Valentine’s Day ID Theft Preparedness

In the wake of the “truth is stranger than fiction” Manti T’eo story and the upcoming Valentine’s holiday, it seems like an opportune time to review some basic online safety precautions.  Not to mention, MTV’s “Catfish” show chronicles stories of people falling in love online and being fooled when they discover the person they’ve been talking to  for months –even  years – isn’t the person they thought it was.

These stories show just how easy it is to create a persona online: Pick a name. Find a photo of an attractive person online. Create an account on a social networking site.

The first lesson when doing anything on line is: STOP. THINK. CONNECT. Take a moment to really process the information and think things through before you jump headfirst into a relationship.

Here are some other tips:

  • Own your online presence.  Set the privacy and security settings on websites to your comfort level for information sharing. It’s okay to limit how people can find you or communicate with you.  If someone you don’t recognize wants to connect with you, think twice before hitting the “accept” button.
  • If something seems too good to be true, it probably is. Often it pays to be the skeptic. If an attractive person contacts you out of the blue on a social networking site and starts professing their love for you within days of meeting, this should raise a red flag. Chances are the person doesn’t look a thing like they do in photos and in extreme cases, may be trying to con you.
  • Think before you act. If they tell you a sob story about losing their job or a sick relative, this should also raise a red flag. They could be trying to get you to wire them money or give them access to your bank account.
  • Protect your personal information. You wouldn’t tell a stranger on the street your home address, ATM pin number, or social security number, would you? The same rule applies online. Even if you have been talking to someone for a while and don’t think of them as a “stranger,” you still need to be wary, especially if you’ve never met in person.
  • Do your own research.  Pretend you’re a private investigator and do some digging.  Type the person’s name into a search engine and see what comes up. Drag their photo into Google image search. The results could surprise you.
  • Be a good online citizen. What you do online has the potential to affect everyone – at home, at work and around the world. Practicing good online habits benefits the global digital community.
  • Post only about others as you have them post about you.

In the unfortunate (and rare) situation that you become the victim of fraud, you can learn how to get your life back on track with our Victims of Cybercrime Tip Sheet.

For more on identity theft precautions visit www.hvshred.com

Reviewing the Importance of Strong Passwords

In another installment of keeping identities safe, this week we review some of the best practices for safe password selection and management. Surprisingly, even in today’s security-conscious environment, the word “password” and the sequence “123456” remain some of the most common passwords!  That makes for funny movie moments (Spaceballs is one of my favorites), but could lead to heartache in the real world.

Here are some basic guidelines to take into account when selecting a password.  Different services may have different requirements, but we always recommend choosing a unique password that is as strong as possible, whether it is for a social media account, e-mail address, or network login.

DO

  • Select passwords that include a combination of upper and lowercase alphabetic characters, symbols, and numbers.
  • Rotate your passwords regularly. Best is to change passwords every sixty days, but rotating them every six months will put you way ahead of most others.
  • Develop a difficult-to-guess but easy-to-remember password that incorporates memory devices.

DO NOT

  • Use all or part of your name in your password.
  • Use a password of all numbers or a single, repeated letter.
  • Use a word contained in any dictionary.
  • Use a password with a length under six characters.
  • Reuse or recycle passwords.

One of the best defenses to password attacks is to select an appropriate length. If an attacker is working to gain access and the dictionary attack method has failed (where words from a dictionary are automatically attempted), a brute force attack will likely be the next step. Brute forces attacks involve cycling through all possible password combinations until the correct one is found. For this reason, the longer the password, the longer it will take a cracking algorithm to successfully guess your password.

But even if we follow all the recommended guidelines and best practices (i.e. selecting an unpredictable password with a length greater than 6 characters and a combination of upper and lowercase letters, numbers, and symbols) we are still missing a premise: a password should be easy to remember.

Writing down your password is highly discouraged, and something like “H$%^j1@” is not going to be easily remembered. One solution to this issue might be to turn a sentence into a password, also called a “pass phrase”. For example if your favorite song is “Glory Days” the password might be “G10reD@z” It’s certainly a complex password, and it is one that can be remembered.

