Posts tagged "Prevention"
Identity theft prevention is not a one-time solution. You must accumulate layers of privacy and security over time. The following identity theft prevention tips are among those I cover in one of my speeches, Think Like A Spy Crash Course and expand into protecting organizational or corporate data.
- Trust Your Instincts. Most of prevention is common sense.
- When someone asks you to share private information, think – Hogwash! Learn more about establishing a Fraud Reflex.
- Ask aggressive questions to spot a ConJOB: Control, Justify, Options & Benefits. Learn more about exposing a ConJOB.
- Target (or prioritize) your responses & options to protect the most valuable items first.
- Use sophisticated Identity Monitoring software to detect theft before it’s disastrous.
- Review your Free Credit Report 3X per year at www.AnnualCreditReport.com.
- Opt-Out of financial junk mail at www.OptOutPreScreen.com (1.888.567.8688).
- Stop Marketing Phone Calls at www.DoNotCall.gov – remove phone & cell numbers from junk caller lists.
On the surface, social networking is like a worldwide cocktail party—full of new friends, fascinating places and tasty apps. Resisting the urge to drink from the endless fountain of information is nearly impossible because everyone else is doing it—connecting is often advantageous for professional reasons, it’s trendy and, unchecked, it can be dangerous.
Beneath the surface of the social networking cocktail party lives a painful data-exposure hangover for the average business. Sites like Facebook and Twitter are now the preferred tool for malware delivery, phishing, and “friends-in-distress” scams while more business oriented sites, like LinkedIn, allow for easy corporate espionage and the manipulation of your employees.
To avoid the cocktail party altogether is both impractical and naïve—the benefits of social networking outweigh the dangers—but applying discretion and wisdom to your social strategy makes for smart business. Follow these 7 Security Secrets of Social Networking to begin locking down your sensitive data.
Freezing your credit is the number one way to protect against financial identity theft. If everyone in the country applied for a Credit Freeze, identity thieves would quickly be out of business. At least, a major part of their business. Take 30 minutes and lower your chances of identity theft drastically (see the online Freeze links at the bottom of this post).
To go directly to placing a security freeze on your 3 bureau accounts, page down to the bottom section.
Every time you establish new credit (e.g., open up a new credit card, store account or bank account, finance a car or home loan, etc.), an entry is created in your credit file which is maintained by companies like Experian, Equifax and TransUnion (listed below). The trouble is, with your name, address and social security number, an identity thief can pretend to be you and can establish credit (i.e., spend your net worth) in your name.
College is the perfect period of life to begin sound financial practices including protecting privacy. Not only are college students vulnerable, but they are impressionable and well positioned to learn strong habits that will last them a lifetime. As students launch into independence, we, as parents, hope to give them the best tools possible to insure a bright future. One of the most vital tools is to establish healthy habits that will guard their financial and personal identities for the rest of their lives. People ages 18 -24 are the least able to spot identity theft according to the BBB. That age group needed more than four months to realize someone had damaged their credit history or used their identity. By taking a few precautions, a young adult can avoid the crushing job of trying to recover from having given away the keys to their financial future, which is especially overwhelming while navigating life away from home for the first time.
In the first part of this article series, we discussed why it is so important to protect your business data, including the first two steps in the protection process. Once you have resolved the underlying human issues behind data theft, the remaining five steps will help you begin protecting the technological weaknesses common to many businesses.
- Start with the humans.
- Immunize against social engineering.