Tax Season 2016: Time to Step Up Vigilance

As we enter tax season 2016, it’s that time of year to reset our vigilance and remind ourselves of best practices regarding identity theft protection particularly as they relate to filing taxes.

 

Identity theft still tops the list of taxpayer concerns. According to the most recent Javelin Strategy & Research, identity thieves stole $16 billion from 12.7 million US consumers in 2014.

 

Still, some good news was reported: the numbers are actually down from the previous year. The drop is likely the result of an increased awareness from consumers together with increased protections in place from industry and government. The more you know about how to protect yourself, the better chance you have to not be a victim.

 

We will spend the next couple of weeks emphasizing best practices.

  1. Understand that public wi-fi access really does mean public.  You may be sharing your information with more than you think.  Unless you know the wi-fi connection is 100% to be trusted, do not use it to access anything containing your private information
  2. Remember your paper documents are vulnerable as well. We get so excited about internet hackers we can forget the easiest thing to do is dumpster dive for your credit statements, bank receipts and copies of old tax returns.  Protect you private information on paper as well as on-line.
  3. Keep your mailing address current. More and more people are moving around more and more.  When you move, it’s vital to make sure you contact your financial institutions and tax authorities so your private information doesn’t just get delivered like a layup into the wrong hands.
  4. Along those lines, keep an eye out for bills including your credit card statements. Read them over and make sure they are accurate.  Also check credit reports a couple of times of year to scan for fishy activity.

More to come next week.  Yes, next week is February!

 

Always more available on www.legalshredinc.com

Setting up Secure Home Networks

This week’s blog is adapted from the FTC’s OnGuard OnLine Blog.  In a recent post, Attorney Lisa Weintraub Schifferle from the FTC Division of Consumer and Business Education addressed the importance of making sure home networks are set up securely.  To keep it secure, Weintrabu Schifferle urges homeowners to secure the router.

Why pay attention to that little box with the flashing lights? Your router lets you connect with the internet and communicate with other devices in your home. So, it’s your first line of defense in guarding against attacks by identity thieves and hackers.

How can you make your router more secure? Start with these steps:

  • Change the name of your router.The name of your router (also called the SSID or service set identifier) is usually a default ID assigned by the manufacturer. Change it to something only you know.
  • Change your router’s pre-set passwords.Your router also usually comes with a default password. Hackers know these default passwords. So, change yours to something unique, long and complex – think at least 12 characters, with a mix of numbers, symbols and upper and lower case letters.
  • Turn off any “remote management” features. Some routers offer remote management for tech support. Don’t leave these features enabled. Hackers can use them to get into your home network.

Maintenance is also important.  Once your router is set up, don’t just stick it in a corner gathering dust. Instead, keep it up to date. Over time, the software that comes with your router may need updates. Visit the manufacturer’s website periodically to see if there’s a new version available for download. Or register your router with the manufacturer and sign up to get updates. If you lease a router, check if your internet service provider issues updates automatically.

For more on best practices for identity theft protection and on-line safety, please visit www.legalshredinc.com

A Refresher for Identity Theft Protection Basics

Let’s get the new year started with a review of the basics for identity theft detection.  There are many ways that you might discover someone is using your information:

  • You see withdrawals from your bank account that you can’t explain.
  • You don’t get your bills or other mail.
  • Merchants refuse your checks.
  • Debt collectors call you about debts that aren’t yours.
  • You find unfamiliar accounts or charges on your credit report.
  • Medical providers bill you for services you didn’t use.
  • Your health plan rejects your legitimate medical claim because the records show you’ve reached your benefits limit.
  • A health plan won’t cover you because your medical records show a condition you don’t have.
  • The IRS notifies you that more than one tax return was filed in your name, or that you have income from an employer you don’t work for.
  • You get notice that your information was compromised by a data breach at a company where you do business or have an account.

 

If you see one of these warning signs of identity theft, act quickly. Taking these steps will help you limit the damage.

  1. Call the companies where you know or suspect fraud occurred.
  2. Place a fraud alert on your credit reports and get copies of your report.
  3. Report identity theft to the FTC.
  4. File a report with your local police department.

Then, take a deep breath and begin to repair the damage. Depending on your situation, your next step might be closing accounts opened in your name, or reporting fraudulent charges to your credit card company. There are some good resources at IdentityTheft.gov.

Another great resource is www.hvshred.com; we can help securely dispose of your confidential data.

Starting the new year with a new name and more enthusiasm than ever

We are so excited for our new name and new horizons I am posting the news 2 weeks in a row.

Like each year before it since we incorporated in 2007, 2015 has been our best year yet!

We shred and recycled enough confidential paperwork to protect over 20,000 trees and nearly 4000 cubic feet of landfill.  That’s over 45% more than 2014.

As Legal Shred, we will surely surpass those numbers and hit another record in 2016.

Whether you’ve been a client since the beginning or just joined us recently; whether you have used our service just once or twice or on a weekly, monthly, or on-call basis, we are grateful for your support.

