Get Started Today!  (813) 749-0895    SEARCH SITE

IT Professional Services and Business Continuity

Do You Know What to Do When Involved in Identity Theft?

Do You Know What to Do When Involved in Identity Theft?

The unfortunate truth of increased technology use in the workplace is that there is a corresponding increase in the potential for cybercrime, more specifically identity theft, to strike the workplace. The question is, what can you do to help prevent it, and how should you react to it should it strike?

How You Can Help an Identity Thief
There are plenty of ways that an identity thief can gain the information they need to successfully take control of one of your accounts or some of your critical data. First of all, many businesses have a tendency to collect more data than they actually need from their contacts and employees. This only gives the identity thief more ammunition. Furthermore, many businesses underestimate the lengths that an identity thief will go to in order to collect the information that they need. Frankly, just throwing out documentation won’t stop someone who isn’t above dumpster-diving. Any paper records should be cross-shredded before they are disposed of.

Of course, paper records are a relatively easy way for an identity thief to get what they want in almost any circumstance. Therefore, it makes much more sense to keep your documentation stored digitally, protected by passwords and encryption that stands up to best practices.

What to Tell Your Clients if Their Identities Are Stolen on Your Watch
Unfortunately, even the smallest error can lead to a security breach, which means that you may have to inform your clients that their information has been stolen. To help them further, you will want to advise them to take the following steps immediately.

Notify Affected Banks or Creditors
One of the first orders of business that needs to happen if financial information could have been leaked is to contact the bank or credit card provider that manages the account. Your contact will want to deactivate these accounts before whomever it was that stole their identity accesses them again.

Time is of the essence, as they will need to report the theft and any unauthorized charges within two days of the unauthorized transactions to limit their liability to $50. If they report the theft before any transactions are made, they will not be liable for any activity on that account until the matter is settled.

Managing Credit Reports
Any client whose data was potentially stolen should work on managing their credit reports. First, have a fraud alert put on your account by one of the major credit reporting agencies. This will automatically provide you with a credit report from all three of these agencies, which you should check for warning signs of fraud. If your reports show credit inquiries that you didn’t make and other unexplainable activity, report the identity theft to remove the transactions and activities you are not responsible for. You may also want to consider requesting a credit freeze to prevent the credit agencies from releasing your credit information to new creditors.

Fill Out and Distribute ID Theft Report
While the FTC (Federal Trade Commission) may only follow up on larger fraud cases, they also monitor identity theft cases to try and identify suspicious patterns that suggest the involvement of organized crime. The FTC’s website also has a link to a form that will produce an identity theft complaint. Once you have that complaint, secure a police report to complete your ID theft report.

This report needs to be distributed to your creditors and credit reporting agencies, and these accounts need to be monitored to ensure that false information doesn’t persist.

Locking Down Accounts
Of course, as with any account breach, you need to update your account passwords to keep your accounts secure. Furthermore, not only should you report any false use of your Social Security Number, you should also ensure that no additional accounts have been opened in your name for any utilities, as the bill for these services can be used as proof of residence to open a new account.

Identity theft is no laughing matter, and you certainly don’t want your business to be responsible for it. For assistance with your data security solutions, call Symmetric Engineering Group at (813) 749-0895.

 

Comments

Already Registered? Login Here
No comments made yet. Be the first to submit a comment

