With online shopping as popular as ever the importance of cyber security becomes essential to everyone. Shopping, even in the real world, involves money and where there is money, there are criminals. Criminals follow the money trail targeting online shoppers all the a way to their computers, mobile devices, credit cards and bank accounts.
Online shopping became fashionable when people discovered one is free from stress and fatigue caused by crowds and traffic. There is also the convenience of searching whatever it is you want from your home, at your most convenient time, and paying for it without waiting in line. All of these with just a few click of a mouse.
However, the internet is also a convenient place for cyber criminals. They target the online shoppers, fraudulently obtaining information they can use for their own financial gains. These criminals use three common ways in attacking the online shoppers.
Unprotected computers are easy targets for viruses and other malicious codes used by cyber criminals to gain access to personal and financial information. On the other end, online vendors have to protect their computers, too, against attackers who may access their customer databases. We have all seen how that has worked out lately. More and more big-box retailers have been hacked. It’s all over the news everyday.
Fake sites and email messages
In the virtual online world, a site (or an online store) can be faked by cyber criminals, with no one the wiser. These fake sites mimic the legitimate ones and capture the business, at least until they are caught or noticed.
Charities have also been misrepresented, especially during natural disasters or holiday seasons where people pour in donation money and aid. Most often, though, these attackers collect information for their own illegal use.
Cyber safety measures
Maintaining an up-to-date anti-virus program, a firewall and anti-spyware is an essential three-pronged first line of defense in cyber security. They protect you against viruses and Trojan horses that may steal or modify your data and make your computer vulnerable. Spyware may also give the attackers access to your data.
Browsers are the gateway between your computer and the internet. Enable the option of automatic updates to your computer so that the operating programs and utilities are up to date.
It is likewise important to check the default settings of your computer and apply the highest level of security. This applies primarily to browsers, email clients, etc. because these are the connectors to the Internet.
This is where care should be taken because cyber criminals are very good at mimicking the sites of legitimate vendors to make it appear genuine. You need to verify their legitimacy before supplying any information. Keep the phone numbers and the physical addresses of these vendors which you can use in case of problems.
Security features and private policies
Make sure the information you give out is encrypted. To check if it is, see if it includes a URL that begins with “https:” instead of “http:” and has a padlock icon. If the padlock is closed, the information is encrypted. Know where the padlock icon is located in your favorite browser since some attackers use fake padlock icons to trick users. There is special keyboard encryption software available now that you should have on every device you use.
Use your credit card
Credit card charges have laws that limit your liability in case of fraud. This may not be the case for your debit card. Because debit cards draw money directly from your bank account, unauthorized withdrawals could leave you penniless. Needless to say, a record of your purchases should be kept aside. Report immediately any discrepancy.
Shopping online is truly a time-saving, hassle-free, and fun way of buying whatever you want on the internet. The presence of the ubiquitous cyber criminals stalking at every cyber corner necessitates the need of cyber security. Make sure you are protected with credit monitoring.
Your cyber-health is your responsibility.
The most sensitive piece of personally identifiable information is without a doubt your social security number. This is one piece of information you don’t want anybody else getting their hands on. An identity thief can do unthinkable amounts of damage with your social security number and very little other information. So what do you need to do in order to keep your SSN as secure as possible?
A typical yet effective strategy on preventing Social Security Number (SSN) theft is on the way, finally. This change will hopefully make it more difficult for identity thieves to easily access your SSN and use it for identity theft purposes. Your SSN will eventually be excluded by Medicare as part of their benefit cards. Over the years, these numbers have been among the primary basis for medical identification. This was just a problem waiting to happen. And guess what, it did happen. In the form of countless cases of identity theft.
Recently, President Obama signed a bill intending to stop using SSNs when transacting with Medicare. This law was accepted by the State’s major political parties. The primary objective of this law is to modify doctors’ fees when it comes to giving medical services to patients covered by Medicare, however there is a specific section of the law that emphasizes that never should SSNs be reflected, typed, or included on the Medicare ID.
