10 Tips to Reduce Your Risk of Identity Theft

10 Tips to Reduce Your Risk of Identity Theft

Whether you are a consumer or a small-business owner Identity Theft should be top of mind.  Protect yourself and your business by using these 10 tips to reduce your risk of identity theft. 
First, what is Breach Fatigue or Alarm Fatigue?
Alarm fatigue is when we get desensitized to safety alerts and as a result, ignore or fail to respond appropriately to warnings.  Breach Fatigue however is more specific.  It’s when small business owners and consumers start to ignore the headlines of identity theft and data breaches.   Fatigue desensitizes both business owners and consumers to be less likely to proactively protect themselves against the risks of identity theft.
Be proactive and prepared with these 10 Tips
Being proactive and prepared can reduce your exposure to the risks of identity theft.
Personal privacy
  • Be more vigilant and hands-on with your personal-privacy settings. Also, be aware that most apps lack basic security defenses and create some sort of privacy issue.
  • Stop ignoring terms and conditions. Read, understand, and use privacy settings and be diligent about your social networking. Beware of fake accounts unless you want to be a partner in your own identity theft.
  • Protect your vehicle documents as if they were cash and regularly check for unusual activities after purchasing a vehicle.
  • Read and understand the privacy policies of every organization you have a relationship with.   Know how your information is protected, saved, analyzed, sold, and/or disclosed.
Identity theft
  • Synthetic identity theft and fraud is an emerging threat. Check your credit-bureau report quarterly at no cost through annualcreditreport.com.
  • No password is “unbreakable”. Do not make it easy for identity theft criminals by using weak passwords, or the same passwords.
  • The best defense against phishing is to be aware that it happens every day. Assume you are being “phished” until you verify the source of an unexpected e-mail or call.
Cybersecurity
  • Businesses need to understand that a data breach is inevitable. Your business profits, brand, and reputation depend on your data-breach response plan.
  • Create a data breach response plan to safeguard your business against insider threats. Conduct pre-employment background screening, regularly test your business and information-security access controls, and regularly review your data retention policy.
  • Cyber insurance may be a good option to help your business minimize today’s cyber-risks. Work with your insurance broker to determine your cyber-risks and the best coverage for your organization.
“the best defense is a good offense”.  This strategic principle used in business, sports, and military combat for years and is very relevant for this discussion.
Protect yourself and your business by using these 10 tips to reduce your risk of identity theft. Because being proactive instead of having a passive attitude (e.g., breach fatigue) will help both small business owners and consumers be better prepared against everyday threats.
By Mark Pribish
Practice Leader, Identity Theft and Data Breach Services
Stolen Check – ID Theft

Stolen Check – ID Theft

Here is a story of a stolen check – ID Theft, how they found out about it, and what they did.
Sally and her husband were living in student housing in Chicago.  She was supporting both of them at the time when a personal check was stolen.  Because they were living in an apartment run by the university, all rent payments had to come out of her husband’s bank account.  This led to a complicated financial situation. At the time money transfers were more complicated so Sally would have to write her husband a check through the bank and have it sent to them by mail.  But, this time the check included rent and a portion of their tax return and it never got to them.
How Sally Found Out

Sally followed up with the bank to cancel her check.  The bank indicated that they couldn’t do it because it had already been cashed.  The bank provided an image of the check and someone else had signed her husband’s name to the check.

What She Did About It

To be able to afford their monthly rent payment while sorting out the stolen money situation, Sally opened a credit card through her bank and borrowed cash from her credit line. To recover the stolen cash, she filed a police report with her local precinct.

Sally told them everything that happened, but because it was clear that the check had been stolen from a mailbox, they said it wasn’t under their jurisdiction — and they had to fill out a report with the postal police instead.  They filled out multiple reports with the postal police, but they never got back to us. Luckily, the bank accepted my screenshots of the report. As long as it was documented with legal authority, they felt it was fine. About a month later, the funds were restored to Sally’s bank account.

Sally and her husband are lucky, this scenario rarely ever works out for the victim without the guidance of a trained recovery advocate.

Stay safe, click carefully and watch for scams because a Stolen Check – Identity Theft incident is a horrible experience.

What is Employee Criminal Identity Theft?

What is Employee Criminal Identity Theft?

All identity theft is illegal, YES, but what do they mean when they say Employee Criminal identity theft?  Unfortunately, it is not just some fictional story played out in the movie “Identity Thief”.  If you have not seen this movie, I highly recommend it.  Jason Bateman has his identity stolen by Melissa McCarthy and as you can imagine the comedic duo battle throughout the movie…very funny!

What is employee criminal identity theft?

Employee Criminal identity Theft typically occurs when an identity thief gives an employee’s name or personal information during an arrest or investigation.  They may use a stolen driver’s license or other identification in the employee’s name or simply use the name and information of a friend or relative without showing any identification.  The employee’s data is then added to the state’s criminal database and potentially the national database.

Most victims don’t even know about it until much later until something else happens.   Most will find out when a job or loan applications involves a background check, or they get pulled over and find out they have a bench warrant.

Unfortunately it is difficult to prevent and difficult to fix.  As an employee, it is their responsibility to clear their name. Employees will need to with law enforcement and court personnel to correct the false reporting on the local, state, and federal level.

