Get Started Today!  (813) 749-0895    SEARCH SITE

IT Professional Services and Business Continuity

Symmetric Engineering Group Blogs

Do You Know What to Do When Involved in Identity Theft?

Do You Know What to Do When Involved in Identity Theft?

The unfortunate truth of increased technology use in the workplace is that there is a corresponding increase in the potential for cybercrime, more specifically identity theft, to strike the workplace. The question is, what can you do to help prevent it, and how should you react to it should it strike?

How You Can Help an Identity Thief
There are plenty of ways that an identity thief can gain the information they need to successfully take control of one of your accounts or some of your critical data. First of all, many businesses have a tendency to collect more data than they actually need from their contacts and employees. This only gives the identity thief more ammunition. Furthermore, many businesses underestimate the lengths that an identity thief will go to in order to collect the information that they need. Frankly, just throwing out documentation won’t stop someone who isn’t above dumpster-diving. Any paper records should be cross-shredded before they are disposed of.

Of course, paper records are a relatively easy way for an identity thief to get what they want in almost any circumstance. Therefore, it makes much more sense to keep your documentation stored digitally, protected by passwords and encryption that stands up to best practices.

What to Tell Your Clients if Their Identities Are Stolen on Your Watch
Unfortunately, even the smallest error can lead to a security breach, which means that you may have to inform your clients that their information has been stolen. To help them further, you will want to advise them to take the following steps immediately.

Notify Affected Banks or Creditors
One of the first orders of business that needs to happen if financial information could have been leaked is to contact the bank or credit card provider that manages the account. Your contact will want to deactivate these accounts before whomever it was that stole their identity accesses them again.

Time is of the essence, as they will need to report the theft and any unauthorized charges within two days of the unauthorized transactions to limit their liability to $50. If they report the theft before any transactions are made, they will not be liable for any activity on that account until the matter is settled.

Managing Credit Reports
Any client whose data was potentially stolen should work on managing their credit reports. First, have a fraud alert put on your account by one of the major credit reporting agencies. This will automatically provide you with a credit report from all three of these agencies, which you should check for warning signs of fraud. If your reports show credit inquiries that you didn’t make and other unexplainable activity, report the identity theft to remove the transactions and activities you are not responsible for. You may also want to consider requesting a credit freeze to prevent the credit agencies from releasing your credit information to new creditors.

Fill Out and Distribute ID Theft Report
While the FTC (Federal Trade Commission) may only follow up on larger fraud cases, they also monitor identity theft cases to try and identify suspicious patterns that suggest the involvement of organized crime. The FTC’s website also has a link to a form that will produce an identity theft complaint. Once you have that complaint, secure a police report to complete your ID theft report.

This report needs to be distributed to your creditors and credit reporting agencies, and these accounts need to be monitored to ensure that false information doesn’t persist.

Locking Down Accounts
Of course, as with any account breach, you need to update your account passwords to keep your accounts secure. Furthermore, not only should you report any false use of your Social Security Number, you should also ensure that no additional accounts have been opened in your name for any utilities, as the bill for these services can be used as proof of residence to open a new account.

Identity theft is no laughing matter, and you certainly don’t want your business to be responsible for it. For assistance with your data security solutions, call Symmetric Engineering Group at (813) 749-0895.

BYOD is Only Helpful If the Devices Are Secure
Failing Technology and Your Data


Already Registered? Login Here
No comments made yet. Be the first to submit a comment


Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week IT Services IT Support Best Practices Managed IT Services Cloud Technology Privacy IT Infrastructure Management Email Business Computing IT Companies in Tampa Business Continuity Malware Hackers Hosted Solutions Internet IT Support Services Business Mobility Business IT Solutions Business I.T. Management Microsoft IT Professional Services Productivity Software Managed Service Provider Custom Business Solutions Data Outsourced IT Mobile Devices Computer IT Business Solutions Data Backup Business Applications Network Security Tech Term IT Management Ransomware Technology Consultants Managed IT Service Business IT Support Managed IT Windows 10 Data Recovery Managed IT Service in Florida Android Google User Tips Windows Internet of Things Cloud Computing Managed Services in Florida I.T. Support IT Support Services in Tampa IT Risk Management Backup Disaster Recovery Workplace Tips Innovation Dynamic Solutions I.T. Services Communication Hardware IT Outsourcing in Tampa IT Services in Florida Smartphone Browser Data Management Remote Monitoring IT Support IT Support in Tampa Network Productivity Managed Services Encryption Small Business Gmail IT Service Upgrade BYOD App Holiday IT Managed Services Server Cybersecurity Smartphones Microsoft Office Managed Services in Tampa Bay Save Money Artificial Intelligence Social Media Unified Threat Management Website Phishing Business Management Mobile Device Management IT Services in Tampa Collaboration Mobile Device Office 365 Paperless Office Firewall Tampa IT Support Applications Vendor Management Efficiency VoIP Tech Companies in Tampa Passwords Customer Relationship Management IT Service Management Data Computer Services IT Company Business Plan Word Two-factor Authentication Apple IT Vendor Management Compliance IT Outsourcing Business IT Support Services Bandwidth Antivirus Operating System Small Business IT Solutions Facebook Infrastructure Managed Service in Tampa Risk Management Computer Networking Tip of the week IT Outsourcing in Florida Bring Your Own Device Chrome Content Filtering BDR Hosted Solution Document Management Data loss Data Security Data storage Project Management The Internet of Things IT solutions Vulnerability Saving Money Remote Computing Unified Communications Router Storage Regulations Managed IT Services Analytics Mobile Computing Miscellaneous Managed Service IT Management Services Settings Telephone Systems Big Data IT Company Windows 10 Robot Automation Money Computer Hardware Repair Wireless Technology SaaS Employer-Employee Relationship Government Retail Wi-Fi WiFi Mobile Security Training I.T. Company Business Application Computer Networking Services Redundancy Virtual Desktop Flexibility Alert Office Patch Management Office Tips Smart Technology How To YouTube Search communications File Sharing Computing Digital Payment Server Management Blockchain Network Congestion Virtualization Network Management Monitors Healthcare Spam Budget User Error Files Tablet Apps IT Consulting Help Desk Virtual Private Network Solid State Drive Managed IT Outsourcing Assessment IT Support Helpdesk LiFi Information Recovery IT Companies in Florida Business Continuity Services Presentation Maintenance Business Technology Virtual Reality Information Technology Mobility Microsoft Virtual Server Hosting in Tampa and Florida Augmented Reality IoT VPN IT Management Service Wireless HIPAA Outlook Net Neutrality IBM Laptop Administration Scam Internet Exlporer Google Drive Uninterrupted Power Supply Quick Tips End of Support Licensing Computer Support Customer Service Computer Network Services Mouse Specifications Social Networking OneNote WannaCry Trending Networking Intranet Managing Stress Servers Google Docs Proactive Undo Hard Disk Drive Halloween Microsoft Excel Social eWaste Read Only Time Management Co-managed IT Downloads Mirgation Software Tips Display Full Service IT Screen Reader USB Samsung Healthcare IT Utility Computing Managed Services Provider IT Solutions for Small Business Technology Laws Staff IT Support Companies in Tampa Save Time Cables Black Friday Motherboard Managed it Services in Tampa Travel Cryptocurrency Humor Employee-Employer Relationship Domains CIO Hotspot Chromebook Enterprise Content Management History User IT Vendor Management in Tampa Sync Remote Monitoring and Management Business Growth Competition Data Technology Scary Stories Server Hosting IT Tech Support Hacks Management Best Practice Identity Theft Multi-Factor Security Migration Wires Digital Signature Hard Drives Identities Distributed Denial of Service Smart Tech E-Commerce Computer Care Firefox Microsoft Affiliate Program Users Unified Threat Management Operations IT Support and Solutions Backups Cyber Monday Managed Service Providers Bitcoin Remote Workers Public Speaking VoIP Techology Language Managed Services in Floirda Google Wallet Vulnerabilities Disaster Avoiding Downtime Statistics Chatbots Network Support in Florida Mobile Device Managment Business Continuity Service Providers WPA3 Writing Sports Computer Repair Lenovo Permissions Technology Consulting Firms Current Events Enterprise Resource Planning Heating/Cooling Touchscreen Server Hosting in Florida Google Calendar Legal Cabling Break Fix Connectivity Hard Drive Features Microsoft Business Solutions Safety Marketing Printer Wearable Technology IT Managed Service in Tampa Information Technology Consulting Bluetooth Cortana Modem Tech Company in Tampa Windows 8 Professional Service Programming Digital Dark Data Disaster Resistance Computing Infrastructure IT Company in Tampa Websites Drones Geography Gadgets Google Maps Legislation Identity Fleet Tracking Social Engineering Superfish Fraud Politics Going Green Mobile Tampa IT Services Education IT Consulting Services Cost Management Mail Merge Careers Alt Codes Dark Web Top IT Outsourcing Company Cache Electronic Health Records Consultation Access Control Help Desk Support in Tampa Health Care IT Services Knowledge Software as a Service Cookies IT Managed Service Provider Monitoring Tech Support Spyware Consulting Services Proactive IT Alerts Managed Service in Florida High-Speed Internet Comparison G Suite IT Consulting Service Asset Tracking Health Corporate Profile Buisness Printing Company Culture Outsourced Computer Support Fun Automobile MSP Address IT Service in Tampa Jobs Typing Data Warehousing Application Server Hosting in Tampa Recycling Password SharePoint IT Technicians Help Desk Support Hacking Shortcut Computers Business IT Solutions Experience Deep Learning Technology Tips Nanotechnology Point of Sale Star Wars Consulting Service IT Hacker Downtime Data Breach Cooperation Machine Learning Development Black Market Update IT Budget Business Appplications Administrator Electronic Medical Records Managed Servers Work/Life Balance 5G Lithium-ion Battery Web Server Cleaning IP Address Relocation Law Enforcement Printers Notifications Unsupported Software Mobile Office Private Cloud Physical Security Hiring/Firing Motion Sickness Cameras Thank You Emergency Gadget IT Consultant Refrigeration Personal Information Staffing Mobile Data Error Meetings CCTV How To Congratulations Virus Regulation Cybercrime Crowdsourcing GPS Public Cloud Twitter Webcam Taxes Upgrades Botnet Telephony Supercomputer Saving Time Running Cable I.T. Managament Cyberattacks Tracking Processors CrashOverride 3D Printing Emoji

Latest Blog Entry

You open a lot of files and folders during your duties around the office, but some of them might seem a little different from others. These files are marked as “read-only.” What is the significance behind these files, and what does this marking mean? Find out in this week’s ...

Latest News

SEG Awarded Small Business of the Year Award!

Symmetric Engineering Group was awarded the Upper Tampa Bay Chamber Small Business of the Year Award for their understanding technical service and support throughout the Tampa Bay area

Read more ...

Account Login