Get Started Today!  (845) 208-0453

croom new

S I M Technology Blog

Do You Know What to Do When Involved in Identity Theft?

Do You Know What to Do When Involved in Identity Theft?

The unfortunate truth of increased technology use in the workplace is that there is a corresponding increase in the potential for cybercrime, more specifically identity theft, to strike the workplace. The question is, what can you do to help prevent it, and how should you react to it should it strike?

How You Can Help an Identity Thief
There are plenty of ways that an identity thief can gain the information they need to successfully take control of one of your accounts or some of your critical data. First of all, many businesses have a tendency to collect more data than they actually need from their contacts and employees. This only gives the identity thief more ammunition. Furthermore, many businesses underestimate the lengths that an identity thief will go to in order to collect the information that they need. Frankly, just throwing out documentation won’t stop someone who isn’t above dumpster-diving. Any paper records should be cross-shredded before they are disposed of.

Of course, paper records are a relatively easy way for an identity thief to get what they want in almost any circumstance. Therefore, it makes much more sense to keep your documentation stored digitally, protected by passwords and encryption that stands up to best practices.

What to Tell Your Clients if Their Identities Are Stolen on Your Watch
Unfortunately, even the smallest error can lead to a security breach, which means that you may have to inform your clients that their information has been stolen. To help them further, you will want to advise them to take the following steps immediately.

Notify Affected Banks or Creditors
One of the first orders of business that needs to happen if financial information could have been leaked is to contact the bank or credit card provider that manages the account. Your contact will want to deactivate these accounts before whomever it was that stole their identity accesses them again.

Time is of the essence, as they will need to report the theft and any unauthorized charges within two days of the unauthorized transactions to limit their liability to $50. If they report the theft before any transactions are made, they will not be liable for any activity on that account until the matter is settled.

Managing Credit Reports
Any client whose data was potentially stolen should work on managing their credit reports. First, have a fraud alert put on your account by one of the major credit reporting agencies. This will automatically provide you with a credit report from all three of these agencies, which you should check for warning signs of fraud. If your reports show credit inquiries that you didn’t make and other unexplainable activity, report the identity theft to remove the transactions and activities you are not responsible for. You may also want to consider requesting a credit freeze to prevent the credit agencies from releasing your credit information to new creditors.

Fill Out and Distribute ID Theft Report
While the FTC (Federal Trade Commission) may only follow up on larger fraud cases, they also monitor identity theft cases to try and identify suspicious patterns that suggest the involvement of organized crime. The FTC’s website also has a link to a form that will produce an identity theft complaint. Once you have that complaint, secure a police report to complete your ID theft report.

This report needs to be distributed to your creditors and credit reporting agencies, and these accounts need to be monitored to ensure that false information doesn’t persist.

Locking Down Accounts
Of course, as with any account breach, you need to update your account passwords to keep your accounts secure. Furthermore, not only should you report any false use of your Social Security Number, you should also ensure that no additional accounts have been opened in your name for any utilities, as the bill for these services can be used as proof of residence to open a new account.

Identity theft is no laughing matter, and you certainly don’t want your business to be responsible for it. For assistance with your data security solutions, call S I M Technology at (845) 208-0453.

BYOD is Only Helpful If the Devices Are Secure
Tech Term: What Does “Encryption” Mean?


