Get Started Today!  (845) 208-0453

croom new

Do You Know What to Do When Involved in Identity Theft?

Do You Know What to Do When Involved in Identity Theft?

The unfortunate truth of increased technology use in the workplace is that there is a corresponding increase in the potential for cybercrime, more specifically identity theft, to strike the workplace. The question is, what can you do to help prevent it, and how should you react to it should it strike?

How You Can Help an Identity Thief
There are plenty of ways that an identity thief can gain the information they need to successfully take control of one of your accounts or some of your critical data. First of all, many businesses have a tendency to collect more data than they actually need from their contacts and employees. This only gives the identity thief more ammunition. Furthermore, many businesses underestimate the lengths that an identity thief will go to in order to collect the information that they need. Frankly, just throwing out documentation won’t stop someone who isn’t above dumpster-diving. Any paper records should be cross-shredded before they are disposed of.

Of course, paper records are a relatively easy way for an identity thief to get what they want in almost any circumstance. Therefore, it makes much more sense to keep your documentation stored digitally, protected by passwords and encryption that stands up to best practices.

What to Tell Your Clients if Their Identities Are Stolen on Your Watch
Unfortunately, even the smallest error can lead to a security breach, which means that you may have to inform your clients that their information has been stolen. To help them further, you will want to advise them to take the following steps immediately.

Notify Affected Banks or Creditors
One of the first orders of business that needs to happen if financial information could have been leaked is to contact the bank or credit card provider that manages the account. Your contact will want to deactivate these accounts before whomever it was that stole their identity accesses them again.

Time is of the essence, as they will need to report the theft and any unauthorized charges within two days of the unauthorized transactions to limit their liability to $50. If they report the theft before any transactions are made, they will not be liable for any activity on that account until the matter is settled.

Managing Credit Reports
Any client whose data was potentially stolen should work on managing their credit reports. First, have a fraud alert put on your account by one of the major credit reporting agencies. This will automatically provide you with a credit report from all three of these agencies, which you should check for warning signs of fraud. If your reports show credit inquiries that you didn’t make and other unexplainable activity, report the identity theft to remove the transactions and activities you are not responsible for. You may also want to consider requesting a credit freeze to prevent the credit agencies from releasing your credit information to new creditors.

Fill Out and Distribute ID Theft Report
While the FTC (Federal Trade Commission) may only follow up on larger fraud cases, they also monitor identity theft cases to try and identify suspicious patterns that suggest the involvement of organized crime. The FTC’s website also has a link to a form that will produce an identity theft complaint. Once you have that complaint, secure a police report to complete your ID theft report.

This report needs to be distributed to your creditors and credit reporting agencies, and these accounts need to be monitored to ensure that false information doesn’t persist.

Locking Down Accounts
Of course, as with any account breach, you need to update your account passwords to keep your accounts secure. Furthermore, not only should you report any false use of your Social Security Number, you should also ensure that no additional accounts have been opened in your name for any utilities, as the bill for these services can be used as proof of residence to open a new account.

Identity theft is no laughing matter, and you certainly don’t want your business to be responsible for it. For assistance with your data security solutions, call S I M Technology at (845) 208-0453.

BYOD is Only Helpful If the Devices Are Secure
Tech Term: What Does “Encryption” Mean?

Related Posts



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, June 18 2018

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Cloud Technology Email Malware Privacy Business Computing Hosted Solutions Hackers Internet Software Ransomware Network Security Business Android Microsoft Computer Backup Mobile Devices Tech Term Data Data Recovery Windows Cloud Computing IT Services Smartphone Data Management Hardware Encryption Small Business Artificial Intelligence Google Alert Internet of Things Browser Data Backup Server Phishing Business Continuity App Vulnerability Windows 10 Gmail User Tips Innovation Business Management Productivity Productivity Managed IT Services Chrome IT Support Tip of the week Cybersecurity Efficiency Remote Monitoring Outsourced IT Passwords Smartphones Infrastructure Paperless Office Saving Money Robot Risk Management Money Applications Data storage Antivirus Government Employer-Employee Relationship IT Support Managed IT Services Windows 10 Apple Disaster Recovery Social Media Bandwidth Website Office 365 Big Data Managed Service Provider Communication IT Management Facebook LiFi Router Mobile Security Word Content Filtering BDR End of Support Document Management Analytics BYOD Business Technology Network Management Network Mouse Outlook Telephone Systems Wi-Fi Spam Settings Firewall Two-factor Authentication Hosted Solution Unified Threat Management YouTube Patch Management Maintenance Monitors Computing Scam Save Money Automation Virtual Reality Miscellaneous VPN Data Security Holiday communications SaaS Storage Virtual Private Network Office Tips Upgrade Google Drive Server Management Mobile Device Data loss WiFi Tablet Customer Service Administration HIPAA Buisness Black Friday Cost Management Bluetooth IT service Vendor Management Typing Printer Spyware Avoiding Downtime Social Engineering IT solutions Modem Cyber Monday Assessment Collaboration Cryptocurrency Virtual Desktop Current Events Hotspot Emergency Solid State Drive Access Control Time Management Safety Machine Learning Budget IT Technicians Cookies Downtime Smart Technology Internet Exlporer Google Maps File Sharing Bitcoin Network Congestion Going Green Language Hard Disk Drive SharePoint CrashOverride Identity Theft Mirgation Nanotechnology Distributed Denial of Service Hard Drive Gadgets Managed IT Computers Printing Computing Infrastructure Lenovo Halloween Downloads How To Touchscreen Microsoft Office Chatbots Deep Learning Screen Reader Windows 8 Managed IT Service Cache Users Shortcut Twitter Display Alerts Superfish Scary Stories Firefox Identity Bring Your Own Device Smart Tech Break Fix Recycling Remote Computing Licensing Legal Sports Multi-Factor Security Customer Relationship Management Digital Payment VoIP Apps Best Practice Humor Social Dark Web eWaste Networking IBM Education Cooperation Compliance Google Calendar Connectivity Heating/Cooling Microsoft Excel Management Cabling Running Cable Corporate Profile Computer Care Information Technology Staff Operating System Regulations Legislation The Internet of Things Servers Wireless Automobile Business Growth Hacks Blockchain Company Culture Marketing Techology WannaCry Samsung Training Writing Politics Augmented Reality Unified Communications Social Networking Comparison IoT Hacker Dark Data Password Permissions Managing Stress Mail Merge Disaster Laptop Unified Threat Management Quick Tips Retail Tech Support Google Wallet Wearable Technology Google Docs Motherboard Specifications Star Wars Statistics Recovery Alt Codes Fraud Enterprise Content Management Address Uninterrupted Power Supply Workplace Tips User Error Digital VoIP Office Websites Drones Chromebook Cameras Mobile Computing Tracking Botnet Physical Security Emoji CCTV Personal Information Cortana Relocation Travel Virtualization G Suite Work/Life Balance Cybercrime Supercomputer Private Cloud Computer Repair Motion Sickness Taxes Law Enforcement IT Budget How To Error Health IT Consultant Gadget Electronic Medical Records Meetings Processors Cleaning Upgrades Webcam 3D Printing Point of Sale Unsupported Software Update Notifications Staffing Mobile Data Administrator Web Server Mobile Device Management Crowdsourcing GPS

Latest Blog Entry

Humankind has always adapted and improved technology to make life easier, starting all the way back at fire and the wheel. Nowadays, our approach to making life easier through technology is centered around productivity and security - if we can accomplish more than before in ...

Latest News

S I M Technology launches new website!

S I M Technology is proud to announce the launch of our new website at The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

Read more ...