How To Read Your Credit Report

Types of Information Contained in a Credit Report

Credit reports contain information regarding financial actions. These actions will include loan account information and payments on those loan accounts. It is suggested that this information be reviewed at least once every year. This will allow checks for report accuracy. The types of information on a credit report are:

Personal Information

This will include: full name, current address and place of employment. It may also include previous addresses and previous places of employment. There may also be name variations or even name misspellings listed. This will usually relate to minor creditor reporting errors. These minor errors are not considered important. They also provide a link between identities and credit information. However, if the error indicates a completely different identity, then it should be reported to the credit bureau immediately.

Credit Summary Section

The credit summary section will summarize the information pertaining to different account types. This section is comprised of the number of accounts, balances and delinquent account information. Account types listed are:

• Installment accounts (loans)
• Revolving accounts (credit cards, lines of credit)
• Real Estate accounts (mortgages)
• Collection Accounts
• Other types of accounts

In addition, the Credit Summary will also indicate:

• The number of open accounts
• The number of closed accounts
• Accounts listed in public records
• Credit inquiries made in the last two years

Account History Section

The Account History Section will contain the majority of the credit information. Each credit account will be listed here. For each account, payment details will be listed. Details listed will include:

• Name of the creditor
• Account number associated with each account (part of the number may be obscured for security reasons)
• Type of Account (mortgage, auto loan, revolving, etc.)
• Account Responsibility (joint, individual or authorized user responsibilities)
• Monthly account payment (minimum monthly payment amount required)
• Date Account opened (month and year of account establishment)
• Date reported is the date of the last report made by the creditor to the credit bureau
• Account Balance is the current amount owed on the account as of the last reporting date
• Amount of the original loan or the current credit limit
• High Credit or High Balance is the largest amount that was ever charged on a credit card. For installment loans, it will be the original amount of the loan
• Past due is the amount that has past the normal payment date at the time of reporting
• Remarks section includes comments posted by creditors
• Payment status (current, charge-off, past due). Current accounts may still list delinquencies
• Payment History will indicate the monthly payment status from the beginning of the account
• Collection accounts will appear in the account history or in a separate section

Public Records Section

The public records section will include court judgments, bankruptcies, tax liens and overdue child support (in some states). Public record entries may remain on a credit report for seven to ten years. Public Records entries are considered particularly negative on a credit report. To get daily credit monitoring plus access to your credit reports, consider one of these credit monitoring services https://www.stopidentityfraud.org/credit-monitoring-services

Credit Inquiries

The credit inquiries section lists those who have accessed the credit report. This will include inquiries made within the past 2 years. Individual credit reports will list all of the inquiries within the last 2 years. However, not all of these are listed on lender’s and creditor’s versions. Lender’s copies will only show ‘hard’ inquiries. A hard inquiry is made when a credit application is submitted. A ‘soft’ inquiry is made when a lender accesses the report for credit promotional purposes. Soft inquiries have no effect on an overall credit score. However, hard inquiries will lower a credit score by a small margin.

How to Physically Keep Sensitive Data Secure

Today I want to talk about physical security and maybe go a little more in-depth than previuosly. I actually worked with an individual who lost sensitive data and it was through a physical method that they lost it. A lack of physical security. So she had a truck all kitted out to come out to your location to shave your dog, shave your cat, whatever was needed. And when she would come out to that location to perform that service for customers, she would take payment from them. Now she may take payment with cash or check, but she also took credit card payments. Now the caveat to that is, she didn’t actually have a mobile payment method with her. She had her credit card processing terminal at her storefront location. And it was stolen.

It begs the question whether she should have had that data stored in that manner anyway. But the reality is a simple lock on that door, putting an electronic device with electronic controls, those things could have protected her. But unfortunately she didn’t have those controls and she was compromised. In truth it’s actually kind of a bizarre method to process. To say, hey! can I write it down on a piece of paper and take a back to process? I promise I’ll do in a safe and a secure fashion. That person’s put their trust in you. Your customers put trust in you. And the trust was lost. She had to go back to her customers and inform the customer I just lost your data while I was eating lunch. The reality is, she’s one of many people that are losing data. You hear about these big medical breaches, the physical security, the physical breaches breaches if you will, are having a major leak in the medical industry because everybody is storing patient data on some type of backup device or on a laptop or tablets.

