Network Synergy Blog

Network Synergy has been serving the Trumbull area since 1988, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Do You Know What to Do When Involved in Identity Theft?

Do You Know What to Do When Involved in Identity Theft?

The unfortunate truth of increased technology use in the workplace is that there is a corresponding increase in the potential for cybercrime, more specifically identity theft, to strike the workplace. The question is, what can you do to help prevent it, and how should you react to it should it strike?

How You Can Help an Identity Thief
There are plenty of ways that an identity thief can gain the information they need to successfully take control of one of your accounts or some of your critical data. First of all, many businesses have a tendency to collect more data than they actually need from their contacts and employees. This only gives the identity thief more ammunition. Furthermore, many businesses underestimate the lengths that an identity thief will go to in order to collect the information that they need. Frankly, just throwing out documentation won’t stop someone who isn’t above dumpster-diving. Any paper records should be cross-shredded before they are disposed of.

Of course, paper records are a relatively easy way for an identity thief to get what they want in almost any circumstance. Therefore, it makes much more sense to keep your documentation stored digitally, protected by passwords and encryption that stands up to best practices.

What to Tell Your Clients if Their Identities Are Stolen on Your Watch
Unfortunately, even the smallest error can lead to a security breach, which means that you may have to inform your clients that their information has been stolen. To help them further, you will want to advise them to take the following steps immediately.

Notify Affected Banks or Creditors
One of the first orders of business that needs to happen if financial information could have been leaked is to contact the bank or credit card provider that manages the account. Your contact will want to deactivate these accounts before whomever it was that stole their identity accesses them again.

Time is of the essence, as they will need to report the theft and any unauthorized charges within two days of the unauthorized transactions to limit their liability to $50. If they report the theft before any transactions are made, they will not be liable for any activity on that account until the matter is settled.

Managing Credit Reports
Any client whose data was potentially stolen should work on managing their credit reports. First, have a fraud alert put on your account by one of the major credit reporting agencies. This will automatically provide you with a credit report from all three of these agencies, which you should check for warning signs of fraud. If your reports show credit inquiries that you didn’t make and other unexplainable activity, report the identity theft to remove the transactions and activities you are not responsible for. You may also want to consider requesting a credit freeze to prevent the credit agencies from releasing your credit information to new creditors.

Fill Out and Distribute ID Theft Report
While the FTC (Federal Trade Commission) may only follow up on larger fraud cases, they also monitor identity theft cases to try and identify suspicious patterns that suggest the involvement of organized crime. The FTC’s website also has a link to a form that will produce an identity theft complaint. Once you have that complaint, secure a police report to complete your ID theft report.

This report needs to be distributed to your creditors and credit reporting agencies, and these accounts need to be monitored to ensure that false information doesn’t persist.

Locking Down Accounts
Of course, as with any account breach, you need to update your account passwords to keep your accounts secure. Furthermore, not only should you report any false use of your Social Security Number, you should also ensure that no additional accounts have been opened in your name for any utilities, as the bill for these services can be used as proof of residence to open a new account.

Identity theft is no laughing matter, and you certainly don’t want your business to be responsible for it. For assistance with your data security solutions, call Network Synergy at 203.261.2201.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, June 18, 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab

QR-Code dieser Seite

Sign Up

  • First Name *
  • Last Name *

      Blog Categories

      Access Control Data PC Care Redundancy Sports Google Spam Experience Samsung Vulnerability Alerts Food Google Analytics Communication Recycling IT service Telephone Systems Virtualization IT Technicians Business Technology Health Data Management Operations communications IP Address History LiFi Office Tips Microsoft Office Going Green Data Recovery Browser Webcam Mouse Search Social Media Two-factor Authentication Consultation Tablet User Cost Management Service-based Business Disaster Cryptocurrency Text Messaging IT Solutions Downtime Security Alert Word Display Safety IoT Management Saving Time Mobile Technology VoIP Scam Law Enforcement Streaming Media Gadget Typing Network Security Network Time Management Mobile Device Management BYOD Content Filtering Modem Mobility Licensing Public Cloud Outlook Tech Term Office Dark Web Telephony iPhone Techology Cyber Monday Remote Computing Automobile Botnet Humor Users Meetings Email Flexibility Troubleshooting Managed Service Provider Facebook Supercomputer Project Management eWaste Smartphone Bitcoin CrashOverride Virtual Reality YouTube Small Business Mobile Data Staff Unified Communications Company Culture Storage Education Augmented Reality Google Calendar Business Intelligence Screen Reader Technology Laws GPS Running Cable Legal 3D Employer-Employee Relationship Web Server Webinar Infrastructure User Error Microsoft Comparison Technology Migration Google Wallet Marketing Business Growth Cleaning Tip of the Week Google Drive Artificial Intelligence The Internet of Things Business Computing Consumers Debate Robot Google Maps Legislation Business Public Speaking Software as a Service Internet Exlporer Hosted Solutions Private Cloud Applications Encryption Presentation Physical Security Memory Vendor Management Digital Hardware Social Inbound Marketing Data Breach Data storage Cortana Workplace Tips Managed IT services Best Practice Heating/Cooling Excel Leadership Smart Tech Mobile Security Customer Relationship Management Windows 10 Secruity Data Security Business Management Healthcare Digital Signature Mobile Office Touchscreen Managed IT Phone System Law Firm IT Saving Money Work Station Net Neutrality Piracy Windows 10 Software Tips IT Management Social Engineering Identity Theft Mobile Device Video Surveillance Gaming Console Writing Wireless Administrator Disaster Recovery Computer Care Notifications Star Wars Google Docs Firefox Trainging Network Congestion Website Bring Your Own Device Motion sickness Distributed Denial of Service Tip of the week Trending eBay Digital Payment Router Managing Stress Unsupported Software Cybersecurity Knowledge Training Windows Staffing Hard Drives Scheduling Analyitcs Utility Computing IT Support Charger Crowdfunding WiFi Save Time Server Management Best Practices Patch Management Computer Accessories CIO Remote Support Computer Tip of the Work End of Support Mobile Operating System Social Networking Hacker IT Support BDR Websites Solid State Drive IT Consulting Assessment Malware Multi-Factor Security Programming Smart Technology Cloud Computing Computers Work/Life Balance Laptop Hiring/Firing Intranet Remote Monitoring Black Friday Networking Hard Disk Drive Cameras SharePoint Bluetooth Passwords Save Money Productivity Managed IT Service Blockchain Recovery Thank You Alt Codes Deep Learning Wearable Technology Document Management Tutorials Bandwidth Superfish Data Warehousing Scary Stories G Suite Android Hosted Solution Machine Learning Spyware Unified Threat Management Regulations Black Market Computing Collaboration Smartphones Co-managed IT Fraud Domains 3D Printing Identity Hackers Technology Tips Files Upgrades Hacking Uninterrupted Power Supply Chromebook Connectivity Firewall Competition Settings Business Continuity Software Skype Monitors Politics Statistics Specifications Undo Quick Tips 5G Wi-Fi Virus Address Ransomware People Conferencing Permissions Mobile Devices Personal Information Backup Logs Miscellaneous Emoji Break Fix Risk Management Point of Sale Holiday Productivity Error USB Data Loss Efficiency Refrigeration Application Relocation Network Management Lenovo Entrepreneur PowerPoint Virtual Desktop Cloud Apple Money Information Technology Nanotechnology Processors Automation Managed IT Services Sync Backups User Tips Mobile Computing Mirgation Maintenance Cooperation Shortcut Value Help Desk Halloween Internet Online Currency Enterprise Content Management Windows 8.1 Update Travel Print Server Big Data Unified Threat Management Cabling Start Menu Current Events VPN Disaster Resistance Taxes Macro Identities Phishing Mail Merge Paperless Office Password Servers Office 365 Drones Government Electronic Medical Records Enterprise Resource Planning Lithium-ion Battery Server Customer Service App Printing Privacy CCTV Hotspot Cookies Crowdsourcing Computing Infrastructure Administration Environment SaaS Outsourced IT Motherboard Fun Buisness Printer HIPAA Cache Chatbots Antivirus Best Available Fax Server Hard Drive Gmail Gadgets Upgrade LinkedIn File Sharing Innovation Corporate Profile Hacks Computer Repair Tech Support Avoiding Downtime IT Consultant IT Services Cybercrime Compliance IT budget Apps Chrome Virtual Private Network How To Twitter IBM Data Backup Congratulations Internet of Things PDF Business Owner Language Microsoft Excel Retail Wireless Technology Budget Battery Tracking Proactive IT Downloads Documents Windows 8

      Latest Blogs

      On the surface, you might think that customer relationship management (CRM) and enterprise resource planning (ERP) are the same exact thing. However, they both have very specific n...

      Latest News

      Our Site Has Launched!

      flag

      Welcome to Our New Site!
      We are proud to announce the unveiling of our new website at Network Synergy!

      Read more ...

      Contact Us

      Learn more about what Network Synergy can do for your business.

      callphone

      Call us today    203.261.2201

      Fax Number :    203-261-2935

      126 Monroe Turnpike
      Trumbull, Connecticut 06611

      facebook twitter linkedin #youtube