Network Synergy Blog

Do You Know What to Do When Involved in Identity Theft?

Do You Know What to Do When Involved in Identity Theft?

The unfortunate truth of increased technology use in the workplace is that there is a corresponding increase in the potential for cybercrime, more specifically identity theft, to strike the workplace. The question is, what can you do to help prevent it, and how should you react to it should it strike?

How You Can Help an Identity Thief
There are plenty of ways that an identity thief can gain the information they need to successfully take control of one of your accounts or some of your critical data. First of all, many businesses have a tendency to collect more data than they actually need from their contacts and employees. This only gives the identity thief more ammunition. Furthermore, many businesses underestimate the lengths that an identity thief will go to in order to collect the information that they need. Frankly, just throwing out documentation won’t stop someone who isn’t above dumpster-diving. Any paper records should be cross-shredded before they are disposed of.

Of course, paper records are a relatively easy way for an identity thief to get what they want in almost any circumstance. Therefore, it makes much more sense to keep your documentation stored digitally, protected by passwords and encryption that stands up to best practices.

What to Tell Your Clients if Their Identities Are Stolen on Your Watch
Unfortunately, even the smallest error can lead to a security breach, which means that you may have to inform your clients that their information has been stolen. To help them further, you will want to advise them to take the following steps immediately.

Notify Affected Banks or Creditors
One of the first orders of business that needs to happen if financial information could have been leaked is to contact the bank or credit card provider that manages the account. Your contact will want to deactivate these accounts before whomever it was that stole their identity accesses them again.

Time is of the essence, as they will need to report the theft and any unauthorized charges within two days of the unauthorized transactions to limit their liability to $50. If they report the theft before any transactions are made, they will not be liable for any activity on that account until the matter is settled.

Managing Credit Reports
Any client whose data was potentially stolen should work on managing their credit reports. First, have a fraud alert put on your account by one of the major credit reporting agencies. This will automatically provide you with a credit report from all three of these agencies, which you should check for warning signs of fraud. If your reports show credit inquiries that you didn’t make and other unexplainable activity, report the identity theft to remove the transactions and activities you are not responsible for. You may also want to consider requesting a credit freeze to prevent the credit agencies from releasing your credit information to new creditors.

Fill Out and Distribute ID Theft Report
While the FTC (Federal Trade Commission) may only follow up on larger fraud cases, they also monitor identity theft cases to try and identify suspicious patterns that suggest the involvement of organized crime. The FTC’s website also has a link to a form that will produce an identity theft complaint. Once you have that complaint, secure a police report to complete your ID theft report.

This report needs to be distributed to your creditors and credit reporting agencies, and these accounts need to be monitored to ensure that false information doesn’t persist.

Locking Down Accounts
Of course, as with any account breach, you need to update your account passwords to keep your accounts secure. Furthermore, not only should you report any false use of your Social Security Number, you should also ensure that no additional accounts have been opened in your name for any utilities, as the bill for these services can be used as proof of residence to open a new account.

Identity theft is no laughing matter, and you certainly don’t want your business to be responsible for it. For assistance with your data security solutions, call Network Synergy at 203.261.2201.

BYOD is Only Helpful If the Devices Are Secure
Failing Technology and Your Data
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, September 21, 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab

