Identity Theft and Children in the Digital World

Primarily, HV Shred services businesses. Nevertheless, our goal is to help educate our community on best practices when it comes to identity theft. Education of our youth is key to a future of savvy adults who are in many ways already stewards for protecting private information.

In this case, a new summer movie is a great conversation starter. The Bling Ring, starring Emma Watson and directed by Sofia Coppola, is based on the true story of a group of teenagers who used social media to identify celebrities who weren’t at home – and then rob them.

The plot combines many elements that appeal to teens: Hollywood, celebrities, luxury, fashion, and naïve recklessness. Parents can find a takeaway, too – the opportunity to speak with their teens about the information they share online and the risks involved. As The Bling Ring demonstrated, what is posted online can lead to unintended consequences (such as, in Paris Hilton’s case, the theft of $2 million in jewelry).

First and foremost, strongly suggest your child limit how and with whom he or she shares information. Encourage your teens to set the privacy and security settings on accounts to their comfort level for information sharing.
The Bling Ring crew used publicly accessible social media posts by celebrities to determine their whereabouts and then burglarized vacant homes. While your family may not be targeted the way Hollywood celebrities are, don’t make the same mistake. A post like, “Going away with the family for Fourth of July!” or posting pictures from your hotel could serve as a helpful tip for a prowling burglar if they’re able to read it.

Protect Your Personal Information

Personal information posted online can be misused in a lot of unpleasant ways, including identity theft and stalking. According to the Center for Missing and Exploited Children, two in five missing teenagers ages 15 to 17 are abducted in connection with some kind of Internet activity.

Encourage your teen to be cautious about the personal information they share on social networking sites. Your teen should never reveal his or her address or phone number and use extra precautions to meet an online acquaintance, like going with a group of friends. Remind your teen not to accept friend requests from people they do not know.
Children and adults alike need to work together to protect personally identifying information.

For more tips on best practices in the world of identity theft prevent, please visit www.hvshred.com

Rotary Shred Event September 28th

It is with great pleasure we announce a Community Shred Event to benefit the Poughkeepsie Arlington Rotary hosted by LaGrange Pharmacy and Bridgeway Federal Credit  at the new plaza at the junction of Routes 82 and 55 in LaGrangeville, NY.

On-site shredding service will be provided by HV Shred, Inc from 9am-noon.  100% of the suggested $10 per box/bag donation will go to the community improvement projects run by the Poughkeepsie Arlington Rotary.

No need to worry about staples, paperclips, spiral notebooks, or even bank books.  HV Shred’s high tech shredding knives can easily shred through all that.  In addition, all the shredded paper is recycled helping to preserve and protect our local and global environment.

For more information, please contact Judith a (845) 705-7279

We’re looking forward to a big crowd so we can fully fund all the Poughkeepsie Arlington Rotary programs in the upcoming year.

Help us make it a success–and protect your identity and the earth as well!

See you Saturday, September 28th 9am-noon at 1520 Route 55 in LaGrangeville NY 12540

Medical Identity Theft-Tips and Tools

Another of our favorite sources for ID Theft information is the Identity Theft Resource Center.   This week’s blog is credited to Sam Imandoust, Esq, a legal analyst from ITRC.  Sam warns about prescription fraud–when an identity thief, using your personal information, has a prescription issued and possibly filled under your name.

An identity thief using your identity to be prescribed restricted medications, may also use your health insurance to purchase the medication. This means that you, the victim, will often get left with the bill for any unpaid expenses the identity thief incurs while using your identity and medical insurance.

It is important to be alert for any explanation of benefits (EOB) you receive from your health insurance provider or bills for medical services you did not seek or receive. This may be your best warning that an identity thief is abusing your medical identity and insurance.

Unfortunately, there are worse consequences to being a victim of prescription fraud than bearing the brunt of fraudulent medical bills. When an identity thief uses your medical identity to be prescribed medication, this information will be incorporated into your health record. Any subsequent medical personnel looking at your record will see the new prescriptions and make medical decisions based on this fraudulent record. Prescription fraud victims have discovered they were victims of identity theft and prescription fraud after their pharmacy refused to fill their current, valid prescription because it conflicted with another medication prescribed to the identity thief.

The best defense to prescription fraud or any identity theft is to be keenly aware of your personal information. Any documents that contain personal information such as your birth date, Social Security number, driver’s license number, or insurance plan information, should be stored somewhere safe and secure or shredded when no longer needed. Do not carry your Social Security card, military identification, or Medicare card on your person as they have your Social Security number on them and are extremely helpful in the hands of an identity theft. New military identification cards no longer have Social Security numbers on them, so if you have an old military ID you can always renew your card to reduce your risk of identity theft.

