Steps To Prevent Identity Theft, Safe Guarding
Personal Information. What To Do?
Our agency is
posting this information on our website to inform the public of the
severity and extend of Identity Fraud. We want you to be safe. We do
investigate case of identity thefts, and we'll certainly tell you all
about your options, but there are also things you can do to protect your
information that won't cost you a thing.
This is Information Is Not
To Be Considered Legal Advice.
What To Do.
STEP 1. Enroll All Your Domains in Domain
Public Records indicate that a domain which is not
enrolled in our domain privacy service may provide scammers personal
Domain privacy" may actually be a misnomer --
it's not the domain itself that's in need of protection; it's your
personal information that's publicly available whenever someone does
a "whois" lookup online.
Harvesting "whois" information is an
easy way for identity thieves to impersonate you. We encourage you to
be permanently enrolled in domain privacy.
STEP 2. Protect
Yourself Against Spyware.
Spy ware is malware downloaded to
your computer or website, without your knowledge or consent, that
runs in the background and collects information about you:
Make sure whatever anti-virus program you're running on your personal
computers includes spyware protection, as well. Some companies, such
as Lavasoft or STOPzilla, will offer a basic anti-spyware service for
free, while charging for advanced protection.
STEP 3. Use
Caution When Entering Information Online.
personal or financial information online, be certain that you have a
secure connection. The URL in the address bar should change from
"http" to "https" or "shttp." A closed padlock symbol also often
indicates that the connection is secure. (If you want to make your
own website secure in this way, you may want to look into purchasing
an SSL certificate
STEP 4. Create Strong Passwords.
We realize that generating strong passwords, not to mention
keeping track of them all, can be a hassle, but it's critical that
you have strong passwords for every site you use.
You may also
want to check out pwdhash.com. When you visit a site that requires
you to create a password, enter a simple password you'll remember,
but before you submit it, run the PwdHash browser extension (Firefox
or Chrome), and it will invisibly generate a custom, strong password
for that site. In the end, you only need to remember one password,
which your browser is able to securely transform into a different,
strong password for each site you use.
What To Do.
5. Use Discretion When Sharing Information.
when updating social media websites. Even if you limit the number of
people who have access to your profile, tweets, etc., keep in mind
that the information is still published online and can be copied and
If anyone ask you for personal information,
make sure they are who they claim to be and that there is a
legitimate reason for the request.
STEP 6. Stop
Unsolicited, "Pre-Approved" Credit Offers
Opt out of
pre-screened credit/insurance offers to prevent potential thieves
from intercepting and accepting the offers in your name. Opting out
doesn't affect your eligibility for credit or insurance; visit
OptOutPrescreen.com for more information.
You should also
limit the amount of unsolicited emails you receive by customizing
your spam filter settings.. .
STEP 7. Shred Confidential
When disposing of papers with account numbers or
other identifying information, shred them. This includes convenience
checks that come with your credit card statement, as well as
unsolicited credit card offers.
STEP 8. Remain Vigilant:
Review Your Accounts Regularly.
Monitor your accounts online
frequently, so you can discover potential issues without having to
wait for bills or statements to come by mail.
You also may
want to check out MyIDScore.com; it's a free service that reviews how
likely it is your identity is being misused and provides ways you can
reduce that risk..
The Free Money. The Free Money, you may
receive a check in the mail in regards to a bank or credit card. It
will look sincere. The check or draft will state that the bank or
credit card agency failed to refund your account due to purchases.
The trick to this scam is for you to deposit the check or draft
into you account. The check is normally for a very small amount of
$1.37, what ever it is not worth the cost of the mailing and check. This
check is them returned to the sender who gains information of your
financial or credit card account. Always verify the check with your
Cyber Crime Made Easy.
theft is the deliberate use of someone else's identity, usually as a
method to gain a financial advantage or obtain credit and other
benefits in the other person's name, and perhaps to the other
person's disadvantage or loss.
The person whose identity has
been assumed may suffer adverse consequences if they are held
responsible for the perpetrator's actions. Identity theft occurs when
someone uses another's personally identifying information, like their
name, identifying number, or credit card number, without their
permission, to commit fraud or other crimes. The term identity theft
was coined in 1964. . .
Determining the link between data
breaches and identity theft is challenging, primarily because
identity theft victims often do not know how their personal
information was obtained, and identity theft is not always detectable
by the individual victims.
An October 2010 article entitled
"Cyber Crime Made Easy" explained the level to which hackers are
using malicious software. As one security specialist said,
"Interested in credit card theft? There's an app for that." This
statement summed up the ease with which these hackers are accessing
all kinds of information online.
The new program for infecting
users' computers is called Zeus; and the program is so hacker
friendly that even an inexperienced hacker can operate it. Although
the hacking program is easy to use, that fact does not diminish the
devastating effects that Zeus (or other software like Zeus) can do to
a computer and the user. For example, the article stated that
programs like Zeus can steal credit card information, important
documents, and even documents necessary for homeland security. If the
hacker were to gain this information, it would mean identity theft or
even a possible terrorist attack.
Investigations And Services.