Get Started Today!  (813) 749-0895    SEARCH SITE

IT Professional Services and Business Continuity

Blog for IT Support and Managed Services in Tampa and Florida

Providing Business IT Support such as technical IT Helpdesk Support, Outsourced Computer Support, Technology Consulting, and Managed IT Services to small and medium-sized businesses in Tampa and Florida.

Do You Know What to Do When Involved in Identity Theft?

Do You Know What to Do When Involved in Identity Theft?

The unfortunate truth of increased technology use in the workplace is that there is a corresponding increase in the potential for cybercrime, more specifically identity theft, to strike the workplace. The question is, what can you do to help prevent it, and how should you react to it should it strike?

How You Can Help an Identity Thief
There are plenty of ways that an identity thief can gain the information they need to successfully take control of one of your accounts or some of your critical data. First of all, many businesses have a tendency to collect more data than they actually need from their contacts and employees. This only gives the identity thief more ammunition. Furthermore, many businesses underestimate the lengths that an identity thief will go to in order to collect the information that they need. Frankly, just throwing out documentation won’t stop someone who isn’t above dumpster-diving. Any paper records should be cross-shredded before they are disposed of.

Of course, paper records are a relatively easy way for an identity thief to get what they want in almost any circumstance. Therefore, it makes much more sense to keep your documentation stored digitally, protected by passwords and encryption that stands up to best practices.

What to Tell Your Clients if Their Identities Are Stolen on Your Watch
Unfortunately, even the smallest error can lead to a security breach, which means that you may have to inform your clients that their information has been stolen. To help them further, you will want to advise them to take the following steps immediately.

Notify Affected Banks or Creditors
One of the first orders of business that needs to happen if financial information could have been leaked is to contact the bank or credit card provider that manages the account. Your contact will want to deactivate these accounts before whomever it was that stole their identity accesses them again.

Time is of the essence, as they will need to report the theft and any unauthorized charges within two days of the unauthorized transactions to limit their liability to $50. If they report the theft before any transactions are made, they will not be liable for any activity on that account until the matter is settled.

Managing Credit Reports
Any client whose data was potentially stolen should work on managing their credit reports. First, have a fraud alert put on your account by one of the major credit reporting agencies. This will automatically provide you with a credit report from all three of these agencies, which you should check for warning signs of fraud. If your reports show credit inquiries that you didn’t make and other unexplainable activity, report the identity theft to remove the transactions and activities you are not responsible for. You may also want to consider requesting a credit freeze to prevent the credit agencies from releasing your credit information to new creditors.

Fill Out and Distribute ID Theft Report
While the FTC (Federal Trade Commission) may only follow up on larger fraud cases, they also monitor identity theft cases to try and identify suspicious patterns that suggest the involvement of organized crime. The FTC’s website also has a link to a form that will produce an identity theft complaint. Once you have that complaint, secure a police report to complete your ID theft report.

This report needs to be distributed to your creditors and credit reporting agencies, and these accounts need to be monitored to ensure that false information doesn’t persist.

Locking Down Accounts
Of course, as with any account breach, you need to update your account passwords to keep your accounts secure. Furthermore, not only should you report any false use of your Social Security Number, you should also ensure that no additional accounts have been opened in your name for any utilities, as the bill for these services can be used as proof of residence to open a new account.

Identity theft is no laughing matter, and you certainly don’t want your business to be responsible for it. For assistance with your data security solutions, call Symmetric Engineering Group at (813) 749-0895.



