Don’t Be Next
Most of us know or have a feeling about which parts of our community to stay away from due to their actual or perceived crime rates. Our knowledge about those areas and our instincts lead us to naturally avoid the “bad areas.” However, when it comes to avoiding crimes involving theft of our identities, we are usually clueless. Sometimes, we even make it easy for the identity thieves to turn us into victims. So how does one avoid being targeted by the “bad guys?”
Start with building a “moat” and “fort” around your computer set up:
- Start with building a “moat” and “fort” around your computer set up:
- Around your personal computer:
- Install basic protections against outside attack:
- a “firewall”
- Virus detection and elimination software
- File encryption for sensitive or personal data
- a “pop up” blocker
- Adopt best practices when communicating electronically:
- Only provide personal data on websites with “https” addresses
- Use strong passwords and protect them from off line theft or discovery
- Change your passwords periodically or whenever you think you might have been compromised
- Back up your files at least weekly and store the back up in a secure physical location or in an established and verified “cloud” site
- Only provide your social security number on sites that you know need that information for legitimate purposes, e.g., www.ssa.gov.
- Be extremely skeptical when receiving unsolicited e mails from unlikely sources that request personal information. This is known as “phishing.” This can also occur when receiving texts or phone calls. This especially so when someone identifies themselves as being with some government agency, e.g., IRS or FTB or from your alleged bank or investment advisor.
- Use a qualified IT consultant with the requisite knowledge and experience. Check their references ahead of time.
- Install basic protections against outside attack:
- Around yourself and family:
- Use a home shredder rather than merely placing items in an outgoing trash basket to prevent “dumpster divers” from getting your personal data
- Consider purchasing an identity theft protection software that monitors changes in your credit activity, applications, new accounts, etc. and reports those changes to you for a monthly fee
- If you do not engage one of the identity theft software providers then you should regularly check your credit report for accurate reporting of your accounts and balances
- Consistently use only one or two credit cards where you can check activity on daily or weekly basis for suspicious activity.
- Review your monthly bank or brokerage statements
- Learn how to reconcile your accounts and do so monthly as your statements arise.
- Check your account at Social Security at least once per year to confirm earnings credits and benefits, ensure no one has accessed your accounts.
- Protect paper copies of statements and tax returns in a locked file at your home or office. Hide the key after telling your spouse where it is hidden.
- Discard/ shred out of date or obsolete paper files
- Immediately change accounts or credit cards if you believe that you have been compromised and inform credit reporting authorities by filing a fraud alert
- Around your personal computer:
Even after implementing all these steps we can still be vulnerable to a determined thief. Remember, their job is to rob you and they have unlimited time and talent to find a way around your defenses. That’s why it is most important that you establish regular inspection and monitoring procedures.