For more on identity theft best practices, please visit www.hvshred.com

Balance Convenience of Wi-Fi with Safety

One of our newest favorite blogs to follow is Staysafeonline.org.  In a recent post by Emily Eckland, Director of Digital Strategy & Awareness Campaigns, she shared valuable tips for using Wi-Fi spot while vacationing this summer.  It’s a great convenience to be able to use our devices in airports, hotels, train stations, coffee shops and other public places, but be aware they’re often not secure.

Be cautious when connecting to Wi-Fi hotspots and mindful that you’re likely online through an unsecured or unprotected network.

Tips she advises:

•Keep a clean machine. Having the latest security software, operating system, web browser and apps is the best way to protect yourself from the malware and other threats you may encounter when using public Wi-Fi.

•Be wary of the sites you visit and the information you share while doing so.  When entering personal information over the Internet (logging into email or social networking sites or banking or shopping), make sure the website is encrypted. Encrypted websites use https://.  Look for https:// on every page, not just the login or welcome page.  You can force a website to https:// by adding the “s” in front of URL.

•Avoid connecting to hotspots that don’t seem legitimate or are misspelled.  It’s not uncommon for cybercriminals to set up Wi-Fi hotspots called “free Wi-Fi” in airports and hotels.

•Be wary of pop-up windows that prompt you to accept and install software updates when using hotel Internet connections. Last year, the FBI and the Internet Crime Complaint Center issued a warning about a rise in malware being installed on travelers’ laptops.

•Remember, a 3G/4G connection is safer than an unsecured Wi-Fi connection when shopping, banking and using other websites that access personal information.

•Consider turning off features on your computer or mobile devices that allow you to automatically connect to Wi-Fi.

•Turn off Bluetooth when you’re not using it. Bluetooth-enabled devices like headsets and wireless keyboards are great accessories for traveling, but can leave you and your personal information at risk. When these devices are not in use, turn off the Bluetooth setting on your phone or tablet. If you leave the functionality on, cybercriminals can pair with your device’s open connection and steal personal information.

For more on ways to protect your personal information and stay safe from ID Theft, please visit www.hvshred.com

Keep Life Simple and Limit Exposure to Identity Theft

On the HV Shred blog, we frequently repeat  the tips for best practices regarding identity theft and it always feels like a good time for a reminder.

First of all, keep private paperwork under lock and key. At home and at work be mindful to find a safe place for your wallet or purse.

Live the simple life and limit what you carry. Take only the identification, credit, and debit cards you need. Leave your Social Security card at home. Make a copy of your Medicare card and black out all but the last four digits on the copy. Carry the copy with you  — unless you are going to use your card at the doctor’s office.

It’s YOUR personal information and it helps to demonstrate to your fiduciaries that you care what happens to it and they should too.  Before you share information at your workplace, a business, your child’s school, or a doctor’s office, ask why they need it, how they will safeguard it, and the consequences of not sharing.

Shred receipts, credit offers, credit applications, insurance forms, physician statements, checks, bank statements, expired charge cards, and similar documents when you don’t need them any longer.

Destroy the labels on prescription bottles before you throw them out. Don’t share your health plan information with anyone who offers free health services or products.

Take outgoing mail to post office collection boxes or the post office. Promptly remove mail that arrives in your mailbox. If you won’t be home for several days, request a hold on your mail.

When you order new checks, don’t have them mailed to your home, unless you have a secure mailbox with a lock.

Consider opting out of pre-screened offers of credit and insurance by mail.

Simplicity will help limit exposure–when the volume of shredding is beyond what your office shredder can handle, consider contacting us at HV Shred.  www.hvshred.com.  In addition to security, we recycle everything we shred–helping clients go green too!

Summer Cleanouts Made Secure and Environmentally Friendly

June was one of our busiest months ever, and it was a win/win for everyone.  When we shred and recycle more paper, we help secure our community from identity theft and the expense of breaches plus we reduce the pressure on local landfills.  In the month of June our clients helped the Hudson Valley save over 1000 trees and over 150 cubic yards of landfill.

Summertime is an active time to throw on old clothes and do some cleaning out. If that process includes the disposal of confidential paperwork, please check out the resources available at hvshred.com.  Our service not only adds security to the project but also includes the labor of bringing the boxes/bags up from basements and down from attics.

Please let us know if we can be of service.  Visit www.hvshred.com

Internet Safety Month and Best Practices for ID Theft Prevention

It’s the tail end of June and in case you didn’t know, June is celebrated as the official month to raise awareness for Internet Safety.  Safety is a theme for this blog, and borrowing from the National Cyber Security Alliance (NCSA) we want to use our last June blog to reinforce internet safety best practices.

As the members of our community transition through graduations from high school and college and couples start new lives together, let’s also pause to remind ourselves about Internet Safety. It goes a long way to identity theft prevention.