No comments made yet. Be the first to submit a comment


Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week IT Services IT Support Managed IT Services Best Practices IT Infrastructure Management IT Companies in Tampa Cloud Technology Business Continuity Business Mobility Email IT Support Services Business Computing Business IT Solutions Privacy Hackers Malware I.T. Management Productivity Microsoft IT Professional Services Custom Business Solutions Internet Managed Service Provider Business Applications Business IT Management IT Business Solutions Software Outsourced IT Mobile Devices Technology Consultants Hosted Solutions Managed IT Service Managed IT Windows 10 Network Security Managed IT Service in Florida Android Business IT Support Computer Windows Managed Services in Florida I.T. Support Ransomware I.T. Services IT Support Services in Tampa Backup Data Dynamic Solutions IT Risk Management Data Backup Google User Tips IT Outsourcing in Tampa IT Services in Florida Disaster Recovery Internet of Things Remote Monitoring Communication Managed Services IT Support in Tampa Browser Data Recovery Small Business IT Service Data Management Smartphone Encryption Hardware Microsoft Office Managed Services in Tampa Bay Gmail Cloud Computing Holiday IT Managed Services Smartphones Workplace Tips Server Network Vendor Management Cybersecurity Artificial Intelligence Upgrade Business Management Mobile Device Management IT Services in Tampa Tech Companies in Tampa Phishing BYOD App Office 365 Firewall Innovation Tampa IT Support Efficiency Managed Service in Tampa Social Media Computer Networking IT Outsourcing in Florida Tip of the week IT Service Management Apple IT Company Business Plan IT Vendor Management IT Outsourcing Business IT Support Services Unified Threat Management Antivirus Operating System Risk Management Small Business IT Solutions Content Filtering Word Data Computer Services Collaboration Mobile Device Save Money IT Management Services Data Security Data loss Windows 10 Wireless Technology SaaS Automation Money Bring Your Own Device Computer Hardware Repair Telephone Systems Customer Relationship Management Infrastructure Productivity Project Management IT solutions Analytics Big Data Facebook IT Company IT Support Robot Chrome Retail Passwords WiFi Applications Two-factor Authentication Hosted Solution Remote Computing Data storage Settings Miscellaneous Recovery Virtual Private Network Unified Communications Augmented Reality Presentation Information Technology Virtual Reality Managed IT Outsourcing Microsoft Virtual Server Hosting in Tampa and Florida VoIP VPN Business Continuity Services LiFi Website Computer Network Services Business Application Mobility YouTube Virtual Desktop Mouse Office Redundancy Search Server Management The Internet of Things Network Congestion Uninterrupted Power Supply BDR Government Mobile Computing IT Consulting IT Support Helpdesk Digital Payment Bandwidth Wireless IT Companies in Florida Business Technology Solid State Drive IBM Laptop Outlook IT Management Service Net Neutrality Tablet Employer-Employee Relationship Managed IT Services End of Support Customer Service Google Drive Administration Office Tips Computer Support Maintenance I.T. Company HIPAA Flexibility Alert Computer Networking Services Virtualization Scam Compliance User Error Budget Computing Vulnerability Paperless Office Saving Money Monitors Licensing communications Mobile Security Apps Storage Help Desk Regulations Document Management Training Business Continuity Service Providers Software Tips Smart Technology Hotspot Samsung Dark Data Computer Repair Network Management Identity Theft File Sharing Multi-Factor Security Help Desk Support in Tampa Drones Tampa IT Services Mail Merge Careers Sync Fun Distributed Denial of Service Language Techology Health Top IT Outsourcing Company VoIP Consulting Services Outsourced Computer Support Touchscreen Downtime Chatbots Files Hacker Google Calendar Help Desk Support Password Hacking Application Address IT Consulting Service Jobs IT Service in Tampa Cabling Mobile Device Managment Break Fix Service IT Halloween Computing Infrastructure Disaster Resistance Digital Identity Websites Legislation Servers Deep Learning Dark Web IT Solutions for Small Business Scary Stories Alerts Domains History Proactive IT Social Spyware Save Time Users Tech Term Business Growth Comparison IT Vendor Management in Tampa Best Practice Hard Drives Humor Data Technology Cryptocurrency Data Warehousing IT Tech Support Microsoft Affiliate Program Sports Cooperation Public Speaking Disaster Data Breach Managed Services in Floirda Spam Hacks Backups Marketing Safety Specifications Network Support in Florida Heating/Cooling Statistics Bitcoin Writing Hard Disk Drive Identities Cortana Microsoft Excel Technology Consulting Firms Microsoft Business Solutions Staff Gadgets Technology Laws IT Company in Tampa Programming Current Events How To Legal Information Technology Consulting Black Friday Bluetooth Blockchain Managed it Services in Tampa Professional Service Windows 8 Social Engineering Travel Knowledge Computer Care Buisness Operations Unified Threat Management Managed Service in Florida Tech Support Going Green Firefox Health Care IT Services IT Consulting Services Education Wi-Fi Cyber Monday Permissions Managed Service Providers Lenovo IT Managed Service Provider Server Hosting in Tampa Alt Codes Experience Trending Wearable Technology Printer Printing Assessment Shortcut Business IT Solutions Computers Google Maps Co-managed IT Fraud Tech Company in Tampa Undo Superfish Intranet Typing Consultation CIO Politics Access Control IT Support Companies in Tampa User Patch Management Google Docs Full Service IT USB Display Software as a Service Internet Exlporer Competition Healthcare IT Server Hosting Corporate Profile Quick Tips IT Technicians Digital Signature SharePoint IT Support and Solutions Avoiding Downtime Automobile Technology Tips Networking WannaCry Time Management Server Hosting in Florida Mirgation Downloads IT Managed Service in Tampa Google Wallet Personal Information Administrator Web Server Cybercrime How To Congratulations Migration Cameras Running Cable Notifications Upgrades Saving Time CCTV Update I.T. Managament 3D Printing IP Address Business Appplications Electronic Medical Records Taxes Crowdsourcing Chromebook Supercomputer Botnet Mobile Office G Suite Hiring/Firing Unsupported Software CrashOverride Physical Security IT Budget Machine Learning Refrigeration Emergency Cleaning Work/Life Balance Mobile Data Relocation Cost Management Virus Law Enforcement Private Cloud Motion Sickness Staffing Gadget Emoji Error 5G Black Market Managed Servers Meetings GPS Lithium-ion Battery Public Cloud Webcam Twitter Tracking Telephony Point of Sale Processors Thank You IT Consultant

Latest Blog Entry

Data loss can have lasting effects upon your business, usually measured in lost productivity and capital. In other words, data loss is often measured by the cost required to retrieve, restore, and/or repair its effects. Of course, this is only the beginning of how data loss ...

Latest News

SEG Awarded Small Business of the Year Award!

Symmetric Engineering Group was awarded the Upper Tampa Bay Chamber Small Business of the Year Award for their understanding technical service and support throughout the Tampa Bay area

Read more ...

Account Login