Data security isn’t just something we focus on once a year – it’s something that we need to keep in mind every day. 

For more tips and best practices, please visit www.hvshred.com

File Early to Avoid ID Theft Related to Tax Fraud

Yes, we are in the full swing of tax preparation season! Again with thanks to the Identity Theft Resource Center, we share the following tips to help our community avoid the frustration and expense of dealing with a growing id theft trend.  ID theft fraud occurs when an identity thief somehow obtains your name and Social Security number and uses this information to file a fraudulent tax return in your name. Tax fraud resulting from identity theft can affect individuals or businesses and often the same information can be used to commit tax fraud against both.

There are many ways that identity thieves can steal your information including: phishing emails, snooping through your trash for intact documents, hacking into an entity that has your personal information, stealing or finding your wallet/purse, public WiFi monitoring, changing the designated agent of business entities and the list goes on. Once your personal or business information has been stolen, identity thieves can use this information to file fraudulent tax returns to the IRS and other tax authorities in order to receive credits or refunds. The identity thieves prefer to have the funds distributed by the IRS in the form of a pre-loaded debit card or a direct deposit which helps them avoid having to deal with security measures related to cashing a paper check. After receiving money from the fraudulent filings the identity thieves will disappear, leaving the victim individual or business owner without their refund or with substantial bills owed to the tax authorities.

The most common issue people face is a delay of their anticipated refunds. When an identity thief files your tax returns before you do, the tax return you file yourself comes under suspicion as it is a second return filed for the same taxpayer. The IRS will require that you send them an IRS Identity Theft Affidavit (Form 14039) with proof of your identity in order to confirm that you indeed are the real taxpayer. This process can be lengthy and your refund will not be processed until you are confirmed by the IRS to be the actual taxpayer. Other consequences of this crime can be severe as victims can also be left to deal with any resulting collection actions, audits, and the possibility of fighting aggressive tax collection through the IRS appeals process.

In late 2012, after the IRS reported that it had identified 642,000 tax returns affected by identity theft. The total number and cost of fraudulent returns is hard to determine because the IRS can count the number of identity theft related incidences they discover, but they have no accurate way of determining how many they are missing. What you can do to minimize your risk of identity theft related tax fraud is to simply file your tax return first. This effectively turns the tables on the identity thief as your return will be accepted by the IRS and the criminal’s fraudulent return in your name will be denied. Now it will be incumbent upon the identity thief to provide information proving that they are indeed you, which will most likely end their attempt to defraud you and the IRS. Try to file your return as early as possible and you will be well on your way to avoiding tax fraud this tax season!

For more information on ID Theft Prevention please visit www.hvshred.com You will also find resources at ITRC

Detecting Identity Theft Scams

We regularly check in with the latest tips from the Identity Theft Resource Center and share what we learn in this blog.  According to “Solution #25”, what follows is some great advice on detecting scams.

 

According to ITRC, thieves are coming up with more and more devious ways to try and trick you into giving them your personal information. What’s so important about your personal information? A crook can open up a new line of credit in your name, rent an apartment, purchase cars, homes, and other goods, get a job, get out of criminal acts, or take over your bank account. In other words, the instant you give up certain personal information to a thief, you are in jeopardy.

What information do thieves want?

  • Social Security Number
  • Bank account or credit card numbers
  • Driver’s license number
  • Insurance policy numbers (medical and auto)
  • Date of birth
  • State or employee identification number.

Here are some universal rules to keep in mind when trying to determine if something is a scam or not.

  • If it’s too good to be true, it probably is.
  • When in doubt, check it out.
  • A bank, credit card company, or utility company will never ask for your personal information by email, whether you have an account or not, period.

