive information somewhere where it could be easily accessed, leaked, or stolen.