According to Texas Representative Sam Johnson (Republican), the main ingredient to making identity theft possible is the SSNs and that the criminals use the Medicare cards of the seniors as a tool.
“Carry your card with you when you are away from home. Let your hospital or doctor see your card when you require hospital, medical or health services under Medicare.” These statements serve as aid to prevent identity theft. This defies the rule that mandates not a single person should ever bring their personal SSN on their behalf. The good news is that the law just solved identity theft by addressing the source.
While this is true however, there are still other ways by which culprits will be able to get your SSN and use it to their schemes. Take note of the following ways where your social security number is most vulnerable and protect yourself in the future. If you do become a victim of a stolen social security number, here are some steps to follow immediately.
1. Tax Documents
These days, filing taxes through mail is a common practice. If you are among the people who do this, there is a possibility that unauthorized people/entities may have access to your documents containing sensitive, personal information like your SSN. Identity thieves can simply take mail from your mail box during tax season. They know exactly what they’re looking for and within seconds, they can have your social security number, and possibly even drivers license numbers, phone numbers and your entire identity. In addition to, SSN thieves also execute their crime through phone scams. Fraudsters pretend to be IRS representatives contacting people and convincing them to provide specific information such as the SSN and other documents. Keep in mind that the IRS only communicates through mail. Solution: Don’t file your taxes via mail. Ask your tax preparer to e-file or if you do your own taxes, you have this option as well. Keep the sensitive paperwork out of the mail and the hands of id thieves.
2. Data Sharing
When you stop and think about it, it seems like every agency requires SSN today – from government agencies, real estate companies, insurance firms, and even telephone plan provider. Unfortunately, providing your SSN is something that most people nowadays do not worry about anymore. It is true that a lot of institutions need SSN for their processes. However, it does not necessarily mean that everyone should lawfully have it. For your information, the law states that it is the IRS, healthcare providers, police, banks, and employers which are allowed to require Social Security Numbers and information from you. A few companies, however, may also be permitted but the process must be upon strict compliance with the law. Whenever you notice that there is an option that does not require you to share your SNN information, choose not to share it. This limits the possibility for your SSN details to be obtained by fraudsters.
3. Bank transactions
Clearly, the law allows banking institutions to ask for your SSN information. However, they are mandated to observe and abide by the “Know Your Customer” guidelines. This stops criminals to use the banks for their fraudulent schemes. As a customer, you have the privilege to learn about the measures that the bank adopts in order to secure your SSN details as well as be oriented about their solutions in case a breach happens.
When you know about the typical sources of SSN ID theft, you will be able to protect yourself from it. Safeguard your SSN at all times by keeping your SS card in your safety deposit box or in a safe at home. Never carry your social security card on your person. It is not necessary. Furthermore, don’t feel that you are required to share your social security number with anyone. You can always refuse to provide it if you don’t feel comfortable with the person asking for it. As always, monitor your credit for signs of fraud or unauthorized use.
We all love going on vacation. It’s the time we give ourselves to forget about all of our worries and remove all stress. If you really want to enjoy your summer vacation, then take the precautions to protect yourself against identity theft before you head out. That way, you will be able to feel at ease and make the most out of your time off.
However, before we get to fully enjoy all those wonderful days coming ahead, we need to do some sort of preparation for not only the summer we love. In fact, thieves love stealing from others during this season as well. For them, people become more vulnerable during the warmer months since vacationers are more focused on relaxing rather than the security of their identities, and that is why criminals can so easily take advantage of the season. That being the case, summer is the perfect time for thieves to collect all the information they need to hijack an identity.
The good news is that you can do something to lower your risk in becoming a victim, even when you are on your summer vacation or travelling far from home.
Listed are some identity protection tips that will help minimize your risk:
Things you need to do before you leave:
- Contact your bank and your credit card company to let them know that you are travelling as well as to know where you would be travelling. That way, they can prevent any charges done from a different location. Instead, they would only allow charges made on your destination. If you have a good bank, then they would let you know if there have been charges that seemed to be suspicious.