For more information on identity theft protection, please visit www.hvshred.com

Safe Web Surfing Tips

When we see valuable information, we like to pass it along to our community.  Recently the ITRC (Identity Theft Resource Center) published information about how web users can be more proactive protecting their privacy when they surf the web. Here are a few  of their top tips for safely using the Google Chrome Web Browser:

In order to set your privacy settings, you must find the privacy settings. When you open your Google browser, find the button at the far top right of the screen, just beyond the URL/address bar; the one that has three horizontal lines. Click that button and a drop down menu will show. Select the 4th option from the bottom that says “settings.”

This will open your settings within the webpage space itself. Find the blue hot link all the way at the bottom that says “show advanced settings.” This will prompt a longer menu to drop down, where you will see some basic privacy preferences like “enable phishing and malware protection” or “offer to save passwords I enter on the web.” These settings are preset by Google and generally speaking the default settings are appropriate for most users.

The most important area to focus on is a button immediately below the “Privacy” headline that says “content settings.” This button takes you to the meat of web browser privacy. In this subsection you’ll find the setting tables for things like internet cookies, pop-ups, location, plug- ins, and handlers. Examine this section carefully and select the settings that most conform to your level of concern.

Some people don’t mind having their web activity tracked by advertisers for the purposes of customized marketing, others do. The Google Chrome browser is highly customizable and easily adaptable in this way. Take a few minutes to examine your privacy settings, and have peace of mind next time you go online.

If you use a different browser, look for similar protections.

For more information on internet safety and identity theft prevention, please visit www.hvshred.com

Part 2: New Year’s Resolutions for Safe 2013

Finishing off the blog we started last week, we hope your 2013 is off to a good start and have 2 more suggestions for new year’s resolutions to help make 2013 a year with decreased identity theft. 

#3. Give your computer a fresh start: There are all kinds of nasty viruses out there which identity thieves use to commit their crimes. The best line of defense against these crooks is to be sure that you have an up-to-date antivirus installed on your computer. Make sure all of the recommended patches are also updated and that your wireless network has a good strong password.

#4. Especially because its FREE monitor your credit reports. One of the best ways to nip ID theft in the bud is by monitoring your credit reports. You can do this for free at www.annualcreditreport.com . There are three major credit reporting agencies and consumers can receive one free report from each, every year. If you stagger your requests and pull one every four months, you can monitor your credit for free.

Again, here’s to a safe and happy New Year!

For more information on identity theft protection, visit www.hvshred.com

New Year’s Resolutions for a Year Safe from ID Theft

As we say goodbye to 2012 and welcome in 2013, we suggest you include some new year’s resolutions to help make 2013 a year with decreased identity theft.  In a two part series to kick off 2013, we have recommendations for making 2013 a year you steer clear of id theft.

Here are the first two examples of resolutions you can make to make sure your 2013 isn’t marred by a nasty case of identity theft.

1. Just because it’s a good idea anyway—and can be really cathartic, consider clearing out your wallet: Many people carry items in their purse or wallet that leave them vulnerable to identity theft. Take the time to remove your Social Security card, checkbook, passport, extra credit cards, and anything else with personal identifying information. If you want to take this one step further, make an inventory of what is still left in your wallet so that if it is stolen you will easily be able to notify creditors, take protective measures and obtain replacements.

2. More and more of our trusted vendors are forcing us to do it anyway-so take the intiative and change your passwords.  One of the best lines of defense against having an account takeover is a strong password. Take this fresh opportunity to change your old passwords and create stronger ones. Do not use words that can be found in the dictionary. Hackers can run a program that goes through the entire dictionary very quickly and crack any password which can be found in the dictionary. Use numbers, upper and lower case letters, punctuation in your passwords. Don’t forget that the longer the password, the harder it is to crack. Create different passwords on each of your accounts. If you have trouble remembering all of these passwords you can look into using a password manager.

Again, here’s to a safe and happy New Year!

For more information on identity theft protection, visit www.hvshred.com

Something You Don’t Need to Buy this Holiday Season

If you follow this blog, you know we find Consumer Reports to be a valuable resource for reliable information.  While you are budgeting for your holiday gifts, we hope you are relieved to hear you can bypass the ID theft protection products on the market.  According to Consumer Reports, Americans spent $3.5 billion in 2010 to buy products that are claimed to protect their identity. 