It’s all about a safer and more secure summer online. The NCSA encourages everyone to STOP. THINK. CONNECT.

Take security precautions, understand the consequences of your actions and behaviors and have a great summer connecting and enjoying the Internet.

Here are some easy ways to stay safer and more secure online. You should know them and share them with your family and friends:

  • Keep a Clean Machine: Keep all Internet connected devices free from infection and malware by keeping all critical software—security software, web browsers, apps and operating systems—up to date.
  • Protect Your Personal Information: Secure your accounts by making passwords long, strong and unique.
  • Connect with Care: Limit the type of business you conduct using unsecure Wi-Fi hotspots.
  • Own Your Online Presence: Set security and privacy settings to your comfort level of sharing.
  • When in Doubt, Throw it Out: If an email, social network post or text message looks suspicious, even if you know the source, delete it.
  • Be Web Wise: Be wary of communications that implore you to act immediately, offer something that sounds too good to be true, or ask for personal information.
  • Be a Good Online Citizen: Post only about others what you would have them post about you.

Visit hvshred.com for more information on identity theft prevention.

Summertime Still Time to Be Vigilant

Schools are out across the country and we shift into the slower pace and summer vacations.  Still, we want to remind our community members these are still times to be vigilant.

Many of the top vacation destinations are also the top destinations for pick-pockets. If you are on vacation then don’t take any more information in your wallet than you really need. Pick-pockets would like your cash but even better is your information. They can use it themselves or sell it to an identity theft ring.

Keep your wits about you and as little ID as possible on you and you’ll be sure to have a better summer!

For more information on id theft best practices please visit www.hvshred.com

Cyber Criminals Use Photo-Sharing Programs to Perpetrate Scams

Since we have found it a valuable resource, we are once drawing our blog from the Internet Crime Complain Center (IC3).  According to IC3, the FBI has seen an increase in cyber criminals who use online photo-sharing programs to perpetrate scams and harm victims’ computers. These criminals advertise vehicles online but will not provide pictures in the advertisement. They will send photos on request. Sometimes the photo is a single file sent as an e-mail attachment, and sometimes the victim receives a link to an online photo gallery.

The photos can/often contain malicious software that infects the victims” computer, directing them to fake websites that look nearly identical to the real site where they originally saw the advertisement. The cyber criminals run all aspects of these fake websites, including “tech support” or “live chat support,” and any “recommended” escrow services. After the victim agrees to purchase the item and makes the payment, the criminals stop responding to correspondence. The victims never receive any merchandise.

The FBI urges consumers to protect themselves when shopping online. Here are a few tips for staying safe:

  • Be cautious if you are on an auction site and lose an auction and the seller contacts you later saying the original bidder fell through.
  • Make sure websites are secure and authenticated before you purchase an item online. Use only well-known escrow services.
  • Research to determine if a car dealership is real and how long it has been in business.
  • Be wary if the price for the item you’d like to buy is severely undervalued; if it is, the item is likely fraudulent.
  • Scan files before downloading them to your computer.
  • Keep your computer software, including the operating system, updated with the latest patches.
  • Ensure your anti-virus software and firewalls are current – they can help prevent malware infections.

 

For more information on how to stay safe from identity theft please visit www.hvshred.com

Recent Phishing Attacks Target Telecommunications Customers

Those familiar with this blog know we like to share relevant information from credible organizations focused on fighting identity theft.  One such Organization is the Internet Crime Complaint Center (IC3).  As a review of past posts, IC3 is a partnership between the Federal Bureau of Investigation (FBI), the National White Collar Crime Center (NW3C) and the Bureau of Justice Assistance (BJA). Since its start in 2000, IC3 has become a mainstay for victims reporting Internet crime and a way for law enforcement to be notified of such crimes. IC3’s service to the law enforcement community includes federal, state, tribal, local, and international agencies that are combating Internet crime.

 

In a recent release, IC3 publicized that it had received numerous reports of phishing attacks targeting various telecommunication companies’ customers. Individuals receive automated telephone calls that claim to be from the victim’s telecommunication carrier. Victims are directed to a phishing site to receive a credit, discount, or prize ranging from $300 to $500.

 

The phishing site is a replica of one of the telecommunication carrier’s sites and requests the victims’ log-in credentials and the last four digits of their Social Security numbers. Once victims enter their information, they are redirected to the telecommunication carrier’s actual website. The subject then makes changes to the customer’s account.

 

The IC3 urged the public to be cautious of unsolicited telephone calls, e-mails and text messages, especially those promising some type of compensation for supplying account information. If you receive such an offer, verify it with the business associated with your account before supplying any information. Use the information supplied on your account statement to contact the business

 

For more on identity theft protection, please visit www.hvshred.com