- Limit the number of people you have told about your vacation or travel. Even though you might want to share everything about your vacation on your social media accounts, try to control it and instead, share it upon your return. Most of the identity thieves look out for people who are currently not in their homes especially during the months when people love travelling.
- Ask the post office to hold all mail for the duration of your trip. That way, you are assured that important documents would not be placed on your mailbox while you are away. Moreover, if it has been left sitting there for a long time, chances are other people could pick them up. It is also one way to avoid the piling up of mail in your mailbox, which gives the others, especially the thieves, a sign that you are currently not in your home.
- Only take the necessary documents and leave the others in a safe place if you are not going to use them during your vacation. Taking them all might only lead to losing them.
Things you need to do while you are on a vacation:
- Keep all your documents safe especially those containing sensitive information. Never ever leave your documents such as passports in the room you are staying in. Other people might also have an access to it. If the room has a safe, then better keep your documents there. However, things like your license should always be with you.
- Only use secured networks and never ever use an unsecured one such as a public Wi-Fi. Even vacation destinations these days provide an internet connection. However, not all of them are secured. Unsecured networks are much easier to hack. Moreover, acquiring sensitive information can be done without exerting a lot of effort. You should never access your online accounts unless the connection is secure and password protected.
- Check your bank statements from time to time. Whether you are on vacation or not, you should periodically check your bank statements. Discovering unauthorized charges would be faster that way, so be sure to use a secured internet connection.
- Never forget to set up a password to all of your devices as a precautionary measure in case one gets stolen or you lose it somewhere. Remote wiping is also a great idea. That way, if you can’t retrieve your phone, at least you are assured that nobody would get their hands on the information on your device.
By doing all these things, you will have a better peace of mind during your vacation.
I’ve talked a bit in the past about using credit freezes as a means of preventing identity theft. Essentially, a credit freeze puts a lock down on access to your credit reports when you enable it with all 3 credit bureaus. No new lines of credit can be opened because potential creditors can’t run your credit. Pretty simple concept right? Unfortunately, most people don’t consider placing a credit freeze until after they have had their identity stolen. At this point, it’s likely the damage has been done, and the credit freeze is nothing more than a band aid. Same goes for your child’s credit.
Until recently, most states haven’t allowed parents to proactively freeze their child’s credit to protect against identity theft damage. This is changing however, as now more than 20 states will allow parents or guardians to freeze the credit of children under the age of 18 before they become victims of identity theft. If you have young children, there is absolutely no reason NOT to lock down their credit reports. If they’re under 18 years old they cannot legally apply for a credit card, mortgage or other lines of credit, so there’s no reason to have their credit reports accessible and left vulnerable to identity theft. Washington state is the most recent to allow proactive credit freezes for minors.
A recent study by identity theft protection company, All Clear ID, shows roughly one in 10 children become the victims of identity theft, making them roughly 35 times more likely than adults to be victimized. A child’s credit is attractive to thieves because it’s often rarely checked, allowing the fraud to continue for an extended period of time, and, unlike adults, a child’s credit is often a clean slate. Read the full story here
Most people are also unaware that they can enroll their children, as well as themselves in a credit monitoring plan that will send alerts if anyone is trying to use their social security number to open any new lines of credit. This is another important proactive step that can mitigate potential identity theft damage. Several of the major credit monitoring services that I recommend, including IdentityGuard & Lifelock, have monitoring plans that allow parents to include their children’s social security numbers for monitoring.
If you live in one of the light colored states on the map above, consider freezing your child’s credit soon, and get a credit monitoring plan in place for the entire family as a second layer of protection.
I Lost My Social Security Card! This is one phrase that will strike fear in just about anyone.
You’ve left the restaurant, you’re having a good time with those you love, and when you get to the next place on the agenda for the evening you realize that you were having such a good time that you forgot your wallet. This causes a slight heart palpitation for a moment as you dash back to the restaurant, bother the people who are sitting at your table now as you frantically search for where you might have dropped it, and in the end, you get zero hope from the statement from the hostess who says they’ll contact you if they ever find it. Losing a Social Security card happens more often than you might think – if you’ve lost yours, then here’s what you’re going to need to do to get another one… along with the protective steps you’ll need to take if whomever has your card has some plans for it.
