Thursday, November 02, 2006

Are You at Risk?

If you think you’ve figured out how to keep the thieves out of your personal information you may be surprised at the methods they use to gain access to it. Finding out HOW thieves access your information is the first step in reducing the risk.

Lost or Stolen Wallet

Not surprisingly a person who has had their wallet lost or stolen is at great risk of becoming a victim of identity theft. Carrying important documents like your Social Security Number, birth certificate, driver’s license and credit or debit cards in your wallet can give a thief easy access to your personal information.

Missing Mail

If you think you’ve missed a couple bills or know that your mail box has been broken into, your personal information may have been stolen. Credit card bills, offers for credit cards and information that contains personal information or your SSN can be used to gain access to unauthorized credit or to commit fraud in your name.

Garbage

Thinking of throwing the latest credit card offer in the garbage? Clearing out old tax forms or other personal information? Rummaging through the garbage for such information is known as ‘dumpster diving’ and can be an easy source for identity thieves. Your personal garbage isn’t the only source – businesses that collect personal information can also be targeted.


‘Phishing’ or ‘Pretexting’

Online or over the phone there are unscrupulous individuals masquerading as legitimate businesses in an attempt to convince you to pass on personal information for illegal purposes. Any requests to ‘validate account information’ by providing personal information online or over the phone should be questioned.

Businesses or Employees

Employees or businesses that have legitimate access to your personal information may use that information for non-business activities. Identity thieves that work in institutions that contain sensitive personal data may abuse the access they have or even present themselves to you as someone that should have access, such as a landlord or employer.

‘Skimming’

Thieves have access to ‘tools of the trade’ that allow them to steal information from your card at ATM’s or during a card swipe for a purchase. These data storing devices capture your information without your realizing it.

Change of Address

By filling out a form at the post office the identity thief can have your bills and other personal mail diverted to a new address. It may take you a few days to realize what has happened and make the correction.

Spyware

A new threat on the scene is from computer viruses that ‘spy’ on you while you shop or do banking online. Any website that you enter personal information into can be ‘spied on’ putting you at risk.

Unsecured Online Transactions

Online shopping at a site that is not secured can potentially put you at risk of having your information stolen. Websites may also collect and sell some of your information without your knowledge unless their posted Privacy Policy states otherwise.

Break In

Anytime you or a business that has your information is a victim of a break in you may have had personal information stolen.

Personal Computers

Are you storing sensitive passwords on your laptop? Are you throwing out an old computer? If your laptop is stolen or accessed by a thief they may be able to find that information. Old computers may hold information on their hard drives even when you’ve deleted it.

No comments: