Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Do You Know What to Do When Involved in Identity Theft?

Do You Know What to Do When Involved in Identity Theft?

The unfortunate truth of increased technology use in the workplace is that there is a corresponding increase in the potential for cybercrime, more specifically identity theft, to strike the workplace. The question is, what can you do to help prevent it, and how should you react to it should it strike?

How You Can Help an Identity Thief
There are plenty of ways that an identity thief can gain the information they need to successfully take control of one of your accounts or some of your critical data. First of all, many businesses have a tendency to collect more data than they actually need from their contacts and employees. This only gives the identity thief more ammunition. Furthermore, many businesses underestimate the lengths that an identity thief will go to in order to collect the information that they need. Frankly, just throwing out documentation won’t stop someone who isn’t above dumpster-diving. Any paper records should be cross-shredded before they are disposed of.

Of course, paper records are a relatively easy way for an identity thief to get what they want in almost any circumstance. Therefore, it makes much more sense to keep your documentation stored digitally, protected by passwords and encryption that stands up to best practices.

What to Tell Your Clients if Their Identities Are Stolen on Your Watch
Unfortunately, even the smallest error can lead to a security breach, which means that you may have to inform your clients that their information has been stolen. To help them further, you will want to advise them to take the following steps immediately.

Notify Affected Banks or Creditors
One of the first orders of business that needs to happen if financial information could have been leaked is to contact the bank or credit card provider that manages the account. Your contact will want to deactivate these accounts before whomever it was that stole their identity accesses them again.

Time is of the essence, as they will need to report the theft and any unauthorized charges within two days of the unauthorized transactions to limit their liability to $50. If they report the theft before any transactions are made, they will not be liable for any activity on that account until the matter is settled.

Managing Credit Reports
Any client whose data was potentially stolen should work on managing their credit reports. First, have a fraud alert put on your account by one of the major credit reporting agencies. This will automatically provide you with a credit report from all three of these agencies, which you should check for warning signs of fraud. If your reports show credit inquiries that you didn’t make and other unexplainable activity, report the identity theft to remove the transactions and activities you are not responsible for. You may also want to consider requesting a credit freeze to prevent the credit agencies from releasing your credit information to new creditors.

Fill Out and Distribute ID Theft Report
While the FTC (Federal Trade Commission) may only follow up on larger fraud cases, they also monitor identity theft cases to try and identify suspicious patterns that suggest the involvement of organized crime. The FTC’s website also has a link to a form that will produce an identity theft complaint. Once you have that complaint, secure a police report to complete your ID theft report.

This report needs to be distributed to your creditors and credit reporting agencies, and these accounts need to be monitored to ensure that false information doesn’t persist.

Locking Down Accounts
Of course, as with any account breach, you need to update your account passwords to keep your accounts secure. Furthermore, not only should you report any false use of your Social Security Number, you should also ensure that no additional accounts have been opened in your name for any utilities, as the bill for these services can be used as proof of residence to open a new account.