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, December 13 2018

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Privacy Cloud Email Malware Internet Business Business Computing Hosted Solutions Data Tech Term Hackers Network Security Productivity Software Computer Microsoft Ransomware IT Services Mobile Devices Backup Data Backup Android Data Recovery IT Support Google Cloud Computing Hardware Encryption Data Management Smartphone Windows Browser Artificial Intelligence Innovation Efficiency Outsourced IT Alert Small Business Internet of Things Server User Tips Business Continuity Vulnerability Remote Monitoring Passwords Windows 10 Gmail Managed IT Services Smartphones Phishing Windows 10 App Managed IT Services Communication IT Management Infrastructure Network Upgrade Paperless Office Facebook Chrome Saving Money IT Support Business Management Tip of the week Social Media Workplace Tips Bandwidth Cybersecurity Antivirus Collaboration Government Website Productivity Big Data Employer-Employee Relationship BYOD Blockchain Storage communications Mobile Device Information Wi-Fi Managed Service Healthcare Two-factor Authentication Apple Customer Service Disaster Recovery Maintenance VoIP Robot Applications Money Save Money Office 365 Risk Management BDR Data storage Managed Service Provider Automation VPN Machine Learning Data Security End of Support Content Filtering Holiday Document Management Miscellaneous Business Technology Virtual Reality Network Management Downtime Operating System Virtual Private Network Wireless Analytics Mouse Politics Telephone Systems Server Management Outlook SaaS Google Drive Office Tips Quick Tips Settings How To Firewall Unified Communications Data loss Tablet Spam Users WiFi Patch Management HIPAA Unified Threat Management Scam Hosted Solution Computing Office YouTube Router Mobile Security Administration Monitors Word Bring Your Own Device Customer Relationship Management LiFi Current Events Remote Monitoring and Management Time Management Access Control Compliance Employee-Employer Relationship Solid State Drive Best Practice Microsoft Excel Education Internet Exlporer IT Technicians Cables Cabling Budget Smart Technology Virtual Desktop The Internet of Things Read Only Instant Messaging Staff Company Culture File Sharing Google Maps Information Technology Tech Terms Servers Legislation Safety Cookies E-Commerce Computer Care Corporate Profile Cryptocurrency Language Automobile Going Green Zero-Day Threat SharePoint Regulations Remote Workers Hard Disk Drive Running Cable Hard Drive Techology Network Congestion Mirgation Wires Point of Sale Managed IT Distributed Denial of Service IoT Identity Theft CrashOverride Hacks Finance Augmented Reality Managing Stress Comparison Marketing Nanotechnology Features Training WannaCry Bitcoin Lenovo Computing Infrastructure Printing Human Error Touchscreen Downloads Writing Samsung Gadgets Social Networking G Suite Business Growth Mail Merge Permissions Cache Unified Threat Management Computers Chatbots Disaster Shortcut Managed IT Service Tech Support Star Wars Help Desk Password Dark Data Authentication Halloween Wearable Technology Enterprise Content Management Google Wallet Statistics Specifications Microsoft Office Screen Reader Windows 8 Superfish Permission Retail Motherboard Monitoring Hacker Google Docs Address Fraud Laptop Alerts Recycling Authorization VoIP User Error Display Twitter Identity Uninterrupted Power Supply Deep Learning Break Fix Websites Cost Management Bookmarks Firefox Mobile Device Management Recovery Scary Stories Vulnerabilities Drones Bluetooth Black Friday Smart Tech Electronic Health Records Digital eWaste IT service Test Multi-Factor Security Consulting Alt Codes Licensing Employees Avoiding Downtime Printer Remote Computing Buisness OneNote Legal Dark Web Vendor Management Assessment Favorites Digital Payment Chromebook Sports Development Cyber Monday Connectivity Files Spyware Social Humor Networking Cooperation Management Apps RMM Heating/Cooling Google Calendar Social Engineering Modem Managed Services Provider IBM Typing Emergency Hotspot Electronic Medical Records IT solutions Processors CCTV Physical Security Emoji Webcam Upgrades Personal Information Relocation Cortana 3D Printing Printers Travel Theft Work/Life Balance Private Cloud Virtualization Unsupported Software Cybercrime Supercomputer Motion Sickness Financial Law Enforcement Staffing Update Administrator Notifications Taxes Computer Repair Error Regulation Web Server Mobile Data IT Budget How To Gadget GPS Crowdsourcing IT Consultant Health Cameras Botnet Mobile Computing Meetings Tracking Cleaning

Latest Blog Entry

While smartphones and tablets can help businesses quite a bit, they can also be quite detrimental to their success. If you can get past the issues related to employees bringing their own devices to the workplace, then you’ll be able to save a considerable amount of time and ...

Latest News

S I M Technology launches new website!

S I M Technology is proud to announce the launch of our new website at The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

Read more ...