The First Thing To Do Is File for Your Replacement Card
Because of the time that it takes to get your card and the amount of materials you may need to obtain that you don’t have, the first step you’ll need to take is to work on filing for your replacement card. In order to get your replacement card, you must:Gather documents proving your:Identity. This is done through your driver’s license, a state issued non-driver identification card, or your passport. If you don’t have one these or cannot get a replacement copy in 10 business days, then there is a secondary list which the Social Security Administration can use. Non-citizens will need to provide proof of their immigration status through their I-551, I-94, or I-766 froms.U.S. citizenship. If you have not established your citizenship with the Social Security Administration, you will need to provide an original copy or agency-issued certified copy of either your birth certificate, your passport, Certificate of Naturalization, or Certificate of Citizenship with your application materials.Immigration status. If you are not a U.S. citizen, then you’ll need to provide proof of your immigration status through the identity documents listed above. In addition, if you are a student or a J1 visitor, you may need to provide additional documentation regarding your legal status in the country.
Once you have gathered the documents that you need to prove that you really who you say you are, you will then need to complete an Application for a Social Security Card. Be aware, however, that you can only receive up to 3 replacement Social Security cards in a calendar year and that there is a cap of 10 maximum replacements that can be issued to you.
Once you have filled out the application, you simply take it or mail it and your supportive documents to either your local Social Security office or your local Social Security Card Center.
The Social Security Administration cannot take any notarized copies or unofficial documents, such as a hospital or city birth certificate. You won’t lose the documents that you have to send in, however – anything you mail in to the SSA will be returned to you along with a receipt. Just plan ahead if that means you need to mail in your driver’s license!
Then It’s Time To Protect Your Identity!
Now that you’ve completed the process to get your card replaced, you need to begin the process of monitoring your identity to make sure that no one plans to compromise it. The easiest method is to simply sign up for a credit monitoring service. There are free ones that can take away most of the pressure of remembering to take care of monitoring your identification items on your own and low cost ones that can monitor virtually everything.
If you’re more the “hands on” type of person, then there are plenty of resources available to you as well. The first thing you should do is request your free credit report from your preferred credit reporting agency. Though you can request one from each agency at the same time, you’re better off ordering one report from one agency every 4 months because you’re limited by Federal law to 1 report per agency every 12 months. Some states also offer free reports, however, so be sure to take advantage of all the free reports you can get because the more you can monitor, the more you can prevent something bad from happening!
You’ll also want to consider putting on a fraud alert or a credit freeze. These can help you to be able to prevent an identity thief from ruining your credit because you’re alerting lenders that someone has potentially compromised your identity or even completely locking lenders and yourself out of your credit report.
Finally, you’ll also want to alert your financial institutions about what has happened so that suspicious activities, such as requests for new accounts or the closure of any long standing accounts, have another level of verification beyond a fraud alert.
Losing your Social Security card can be scary, but the recovery process doesn’t have to be when you follow these step by step instructions! By taking these steps, you can successfully get your Social Security card replaced and eliminate the threat of identity theft. It only happens, however, when you take proactive steps to make sure these tasks happen. There’s rarely a need for you to carry your social security card on your person, so lock it up in a safe place at home, in the event you happen to lose your wallet again in the future.
Have you ever experienced that strange sensation you get when you come home from a long day at work to find that your home has been broken into? When you get inside, you notice that not much has been taken… but much of your paperwork, financial statements, and other identifying information has been? Sadly, this scenario plays out every day for many people. Though a breakin might be a little better than getting served with a lawsuit because of identity theft, it’s still a devastating experience, yet many people often make some common mistakes when it comes to protecting their identity. What are those common mistakes and how can you avoid making them yourself?
Not Locking Up Your Files Properly
A good rule of thumb for anything that is vital or dangerous is to put it behind a double lock. Many states require medications to be placed behind two locks to prevent someone from stealing them because of the harm they could cause themselves or others. That same care should be given to your documentation as well… and your front door doesn’t count, because let’s be honest. We don’t always remember to lock our front door every single time.
