Showing posts with label Theft. Show all posts
Showing posts with label Theft. Show all posts

Monday, 14 November 2011

Protection from Identity Theft

Identity theft is the fastest growing criminal activity in the 20th Century, replacing illegal drug sales.

How BIG is this Problem?

Banks, credit card companies and businesses that house servers storing passwords or other sensitive information all report "break-ins"through Trojan viruses or other online hacking methods - resulting in the loss of millions of pieces of information. Instances of lost information are employees selling it and other lax security measures resulting in thieves having access to your identity.

Thieves Want

- Your Name
- Date of Birth
- Home Address
- Phone Numbers
- Social Security Number
- Driver's License Number
- Credit Card Numbers
- CW2 Security Code (the number on the back of your credit card)
- Your Credit Report
- ATM Cards
- Telephone Calling Cards
- Mortgage Details

Where Are They Getting Your Information?

- Banks
- Credit-Reference Agencies
- Retailers
- Credit Card Networks
- Data-Brokerage Companies
- Payment Processing Companies
- Phone Companies
- Schools
- Your Employer
- Doctors, Clinics and Health Departments
- Government Agencies

There are other effective methods:

- Dumpster Diving
- Mail Theft
- Retail Theft
- "Phishing"/pretexting/pretending
- Purse/Wallet Theft

What are Thieves Using Your Information For?

- Making charges to your existing credit cards
- Opening new credit cards in your name
- Having phone or utilities turned on
- Withdrawing money from your existing bank accounts
- Employment purposes
- Driver's Licenses
- Tax Fraud
- Social Service benefits
- Student loans
- Business or Personal loans
- Health care
- Mortgage loans/leases
- Auto loans
- Using your ID when caught committing a crime

How Can You Protect Yourself?

- Keep a photocopy of your credit cards, bank account numbers and investment account numbers in a safe place
- Keep your credit card receipts
- Put a "fraud alert" on all your credit reports
- If you apply for credit and the card doesn't arrive on time, call the card issuer
- Choose difficult PIN numbers or passwords. (Don't use birth dates, your mother's maiden name, etc.)
- Never give personal information to anyone who sends you an email, a letter or calls you asking for it
- Shred personal information
- Don't use the ATM machine if someone is watching you
- Pay attention to what's going on around you
- cell phones often have cameras in them. If someone is standing by you with a cell phone while you're entering a PIN number, block their view
- Review your bills each month. If there's something you don't remember, call the creditor.
- Check your credit report at least once a year
- Store your cancelled checks safely.
- Don't leave your purse in plain sight when driving
- Keep your valuables locked in the trunk or glove box when driving
- Make all personal information on your computer password protected
- Don't carry information about your PIN numbers, passwords and account numbers in your purse or wallet

Warning Signs that Your Identity Has Been Stolen:

- A loan application is denied, or you're refused extended credit requests
- You are contacted by a debt-collection agency
- Your purse or wallet has been stolen, or your house broken into
- Unfamiliar activity on your credit report

What to do if it Happens to You:

- If your purse or wallet is stolen, call the police
- Contact your bank, credit card and other credit extending companies and report the theft
- Close accounts
- Contact the credit-reporting companies
- Have fraudulent activity removed immediately and monitor your credit report every 90 days for the next year
- Put everything in writing
- File a report with the Federal Trade Commission
- Change passwords on your existing accounts and create new ones for new accounts

Identity theft is real. There are no guarantees you can keep your information safe, by taking proactive steps to protect yourself, you can minimize your chances of having an "identity crisis".

About the Author
Host, Sintilia Miecevole offers resources for purses with designs influenced by the latest trends at http://www.trendipurses.com. Be sure to visit http://www.trendipurses.com to find information from designer handbags, fashion, trends and accessories to vintage, replica, wholesale and much more.


View the original article here

Personal Security; Avoiding Identity Theft

Some law-enforcement authorities call identity theft the fastest growing crime across the country right now. In fact, identity theft is the most called-about subject on the Privacy Rights Clearinghouse's telephone hotline. Most victims don't even know how the perpetrators got their personal information.

Such fraud may account for as much as 25% of all credit card-fraud losses each year. Not surprisingly 49% of the victims, who have had their identities stolen, stated that they do not feel they know how to adequately protect themselves from this crime.

What Steps Can you Take to Avoid Identity Theft?
1. Credit Report
Order your credit report each year from each of the three major credit reporting agencies. Check each credit report carefully for accuracy and for indications of fraud, such as credit accounts that you did not open; applications for credit that you did not authorize; credit inquiries that you did not initiate; charges that you did not incur; and defaults and delinquencies that you did not cause. Check the identifying information in your credit report to be sure it is accurate pay particular attention to your identifying information like your name, address, and Social Security number. Make sure that you recognize every line of information established in your file.

2. Social Security Report
Additionally order your social security earnings and benefit statement once a year so that you can check to make sure your earnings are correctly recorded. If the numbers are inflated it maybe because someone is using your Social Security number for employment. (Note - The Social Security Administration now automatically mails these statements annually to all eligible workers age 25 and older).