It’s happening a lot. It’s ease of use. Wherever you’re at, your in a medical profession, you’re trying to provide medical services to patients as quickly as he can. I mean you don’t want anything to hinder that patients medical service. So we put on an electronic device, which makes it easier for us to access, easier for us to diagnose and treat, and we don’t protect it. We put it in a vehicle, we leave it in an office that’s unlocked, we didn’t document where it was at and it gets stolen. Your business may be concerned about protecting a trade secret, the secret recipe of your business. And you as the business owner, you care about that.

You care about the sensitivity of it and the security of that. But what you need to remember is, while you may care, your employees may not have the same investment. So it’s important like I referenced in the last episode, it’s important to document what sensitive information you’re trying to protect. I know I said electronic devices, but really it’s all sensitive data. Document what you’re trying to protect. Now that is valuable data and you don’t want people to get a hold of that, so that needs to be physically protected. But make sure it’s documented. Make sure that you know where it’s at, that you have policy and procedures in place that has a protection for each of those. Then you need to make sure that when that’s documented, you document who has access to it.

There is no worse feeling asking yourself, where did it go and who had access to it, who was the last person with it. It makes your job incredibly frustrating hard, and if there was sensitive data especially if it’s industry-specific and/or there was a compliance guideline behind it, you could be liable for that data that’s lost so documenting what you have, documenting who has access to it, is absolutely crucial for your business. The reality is, we want to hear from you. If you have questions you’d like answered, if you have concerns or things you’d like me to answer, please let us know.

7 Celebrities Who Have Been Victims of Identity Theft

The problem with identity theft is that it doesn’t discriminate against one demographic or socioeconomic status. In many cases, the theft is not due to carelessness on the part of the victim. Celebrities have to deal with the annoyance of identity theft as well, and they have plenty of money to steal, so they are prime targets. Here’s a list of 7 well-known celebrities that have been victims of identity theft related crimes

steven speilbertSteven Spielberg was the victim of identity theft, however he had nothing stolen besides his privacy. In the 1990s, Spielberg had his personal information used to allow an inmate in a Tennessee prison view on Spielberg’s American Express credit card purchases. The man later claimed he did it to supply the celebrity’s information to a Hollywood studio. Apparently this genius thought he could make money by getting a movie made about his small time id theft caper.  Are people just that stupid?

liv tylerLiv Tyler had a bout with an identity thief in 2011. Her hairstylist used her credit card number to help herself to plenty of merchandise and services around town. When caught, it seems the stylist didn’t use Tyler’s card alone. She used Anne Hathaway, Penelope Cruz and Melanie Griffith’s card information as well. Tips and payment aren’t enough?

 

ricky gervaisRicky Gervais was on the receiving end of a fraud in 2009. Using an insider at the bank to obtain Gervais’ information, the group of thieves transferred 200,000 pounds from his bank account. The cash was to be used to secure gold bullion. While the scheme seems fairly clever, the identification they used was a passport, with a cutout photograph of Gervais. The pic was taken off the DVD box of The Office. They needed the identification to pick up the gold they had purchased.

 

paris hiltonParis Hilton had her name used in setting up a website. The site was dubbed Paris.org. Being registered as a trademark, she informed the thieves that she wanted payment for the use of her name. Later, her run-in with a teen in Minnesota resulted in her information being posted online. Apparently the teen had hacked in to Ms. Hilton’s phone.

 
A busboy was not using his head when he stole Ms. Oprah Winfrey’s social security number, birth dates of friends and relatives and even addresses of Oprah and 200 of the Richest People in America list published in Forbes. With the use of cell phones, a library computer and people imitating couriers, the thief snagged all of this info from credit protection services and reporting through Equifax.  If you’re going to steal someone’s identity (or bank info) you might as well swing for the fences and steal Oprah’s right?

Tiger WoodsKnown criminal, Anthony Lemar Taylor, picked a good one. He obtained Tiger Woods’ information after finding his information was not that secure. Taylor purchased $50,000 in merchandise. To top it all off, Taylor procured a fake license to drive, social security card and a military I.D, all in Tiger’s name. This bright guy even misspelled Tiger’s middle name wrong on the document’s but managed to still fill a storage unit to the hilt with stolen goods.