To combat this, I have a room that I keep locked in my home at all times. It is windowless, so there is no other entry beyond either drilling through the outside wall, kicking the door in, or drilling out the lock. Inside this room I keep a file cabinet that also stays locked at all times, and this is where I keep my sensitive financial and identification documents.. I then also keep the keys on my work key ring instead of my car key ring, so it comes with me virtually everywhere.
Not Disposing of Documents Properly
Every time I go out to the recycling center I cringe because there is invariably someone dumping out their junk mail without ever opening it or shredding it. They just throw it into the bin and trust that no one can grab that information and do something with it. When it comes to document disposal, however, the only person you can trust is yourself. Make sure to invest in a crosscut shredder if you don’t have one already, and then take the leftover confetti to the recycling center. You’ll get lots of jokes there from others about how you are trashing confetti, but that’s a small price to pay in the prevention of having an identity stolen.
Not Being Aware of the Environment
It’s late at night. You’ve got to get some cash out of the ATM because you’re going to have to pay for something tomorrow, where they don’t take plastic. The ATM is on your way home, so you stop and give the machine your card. That’s when you notice the shadowy figure behind you, watching your every move. Would you tell that shadowy figure what your PIN is? Would you let them watch you punch in your PIN? Or would you go to a different machine?
Many people here say that they’d go to a different machine… but in different circumstances, they are extremely casual with their PIN. They’ll punch in the number in plain sight of others while at the grocery store making a purchase. They’ll tell their PIN to a cashier because they can’t get their card to work. They’ll take out extra money from a purchase and then carry the cash out the door with them in plain sight because they haven’t taken the time to put it into a wallet or purse. Daylight might make you feel more secure… but it’s not a secure environment.
By avoiding these common mistakes, you’ll be able to keep your identity more secure every day. Identity thieves have one goal in mind to profit from your identity as much as possible. It’s up to you to prevent that from happening. If you’re worried that what you are doing might not be enough, there are some great identity theft protection plans available from professional providers that can help you be more secure as well.
Don’t be that person who said they should have done something after the fact. Be the person who does something now. Sign up for credit monitoring with IdentityGuard.com today and get protected.
Knowledge is the best form of prevention.
Identity Force Effectively Protects Your Entire Identity
Identity Force is an industry leader in providing full-circle, proactive identity theft protection for individuals, businesses, and government agencies. Their solution to identity theft is simple, easy-to-use, and guaranteed to work.
Identity Force was launched in 2005 as a response to the dramatic increase in identity theft crimes in the United States. They are a division of Bearak Reports, Inc., who are themselves industry leaders in background screening and asset search services since 1992. Identity Force is effective because they draw on the extensive expertise found in the 20 years of information verification services in order to provide a complete and proven approach to identity theft protection.
A consistent leader in identity protection issues, Identity Force was the first in the United States to issue an Identity Theft Bill of Rights. This Bill of Rights outlines the responsibilities businesses and organizations ought to undertake when they discover that their data has been breached, thereby putting both employees and customers at risk of identity theft.
Identity Force Monitors the Right Information
You deserve the best, and that’s what Identity Force strives to provide you. From credit monitoring to internet monitoring to database deletion, the proactive services that Identity Force provides you with their theft protection plans are the cornerstone of keeping identities safe.
Payday loans, public records, and other potential sources of identity theft are also monitored on a daily basis from the online dashboard. If suspicious activities are detected, then you are sent an immediate alert so that you can take action to prevent theft from happening, and you can see this directly on your front page. Identity Force will also work to eliminate your identification information from being on common databases that many identity thieves attempt to utilize.
The Identity Force Red Alert™ System
Identity Force is continuously monitoring your credit reports, your wireless accounts, retail activities, your utilities, your other public records, and even your automobile loan and mortgage for fraudulent activity. If anything suspicious is detected through the monitoring being done, Identity Force will send you what is called a Red Alert™ if they discover any potential fraudulent use of your personal information. This gives you the advantage when it comes to preventing identity theft because you get immediate monitoring results. You can see all of your Red Alerts on your Identity Health Score & Report page.