3. Checks
Call the payees of any outstanding checks that you are not certain you wrote. The payee is the person or business to whom you wrote the check. Explain to each payee that you are the victim of identity theft and that you have to close your checking account for that reason. Ask each payee to waive (forgive) any late payment or returned check fee. Then send each payee a replacement check drawn on your new account and stop payment on the check that it replaces. It's a good idea to enclose a note with each check explaining why you are sending a replacement check and reminding the payee that the payee has agreed to waive the late payment or returned check fee.

4. Mail
If you are traveling be sure to stop your mail delivery at the post office, rather than having it accumulate unattended in your mailbox. If you do not receive your credit card statement on time or if you do not receive a new or renewed credit card when you expect it, your mail may have been stolen. If you notice your mail is dwindling, check with the post office to see if they have any change of address posted. If a change of address request has not been filed at the post office check if one has been filed with the creditor. Guard your mail from theft. Deposit outgoing mail in post office collection boxes or at your local post office, rather than in an unsecured mailbox. Promptly remove mail from your mailbox. Install a lock on your mailbox if you live in an area where mail theft has occurred. This will reduce the risk of mail theft.

5. Good Record Keeping
Be sure to keep a list of all your credit card account numbers, expiration dates, and telephone numbers of the customer service and fraud departments in a secure place, not in your wallet or purse, so that you can quickly contact your creditors in case your cards are lost or stolen. Make a list of, or photocopy, all of your credit and debit cards. For each card, include the account number, expiration date, credit limit and the telephone numbers of customer service and fraud departments. Additionally be sure to store a list of bank accounts in secure location, along with access numbers.

6. Lost or Stolen
A thief may steal, or the consumer may lose, the consumer's purse or wallet. The thief then may use the consumer's stolen personal identification information to obtain credit in the consumer's name.

7. Collection
If you receive calls from collection agencies or creditors for an account you don't have or that is up to date. Someone may have opened a new account in your name, or added charges to an account without your knowledge or permission. Financial account statements show withdrawals or transfers you didn't make. A creditor calls to say you've been approved or denied credit that you haven't applied for. Or, you get credit card statements for accounts you don't have. You apply for credit and are turned down, for reasons that do not match your understanding of your financial position.

8. Notebooks
Laptops and notebooks are treasure troves of useful information. Be sure to password protect any sensitive information. When creating passwords and PINs (personal identification numbers) do not use any part of your Social Security number, birth date, middle name, spouse's name, child's name, pet's name, mother's maiden name, address, telephone number, consecutive numbers, or anything that a thief could easily deduce or discover. For tips on strong passwords refer to: http://www.password-software.com . Avoid using an automatic log-in feature that saves your user name and password; and always log off when you are finished.

9. ATM/ Credit Cards
If your ATM card has been lost, stolen or otherwise compromised, cancel the card as soon as you can. Get a new card with a new PIN. If you suspect unauthorized use, contact the provider's customer service and fraud departments immediately. Never give out your credit card, bank account or Social Security number over the telephone unless you placed the call and you have a trusted business relationship with the business or organization. Place passwords on credit cards, bank and phone accounts. Avoid using easily available information like mother's maiden name, your birth date, the last four digits of your SSN or your phone number, or a series of consecutive numbers. Cancel your unused credit cards so that the accounts will not appear as being "open" or "active" on your credit report. Shield your ATM or telephone key pad when using an ATM or making a phone call with your phone calling card. Some shoulder surfers' use binoculars or video cameras to record your numbers. If you use ABMs or point-of-sale terminals, always shield the entry of your PIN, and never give your access code (PIN) to anyone. Choose a PIN that can't be figured out easily, as you could be liable if you use a PIN combination selected from your name, telephone number, date of birth, address or Social Insurance Number (SIN). Remember that no one from a financial institution or the police will ask you for your PIN. Always take credit card, debit card and ATM receipts with you. Never throw them in a public trash container. ear them up or shred them at home when you no longer need them.

10. Trash
One person's trash is another person's treasure. Shred documents before throwing them away. Be sure to shred credit card statements, bank statements, pre-approved applications, any important papers with identifying numbers. Memorize ALL passwords and PIN numbers. Keep them private. Some thieves create identities by retrieving personal information in your garbage or recycling bin by "dumpster diving".

11. Public Information
Some thieves use public information, Searching public sources, such as newspapers (obituaries), phone books, and records open to the public (professional certifications). Consider not listing your residence telephone number in the telephone book, or consider listing your name and residence telephone number without an address. If you decide to list your name and telephone number, consider not listing your professional qualification or affiliation (for example, "Dr.," "Atty.," or "Ph.D .").

12. Online Banking
After completing a financial transaction or online banking, make sure you sign out of the Web site and clear your Internet file/caches (Internet files are retained in your computer automatically and thus should be cleared so that hackers cannot obtain the information). Most financial institutions provide instructions on how to clear the caches under their "security" section. Look for "https" in the URL header and a padlock icon on your Internet toolbar at the bottom of the screen; both indicate that a secure connection is in effect. With Microsoft Internet Explorer, click Tools then Internet Options. On the General tab, click Delete Files, Delete Cookies and Clear History buttons.

13. Posing
Do not release any information to anyone calling. Thieves often pose as a creditor, landlord or employer to get a copy of your credit report or access to your personal information from other confidential sources.

About the Author:
Francesca Black develops educational material for http://www.security-port.com and http://www.security-protection.net a top resource for locating security related RSS feeds.


View the original article here