 

Image result for Will SmithWill Smith found several fake accounts were used to grab $33,000 under his real name, William C. Smith. The 2009 incident wasn’t the first time for the thief. He had been arrested before for stealing the former Atlanta Hawks basketball player, Steve Smith’s name. He was still on parole for the prior arrest. Some folks never learn.

So what’s the moral of the story here?  That anyone can be a victim of identity theft.  You, me, Kim Kardashian or the mail man.  Identity thieves don’t discriminate.  If you haven’t started making decisions to better protect your identity, then you are just a statistic waiting to happen.  Learn how to protect yourself on a daily basis and discover what credit monitoring can do as an proactive tool to help limit the damage should be ever be a victim of identity theft.

10 Common Credit Mistakes You’re Making

Last week we mentioned how Your Credit Rating Might Be Ruined Even When You’re Not Doing Anything Wrong. This week we’ll be addressing The 10 Most Frequent Credit Mistakes you’re making.

What’s a Credit Rating?

Your credit rating is a judgment about your fiscal well being, at a certain time. It suggests the threat you represent for lenders, in contrast to other consumers.

There are various approaches to work out FICO scores. The credit rating agencies Equifax and Trans Union use a scale from 300 to 900. High scores on this particular scale are great. The larger your rating, the lower risk you pose to the lender. Lenders might also provide their very own methods for arriving at credit ratings. Additionally, lenders must choose the lowest score you’ll be able to have and still borrow cash from them. They may also apply your score to create the interest you may pay.

Which are the 10 Most Frequent Credit Rating Errors?

1. Neglecting to review your own credit history for mistakes: Assess your credit report at least yearly. Errors on credit reports are somewhat more frequent than you could have visualized and you should stay along with the problem. Should you find any mistakes, contact the credit reporting agency when possible to fix the scenario.

2. Not using your complete legal name in monetary records: It Is possible that individuals with common names or similar sounding names could have their name imputed to a credit report that’s not theirs, as was the situation for Mr. Dave Johnson of Pembroke, Ontario. Use your complete legal title on credit programs, bank accounts as well as other files that become segment of your own credit history.

3. Paying your bills late and neglecting to make at least the minimal monthly payment:In time your lenders will finally report your account as past due, which can damage your credit If you do not pay at least the minimal amount due on score When there is a rationale why you will not be in a position to cover your invoice promptly, get in touch with your lender prior to your invoice is arrangement if due to work-out an feasible

4. Maxing out on your charge cards: If your charge cards are maxed out, prospective lenders may challenge your ability to refund. You might be billed an increased rate of interest to compensate for what exactly is viewed as a higher hazard in case you are qualified to get a loan.

5. Not alarming lenders if you have proceeded: Your statement may arrive late and as a result your payments could be late, possibly damaging your credit score.

6. Registering for too many new charge cards: Consumers who often open new credit cards are viewed as a greater danger than those who do not.

7. Closure older credit card accounts: Closure this can adversely impact your credit score and older credit card accounts shortens the duration of your credit history.

8. Do Not cosign for someone else’s loan: You could be liable for that man’s debt and harm your credit.

9. Do Not share your charge card or social insurance number with anyone: There are a lot of abound where individuals strive by telephone, e-mail or mail to get your charge card or social insurance scams number This is a fast-track to fiscal catastrophe and id theft.

10. Dismissing the warning signals of credit issues: If you’ve problem making the minimum payments on time and have maxed out all of your credit, you’ve severe debt issues.

Professional assistance is required by serious debt issues. Contact a reputable credit repair company or a debt management service to help get your credit moving upward again.

Also Read: The Best Credit Monitoring Services 2018

Top 10 States with the Highest Credit Scores

Lenders look at credit scores as a means to judge an individual’s creditworthiness. In today’s market, it may look like everyone is taking a hit to that all important credit rating. It’ll likely come as a surprise to you that some states are do better than many others. Dwelling in a specific locale does not mean you’ve got perfect credit, yet. Understanding which says top the list will provide you with a concept of the manner in which you compare together with the individuals residing around you.

What Variables Determine a State’s Typical Credit Score?

Just what variables can alter the common credit rating of a state’s residents? There really are a number to contemplate. Joblessness is among the top concerns. States with better employment numbers often have residents using a healthy FICO score. Being jobless forces some visitors to rely greatly on credit to fund essentials, and that could drive their scores down. Foreclosures inside the state are another prime concern. Other factors include:

  • Typical charge card payment history
  • Natural disasters which affect the state market
  • New companies
  • Home marketplace
  • Insolvency rate
  • Warm weather locations often endure more than states that face the chilly each year, also. This might take part because of their tourism-based markets. As a country, Vantage Scores average from 707 to 785, but by state, there’s a broader distribution.

A Review Of the Top Ten

10. Iowa – With a score that sits around 771, Iowa makes the most effective 10. Residents of Iowa tend to get low bank card delinquencies, as well as the state in general has low joblessness. Iowa does take a moderate ding to get a greater-than-average foreclosure speed. It had been enough to motivate the state right down to number 10.

9. Hawaii – Hawaii is tied with Wisconsin and Connecticut for average credit rating, with all three coming in at 772. Hawaii is the exception to the warm weather rule. While this sunlight state is famous for the high expense of living, it also hosts among the greatest amount of millionaires per capita in the U.S.

8. Wisconsin – Coming in at 772, Wisconsin boasts a gross state product of $248.3 billion. An adverse element in its credit rating is high joblessness. The Bureau of Labor Statistics reports the speed in Wisconsin hovers around 6.3, but that’s a large progress on the 2010 amounts.

7. Connecticut – The per capita income in the area of Connecticut is among the elite in the nation, but the unemployment rate runs high. In cases like this, the one positive and one negative cancel each other out to provide the state an average credit rating of 772.

6. Massachusetts – With a score of 773, Massachusetts is number six on the top ten list. Like Connecticut, Massachusetts increases points depending on its high personal income – it’s the 3rd-wealthiest state in the union. It’s also home to 13 Fortune 500 firms, making it-one of CNBC’s top states for company in 2010.

5. North Dakota – Back in 2011, this was the state that topped the set of greatest credit scores. These days, it’s still among the top competitors based on all of the credit metrics. North Dakota reports the lowest unemployment rate in the state – only 2.7 percent – and keeps low bank card delinquencies, giving it an entire credit rating of 775.

4. New Hampshire – Linked with North Dakota is New Hampshire. Like its New England neighbors, New Hampshire gains points for high personal income. It ranks number seven in the nation. Unlike Massachusetts and Connecticut, it’s a fair unemployment rate, also – well under the national average.

3. Vermont – The state of Vermont ties with South Dakota for time slot two and three. Vermont has steadily kept low foreclosure speeds. The national percentage of foreclosures is around one in every 2,370 home units. In Vermont, that amount is closer to one in every 39,000 units. Vermont ranks high in virtually every measurable class, giving it an average credit rating of 777.

2. South Dakota – Another state that produces the list every year, South Dakota additionally boasts a typical credit rating of 777. The state keeps a reduced unemployment rate, tied with Nebraska at 3.6. Additionally, it makes the very best six for high scores in most quantifiable groupings.

1. Minnesota – Topping the list by the end of 2013 was Minnesota. The residents of the state have a few of the best credit ratings in the country. United, their average sets Minnesota in the lead using a score of 785.

Fico scores transform year to year for every state. In 2011, North Dakota was on top of the stack, followed closely by Vermont, South Dakota and Nebraska. In 2013, Nebraska did not even make the list, due in part to a large number of reported personal bankruptcies.

Going to a different location in the country is most likely not the solution to boosting your credit rating, but understanding your state average does help provide some perspective. It requires work to build it up again when your score has dropped. The important thing for rebuilding a faltering credit report is an all-inclusive credit repair solution. It begins having an overview of your payment history and setting FCRA and FACTA laws to meet your needs, in order to construct better credit opportunities wherever you reside

Bankruptcy and Credit Repair Companies

My name is Jon Labella and I am a Bankruptcy Attorney. I wanted to take a couple of minutes to talk to you about your credit and credit repair services. You can barely pass a corner anymore without seeing signs begging you to call now to fix your credit. Some of these companies provide a legitimate service, but many do not. It’s time for you to get a peek into how credit repair works and see if it’s worth the price.