Restoration Is Easy with Identity Force
Identity Force gives you all the tools that you need in order to restore your identity back to normal should you become the victim of identity theft. You get immediate access to common contact numbers you may need, emergency numbers so that you can report the theft of your identity to potential stakeholders immediately, sample letters that will help you contact your accounts and dispute charges easily, and access to trained credit professionals that can help you take off false information quickly. You also get a $1,000,000 insurance policy that can help reimburse you for out-of-pocket expenses that may occur from your recovery efforts.
Identity Force Makes Protecting Your Identity Easy
Identity Force members just click a button on their dashboard to get their complete identity theft recovery solution. Members never leave the Identity Force website and don’t need to register or login to any other service. There is just one login that happens, securely and instantly, all in the background. This gives you easy access to all of the information that you need at one click convenience when checking up on the status of your identity at any given moment.
What Else Does Identity Force Offer?
Lost Wallet Protection
This type of protection helps you to be able to prevent your bank and credit accounts, as well as your identification, from being utilized if you lose your wallet or purse – or have it stolen. With one call to Identity Force, you can authorize them to contact all of your open accounts to have them stopped, closed, or notified of the loss of materials related to the account so that specific measures can be taken to prevent loss. This is important because many financial institutions that aren’t related to credit cards have specific time limits in place regarding the length of time it takes to report a lost item that correlate with how much of any loss for which you may be responsible.
Database Monitoring & Deletion
At Identity Force, it has been realized that several identity theft attempts occur because your identification information is readily available on several databases. Identity thieves realize this as well, and it does not take much effort on their part to learn this information. An identity theft protection plan with Identity Force includes monitoring these databases for your information and requests to have that information deleted.
Pricing & Value
Identity Force offers services to businesses and government agencies, as well as to individuals. The individual plan starts at $17.95 per month, but if you act today using this special discount to sign up for your two week free trial, you can get identity theft protection plans that start at just $14.95 per month. If you are not satisfied with Identity Force, just cancel within the two week trial period and you won’t owe anything!
Protect All Parts of Your Identity Today!
Identity Force is the government’s preference when it comes to identity theft protection solutions for a reason. They effectively monitor your credit, identity, and even public records to make sure that your identity has not fallen into the wrong hands. They have an effective resolution department that you can contact whenever you suspect identity theft. They can help you fill out your paperwork should identity thieves strike, gives you samples to do it on your own, and have $1,000,000 in insurance protections. Act today to save on your Identity Force protection plan and you’ll see for yourself just how good of a job Identity Force does in protecting all aspects of your identity.
You don’t have to be a software expert to understand that passwords are among the key elements in making sure your personal or guarded information won’t be revealed to ID thieves, hackers or anyone else with malicious intent. Running parallel to the way that the internet has been learned about and embraced by society as a whole, cyber criminals have been honing their skills. As tech gets more advanced, hackers keep finding new ways to get leverage over pretty much anyone. For this reason, people are encouraged to create secure passwords that’ll be difficult for identity thieves to unlock. You may not be able to stop these criminals from doing what they want to do, but you can always adopt security measures to give better protection to your documents. The following suggestions are a great place to get started:
Regular modification of passwords
If you plan on using a single password for most or all of your online accounts for the rest of your life, you’re putting yourself at high risks for identity theft. You can avoid a lot this risk by frequently changing your passwords every three to six months. This way, hackers will have a hard time breaking in to your often-changing entry point, even if you only change a character or two at a time.
Use passwords with an array of characters
Using passwords that contain your name, birthdate, or a combination of you and your spouse’s names is not a good idea. Hackers can easily obtain that kind of information from social media and people around you. They will then link all the details together and figure out what password you might be using. To make it as difficult as possible for these criminals, make sure that your passwords are composed of numbers, upper and lower case letters and symbols. This will make your password far more difficult to figure out and will take a substantial amount of time to get around it. Before hackers finally discover your previous password, you may have already changed it to a new one.
