Network Synergy Blog

Network Synergy has been serving the Trumbull area since 1988, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Do You Know What to Do When Involved in Identity Theft?

Do You Know What to Do When Involved in Identity Theft?

The unfortunate truth of increased technology use in the workplace is that there is a corresponding increase in the potential for cybercrime, more specifically identity theft, to strike the workplace. The question is, what can you do to help prevent it, and how should you react to it should it strike?

How You Can Help an Identity Thief
There are plenty of ways that an identity thief can gain the information they need to successfully take control of one of your accounts or some of your critical data. First of all, many businesses have a tendency to collect more data than they actually need from their contacts and employees. This only gives the identity thief more ammunition. Furthermore, many businesses underestimate the lengths that an identity thief will go to in order to collect the information that they need. Frankly, just throwing out documentation won’t stop someone who isn’t above dumpster-diving. Any paper records should be cross-shredded before they are disposed of.

Of course, paper records are a relatively easy way for an identity thief to get what they want in almost any circumstance. Therefore, it makes much more sense to keep your documentation stored digitally, protected by passwords and encryption that stands up to best practices.

What to Tell Your Clients if Their Identities Are Stolen on Your Watch
Unfortunately, even the smallest error can lead to a security breach, which means that you may have to inform your clients that their information has been stolen. To help them further, you will want to advise them to take the following steps immediately.

Notify Affected Banks or Creditors
One of the first orders of business that needs to happen if financial information could have been leaked is to contact the bank or credit card provider that manages the account. Your contact will want to deactivate these accounts before whomever it was that stole their identity accesses them again.

Time is of the essence, as they will need to report the theft and any unauthorized charges within two days of the unauthorized transactions to limit their liability to $50. If they report the theft before any transactions are made, they will not be liable for any activity on that account until the matter is settled.

Managing Credit Reports
Any client whose data was potentially stolen should work on managing their credit reports. First, have a fraud alert put on your account by one of the major credit reporting agencies. This will automatically provide you with a credit report from all three of these agencies, which you should check for warning signs of fraud. If your reports show credit inquiries that you didn’t make and other unexplainable activity, report the identity theft to remove the transactions and activities you are not responsible for. You may also want to consider requesting a credit freeze to prevent the credit agencies from releasing your credit information to new creditors.

Fill Out and Distribute ID Theft Report
While the FTC (Federal Trade Commission) may only follow up on larger fraud cases, they also monitor identity theft cases to try and identify suspicious patterns that suggest the involvement of organized crime. The FTC’s website also has a link to a form that will produce an identity theft complaint. Once you have that complaint, secure a police report to complete your ID theft report.

This report needs to be distributed to your creditors and credit reporting agencies, and these accounts need to be monitored to ensure that false information doesn’t persist.

Locking Down Accounts
Of course, as with any account breach, you need to update your account passwords to keep your accounts secure. Furthermore, not only should you report any false use of your Social Security Number, you should also ensure that no additional accounts have been opened in your name for any utilities, as the bill for these services can be used as proof of residence to open a new account.

Identity theft is no laughing matter, and you certainly don’t want your business to be responsible for it. For assistance with your data security solutions, call Network Synergy at 203.261.2201.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, 24 March 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab

