Get Started Today!  (845) 800-0778

Do You Know What to Do When Involved in Identity Theft?

Do You Know What to Do When Involved in Identity Theft?

The unfortunate truth of increased technology use in the workplace is that there is a corresponding increase in the potential for cybercrime, more specifically identity theft, to strike the workplace. The question is, what can you do to help prevent it, and how should you react to it should it strike?

How You Can Help an Identity Thief
There are plenty of ways that an identity thief can gain the information they need to successfully take control of one of your accounts or some of your critical data. First of all, many businesses have a tendency to collect more data than they actually need from their contacts and employees. This only gives the identity thief more ammunition. Furthermore, many businesses underestimate the lengths that an identity thief will go to in order to collect the information that they need. Frankly, just throwing out documentation won’t stop someone who isn’t above dumpster-diving. Any paper records should be cross-shredded before they are disposed of.

Of course, paper records are a relatively easy way for an identity thief to get what they want in almost any circumstance. Therefore, it makes much more sense to keep your documentation stored digitally, protected by passwords and encryption that stands up to best practices.

What to Tell Your Clients if Their Identities Are Stolen on Your Watch
Unfortunately, even the smallest error can lead to a security breach, which means that you may have to inform your clients that their information has been stolen. To help them further, you will want to advise them to take the following steps immediately.

Notify Affected Banks or Creditors
One of the first orders of business that needs to happen if financial information could have been leaked is to contact the bank or credit card provider that manages the account. Your contact will want to deactivate these accounts before whomever it was that stole their identity accesses them again.

Time is of the essence, as they will need to report the theft and any unauthorized charges within two days of the unauthorized transactions to limit their liability to $50. If they report the theft before any transactions are made, they will not be liable for any activity on that account until the matter is settled.

Managing Credit Reports
Any client whose data was potentially stolen should work on managing their credit reports. First, have a fraud alert put on your account by one of the major credit reporting agencies. This will automatically provide you with a credit report from all three of these agencies, which you should check for warning signs of fraud. If your reports show credit inquiries that you didn’t make and other unexplainable activity, report the identity theft to remove the transactions and activities you are not responsible for. You may also want to consider requesting a credit freeze to prevent the credit agencies from releasing your credit information to new creditors.

Fill Out and Distribute ID Theft Report
While the FTC (Federal Trade Commission) may only follow up on larger fraud cases, they also monitor identity theft cases to try and identify suspicious patterns that suggest the involvement of organized crime. The FTC’s website also has a link to a form that will produce an identity theft complaint. Once you have that complaint, secure a police report to complete your ID theft report.

This report needs to be distributed to your creditors and credit reporting agencies, and these accounts need to be monitored to ensure that false information doesn’t persist.

Locking Down Accounts
Of course, as with any account breach, you need to update your account passwords to keep your accounts secure. Furthermore, not only should you report any false use of your Social Security Number, you should also ensure that no additional accounts have been opened in your name for any utilities, as the bill for these services can be used as proof of residence to open a new account.

Identity theft is no laughing matter, and you certainly don’t want your business to be responsible for it. For assistance with your data security solutions, call S I M Technology at (845) 800-0778.

BYOD is Only Helpful If the Devices Are Secure
Tech Term: What Does “Encryption” Mean?

Related Posts



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, 20 March 2018

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Email Privacy Malware Business Computing Hackers Software Android Internet Microsoft Ransomware Backup Hosted Solutions Network Security Business Computer Mobile Devices IT Services Windows Data Management Small Business Smartphone Hardware Cloud Computing Encryption Server Artificial Intelligence Google Data Windows 10 Internet of Things Browser Business Continuity Innovation Saving Money IT Support Tip of the week Productivity Remote Monitoring Outsourced IT Phishing App User Tips Business Management Efficiency Gmail Data Recovery Managed IT Services Smartphones Facebook IT Support Apple Windows 10 Disaster Recovery Risk Management Cybersecurity Office 365 Communication Managed Service Provider IT Management Infrastructure Chrome Data Backup Robot Money Data storage Antivirus Big Data Productivity Settings Telephone Systems Two-factor Authentication Firewall Managed IT Services Administration Computing Scam LiFi Monitors Unified Threat Management Save Money Maintenance Vulnerability Content Filtering Automation Virtual Reality Miscellaneous VPN Data Security Analytics Virtual Private Network Network SaaS Holiday Storage Upgrade Google Drive Server Management Mobile Device Data loss Hosted Solution Customer Service HIPAA Tablet YouTube Social Media Bandwidth Mobile Security Word End of Support Passwords Government Business Technology Employer-Employee Relationship communications Mouse Office Tips BYOD Outlook Printing Lenovo Unified Communications Identity Theft Computers Computing Infrastructure Microsoft Office Chatbots Downloads Hacker Touchscreen WiFi Laptop Managed IT Service Windows 8 Shortcut Superfish How To Display Alerts Identity Alt Codes Workplace Tips Break Fix Patch Management Firefox Buisness Remote Computing Licensing Tech Term Legal Multi-Factor Security Typing IT solutions Humor Dark Web Social Networking Customer Relationship Management Digital Payment Cooperation Compliance Google Calendar Cryptocurrency Heating/Cooling Virtual Desktop IBM Microsoft Excel Staff Information Technology Downtime Alert Regulations Operating System Legislation Bitcoin Servers Cabling Hacks Corporate Profile Computer Care Blockchain Writing Augmented Reality Techology Wireless Samsung Automobile Gadgets Comparison Password Mail Merge WannaCry Spam Training Halloween Politics Dark Data Permissions Retail Wearable Technology Google Wallet Unified Threat Management Deep Learning Quick Tips Users Paperless Office Google Docs Specifications Statistics Disaster Address Scary Stories Recovery Tech Support Fraud Office Drones User Error Bring Your Own Device VoIP Vendor Management Black Friday Bluetooth Uninterrupted Power Supply Digital Apps Sports Websites Social Engineering Applications Printer Best Practice Avoiding Downtime IT service Website Education Cyber Monday Current Events Spyware Hotspot Safety IT Technicians Budget Access Control Time Management BDR Collaboration Solid State Drive Running Cable Smart Technology Going Green Document Management Network Congestion Language File Sharing Marketing Mirgation SharePoint Business Growth Network Management Google Maps Hard Disk Drive Wi-Fi Distributed Denial of Service Managed IT CrashOverride Virtualization Relocation Travel G Suite Computer Repair Work/Life Balance Supercomputer Twitter Private Cloud Motion Sickness How To Taxes Health Law Enforcement IT Budget Error IT Consultant Electronic Medical Records Gadget Processors VoIP Meetings Upgrades Cleaning Webcam 3D Printing Point of Sale Cybercrime Unsupported Software Update Notifications Mobile Data Mobile Device Management Staffing Crowdsourcing Administrator Web Server Mobile Computing GPS Chromebook Cameras Physical Security Emergency Tracking Emoji Botnet CCTV Personal Information Cortana Machine Learning

Latest Blog Entry

What one organization considers a disaster might be much different than what another business might see as disastrous. Perhaps one sees the loss of a few hours and a few files as something that can be recovered, while another sees every lost moment and each iota of data as a...

Latest News

S I M Technology launches new website!

S I M Technology is proud to announce the launch of our new website at The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

Read more ...