Avoid using the same password for different accounts
A lot of people are using a similar password for their bank accounts other activities. Cleveland.com revealed that around 20% of people are using this risky practice. Always remember that different accounts mean different security systems. Your social network account may have weaker anti-identity theft measure compared to your bank account. Once hackers are able to break in to the account that has a weaker security system, they will eventually infiltrate your other more important accounts by plugging in the same passwords.
Say “No” to password-sharing
Experian, one of the giants in the credit industry in the United States, conducted a survey covering matters on identity protection. The company found out that nearly 50% of people (under 30 years old) feel secure when somebody knows about their passwords. However, this is never encouraged, even if the person by whom the password will be shared with is a loved one. After all, it is all about your identity’s protection, so it is best to always keep your password by yourself. Even if you share a bank account, most financial organizations will allow you and your partner to each create unique logins.
Avoid using public computers
In case you don’t know, cyber criminals are clever enough to integrate custom software on public computers that will record every keystroke of your user names and passwords. Using library computers, internet cafes and other devices available to the public to log into your financial accounts is highly discouraged. Moreover, avoid using public Wi-Fi at all if you plan on accessing your bank account.
Use scrambled words
As mentioned earlier, a lot of people are fond of names of people close to them (or their own name) as passwords. If you are one of these people, you need to quit that practice immediately. Those kinds of passwords are easy for hackers to figure out. In fact, it can only be a matter of guessing game. To prevent this, use acronyms and scramble your set of characters so that it becomes a unique and hard-to-hack password. For truly strong passwords, chain together three or four random words and replace some of the letters with numbers and symbols. Something like “Ilovedogs1!” is super easy to figure out compared to a password like “Do6sEnv3lopeSKY”.
Sequential numbers or letters is a no-no
Are you so forgetful that you would really want to assign ABCDE or 12345 as your password? If you said ‘yes’ you might as well just post all of your login information on Twitter or Facebook for the world to see. Avoid these kinds of passwords like the plague. Password guessing software can figure them out super fast. For example, you wouldn’t use 1234 as your ATM pin code… would you?
Avoid writing down your passwords
Some people become victims of their own passwords. They tend to forget what they came up with in the moment and find that writing them down and carrying them about is an acceptable solution. Well, it might help you remember your password, but it’s really easy to leave behind those small pieces of paper (especially if you’re forgetful in the first place). Other people might just outright steal your valuables, which would then give the criminals immediate and easy access to everything in your life. If you really need something to remind you of your password, writing down a hint (not the exact password) is a far superior alternative.
Create a long password
The idea is simple – longer passwords are more difficult to hack or guess. How long should you passwords have to be? Most websites make it so they must be 8 characters or more. We would recommend aiming for 12-16 to really make it strong.
You don’t want to be a victim of identity theft, do you? If not, your first and one of the best lines of defense against identity thieves and hackers is to follow the tips above and make a password that’s impossible to crack.
Turning from a renter to a home owner is such an exciting moment in life. However, it could also be stressful at the same time. Aside from looking for the right neighborhood for your new home, your finances should be in near perfect condition for you to be able to take out a home loan. What doesn’t often cross the mind of home buyers, though is there’s a large risk of becoming an identity theft victim.
In most cases, the victim of identity theft doesn’t have any idea about it until the originator of the mortgage pulls his or her credit score to prepare for a home loan noted Paul Wylie, who was the former owner and founder of the Metrocities Mortgage. He said that he had seen potential borrowers get turned away from buying their dream homes or receiving a significantly higher interest rate. This interest rate increase happens because the borrowers usually aren’t able to take fast enough action to remedy damage cause by identity theft. Thus, they failed to secure a reasonable home loan, and that’s if they were able to qualify for one at all. This is reason is enough for you to make sure that you’re not and won’t be an identity theft victim before you even start looking for a new home.
Before you even purchase your home, you should first check out your credit report and review it closely. Look for suspicious items that might indicate someone is using your identity without your consent. In particular, look for unauthorized new credit requests. You should also spend your money wisely by investing on services to protect your identity which will monitor your personal information while you search for your new home.