Identity theft is no laughing matter, and you certainly don’t want your business to be responsible for it. For assistance with your data security solutions, call Voyage Technology at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 03 April 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Hardware Internet Efficiency IT Support Malware Privacy Google Email Phishing Workplace Tips Computer Collaboration IT Services Hosted Solutions Users Mobile Device Ransomware Quick Tips Workplace Strategy Small Business Cybersecurity Microsoft Passwords Communication Data Backup Smartphone Backup Saving Money VoIP Business Management Smartphones Android Upgrade Mobile Devices communications Disaster Recovery Managed Service Data Recovery Browser Managed IT Services Social Media Microsoft Office Windows Remote Network Tech Term Internet of Things Automation Artificial Intelligence Facebook Current Events Productivity Covid-19 Cloud Computing Server Managed Service Provider Remote Work Miscellaneous Gadgets Information Outsourced IT Holiday AI Employee/Employer Relationship Encryption Spam Windows 10 Compliance Business Continuity Data Management Government Training Office Business Technology Blockchain Bandwidth Windows 10 Virtualization Wi-Fi Mobile Office Data Security Apps Two-factor Authentication Chrome Mobile Device Management Vendor Budget Gmail Apple Networking App Managed Services Voice over Internet Protocol Employer-Employee Relationship Avoiding Downtime Office 365 Tip of the week Marketing Applications How To WiFi BDR Conferencing BYOD Computing Information Technology Hacker Access Control Office Tips Analytics Website IT Support Augmented Reality HIPAA Router Retail Storage Password Bring Your Own Device Managed IT Services Help Desk Big Data Operating System Healthcare Virtual Private Network Risk Management Computers Health Microsoft 365 Document Management Solutions Firewall Scam Data loss Windows 11 The Internet of Things 2FA Monitoring Excel Going Green Patch Management Social Save Money Remote Monitoring Remote Workers Vulnerability End of Support Vendor Management Cybercrime Telephone Customer Service Display Printer Cooperation Free Resource Project Management Paperless Office Windows 7 Infrastructure Multi-Factor Authentication Mobility Telephone System Cost Management Outlook Machine Learning Money Word Humor Employees Integration Maintenance Antivirus Modem Sports User Tip Processor Mouse Mobile Security Holidays Safety Administration Data Storage Smart Technology Supply Chain Video Conferencing Managed Services Provider Saving Time Virtual Machines Professional Services Robot Settings Printing Managed IT Service Wireless Content Filtering IT Management Customer Relationship Management Downloads VPN YouTube Meetings iPhone Physical Security Licensing Cryptocurrency Entertainment Vulnerabilities Hacking Computer Repair Data Privacy Presentation Images 101 Virtual Desktop Data storage LiFi Wireless Technology Windows 8 Social Networking IP Address Laptop Websites Legislation Shortcuts Organization Fileless Malware Digital Security Cameras Drones Smart Devices Ransmoware Electronic Medical Records SharePoint Content Remote Working Wearable Technology Memory Vendors Motherboard Data Breach Halloween Comparison Google Play Be Proactive Recovery Health IT Directions Videos Lenovo Assessment Electronic Health Records Permissions Workforce Hard Drives Writing Virtual Reality Wasting Time Threats Domains Hacks Server Management Trend Micro Scary Stories Private Cloud Specifications Security Cameras Workplace Strategies Microchip Superfish Internet Exlporer Software as a Service Identity Theft Fraud Meta Refrigeration Fun Twitter Username Deep Learning Managing Costs Amazon Public Speaking eCommerce Lithium-ion battery Error Black Friday SSID Database Surveillance Education Virtual Assistant Outsource IT Social Engineering Entrepreneur Remote Computing Media IT Technicians Virtual Machine Environment Mobile Computing Cookies Cyber Monday Medical IT Proxy Server Reviews Tactics Development Tablet Hotspot Transportation Small Businesses Undo Search Alert Best Practice Mirgation Hypervisor Displays Managed IT Nanotechnology Optimization Buisness File Sharing PowerPoint Dark Data Shopping Legal Addiction IT solutions Language Employer/Employee Relationships Outsourcing How To Notifications Navigation Management PCI DSS Business Growth Chatbots Gig Economy Screen Reader Travel Distributed Denial of Service Workplace Application Techology Service Level Agreement Internet Service Provider Google Maps Computing Infrastructure Teamwork Hiring/Firing Cortana Identity IBM Evernote Paperless Regulations Compliance Alt Codes Bookmark Smart Tech Memes Downtime Unified Threat Management Co-managed IT Unified Threat Management Download Net Neutrality Hosted Solution Alerts SQL Server Technology Care Typing History Business Communications Financial Data Browsers Smartwatch Connectivity IT Break Fix Scams Network Congestion Knowledge Google Drive User Error Upload Procurement Azure Hybrid Work Competition Cyber security Multi-Factor Security Tech Human Resources Social Network Telework CES IoT Communitications Point of Sale Dark Web Cables 5G Experience Google Docs Trends Supply Chain Management Unified Communications Bitcoin Network Management Regulations Running Cable Tech Support Google Calendar Term Google Apps User Customer Resource management FinTech Data Analysis Google Wallet Star Wars IT Assessment Microsoft Excel IT Maintenance Monitors Gamification Flexibility Staff Value Business Intelligence

Blog Archive