| Home | Free Articles for Your Site | Submit an Article | Advertise | Link to Us | Search | Contact Us |
This site is an archive of old articles

    SEARCH ARTICLES


vertical line

Article Surfing Archive


10 Steps to Avoid ID Theft - Articles Surfing

How much information does an ID thief need to steal someone's identity? Easily found personal information such as a name, birth date, address, or a mother's maiden name can be enough for an ID thief to access someone's existing accounts or establish new loans or credit in another's name.

Every day, personal information is stolen. ID thefts occur when someone shifts through a trash can or a waiter writes down a customer's credit card number. While network security is constantly improving - especially as more consumers conduct shopping and banking online, it is still imperative that personal information be monitored and protected by its immediate owner.

Following are 10 steps to securing and protecting personal information, according to Tony Bradley, respected information security resource guru and author of Essential Computer Security:

Be on guard for the shoulder surfer. This is the guy who likes to casually look over someone's shoulder as he or she enters a PIN number or credit card number at an ATM, phone booth, or even work computer. Those using a public place to withdraw cash or import personal information should always be aware of others around them and their ability to see what keys are being pressed.

Direct people to photo ID verification. Instead of signing the back of a credit card, write "See photo ID" on the back. Often, store clerks do not check for a signature on a credit card; and thieves can still use these cards to make purchases online or over the phone. However, for times when signature verification is required, the card holder is creating another layer of security by directing a salesperson a photo ID as well.

Shred bills and credit cards statements. Thieves who acquire information by going through trash are known as "dumpster diving." These individuals are looking for bills, statements, and even junk mail to steal an identity. Use a personal shredder to destroy any and all material that contains personal information before disposing of them in the trash.

Destroy all digital data. Individuals who sell, trade or discard of a computer system, hard drive, recordable CD, DVD, or backup tape should take extra precautions to ensure the data has been completely destroyed. Thieves who are technically savvy may retrieve information believed to have been deleted or reformatted. CDs and DVDs should be shattered before being thrown away and there are shredders designed to shred CD/DVD media.

Check any and all statements. Cross-checking bank and credit statements has two benefits. First, individuals who regularly check their statements will be more aware if one does not arrive each month ' indicating that an account has possibly been stolen. Secondly, checking statements allows the account holder to confirm that the entries are legitimate.

Pay paper bills at the post office. Paid bills that are left in the mailbox can be stolen by someone looking for critical information ' such as a name, address, credit card account number, or bank information. Take bills to the post office or to a U.S. Postal Service drop box.

Limit personal information on checks. It may be convenient to have a driver's license number or other information printed on personal checks. However, if that information falls into the wrong hands it may be enough information for a thief to cause real harm.

Review a credit report each year. Thanks to a recent congressional act, consumers can check their credit report for free each year, provided from Equifax, Experian and TransUnion. Check the report for any suspicious entries or activity.

Protect your Social Security Number. Now, more than ever, if a thief has personal information such as a name, address, and a social security number, he or she can assume someone's identity. Especially never give out your social security number over the phone or email.

Do online business with established companies. It's imperative that a level of trust be established before conducting business online. Make sure those companies take the security of personal information as seriously as you do. Always review a company's online privacy policy to ensure it is a secure or encrypted web site.

Submitted by:

Rita Lowman

AmericanMomentumBank.com provides a wide array of personal banking and business banking options and banking solutions tailored to your individual needs. For more information, please visit AmericanMomentumBank.com.


        RELATED SITES



https://articlesurfing.org/finances/10_steps_to_avoid_id_theft.html

Copyright © 1995 - 2024 Photius Coutsoukis (All Rights Reserved).

ARTICLE CATEGORIES

Aging
Arts and Crafts
Auto and Trucks
Automotive
Business
Business and Finance
Cancer Survival
Career
Classifieds
Computers and Internet
Computers and Technology
Cooking
Culture
Education
Education #2
Entertainment
Etiquette
Family
Finances
Food and Drink
Food and Drink B
Gadgets and Gizmos
Gardening
Health
Hobbies
Home Improvement
Home Management
Humor
Internet
Jobs
Kids and Teens
Learning Languages
Leadership
Legal
Legal B
Marketing
Marketing B
Medical Business
Medicines and Remedies
Music and Movies
Online Business
Opinions
Parenting
Parenting B
Pets
Pets and Animals
Poetry
Politics
Politics and Government
Real Estate
Recreation
Recreation and Sports
Science
Self Help
Self Improvement
Short Stories
Site Promotion
Society
Sports
Travel and Leisure
Travel Part B
Web Development
Wellness, Fitness and Diet
World Affairs
Writing
Writing B