Once you are sure that you’re eligible to take out a home loan, then the next step would be to protect your identity while going through the buying process. Here are the few tips regarding the matter:
- Ensure that the mortgage and real estate professionals you are transacting with make use of a secure system while communicating all of your sensitive information. In case you still doubt their network security or want to take caution, it would be best to hand over the documents personally.
- Ask your lenders about how they protect information given to them and what happens to it once the process of acquiring the loan is done.
- Make use of referrals in contacting realtors and mortgage professionals. Check if they have up-to-date licenses. Even then, you should trust your instincts on this one.
- Continue using the services mentioned before to ensure you know what’s happening to your data. Credit monitoring is also capable of alerting you with suspicious activity on your credit. That way, you would be able to take action to it fast.
- Evaluate if the offers seems to be too good to be true. It would be best to ensure that the offers are legitimate and you should never provide them with a down payment if you have not met him or her in person or without even seeing the home they are offering you.
- Be wary of loan providers and make sure that they are not con artists. Meet them personally, do your own research about the company they are working for and check out if they have a good reputation. As much as possible, do not apply for loans online if you are unsure about the validity of the website.
Purchasing a home is not an easy thing to do. However, the complicated process isn’t an excuse to stop doing everything you can to protect your identity.
Most of us feel comfortable in using ATMs and that is why some us don’t even realize our financial information is rather vulnerable. Not all thieves are present online and not all of them involve hacking or data mining over the internet. In fact, there are thieves who target individuals at ATMs.
We can’t deny the fact that ATMs (Automatic Teller Machines) have been a great blessing to us. They are extremely convenient considering, whenever you are in need of money, you can find one pretty much everywhere. Moreover, these ATMs are available 24/7 and are really easy to use. Although ATMs may have seemed impossible decades ago, life today seems like it would be particularly difficult without them.
Even though we might consider them as a blessing, certain issues still can’t be avoided just like other things have. When you are in need money and have decided to either drive to the nearest ATM or just walk to the one across the street, it is important to take precautionary measures to ensure that you are not making yourself vulnerable to identity theft.
Here are a few tips for you to keep in mind:
Beware of skimming
Skimming is one of the most common methods that thieves use in order to collect data from an ATM. In this one, the thief attaches a certain device on the ATM. This device then allows thieves to acquire certain data like PINs, credit card numbers and cardholder’s name. Fairfax County Police’s Detective Tom Polhemus located in Virginia said that the devices that these criminals use are subtle and small. Therefore, it would be difficult to notice them. Moreover, the device is capable of functioning for 2-4 hours, which could potentially mean dozens or hundreds of cards’ details depending on how busy the area might be.
After they are done skimming a few cards, the thieves remove the device and head off to their next target ATM. These devices are usually attached using a tape or glue. Tom said that ATM users should beware of using machines with card receivers that are bulky, poorly attached to the machine or out of place. Machines with scratches, cracks and tapes should be avoided at all cost.
Check if there are cameras installed
With the continuously evolving technology, companies have been releasing smaller cameras each time. The thieves makes use of this technology by installing them near the ATM. Obviously, they are much smaller than the security cameras usually attached to an ATM. Even though it might be hard to discover the camera, you could check all sides of the ATM to check whether it has small holes where mini cameras might be installed. If you feel like something is unusual or out of place with the ATM, then it would be best to locate and use a different one and inform the bank (if it’s open) of the problem.
Check the ATM’s keypad
There are thieves that make use of keypads if skimming or placing a camera did not work out well for their criminal activity. These keypads are placed over the actual keypad of the ATM and these are really hard to detect. However, just like the tips mentioned for the cameras, look for another machine if there is something odd with the current machine you are planning to use.
Aside from the tips mentioned above, it would be better and safer to choose an ATM near a bank instead of one located on a random street corner. Moreover, always remember to cover with your hand the numbers that you press for your PIN. Always ask for receipts and keep them until you have compared it with your bank statement. No matter what precautionary measures you you choose to go with at the ATM, it’s be a good idea to use credit monitoring services as well.