Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Do You Know What to Do When Involved in Identity Theft?

Do You Know What to Do When Involved in Identity Theft?

The unfortunate truth of increased technology use in the workplace is that there is a corresponding increase in the potential for cybercrime, more specifically identity theft, to strike the workplace. The question is, what can you do to help prevent it, and how should you react to it should it strike?

How You Can Help an Identity Thief
There are plenty of ways that an identity thief can gain the information they need to successfully take control of one of your accounts or some of your critical data. First of all, many businesses have a tendency to collect more data than they actually need from their contacts and employees. This only gives the identity thief more ammunition. Furthermore, many businesses underestimate the lengths that an identity thief will go to in order to collect the information that they need. Frankly, just throwing out documentation won’t stop someone who isn’t above dumpster-diving. Any paper records should be cross-shredded before they are disposed of.

Of course, paper records are a relatively easy way for an identity thief to get what they want in almost any circumstance. Therefore, it makes much more sense to keep your documentation stored digitally, protected by passwords and encryption that stands up to best practices.

What to Tell Your Clients if Their Identities Are Stolen on Your Watch
Unfortunately, even the smallest error can lead to a security breach, which means that you may have to inform your clients that their information has been stolen. To help them further, you will want to advise them to take the following steps immediately.

Notify Affected Banks or Creditors
One of the first orders of business that needs to happen if financial information could have been leaked is to contact the bank or credit card provider that manages the account. Your contact will want to deactivate these accounts before whomever it was that stole their identity accesses them again.

Time is of the essence, as they will need to report the theft and any unauthorized charges within two days of the unauthorized transactions to limit their liability to $50. If they report the theft before any transactions are made, they will not be liable for any activity on that account until the matter is settled.

Managing Credit Reports
Any client whose data was potentially stolen should work on managing their credit reports. First, have a fraud alert put on your account by one of the major credit reporting agencies. This will automatically provide you with a credit report from all three of these agencies, which you should check for warning signs of fraud. If your reports show credit inquiries that you didn’t make and other unexplainable activity, report the identity theft to remove the transactions and activities you are not responsible for. You may also want to consider requesting a credit freeze to prevent the credit agencies from releasing your credit information to new creditors.

Fill Out and Distribute ID Theft Report
While the FTC (Federal Trade Commission) may only follow up on larger fraud cases, they also monitor identity theft cases to try and identify suspicious patterns that suggest the involvement of organized crime. The FTC’s website also has a link to a form that will produce an identity theft complaint. Once you have that complaint, secure a police report to complete your ID theft report.

This report needs to be distributed to your creditors and credit reporting agencies, and these accounts need to be monitored to ensure that false information doesn’t persist.

Locking Down Accounts
Of course, as with any account breach, you need to update your account passwords to keep your accounts secure. Furthermore, not only should you report any false use of your Social Security Number, you should also ensure that no additional accounts have been opened in your name for any utilities, as the bill for these services can be used as proof of residence to open a new account.