QR-Code dieser Seite

Sign Up

  • First Name *
  • Last Name *

      Blog Categories

      Remote Monitoring and Management Firefox Managed IT Service Permissions Black Market Star Wars Managed Service Supercomputer Management Work Station Address Social Media Backup Alert Network Security Access Control Writing Project Management MSP Mobility 3D Web Server Multi-Factor Security VPN The Internet of Things Networking Technology Tips Users Remote Computing 3D Printing Apple End of Support WiFi Chrome Router Virus Tracking Service-based Business Black Friday Analyitcs Managed Services Provider Lenovo Cabling BYOD Holiday Legal E-Commerce Avoiding Downtime Windows 10 Disaster Resistance Computer Computer Accessories PDF Compliance Remote Monitoring Budget Recovery Word Wireless Managed IT Services Sports Humor Language Public Speaking IT Consulting iPhone IT budget Read Only Outlook Redundancy IT service Business Training Proactive Mobile Technology Data Warehousing Point of Sale SaaS Microsoft Office Wires Politics How To Hacker Customer Service Marketing Security Network Management Thank You Google Docs Shortcut Mobile Device Connectivity Social Engineering Mobile Computing Hotspot Trainging Public Cloud Geography Monitoring Computers Internet of Things Content Filtering IT Support Net Neutrality Windows Tech Support Virtual Private Network Settings Regulations Cloud Best Practice communications Identities Text Messaging Mobile Device Management Files Gmail Internet Exlporer Notifications Asset Tracking Botnet Bandwidth Cookies Computer Repair Employee-Employer Relationship IT Solutions Electronic Health Records Administration Hackers Fax Server Machine Learning Telephony Staffing Smartphone Smart Tech Programming Corporate Profile Troubleshooting Small Business Tablet Laptop Enterprise Resource Planning Best Practices Business Continuity Email Personal Information Quick Tips GPS Tutorials Information Technology Network Data Management Productivity Unified Communications Enterprise Content Management Cleaning Antivirus Experience Print Server IoT Logs Server Alerts Tip of the Week Hiring/Firing Money IT Technicians Solid State Drive Tech Term Domains CrashOverride Mobile Security Artificial Intelligence Data Loss Twitter Fun Help Desk Operating System G Suite Printer Hacks Memory Cameras Phishing Passwords Chatbots Password Migration Software Managed IT services History Staff Deep Learning SharePoint Fraud Server Management Managed IT Disaster Online Currency Electronic Medical Records Productivity Identity Presentation Hosted Solutions User Tips Big Data Search Applications Office Company Culture Techology Hard Drives Leadership Excel CCTV Education User Cloud Computing Undo Specifications Smart Technology Printing Internet Webcam Save Money Social Networking Relocation Typing Charger Computing Information Software Tips Automation Taxes Alt Codes Windows 8 BDR Administrator Efficiency Touchscreen Cyberattacks Monitors Infrastructure Software as a Service Customer Relationship Management Data storage Application Blockchain Website Bring Your Own Device Trending Law Enforcement Document Management Superfish Work/Life Balance App Android Mobile Office How To Crowdfunding Facebook Smartphones Tip of the week Comparison Maintenance Business Technology Documents Unified Threat Management User Error Health Google Private Cloud Risk Management Hardware Paperless Office Remote Support Features Managing Stress Robot IT Consultant Halloween Bitcoin Business Growth Windows 8.1 Update Streaming Media Google Analytics OneNote Hacking Video Surveillance Motion sickness Cables Motherboard Scheduling Mirgation Cybercrime Spyware Current Events Crowdsourcing Vendor Management Cortana Buisness Mobile Data IT Management USB Business Computing Data Breach LinkedIn Augmented Reality File Sharing Data Recovery Digital Environment Wi-Fi Upgrade Secruity Hosted Solution Social Telephone Systems Government Running Cable Data Security Outsourced IT Business Intelligence Licensing IBM HIPAA eBay Samsung Google Wallet Innovation Firewall Utility Computing Digital Signature Inbound Marketing High-Speed Internet Saving Time Mouse Development Display Upgrades Tip of the Work LiFi IP Address Microsoft Patch Management Drones Webinar Flexibility Google Calendar Office 365 PC Care Hard Disk Drive Gadget IT Support Bluetooth Debate Vulnerability Meetings Cybersecurity Value Ransomware Scary Stories Gadgets Uninterrupted Power Supply Knowledge Phone System Chromebook Emoji Start Menu Technology Consulting Battery Malware Cost Management Disaster Recovery Sync Operations Virtual Desktop Fleet Tracking Cyber Monday Automobile People Encryption YouTube Co-managed IT Mobile Wearable Technology Network Congestion Identity Theft Business Owner Consultation Consumers Distributed Denial of Service Microsoft Excel Healthcare Workplace Tips Save Time Google Drive Heating/Cooling Conferencing Technology Laws Safety Hard Drive Miscellaneous Downloads Statistics Communication Food 5G Entrepreneur Gaming Console Privacy Retail Digital Payment IT Services Break Fix Modem Business Management Congratulations Intranet Screen Reader Data Backup Storage Processors Spam Collaboration Virtual Reality Assessment Remote Workers Unsupported Software Regulation Error Cache Lithium-ion Battery VoIP Computing Infrastructure Physical Security Going Green Managed Service Provider WPA3 eWaste Downtime Dark Web Scam Virtualization Saving Money Apps Browser Wireless Technology Travel Piracy Mail Merge Cooperation Time Management Proactive IT Recycling Nanotechnology Windows 10 Office Tips Websites Vulnerabilities Refrigeration Servers Mobile Devices CIO Google Maps Legislation Competition Printers Computer Care Macro Data PowerPoint Skype Two-factor Authentication Cryptocurrency Unified Threat Management Best Available Backups Employer-Employee Relationship Law Firm IT

      Latest Blogs

      You open a lot of files and folders during your duties around the office, but some of them might seem a little different from others. These files are marked as “read-only.” What is...

      Latest News

      Our Site Has Launched!

      flag

      Welcome to Our New Site!
      We are proud to announce the unveiling of our new website at Network Synergy!

      Read more ...

      Contact Us

      Learn more about what Network Synergy can do for your business.

      callphone

      Call us today    203.261.2201

      Fax Number :    203-261-2935

      126 Monroe Turnpike
      Trumbull, Connecticut 06611

      facebook twitter linkedin #youtube