Network Synergy Blog

Do You Know What to Do When Involved in Identity Theft?

Do You Know What to Do When Involved in Identity Theft?

The unfortunate truth of increased technology use in the workplace is that there is a corresponding increase in the potential for cybercrime, more specifically identity theft, to strike the workplace. The question is, what can you do to help prevent it, and how should you react to it should it strike?

How You Can Help an Identity Thief
There are plenty of ways that an identity thief can gain the information they need to successfully take control of one of your accounts or some of your critical data. First of all, many businesses have a tendency to collect more data than they actually need from their contacts and employees. This only gives the identity thief more ammunition. Furthermore, many businesses underestimate the lengths that an identity thief will go to in order to collect the information that they need. Frankly, just throwing out documentation won’t stop someone who isn’t above dumpster-diving. Any paper records should be cross-shredded before they are disposed of.

Of course, paper records are a relatively easy way for an identity thief to get what they want in almost any circumstance. Therefore, it makes much more sense to keep your documentation stored digitally, protected by passwords and encryption that stands up to best practices.

What to Tell Your Clients if Their Identities Are Stolen on Your Watch
Unfortunately, even the smallest error can lead to a security breach, which means that you may have to inform your clients that their information has been stolen. To help them further, you will want to advise them to take the following steps immediately.

Notify Affected Banks or Creditors
One of the first orders of business that needs to happen if financial information could have been leaked is to contact the bank or credit card provider that manages the account. Your contact will want to deactivate these accounts before whomever it was that stole their identity accesses them again.

Time is of the essence, as they will need to report the theft and any unauthorized charges within two days of the unauthorized transactions to limit their liability to $50. If they report the theft before any transactions are made, they will not be liable for any activity on that account until the matter is settled.

Managing Credit Reports
Any client whose data was potentially stolen should work on managing their credit reports. First, have a fraud alert put on your account by one of the major credit reporting agencies. This will automatically provide you with a credit report from all three of these agencies, which you should check for warning signs of fraud. If your reports show credit inquiries that you didn’t make and other unexplainable activity, report the identity theft to remove the transactions and activities you are not responsible for. You may also want to consider requesting a credit freeze to prevent the credit agencies from releasing your credit information to new creditors.

Fill Out and Distribute ID Theft Report
While the FTC (Federal Trade Commission) may only follow up on larger fraud cases, they also monitor identity theft cases to try and identify suspicious patterns that suggest the involvement of organized crime. The FTC’s website also has a link to a form that will produce an identity theft complaint. Once you have that complaint, secure a police report to complete your ID theft report.

This report needs to be distributed to your creditors and credit reporting agencies, and these accounts need to be monitored to ensure that false information doesn’t persist.

Locking Down Accounts
Of course, as with any account breach, you need to update your account passwords to keep your accounts secure. Furthermore, not only should you report any false use of your Social Security Number, you should also ensure that no additional accounts have been opened in your name for any utilities, as the bill for these services can be used as proof of residence to open a new account.

Identity theft is no laughing matter, and you certainly don’t want your business to be responsible for it. For assistance with your data security solutions, call Network Synergy at 203.261.2201.

BYOD is Only Helpful If the Devices Are Secure
Failing Technology and Your Data


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, December 17, 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab

QR-Code dieser Seite

Sign Up

  • First Name *
  • Last Name *

      Blog Categories

      Employer-Employee Relationship Bluetooth Phishing Unified Threat Management Save Time Gaming Console Google Drive Thank You LinkedIn Best Available Legislation Consumers Scam Miscellaneous Marketing Unsupported Software Technology Laws Password Competition Processors Maintenance Customer Relationship Management BYOD Congratulations Facebook Windows Supercomputer Excel Server Uninterrupted Power Supply Online Currency Assessment GPS Presentation Internet Exlporer Operating System Artificial Intelligence Business Management Notifications Public Speaking Spyware Undo Digital Signature Mobile Devices Operations Experience Business Growth Tech Terms Techology Asset Tracking File Sharing Internet Chrome Scheduling RMM IT Services Sports History Google Google Docs Saving Money Android Compliance Chatbots Cleaning Holiday Downloads Dark Web 3D Printing Tracking Document Management HIPAA Sync Mobile Technology Humor Apps Files Programming Training High-Speed Internet CCTV Managed IT Food Cyber Monday Phone System Augmented Reality Cables People Piracy Fax Server Search Documents communications Hiring/Firing G Suite Laptop Bandwidth Remote Workers Identity Theft Entrepreneur Wireless Technology Network Security Social Engineering Migration Touchscreen Mobile Device Management Education Microsoft Point of Sale Halloween Inbound Marketing Email Mobile iPhone Content Filtering Networking Office Tips Black Friday Webinar Legal Current Events Workplace Tips Technology Innovation Mobile Device Conferencing Data Management Paperless Office CIO Cryptocurrency Malware Proactive Star Wars How To Users Text Messaging Enterprise Content Management Cloud Finance eBay Data Loss Comparison Gadget Identity Web Server Business Intelligence Features Procurement Analyitcs Infrastructure Motion sickness Flexibility Display Government Gmail Monitors Gadgets Employee-Employer Relationship Start Menu Superfish Business Computing Mobile Computing Smart Tech Redundancy Big Data CrashOverride Smart Technology Staffing IT service Efficiency Money Digital Financial How To Software USB Management Distributed Denial of Service Hacks Hosted Solutions Digital Payment Bring Your Own Device Electronic Health Records Privacy Safety Drones Geography Website Scary Stories Storage Time Management Fraud Administration Wi-Fi E-Commerce Hard Drives Mobile Data Refrigeration 5G Computer Repair Twitter Upgrades Taxes Internet of Things PowerPoint Small Business Telephony Information Data Backup Microsoft Office Health Hotspot Social Specifications Heating/Cooling Security Private Cloud Mobile Office Network Management Consultation Going Green Authorization Telephone Systems Network Congestion Ransomware Firewall Router Google Analytics Break Fix Screen Reader Meetings Upgrade Emoji Statistics Cyberattacks Managed Service Running Cable The Internet of Things Antivirus Public Cloud Avoiding Downtime Fun Outsourced IT Alt Codes Human Error Monitoring Politics Computer Websites Trending Wires Work Station Address Solid State Drive Downtime WPA3 Applications IT Support VPN Machine Learning Backups Quick Tips Best Practice Black Market Mobility Hosted Solution IT Technicians Unified Threat Management Permission Authentication Encryption Samsung Collaboration Printers Server Management Instant Messaging Read Only Cache Google Wallet Social Networking Botnet Robot Cooperation LiFi Language Cloud Computing Passwords Servers Virus Tech Support Risk Management Macro Browser Enterprise Resource Planning Shortcut Proactive IT Google Calendar Managing Stress Hardware Remote Monitoring Test Cybersecurity Intranet User Tips Data storage Unified Communications Cortana Licensing Co-managed IT YouTube Tech Term Modem Printing Alert Computing Print Server Disaster Motherboard IT Management Managed Service Provider Vendor Management Help Desk Logs Settings Buisness BDR Backup and Disaster Recovery Customer Service Writing IoT Google Maps Employees Virtual Desktop Multi-Factor Security Office 365 Managed Services Provider IP Address Smartphones Word Tip of the week Best Practices Typing Automation Webcam Development Cost Management Mouse Software Tips Wearable Technology Mail Merge Nanotechnology SaaS Saving Time Alerts Save Money Mobile Security Access Control Consulting Data Breach Computer Care SharePoint OneNote Hackers Relocation Disaster Recovery Office Windows 10 Hacking IT Support Knowledge Apple Information Technology Vulnerability Permissions Remote Computing Physical Security Social Media User MSP Data Recovery Favorites Cookies Recovery Firefox Productivity Application Regulation Tip of the Work Crowdsourcing Remote Monitoring and Management Environment Hard Disk Drive IT Solutions Software as a Service IBM Disaster Resistance Smartphone Bookmarks Memory Lenovo Skype Regulations Network PDF Net Neutrality Electronic Medical Records Business Technology Administrator Business Continuity Spam Deep Learning Domains Debate Troubleshooting Tip of the Week WiFi Data Security Windows 10 Budget Computing Infrastructure Managed IT Services IT budget Wireless Chromebook Mirgation eWaste Zero-Day Threat Windows 8 Crowdfunding Virtual Reality PC Care Hacker Virtualization Healthcare Communication Company Culture Automobile Tablet Backup Data Warehousing Cybercrime Identities Trainging Video Surveillance Computers Managed IT Service Service-based Business Remote Support Secruity Theft Law Enforcement Utility Computing Productivity Microsoft Excel Charger Work/Life Balance Fleet Tracking App Business Owner Travel Project Management IT Consultant Printer Virtual Private Network Corporate Profile Cabling Recycling Lithium-ion Battery Connectivity Business Blockchain Bitcoin Tutorials Computer Accessories Value Law Firm IT Data VoIP Battery Managed IT services Vulnerabilities Error Streaming Media Personal Information Windows 8.1 Update 3D Technology Tips Outlook End of Support User Error Two-factor Authentication Hard Drive Retail Leadership Cameras Staff IT Consulting Patch Management

      Latest Blogs

      As the modern gift certificate, the gift card has become an institution, especially around the holidays. Thousands of companies offer statically-priced and reloadable gift cards. W...

      Latest News

      Our Site Has Launched!


      Welcome to Our New Site!
      We are proud to announce the unveiling of our new website at Network Synergy!

      Read more ...

      Contact Us

      Learn more about what Network Synergy can do for your business.


      Call us today    203.261.2201

      Fax Number :    203-261-2935

      126 Monroe Turnpike
      Trumbull, Connecticut 06611

      facebook twitter linkedin #youtube