The Fair Credit Reporting Act says that everything, good, bad and ugly, stays on your credit report for 7 years from the date it is last reported to the credit bureau. The credit bureaus received massive updates of millions of accounts from national lenders every day. Sometimes mistakes happen and your report may contain inaccurate information. A credit account that isn’t yours, a delinquency that didn’t actually happen, and some stuff that is really old that never went away. Inaccurate or outdated information contained on your credit bureau can and should be removed.

The process is really pretty simple. Pull a copy of your credit bureau report and take a look at it. If you see anything that is old or inaccurate, you file a dispute with the bureau that is reporting it. That sounds pretty involved, but it really is easy to do. Federal law required the credit bureaus to set up a website so that consumers could order their free annual credit report online. You can use this exact same website to file a dispute. The credit bureau requests verification from the creditor, and the creditor has 30 days to respond. If the creditor fails to respond, the entry is removed. If the creditor responds, the credit bureau updates the entry with the new data. If it comes back the same, then it stays.

Most credit repair companies offer to pull your credit report, review it with you to see if there is anything old or wrong, and write dispute letters for you. Nothing is mystical or magical. No special expertise, no special technical training, no advance degrees needed. Look it over, find what’s old or wrong, and let the bureau know. You can do it all online yourself. How much is it worth to have somebody hold your hand while you do that?

That is all legitimate credit repair companies do for you. Now, let’s talk about the not so legitimate ones. Some credit repair companies will tell you that if you bombard the credit bureau with disputes, then the creditor will get overwhelmed and will miss responding to the credit bureau. If the creditor doesn’t respond, the entry will come off. As nice a thought as that is, the bureaus and the creditors caught onto this one and the law has been changed to only allow one dispute per entry. So while that may have worked in the past, it won’t fly now.

Other credit repair companies encourage you to set up an alter ego for yourself by changing your name slightly, altering your social security number, or otherwise adjusting your identity. Common sense should tell you this isn’t cool. Even suggesting that a consumer do this is illegal. Many other credit repair companies just take your money and don’t really do anything for you. I have even heard of one company that charged $500 for a box that had a credit bureau report order form and a bunch of form letters.If you do decide to use a credit repair company, know your rights. All credit repair companies have to use written service contracts and give you a signed copy of it. They have to provide you with a disclosure of your rights regarding credit information. They cannot require payment in advance, and all service contracts carry a 3 day right to cancel. If you have gotten tangled up with a questionable credit repair company, call us. We can help.

Is Your NetFlix Password In The Wrong Hands?

For millions of Americans, their Netflix accounts are essential to getting through a sick day or weekend at home. Nevertheless, something most of these subscribers don’t pay much mind to is keeping basic account security that helps to keep their individual info safe. Something as easy as changing a password regularly may appear like a bit of a hassle, but it’s vital to making sure ongoing account security, particularly as it associates with current hacking attacks.

A number of major data breaches in recent months have potentially put Netflix users at risk of having their streaming accounts hacked, according to Advertisement Week’s Lost Remote vertical. In mid-October 2016 and once again previously this month, Netflix began alerting customers that it had actually been checking its own user records versus data exposed in other companies’ information breaches, indicating that while Netflix itself has actually been unaffected, user accounts were still at threat. As a result, impacted users were required to alter their passwords.

What’s the risk?

The reason for customers to change their passwords is basic: Many individuals use the very same login details for numerous or perhaps all their online accounts, according to TIME Data Security. While can make it much easier for individuals to bear in mind their passwords, it likewise makes it simpler for hackers to get access to potentially important details. Even something as easy as a Netflix password can give criminals– who can frequently buy taken login data at low individual costs– access to crucial information that can be used for fraud, including name, address, and even charge card data.

Customers can examine to see how their accounts have been accessed by making use of Netflix’s “Viewing Activity” feature, which will show info such as the IP address and place where accounts have been accessed, the news source stated. That, in turn, can assist individuals comprehend if their accounts have been subjected to these kinds of attacks, and trigger them to start altering their passwords for their other accounts if they haven’t currently.