Search

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week IT Services IT Support Managed IT Services Best Practices Cloud Technology IT Infrastructure Management Email IT Companies in Tampa Business Continuity Business Computing Malware Privacy Hackers IT Support Services Business Mobility Hosted Solutions Business IT Solutions I.T. Management Microsoft Internet IT Professional Services Productivity Custom Business Solutions Managed Service Provider Outsourced IT Business Software Mobile Devices IT Business Solutions Business Applications IT Management Ransomware Network Security Computer Data Backup Technology Consultants Managed IT Service Android Managed IT Service in Florida Windows 10 Business IT Support Managed IT Data Data Recovery Managed Services in Florida Windows I.T. Support Cloud Computing IT Risk Management Backup IT Support Services in Tampa Disaster Recovery Internet of Things I.T. Services Dynamic Solutions User Tips Communication Browser Google Data Management Smartphone IT Outsourcing in Tampa IT Services in Florida Tech Term Remote Monitoring Small Business IT Service Managed Services Gmail IT Support in Tampa Hardware Innovation Encryption Social Media Managed Services in Tampa Bay IT Managed Services Holiday Workplace Tips Smartphones Server Microsoft Office Upgrade BYOD Cybersecurity App Artificial Intelligence Firewall Mobile Device Management Office 365 Vendor Management IT Services in Tampa Mobile Device Applications Network Phishing Paperless Office Save Money Business Management Tampa IT Support Tech Companies in Tampa Data Computer Services IT Service Management IT Company Business Plan Unified Threat Management Bring Your Own Device Chrome Infrastructure Content Filtering Managed Service in Tampa Customer Relationship Management Tip of the week IT Outsourcing in Florida Apple IT Outsourcing Collaboration Business IT Support Services Compliance Small Business IT Solutions IT Vendor Management Antivirus Productivity Passwords Website Computer Networking Operating System Word Efficiency Risk Management Windows 10 IT Company Robot Hosted Solution Miscellaneous Data storage Big Data Data Security Facebook BDR IT solutions The Internet of Things Document Management Saving Money Remote Computing Wireless Technology Unified Communications Employer-Employee Relationship Telephone Systems Bandwidth Retail Analytics Data loss Mobile Computing WiFi Settings IT Support Project Management Money Vulnerability Regulations Computer Hardware Repair SaaS Two-factor Authentication Managed IT Services Automation IT Management Services VoIP Government Administration I.T. Company Virtualization IT Support Helpdesk Training Mobility Microsoft Virtual Server Hosting in Tampa and Florida Computer Networking Services Maintenance Business Technology Wi-Fi Spam IT Management Service Mobile Security Apps Computing Alert Smart Technology End of Support Office Tips Uninterrupted Power Supply Recovery YouTube Presentation Search communications Licensing Information Technology VPN Business Application Network Congestion Managed IT Outsourcing IBM Flexibility Router Redundancy Laptop Help Desk Patch Management Budget User Error Digital Payment Server Management Business Continuity Services Network Management Customer Service Solid State Drive IT Companies in Florida Virtual Reality LiFi Monitors Storage Augmented Reality HIPAA Tablet Virtual Desktop Outlook Google Drive Office Wireless IT Consulting Computer Support Assessment Computer Network Services Mouse Net Neutrality Virtual Private Network Scam Internet Exlporer Competition Dark Data Fun SharePoint IT Technicians Machine Learning Google Maps Bluetooth Best Practice Utility Computing Buisness Data Warehousing Digital Business Growth Data Breach Cooperation Social Tampa IT Services Typing Technology Tips Nanotechnology Google Docs Application Digital Signature Hard Drives Enterprise Content Management Social Engineering Healthcare IT Consultation Public Speaking Experience Deep Learning Specifications Social Networking Save Time Mail Merge Disaster Avoiding Downtime Management Hacker Careers Downtime Networking Consulting Services Downloads IT Support Companies in Tampa Mirgation Heating/Cooling Healthcare Health Care IT Services Trending Microsoft Excel Samsung Cryptocurrency Humor Intranet Spyware Co-managed IT Technology Laws Staff File Sharing IT Tech Support Hacks Outsourced Computer Support Halloween Managed it Services in Tampa Screen Reader Travel Corporate Profile Quick Tips Programming Black Friday IT Vendor Management in Tampa Motherboard Sync Backups USB Address Gadgets Enterprise Resource Planning IT Service in Tampa Jobs Server Hosting Hotspot Service IT Multi-Factor Security IT Support and Solutions Migration Google Wallet Shortcut Hard Drive Computers Business IT Solutions CIO Blockchain Bitcoin Unified Threat Management Managed Services in Floirda Operations Files Technology Consulting Firms Current Events Servers Scary Stories Distributed Denial of Service Managed Service Providers Smart Tech Business Continuity Service Providers WannaCry Cost Management Time Management Tech Support Identities Cyber Monday Network Support in Florida Mobile Device Managment Information Technology Consulting Legal Hard Disk Drive Mobile Users Techology Language Professional Service How To Health IT Solutions for Small Business Google Calendar IT Managed Service in Tampa Chatbots Drones Software Tips Cache Display Full Service IT Lenovo Permissions Windows 8 Printer IT Company in Tampa Wearable Technology Websites Going Green Password Sports Computer Repair Break Fix Tech Company in Tampa Connectivity Politics Top IT Outsourcing Company Identity Theft Modem IT Consulting Services Hacking Company Culture Safety Data Technology Marketing Disaster Resistance Computing Infrastructure IT Managed Service Provider Computer Care Firefox Microsoft Affiliate Program Cortana Legislation Help Desk Support in Tampa Identity Recycling Superfish Fraud Education Access Control Managed Service in Florida Printing Statistics Star Wars Dark Web IoT IT Consulting Service VoIP Undo Alerts Touchscreen Server Hosting in Florida Alt Codes Software as a Service Cookies Managing Stress Writing Proactive IT Domains Microsoft Business Solutions Knowledge Comparison Help Desk Support Automobile Cabling History User eWaste Server Hosting in Tampa How To Emoji Processors Point of Sale CCTV Update Running Cable Black Market GPS Business Appplications Administrator Managed Servers Work/Life Balance Upgrades Relocation Web Server Taxes 5G Chromebook Supercomputer IT Consultant Refrigeration Tracking Lithium-ion Battery IP Address Law Enforcement CrashOverride 3D Printing Private Cloud Notifications IT Budget Motion Sickness Mobile Office Electronic Medical Records Gadget Thank You Cleaning Hiring/Firing Error Meetings Saving Time Congratulations Unsupported Software Public Cloud Crowdsourcing Botnet Physical Security Twitter Webcam Cameras Virus Telephony I.T. Managament Cybercrime G Suite Emergency Staffing Mobile Data Personal Information

Latest Blog Entry

There’s no getting around it: technology has spoiled us. We have had access to 4G mobile data speeds since 2009, and we’re already clamoring for the next thing. While 5G has been in development for some time now, it will likely be quite a while before it is available for com...

Latest News

SEG Awarded Small Business of the Year Award!

Symmetric Engineering Group was awarded the Upper Tampa Bay Chamber Small Business of the Year Award for their understanding technical service and support throughout the Tampa Bay area

Read more ...

Account Login