Warning signs

An employee may be a victim of criminal identity theft if:

  • They get arrested and don’t know why
  • Are denied for promotion after background check
  • Get fired after background check
  • They  don’t get hired after background check
  • Receive a ticket for a car or property they don’t own or in unfamiliar places

What if it happens to you as an employee?

Here are three tips to follow if it happens to you:

  1. Talk to law enforcement.  If any of the above warning signs apply to you it is time to contact the authorities.  You should ask your employer or loan officer about the areas of concern and where they occurred.  You can file a report about the incident and offer any personal information that would help clear your name/identity in comparison to the criminal.
  2. Keep Documentation.  Once you have proven your innocence, ask law enforcement to provide you with a “certificate of release”.  Keep this letter with you in the event you need it in the future.  Not all databases are updated immediately and this will help to clear you in any unfortunate future situations.
  3. States Attorney General.  Contact your state and determine if they offer special help for identity theft.  This can be useful if your state has addressed identity theft in the court system.

Although criminal identity theft is less prevalent than other types of fraud it is certainly something we all need to be aware of.  So next time someone asks, What is Criminal Identity Theft, we can help explain.

Lower employee risk of Criminal Identity Theft with our defend-id services – and get a dedicated recovery expert if your identity ever becomes compromised.  defend-id monitors criminal data records for employee reporting and will alert your employee as soon as it is detected.

Stay safe, click carefully and protect your data!

My Story as a Victim of Identity Theft

My Story as a Victim of Identity Theft

I had the pleasure of speaking with our partners at Tzedakah House on their podcast, Benefits & Beyond.  In this podcast, I chat with Luke about identity theft protection and the services defend-id provides. I share my story as a victim of identity theft and the first-hand effects it can have on a person both emotionally, financially, and at the office.

Topics Luke and I cover:

  • What services does defend-ID offer? (credit checks, recovery, etc.)
  • How did you get started doing this? (backstory)
  • What kinds of plans are available? (gold vs. platinum)
  • How easy is ID theft to offer to employees? (size, participation, funding, etc.)
  • Can folks purchase coverage individually, too?
DON’T BE THE WEAK LINK

DON’T BE THE WEAK LINK

Do not let your guard down. Always be cautious in revealing information about yourself or your employer.  “Stop, look and think” about emails, texts, and phone calls. Slow down, be aware, be safe, and don’t be the weak link to identity theft.

Nearly eight years ago I wrote a December 2014 article for the Arizona Republic titled Read the fine print when buying ID-theft protection services.

The premise of my article was that the core product offered to most identity theft protection service providers is credit bureau monitoring and that credit bureau monitoring offers a false sense of security.

Credit bureau monitoring cannot monitor non-financial identity theft events.  Events like:
  • taxpayer ID theft and refund fraud,
  • unemployment ID theft, benefits fraud,
  • medical ID theft and fraud,
  • or credential (e.g. driver’s license and passport) ID theft and fraud.

The identity theft protection community is largely reputable and trustworthy.   It is not uncommon, however,  for identity theft marketing campaigns to include deception, exaggerated threats, and flawed offers.

In addition, I encourage consumers to read the fine print for hidden “exclusions” when selecting an identity theft service provider. Hidden exclusions are commonly found in the “terms and conditions,” where marketing meets reality.

Marketing versus reality.

I find it interesting how more consumers are paying for ID theft protection services than ever before and yet there are more victims of ID theft than ever before.  (The bad guys getting better? Are there more PII records our there? The ID Theft Protection Providers Failing or are they just marketing beyond their ability?)

For example and according to the March 2022 Javelin Strategy Annual Identity Fraud Study, identity theft and fraud losses totaled $52 billion affecting 42 million U.S. adults in 2021.

Here are a few ways consumers lower their risk of being a weak link to identity theft.
  1. First, consumers need to stay up to date on the most recent data breach and identity theft trends such as Phishing (fraudulent emails), Vishing (fraudulent phone calls and voice mail messages) and Smishing (fraudulent text messages) tactics.
  2. Second, consumers should be taking advantage of risk mitigation tools such as fraud alerts, credit freezes, credit/debit card alerts, and yes – even credit bureau monitoring – as long as you understand the limitations of credit bureau monitoring.
  3. Third, consumers should consider using new and strong passwords every 90 days or use a password manager that can help create new and strong passwords along with scanning existing passwords to flag reused and weak passwords.
  4. Lastly, consider using a Virtual Private Network (VPN) as VPN software scrambles your IP address, encrypts data sent between your computer and the websites you visit, and masks your true location and service provider. Masking your data is very important while using public WIFI

To conclude, I would like to reference Kevin Mitnick, the Chief Hacking Officer and part owner of security awareness training company KnowBe4 and convicted hacker turned paid security consultant, public speaker, and author.

Mr. Mitnick is best known for his high-profile 1995 arrest and five years in prison for various computer and communications-related crimes. He has said many times that “the weakest link in the security chain is the human element.”

To add to Mr. Mitnick’s comments about the human element, I always say that hackers, social engineers and ID theft criminals depend on human nature, psychology and “trusting” consumers to let their guards down.

Do not let your guard down. Always be cautious in revealing information about yourself or your employer.  “Stop, look and think” about emails, texts, and phone calls. Slow down, be aware, be safe, and don’t be the weak link to identity theft.

Sincerely,

Mark

error

Enjoy this blog? Please spread the word :)