Identity theft is no laughing matter, and you certainly don’t want your business to be responsible for it. For assistance with your data security solutions, call Voyage Technology at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 25 April 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud User Tips Network Security Internet Hardware Efficiency IT Support Malware Privacy Google Email Workplace Tips Phishing Computer IT Services Collaboration Hosted Solutions Users Mobile Device Ransomware Quick Tips Workplace Strategy Microsoft Cybersecurity Small Business Passwords Communication Data Backup Smartphone Backup Saving Money Android Business Management VoIP Smartphones communications Upgrade Managed Service Mobile Devices Disaster Recovery Data Recovery Browser Managed IT Services Social Media Microsoft Office Windows Remote Network Tech Term Internet of Things Current Events Artificial Intelligence Facebook Automation Productivity Cloud Computing Covid-19 Gadgets Server Managed Service Provider AI Remote Work Miscellaneous Information Holiday Outsourced IT Employee/Employer Relationship Encryption Spam Compliance Office Windows 10 Government Data Management Training Business Continuity Wi-Fi Blockchain Windows 10 Bandwidth Virtualization Business Technology Data Security Two-factor Authentication Mobile Office Apps Networking Mobile Device Management BYOD Vendor Chrome Gmail Budget Apple App Employer-Employee Relationship Managed Services Voice over Internet Protocol Computing Hacker How To Information Technology Avoiding Downtime BDR Marketing Office 365 IT Support Applications Access Control WiFi Tip of the week Conferencing Computers Managed IT Services Risk Management Website Analytics Office Tips HIPAA Router Augmented Reality Virtual Private Network Storage Password Bring Your Own Device Health Help Desk Big Data Retail Healthcare Operating System Excel Cooperation Free Resource Project Management Windows 7 Patch Management Save Money Microsoft 365 Remote Monitoring Vulnerability End of Support Vendor Management Solutions Firewall Physical Security Display Printer Paperless Office The Internet of Things Infrastructure Monitoring Social Document Management Going Green Remote Workers Windows 11 Telephone Customer Service Scam 2FA Data loss Cybercrime YouTube Presentation Entertainment Vulnerabilities Cryptocurrency Wireless Technology Images 101 Telephone System Virtual Desktop Multi-Factor Authentication Robot Mobility Data storage LiFi Cost Management Word Outlook IT Management VPN Employees Meetings Data Privacy Money Humor Integration User Tip Modem Safety Processor Computer Repair Mobile Security Sports Holidays Mouse Data Storage Administration Smart Technology Video Conferencing Machine Learning Managed Services Provider Saving Time Virtual Machines Professional Services Customer Relationship Management Managed IT Service Maintenance Settings Wireless Downloads Printing Antivirus Content Filtering iPhone Supply Chain Hacking Licensing Cyber security Outsourcing Multi-Factor Security Tech Social Network Telework Google Drive CES User Tablet IoT Communitications Knowledge Dark Web Workplace Trends Supply Chain Management Alert File Sharing Regulations 5G Hiring/Firing Dark Data Google Calendar Term Managed IT Customer Resource management FinTech IP Address Google Docs Data Analysis Unified Communications Star Wars IT Assessment Experience How To Microsoft Excel Paperless Co-managed IT Bitcoin Gamification Flexibility Running Cable Notifications Staff Value Organization Travel Social Networking Technology Care Legislation Google Wallet Techology Fileless Malware Digital Security Cameras Recovery Google Maps Smart Devices Business Communications Wearable Technology Memory Scams Hard Drives Windows 8 Content Remote Working Laptop Health IT Unified Threat Management Motherboard Data Breach Hybrid Work Comparison Google Play Domains Drones Unified Threat Management Directions Videos Assessment Electronic Health Records Permissions Human Resources Wasting Time Cables Refrigeration Halloween Trend Micro Network Congestion Specifications Security Cameras Public Speaking Lithium-ion battery User Error Microchip Internet Exlporer Software as a Service Fraud Google Apps Managing Costs IT Maintenance Hacks Username Entrepreneur Scary Stories Point of Sale eCommerce Fun Business Intelligence Black Friday SSID Deep Learning Database Surveillance Virtual Assistant Shortcuts Tech Support IT Technicians Virtual Machine Ransmoware Undo Network Management Proxy Server Reviews Education Cookies Vendors Monitors Cyber Monday Medical IT Tactics Development Hotspot Transportation Be Proactive Websites Mirgation Hypervisor Workforce Mobile Computing Shopping Nanotechnology Optimization Search Threats PowerPoint SharePoint Application Best Practice Addiction Electronic Medical Records Language Employer/Employee Relationships Workplace Strategies Buisness Chatbots Meta Navigation Management PCI DSS IBM Legal Lenovo Gig Economy IT solutions Screen Reader Amazon Writing Distributed Denial of Service Business Growth Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Private Cloud Identity Outsource IT Evernote Server Management Regulations Compliance Superfish Bookmark Identity Theft Smart Tech Memes Cortana Environment Media Alt Codes Download Net Neutrality Twitter Alerts SQL Server Downtime Error History Small Businesses Competition Financial Data Browsers Smartwatch Hosted Solution Connectivity IT Displays Social Engineering Break Fix Typing Upload Procurement Remote Computing Azure

Blog Archive