Get Started Today!  (845) 208-0453

croom new

S I M Technology Blog

Do You Know What to Do When Involved in Identity Theft?

Do You Know What to Do When Involved in Identity Theft?

The unfortunate truth of increased technology use in the workplace is that there is a corresponding increase in the potential for cybercrime, more specifically identity theft, to strike the workplace. The question is, what can you do to help prevent it, and how should you react to it should it strike?

How You Can Help an Identity Thief
There are plenty of ways that an identity thief can gain the information they need to successfully take control of one of your accounts or some of your critical data. First of all, many businesses have a tendency to collect more data than they actually need from their contacts and employees. This only gives the identity thief more ammunition. Furthermore, many businesses underestimate the lengths that an identity thief will go to in order to collect the information that they need. Frankly, just throwing out documentation won’t stop someone who isn’t above dumpster-diving. Any paper records should be cross-shredded before they are disposed of.

Of course, paper records are a relatively easy way for an identity thief to get what they want in almost any circumstance. Therefore, it makes much more sense to keep your documentation stored digitally, protected by passwords and encryption that stands up to best practices.

What to Tell Your Clients if Their Identities Are Stolen on Your Watch
Unfortunately, even the smallest error can lead to a security breach, which means that you may have to inform your clients that their information has been stolen. To help them further, you will want to advise them to take the following steps immediately.

Notify Affected Banks or Creditors
One of the first orders of business that needs to happen if financial information could have been leaked is to contact the bank or credit card provider that manages the account. Your contact will want to deactivate these accounts before whomever it was that stole their identity accesses them again.

Time is of the essence, as they will need to report the theft and any unauthorized charges within two days of the unauthorized transactions to limit their liability to $50. If they report the theft before any transactions are made, they will not be liable for any activity on that account until the matter is settled.

Managing Credit Reports
Any client whose data was potentially stolen should work on managing their credit reports. First, have a fraud alert put on your account by one of the major credit reporting agencies. This will automatically provide you with a credit report from all three of these agencies, which you should check for warning signs of fraud. If your reports show credit inquiries that you didn’t make and other unexplainable activity, report the identity theft to remove the transactions and activities you are not responsible for. You may also want to consider requesting a credit freeze to prevent the credit agencies from releasing your credit information to new creditors.

Fill Out and Distribute ID Theft Report
While the FTC (Federal Trade Commission) may only follow up on larger fraud cases, they also monitor identity theft cases to try and identify suspicious patterns that suggest the involvement of organized crime. The FTC’s website also has a link to a form that will produce an identity theft complaint. Once you have that complaint, secure a police report to complete your ID theft report.

This report needs to be distributed to your creditors and credit reporting agencies, and these accounts need to be monitored to ensure that false information doesn’t persist.

Locking Down Accounts
Of course, as with any account breach, you need to update your account passwords to keep your accounts secure. Furthermore, not only should you report any false use of your Social Security Number, you should also ensure that no additional accounts have been opened in your name for any utilities, as the bill for these services can be used as proof of residence to open a new account.

Identity theft is no laughing matter, and you certainly don’t want your business to be responsible for it. For assistance with your data security solutions, call S I M Technology at (845) 208-0453.

BYOD is Only Helpful If the Devices Are Secure
Tech Term: What Does “Encryption” Mean?