Getting smarter

People typically know they need to utilize multiple passwords for their various accounts– ideally using an unique one for each account they develop– hackers also know that this isn’t basic practice for the huge bulk of internet users, inning accordance with KrebsOnSecurity. Hackers also understand that if they have, state, a victim’s Facebook password, they can attempt using that password for Twitter, Netflix and even savings account and have some quantity of success.

Fortunately for numerous web users is that larger business like Netflix are taking preemptive actions to make sure account information isn’t used by hackers, but there’s no single sure-fire way to prevent this from occurring. Businesses can examine their own records versus exactly what’s been dripped online, but it depends on users change their login information.

” Some Netflix members have actually received emails motivating them to alter their account passwords as a precautionary procedure due to the recent disclosure of extra credentials from an older breach at another internet business,” Netflix told KrebsOnSecurity. “Note that we are constantly participating in these kinds of proactive security procedures (leveraging Scumblr in addition to other mechanisms and information sources), not just when it comes to significant security breaches such as this one.”

In addition to keeping different passwords for all their separate accounts, it’s smart for users to make sure they take efforts to read more about the dangers they face and alter their passwords regularly. That way, even if a years– old Netflix account is breached, there’s little chance of that to affect other accounts. When passwords fail you, it’s constantly excellent to have an identity theft security plan in place.  Take proactive steps to secure your personal information and keep track of your credit by monitoring it regularly.

What Identity Thieves Do With Stolen Credit Cards

Unless you live in a remote village on some tropical island, it’s almost 100% likely that you or someone you know has been a victim of identity theft.  Unfortunately, identity theft is a harsh reality that we all have to accept and do our best to prevent.  But have you ever wondered what’s really going on behind the scenes when your identity is stolen?  How many criminals are seeing your social security number or your credit card information?  This is a very scary thing to consider.  According to an article on CBSNews.com here’s what’s happening to your information after it’s been fraudulently taken.

If your credit card information is stolen as part of a large breach, it’s more likely that your identity and information will be sold at least once as part of a package deal. Along the path to fraudulent purchases your card will be valued based on such factors as whether it is proven to be active (typically with small purchases that may go unnoticed) and whether other information is included — such as passwords, Social Security numbers, and birthdates that make it easier to open new lines of credit in your name.

Once your card information ends up in the hands of the final “user,” the fraudulent action can take many forms. The thief may make a duplicate card, choose to open up fraudulent accounts in your name, or simply use your existing card to buy items that can be resold for cash. https://www.cbsnews.com/news/what-identity-thieves-do-with-stolen-credit-cards/

Once you find out that your credit card, social security number or some other personal identifiable information has been stolen, you will have to take some corrective and preventative actions. Start by calling your credit card company and let them know what has happened.  If any account were opened fraudulently, you’ll need to contact those companies as well so they can close the unauthorized accounts before more charges are made.    File police reports and consider placing a freeze on your credit for at least 90 days.  This will prevent anyone from running your credit during that time, so no new unauthorized accounts can be opened.

Use a credit monitoring service to stay on top of daily changes to your credit reports.  If any new items pop up that you don’t recognize, it’s likely fallout from the credit card or identity theft.  In the future, use some of these tips to help keep your personal information safe.

 

What You Need To Know About Credit Card Fraud

Types of Credit Card Fraud

Credit card fraud comes in several different forms and even if you don’t currently have any credit cards in your name, you can still become a victim. Criminals are becoming more crafty as they attempt to find ways to steal your credit and use it fraudulently. Here are some of the more common credit card fraud methods that you should familiarize yourself with.

Application fraud: The most common type is the application fraud. Fake or stolen documents are used to open credit card accounts. This is of two types: The card obtained by assuming the identity of someone or by falsifying the financial position to obtain credit.

Assuming the identity of another person is a form of traditional identity theft. The fraudster may create false names and addresses or even steal the identity of an existing person to obtain the card.

Acquiring more credit than entitled, by exaggerating financial position is another common practice. Banks often protect their interests by demanding documents to support the financial claims or by confirming details with the employers.

Stealing: Criminals get hold of your card either by stealing or when you lose it. Postal intercepts are a common form of stealing cards whereby the card is stolen before it reaches the rightful owner by post.