QR-Code dieser Seite

Sign Up

  • First Name *
  • Last Name *

      Blog Categories

      Deep Learning Software Tips Internet Information Technology Network Management Cortana Education Spam Buisness Users Apple Statistics Encryption Cybercrime Heating/Cooling Privacy G Suite Recycling Distributed Denial of Service 3D Printing communications PDF Mobile Office Unified Threat Management Upgrade Robot Printer Mail Merge Language Data storage IT Support Phone System Consultation Smartphones Shortcut Display Migration Tip of the Week Microsoft Data Recovery Search Gadget Net Neutrality Cyber Monday Website Downloads IT Consultant Outsourced IT Identity Business Continuity Data Security Windows 10 Backup Trending End of Support Cloud Chatbots Downtime Bitcoin Staff Tracking Network Security Mobile Device Management Documents Server Smart Technology Data Backup Conferencing Firewall Project Management Hard Drives Internet Exlporer Google Drive Business Microsoft Excel Alt Codes Backups Operations Webcam Applications Marketing How To Domains Superfish IT Technicians Antivirus Productivity Twitter Google Maps Physical Security Address Redundancy Identities Infrastructure Computer Repair Computing Infrastructure Health Halloween Black Market Password Mobile Device File Sharing Emoji Competition Browser Technology Hosted Solution Settings IT budget Cybersecurity Multi-Factor Security Server Management Legal Error Social Engineering Employer-Employee Relationship Writing Servers Safety Bluetooth Telephony Alert Workplace Tips Managed IT Services Windows 8 Google Computers Secruity Windows Virtual Reality CIO Proactive IT Productivity Miscellaneous Specifications Dark Web Best Practice App Cabling Data Breach Running Cable LinkedIn Piracy Identity Theft Social Media Knowledge Techology Current Events Hackers Network Text Messaging Mobile Devices Best Practices CrashOverride Business Intelligence Operating System Office Tips Money Remote Monitoring Hacking Intranet Hardware Word Budget Administration Quick Tips LiFi Chromebook YouTube Collaboration Mobile Data Crowdfunding Licensing Phishing eBay Vulnerability Spyware Scam Mobility Fraud Computer Care Bandwidth Hiring/Firing Apps Web Server Business Growth Touchscreen Computer Content Filtering Microsoft Office Save Time Public Cloud Software as a Service Automation Lenovo IT Solutions Break Fix Google Calendar Lithium-ion Battery Service-based Business Wireless VoIP IT Consulting Unified Threat Management Typing SharePoint Uninterrupted Power Supply Router Digital HIPAA Botnet Firefox Point of Sale Mouse Ransomware Tip of the week WiFi Virtual Desktop Comparison Google Docs Business Technology Access Control eWaste Hacker Time Management Application Security Logs Co-managed IT Data Warehousing Bring Your Own Device Computer Accessories Save Money Vendor Management PC Care Webinar Business Owner 5G Recovery Debate Social Networking Drones Memory Smartphone Law Firm IT Relocation Google Analytics Processors Files Software Electronic Medical Records Environment Gaming Console Consumers Government Video Surveillance Network Congestion Customer Service Travel Laptop Administrator Skype Virus Holiday Remote Support Gmail Digital Signature Value Programming 3D Retail Taxes Managed IT Service Experience Public Speaking Big Data The Internet of Things History Fun Cryptocurrency Staffing Two-factor Authentication Private Cloud Hacks Tablet Notifications Mirgation Solid State Drive Augmented Reality Flexibility IT service Politics Undo Troubleshooting Assessment Android Inbound Marketing iPhone Excel Data Patch Management SaaS Business Computing Machine Learning Windows 8.1 Update Saving Time Analyitcs Alerts Cost Management Efficiency GPS Streaming Media Motion sickness Tech Term Start Menu Black Friday Leadership Communication Charger People CCTV Samsung Office User Tech Support Law Enforcement Upgrades Fax Server Office 365 Malware Online Currency Cameras Cooperation Regulations Printing Virtualization Innovation Sync Meetings Passwords Battery Managed IT services Hotspot Gadgets Thank You Managed Service Provider Document Management Computing BYOD Corporate Profile Mobile Security Mobile Computing Facebook Tip of the Work Nanotechnology Disaster Resistance Tutorials Windows 10 PowerPoint Company Culture Social Outlook Remote Computing Mobile Technology IBM Business Management VPN Scary Stories Digital Payment Virtual Private Network Risk Management Maintenance Legislation Print Server Permissions BDR Networking Compliance Best Available Google Wallet Unified Communications Humor User Tips Chrome Automobile Help Desk Congratulations Avoiding Downtime Artificial Intelligence Saving Money Cloud Computing Trainging IP Address Data Management Customer Relationship Management Sports Crowdsourcing Hard Disk Drive Websites Email Food User Error Wearable Technology Technology Laws Small Business Internet of Things Refrigeration Supercomputer Cleaning Entrepreneur Unsupported Software Going Green Monitors Storage IT Services Work/Life Balance Wireless Technology Training Blockchain Presentation Hosted Solutions Disaster Recovery IT Support USB Wi-Fi Disaster Work Station Macro Technology Tips Telephone Systems Data Loss Personal Information Paperless Office IT Management Scheduling Managed IT

      Latest Blogs

      Ransomware is a growing problem for businesses, being one of the most difficult threats to remove from an infrastructure. Not only is it easy to spread, but difficult to avoid as a...

      Latest News

      Our Site Has Launched!


      Welcome to Our New Site!
      We are proud to announce the unveiling of our new website at Network Synergy!

      Read more ...

      Contact Us

      Learn more about what Network Synergy can do for your business.


      Call us today    203.261.2201

      Fax Number :    203-261-2935

      126 Monroe Turnpike
      Trumbull, Connecticut 06611

      facebook twitter linkedin #youtube