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, September 26 2018

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Privacy Email Cloud Malware Internet Hosted Solutions Business Computing Tech Term Data Business Hackers Software Computer Microsoft IT Services Network Security Ransomware Mobile Devices Backup Android IT Support Cloud Computing Google Artificial Intelligence Windows Data Recovery Innovation Data Management Productivity Hardware Smartphone Data Backup Encryption Small Business Internet of Things Browser Alert User Tips Efficiency Vulnerability Passwords Windows 10 Gmail Business Continuity Server Phishing App Outsourced IT Managed IT Services Productivity Website Tip of the week Paperless Office Network Remote Monitoring Smartphones Business Management IT Support Facebook Cybersecurity Chrome Communication Saving Money Workplace Tips Infrastructure Storage Big Data Antivirus VoIP Managed IT Services Applications Save Money Office 365 Managed Service Provider Government Apple Disaster Recovery IT Management Robot BYOD Money Employer-Employee Relationship Data storage Social Media Windows 10 Two-factor Authentication Bandwidth Managed Service Risk Management Telephone Systems Scam Mobile Device Mobile Security Analytics Mouse Outlook HIPAA communications Upgrade How To Firewall Router Data loss Google Drive Tablet Settings VPN Monitors Unified Communications Unified Threat Management Spam Data Security Customer Service Office Tips Business Technology Maintenance Network Management Machine Learning Virtual Private Network Word Blockchain Automation End of Support Hosted Solution Computing Holiday Collaboration Server Management BDR Virtual Reality WiFi Bring Your Own Device LiFi Quick Tips Document Management SaaS Administration Information YouTube Wi-Fi Miscellaneous Content Filtering Patch Management Healthcare Bluetooth Black Friday Going Green Motherboard IT solutions Monitoring Training WannaCry Microsoft Office Operating System Alerts Recycling Multi-Factor Security Hacks Identity Education G Suite Retail Cost Management Websites Bitcoin Virtual Desktop Vulnerabilities Disaster Dark Web Display Twitter Smart Tech Electronic Health Records Avoiding Downtime Printer Cyber Monday Recovery Printing Consulting Networking Business Growth Licensing eWaste Heating/Cooling Google Calendar Password Dark Data Running Cable OneNote Emergency Hotspot Office Downtime Assessment Access Control Firefox Vendor Management Windows 8 Development Uninterrupted Power Supply Microsoft Excel Remote Computing Google Wallet Connectivity Files Time Management Smart Technology Chromebook Modem Managed Services Provider Digital Hacker Google Docs Marketing Cooperation Management Servers IT service Legislation Compliance Employee-Employer Relationship Language Social Engineering Deep Learning Gadgets Internet Exlporer Digital Payment SharePoint Customer Relationship Management IT Technicians Cables Drones The Internet of Things Read Only Company Culture Managed IT Distributed Denial of Service Halloween Cookies E-Commerce Techology Spyware Alt Codes Staff Comparison Automobile Laptop Regulations Remote Workers Lenovo IBM Computing Infrastructure Safety Legal Users Hard Drive Touchscreen Downloads Social Humor Mirgation Wires Mail Merge Solid State Drive Permissions IoT Augmented Reality Managing Stress Shortcut Cabling Managed IT Service Network Congestion Apps Scary Stories Nanotechnology Features Unified Threat Management Politics Typing File Sharing Statistics Google Maps Specifications Current Events Social Networking Computer Care Superfish Corporate Profile Best Practice Cache Wireless Chatbots Address Hard Disk Drive Fraud Writing Samsung Budget Buisness Star Wars Help Desk Cryptocurrency Wearable Technology Enterprise Content Management Point of Sale Break Fix Computers Information Technology Sports Screen Reader VoIP Identity Theft User Error CrashOverride Tech Support Travel Update Law Enforcement Computer Repair Error Regulation Notifications Mobile Data Supercomputer Motion Sickness Staffing How To Gadget Administrator Health Taxes Crowdsourcing Botnet Web Server IT Budget GPS Electronic Medical Records Mobile Device Management IT Consultant Physical Security Cybercrime Cameras Processors Meetings Emoji Tracking Upgrades Mobile Computing Cleaning Personal Information Relocation CCTV Printers Webcam Cortana 3D Printing Work/Life Balance Private Cloud Virtualization Unsupported Software

Latest Blog Entry

Technology support can be one of the major pain points for businesses, and it’s not something that your organization wants to invest in without thinking about the details. Technology support as a service has a lot to offer when compared with the break/fix method. We’ll help ...

Latest News

S I M Technology launches new website!

S I M Technology is proud to announce the launch of our new website at The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

Read more ...