Skimming: This is a type of fraud where the card is cloned or forged without the card owner’s knowledge. The data in the magnetic strip of the card is copied and used. This type of crime is difficult to spot since skimming is exposed only when the next statement is generated. The magnetic strip can be copied by a dishonest employee at the point of sale, with illegal recording devices or by skimming devices installed in cash machines.

Online fraud: Most credit card frauds are committed over the internet. The card details are hacked at the merchant site when being used to make legitimate online purchases. Another common scam is thorough phishing. The phishing sites send out false e-mails or links to fraudulent sites to deceive the card owner to part with card details. These details are then used to make false purchases.

CNP fraud: Purchasing goods on mail order or on telephone without involving a direct seller, where no PIN verification is required, can result in card not present (CNP) fraud. The card details are obtained even from old receipts and since the seller does not verify the PIN number or signature, it becomes difficult to detect such crimes.

BIN attack: Credit cards companies often come under the BIN (Bank Identification Number) attack. Fraudsters generate the last four numbers by obtaining the first six numbers (BIN) of a legitimate card. The cards in the same BIN range have similar data like expiry dates etc.

The key to avoiding such frauds is to be aware and follow safe practices. Always use strong passwords on your internet banking and credit card websites. Do not give secure information on telephone or e-mail. Report a lost card immediately to block any further transaction. Also, consider using a credit monitoring service to keep track of what’s going on with your credit reports. With such simple safe practices, you can ensure that your plastic money is safe.

Preventing Identity Theft: Proper Disposal Of Old Computers

Computer Data Has a Long Shelf Life

Conscientious people shred their bank statements and cut up their credit cards without a thought. But when it comes to disposing of their computer’s hard drive, they can be extremely careless. With computers constantly evolving and being made more powerful, people frequently upgrade to the newest models, casting aside millions of computers yearly. Many computer users leave sensitive information on their hard drives as they discard them at computer drop-off centers or in landfills, just waiting for an identity thief to come by. If you have a computer to dispose of, you don’t want to become a future statistic for identity theft.

Some people do not realize the process involved in removing data from a hard drive. Many computer users think if they move all their files to the trash or reformat the hard drive that the files are gone for good. Actually, those trashed files remain fully intact, unless they are rewritten. Rewriting only takes place if space is needed and most computers have ample space. In the case of reformatting the drive, data can be still retrieved with the right tools. If you are among the unaware, the Department of Defense has advice on how to remove information from a hard drive.

Wiping the Hard Drive

You can buy programs, also known as shredders, which are relatively inexpensive, or find freeware on the Internet that will do the job. These programs cover the data with zeros or random characters to make them unreadable by data-restoration software. The DOD recommends overwriting the drive sectors three times with different characters. Other experts recommend going over the data seven times to make it completely unrecoverable. Also, wiping just certain files may not fully protect your information, as copies of those files can be stored in other parts of your computer. It is probably best to use the wiping program on your entire hard drive.

Removing the Hard Drive

If you don’t want to use a wiping program, you can remove your computer’s hard drive. It is relatively small and will store easily in a safe or other secure location. If you aren’t sure where the hard drive is located on your computer, refer to your manual or manufacturer’s website. Once removed, some people resort to pounding the hard drive with a hammer, or using a magnet, or soaking it in water or acid. All these methods are ineffectual. The only method to guarantee the removal of your information is to sand the platters or use an industrial shredder which obliterates it.

Discard Wisely

The sheer amount of e-waste being generated each year is a threat to our environment. Federal regulations don’t cover e-waste, but some states have passed legislation dealing with the landfill problem. Yet, disposing of a computer is easier today than a few years ago as there are more options available. To help confront the landfill problem, some stores have unveiled take-back or buy-back programs. While online sites have also appeared to buy back old electronics, where they will revamp them to sell or recycle the components. You would be doing a great service if you consider other options rather than tossing your computer into a landfill.

Stealing your sensitive information from an old hard drive is just one way criminals can commit identity theft.  Learn other methods to protect yourself from identity theft and keep your data out of the wrong hands.

Reference:

1. Department of Defense, Department of Defense Directive, October 24, 2002, https://www.acq.osd.mil/ie/bei/pm/ref-library/dodd/d85001p.pdf