Time has shown that do-it-yourself safeguards are just as effective as paid services.  Many of the purported ID Theft products have been fined extensively by the government for deceptive marketing practices–Capital One, Discover Financial Services, Lifelock and others.   Remember, you are eligible for a free credit report from each of the three reporting agencies every year.  If you spread it out, that’s one every 4 months.  You can also sign up for free online banking and mobile apps to monitor your checking and credit accounts daily.

The most important tool you have is vigilance.  Keep an eye on your accounts.

When it’s time to discard personally identifying paperwork, the most secure method is to shred and recycle the paperwork.  That one-two punch ensures your confidential data will not get into the wrong hands.  For more information on shredding and recycling services, visit www.hvshred.com

Don’t Let Scams Spoil Holiday Cheer

 

The holidays should be a time to celebrate good times and be merry.  This week, we reinforce a theme we touch on regularly–scams to watch out for.

This time of year many of us are taking a look at our investments–especially as we prepare for tax season and consider the forecasted increase in capital gains taxes.  Investor-seminar scams promote themselves as “educational opportunities” with the added enticement of free food, entertainment, and even travel promos.  They then promise to show how to to turn mud into gold.  Well, they’re not all that bad, but many times the opportunities are misleading and/or inappropriate for attendees.

The best way to protect yourself is to deal only with long-time, trusted financial advisers.  Never sign a blank authorization form or anything else you don’t understand.  Your private information in mischievous hands will likely cause seemingly endless aggravation at best and financial ruin at worst.

It may not always seem most economical on the surface, but there truly is something to using a local business.  People in your neighborhood have an added incentive to provide service and quality and will often save you money in ways you’ll never know because you didn’t have to go through the heartache of being swindled by the company hoping to capitalize on the gimmick sale.

In this holiday season, think local first and get value and feel good about supporting your community and getting exactly what you need and what you want.

For more on identity theft protection, visit www.hvshred.com

 

Thanks for helping HV Shred Grow and reach 5th Anniversary

As we celebrate our 5th full year of service, this week, we’d like to take a moment to thank our community for making HV Shred a company that has grown despite the poor economy. 

 How can HV Shred have added payroll and purchased 2 new trucks in the last 2 years?  Through the support of a community that is solidly behind “Think Local First” and because document security has become vital to businesses large and small.

Despite getting started in the worst economic times in recent history, we are proud to have been able to increase our payroll every year since our inception in 2008 as well as having now purchased our third mobile shredding truck.

We know worse than paying taxes is paying fines and losing the trust of customers barely skims the surface.  Lots of talk about taxes and the fiscal cliff but businesses need to make sure they are wary of one of their most important assets—their reputations!  Dumpster divers, deficit mired government agencies, and even networks on slow news days are all quick to capitalize on businesses that don’t securely dispose of their confidential paperwork.

Though the economy is supposedly on the rebound, the fact is, many people are still struggling and that too often leads to increases in criminal activity.  Also a fact, criminals tend to go for the easy score—like dumpster diving.  Businesses that haven’t taken steps to securely dispose of their confidential paperwork are not only at risk for huge government fines (Uncle Sam is looking for easy money too!), but also more damaging loss of trust and business from clients/customers/patients. 

Investing in data security is simply a necessity.

If sensitive data falls into the wrong hands, it can lead to fraud, identity theft, or similar harms.  Given the cost of a security breach—losing clients’ trust and perhaps even defending yourself against a lawsuit—safeguarding confidential information is just plain good business.

We are all in this together.  Every businessperson be they a lawyer, doctor, banker, insurance broker, or dog trainer is also someone else’s client or patient or customer.  These key principles are fundamental to protecting our local and global community from the pitfalls of private information getting into the wrong hands.  There is a wealth of information available at www.hvshred.com and www.ftc.gov    

Not to mention, all the shredded paper is recycled—helping support efforts towards more sustainable businesses practices across the board.  Already this year, HV Shred clients have helped recycle over 400 tons of paperwork.