In 2016, we will continue to deliver heartfelt, relationship-focused service. Ensuring security, compliance, and sustainability for the business and local community is our top priority. Our team of professionals will provide secure data destruction to safeguard confidentiality and preserve the environment through recycling. We are the identity protection company who puts the confidence in confidential.

One thing is changing…to facilitate our growth, we are transcending our HV Shred cocoon and renaming ourselves Legal Shred of the Hudson Valley. This will help us grow into neighboring markets north, south, east, and west spreading our brand beyond our hometown.

As president, I am still at your service and always welcome your feedback, questions, and concerns.

We consider our clients part of our extended family and look forward to continuing to grow and improve with your support and partnership.

Happy New Year–and please let us know what we can do better and what we can offer to satisfy all your data security needs!

More information www.hvshred.com

HV Shred changes name to mark growth in 2016 and beyond!

Like each year before it since we incorporated in 2007, 2015 has been our best year yet!

Whether you’ve been a client since the beginning or just joined us recently; whether you have used our service just once or twice or on a weekly, monthly, or on-call basis, we are grateful for your support.

In 2016, we will continue to deliver heartfelt, relationship-focused service. Ensuring security, compliance, and sustainability for the business and local community is our top priority. Our team of professionals will provide secure data destruction to safeguard confidentiality and preserve the environment through recycling. We are the identity protection company who puts the confidence in confidential.

One thing is changing…to facilitate our growth, we are transcending our HV Shred cocoon and renaming ourselves Legal Shred of the Hudson Valley. This will help us grow into neighboring markets north, south, east, and west spreading our brand beyond our hometown.

As president and owner, I am still at your service and always welcome your feedback, questions, and concerns.
We consider each of our clients part of our extended family and look forward to continuing to grow and improve with your support and partnership.

Happy New Year to all!

HV Shred will now operate as Legal Shred as we expand our family beyond the borders of the Hudson Valley region.

HV Shred will now operate as Legal Shred as we expand our family beyond the borders of the Hudson Valley region.

Resolve to Protect Your Identity in 2016

It’s that time of year for New Year’s resolutions and always a good time to take stock of how mindful you are of protecting one of your most valuable assets—your identity. Javelin Strategy & Research reported that about 12.6 million people were victims of identity theft in 2012, an increase of more than one million from the previous year. One likely reason: a spike in Web site data breaches. LinkedIn, Sony and Zappos are among the high-profile businesses attacked in recent years. Javelin found that nearly one in four people who were notified that their data had been compromised in a breach became victims of identity theft last year. The fix: Create a variety of passwords so that a thief won’t be able to use a password stolen from one site to enter another. Passwords for your e-mail and financial accounts, in particular, should be unique. Create longer passwords that contain a mix of upper- and lowercase letters, numbers, and symbols.

Resolve to review your credit reports quarterly this year and each bank and credit card statement you receive for unauthorized transactions. Bills from medical providers for services you never received could mean someone is posing as you to get treatment. Make a habit of shredding documents that contain sensitive information.

Resolve to be more protective of your phone number and birthday—avoid the temptation of sharing too much information on social media. It’s not just your “friends” who are monitoring your posts!

Resolve to keep your security software up to date and get notices from your bank and credit card companies for suspicious transactions.

For more on identity theft best practices, please visit www.hvshred.com

Year End/New Year Records Management Assessment Time

This last calendar month of the year and going into the first calendar month of 2016 is a good time to reflect and take stock of your record keeping process. Every business has the responsibility to safely and securely store and dispose of personally identifying private information. Not to mention, the huge legal liability in the face of HIPPA, Gramm-Leach Bliley and the whole alphabet soup of federal and state legislation that holds businesses accountable.

There are a variety of privacy concerns to consider, in addition to setting the clients’ minds at ease. When it comes to document destruction and shredding services, the best way to ensure simplicity and quality is to hire an outside firm to shred your sensitive papers. For professionals such as lawyers, physicians, and accountants, the easiest and most efficient method happens to be the method required by federal law.

A company that uses a mobile document shredding unit is the best available, since the document destruction capabilities go wherever they’re needed. No matter your business, no matter the location, a mobile shredding service can handle the task for you.

When hiring a document shredding firm, be sure to ask whether it’s necessary for you to prepare the documents for destruction – and if it is, keep looking. The most efficient way to eliminate old documents and expired paperwork is to simply hand them over to the professionals in charge of shredding. Spending hours removing every paper clip, rubber band and staple isn’t a good use of your company’s time, so make sure the shredding-and-baling unit your document destruction firm uses is a powerful one.

If your firm generates a substantial amount of paperwork every week, it might be a good idea to hire a document destruction company that makes regular pickups. Many companies will provide disposal bins, complete with lock and key. Schedule a regular pickup time, and make sure to have one or two employees serve as a regular liaison to the document destruction firm’s representatives. Your clients’ privacy will be worth it.

HV Shred can service all of your mobile document destruction needs. We offer same-day and next-day service, as well as routine service without hidden fees or surcharges. Our document shredding and mobile document shredding practices all conform to shredding regulations outlined in HIPAA, GLBA, and FACTA

For more on best practices in identity theft protection and navigating the alphabet soup of legislation, please visit www.hvshred.com

We are Extra Thankful for Record Recycling Numbers in November

We are full force into the 2015 Holiday Season and we got an early gift of our busiest November yet.  Over the course of the month of November, thanks to the support of the local business community, HV Shred helped shred and recycle enough paper to protect over 1500 trees and nearly 300 cubic yards of landfill.

Protecting identities and the environment are our top priorities.

Our mission is clear:  We are dedicated to delivering heartfelt, relationship focused service ensuring security, compliance, and sustainability for the business and local community. Secured data destruction customized and executed with appreciation and enthusiasm by our hand-picked, fully vetted team of professionals to safeguard confidentiality as well as protect and preserve the environment. We are the identity protection company who puts the confidence in confidential.

For resources and results for all manner of things related to identity theft protection and best practices in the realm of securely destroying and disposing confidential data, please visit www.hvshred.com

Best Practices on Cyber Monday

Thanksgiving officially kicks off the holiday season highlighted by Black Friday, Small Business Saturday, and Cyber Monday.  This week’s blog is adapted from one of our favorite on line safety resources–OnGuard Online produced by the FTC.  Yes, Cyber Monday promises unbelievable savings – but before commencing your shopping, here are some tips to help you save money and protect your personal information:

Know the seller and the item. Put the company or product name in a search engine, along with “review,” “complaint,” or “scam.” Read the reviews. Be sure you can contact the seller if you have a dispute.

Avoid clicking links in emails. Scammers know it’s Cyber Monday, too. Their phishing scams are after your money or personal information. If an unexpected email promises awesome online deals, don’t click on those embedded links. Check out the company first, confirm its web address, and type it in yourself.

Pay by credit card. Credit cards give you extra protections – like the right to dispute charges and temporarily withhold payment during an investigation. Whatever the deal might be, never mail cash or wire money to online sellers. And if a company insists you only pay with a gift card, it’s probably a scam.

Ensure happy returns. What are the site’s return or exchange policies? Is there a re-stocking fee?

Have a safe checkout. Look for a URL that starts with https. (The ‘s’ stands for secure). If there’s no ‘s,’ if you have doubts, or if you’re asked to email payment info, leave the site.

Keep records. Print or save records of online transactions until you get the goods. Keep the product description and price, receipt, return policy, and any emails related to your purchase.

For more on best practices in all things related to identity theft, please visit www.hvshred.com

Vigilance Still Required with New Credit Card Chip

This week our blog post is adapted from a recent FBI press release.  In October 2015, most U.S. banks will have replaced hundreds of millions of traditional credit and debit cards, which rely on data stored on magnetic strips, with new payment cards containing a microchip known as an EMV chip. While EMV cards offer enhanced security, the FBI is warning law enforcement, merchants, and the general public that no one technology eliminates fraud and cybercriminals will continue to look for opportunities to steal payment information.

With traditional credit cards, the magnetic strip on the back of the card contains static personal information about the cardholder. This information is used to authenticate the card at the point of sale (PoS) terminal, before the purchase is authorized. When a consumer uses an EMV card at a chip PoS terminal, that transaction is protected using the technology in the microchip. Additionally, consumers will be able to continue to use the magnetic strip on the EMV card at retailers who have not yet implemented chip PoS terminals. When the card is equipped with a personal identification number (PIN), which is known only to the cardholder and the issuing financial institution, issuers will be able to verify the user’s identity. Currently, not all EMV cards are issued to consumers with the PIN capability and not all merchant PoS terminals can accept PIN entry. EMV transactions at chip PoS terminals provide more security of consumers’ personal data than magnetic strip PoS transactions. In addition, EMV card transactions transmit data between the merchant and the issuing bank with a special code that is unique to each individual transaction. This provides the cardholder greater security and makes the EMV card less vulnerable to criminal activity while the data is transmitted from the chip enabled PoS to the issuing bank.

Although EMV cards provide greater security than traditional magnetic strip cards, an EMV chip does not stop lost and stolen cards from being used in stores, or for online or telephone purchases when the chip is not physically provided to the merchant, referred to as a card-not-present transaction. Additionally, the data on the magnetic strip of an EMV card can still be stolen if the merchant has not upgraded to an EMV terminal and it becomes infected with data-capturing malware.

As always, consumers should closely safeguard the security of their EMV cards and PINs. This includes being vigilant in handling, signing, and activating a card as soon as it arrives in the mail, reviewing statements for irregularities, and promptly reporting lost or stolen credit cards to the issuing bank. Consumers should also shield the keypad from bystanders when entering a PIN, as PINs are vulnerable to cybercriminals who work to steal these numbers to commit ATM and cash-back crimes.

So too, merchants need to remain vigilant and the FBI encouraged adopting additional security measures to ensure the authenticity of cards used for transactions.

For consumers and merchants, vigilance remains key.

For more on best practices regarding identity theft please visit www.hvshred.com