Agile Computing Authors: Zakia Bouachraoui, Pat Romanski, Elizabeth White, Carmen Gonzalez, Yeshim Deniz

News Feed Item

IdentityTruth Shares Top 10 Tips for ID Theft Prevention in 2010

IdentityTruth, the leading provider of a new breed of services to help consumers safeguard their privacy and identity, today is sharing its top 10 tips for avoiding ID theft in 2010. IdentityTruth’s statistics point to a continual year-to-year increase in identity theft-related crimes, indicating that as criminals get more savvy, identity theft becomes easier to perpetrate. The best bet is for consumers to remain informed on how different life events – from shopping and traveling to starting college and getting married – increase their risk for ID theft.

“ID theft is about much more than simple credit card fraud. What many consumers may not realize is that at different points in one’s life, we are all made more vulnerable to identity theft related crime,” said Steven Domenikos, CEO of IdentityTruth. “Taking some simple steps now and being extra-vigilant can help people from becoming victims of identity theft.”

Steven shares his list of “Top 10 Tips for 2010” to help consumers be more aware of their ID theft risk this year:

  • When traveling: Know where your credit cards/debit cards are at all times – it’s easy to get distracted when on vacation and out of your usual routine! Double-check credit card receipts when traveling out of the country, as some receipts still print out the cardholder’s full name and credit card number. If you’re going to throw receipts in the trash, be sure to shred them.
  • When shopping: Be careful when using ATMs: only use ATMs with monitoring cameras, such as those in bank lobbies. Avoid kiosk ATMs, those freestanding units often do not have cameras and are statistically more likely to be infected by skimmers (electronic devices that allow thieves to record account and PIN numbers). "Shoulder Surfing" can also be a problem at crowded stores, so don’t be afraid to question someone that is standing too close. When making purchases online, look for a familiar logo that indicates that the site is deemed secure.
  • When filing taxes: Check with the Better Business Bureau to determine the creditability of your tax preparer before you entrust them with access to your personal information. Beware of calls “from” the IRS: if you receive a phone call from the IRS asking for personal information, hang up, because it’s a scam. Also, the IRS does NOT email taxpayers: if you receive emails pretending to be from the IRS asking for your personal information, this is also a scam. Don’t use online filing programs (make sure the tax filing software resides on your desktop) - online filing programs are easily penetrated by identity thieves, and sensitive information could end up on countless other servers. And finally, protect your desktop: make sure your computer has the latest antivirus and spyware to protect you from invasion.
  • When getting married: For women - definitively make the decision to either keep your maiden name or assume your spouse’s name – using both leaves room for error, as it would be difficult to keep track of where you’re using one versus the other. Keep your marriage license and other personal documents locked in a safe and secure place. Make sure your SSN does not appear on the marriage license, and decide how you will filling for taxes (jointly or separately) and file early with the correct name.
  • When starting college: Almost half of all college students receive credit card applications on a daily or weekly basis. Many of these students throw out card applications without destroying them – be sure to destroy yours. Almost 50 percent of students have had grades posted by Social Security number - when you go to the security office to get your student ID, be sure to ask the school to not use your social security number as your college ID number.
  • With consumer electronics: Never store identifying names, companies, or login information on your cell phone. If you lose your cell phone, all this information can be easily extracted off your SIM Card and used to access your personal information. If you lose your cell phone, contact your provider immediately to report the loss. IdentityTruth’s research shows reported cases of stolen computers have more than doubled over 2008 – have your laptop engraved with identifying information, as research shows that thieves are then less likely to steal them.
  • When using social networking sites: With millions of people using social networking sites like Facebook and MySpace – and sharing sensitive information such as their full name, date of birth and address information - there are countless opportunities for identity thieves. Individuals should set restrictions on their profiles so that only friends can view their information, and should delete history/cookies if accessing those sites through public computers.
  • When a loved one passes away: Although it may seem unthinkable, statistics show that identity thieves prey on the sick or deceased (known as “ghosting") due to an increased likelihood that the theft will go undetected. Notify the Social Security Administration of a death at 800-722-1213. The SSA maintains a master file that is used by all the CRAs before issuing credit. Close all bank and credit accounts and remove the deceased’s name from all joint accounts, and notify credit reporting agencies of the death.
  • The basics: Write “see id” on the back of each credit card and demand that the recipient verify your identity. Frequently look over your credit reports- question all suspicious activities. Before and after you use your credit card, be sure to cover the numbers with your hand- you never know who may be watching. Shred all credit card applications that come in via mail.
  • Consider signing up for an ID theft monitoring service: Identity theft is America’s fastest growing crime. Your security goes well beyond your credit report. Identity thieves can apply for government benefits, receive medical care, obtain driver’s licenses and jobs all in your name. ID theft monitoring services provides alerts beyond what shows up on your credit report; when considering an ID theft monitoring services, comparison shop to find the one that provides the greatest value.

Identity theft is America's fastest-growing crime. More than 70 million identities will be lost this year alone with as many as 4 million social security numbers being stolen. Simple credit monitoring is not enough - only 15% of identity theft is credit-related (85% of identity fraud happens “outside” the credit system). IdentityTruth has discovered suspicious “identity events” for more than 1 out of 4 consumers who subscribe to its service.

IdentityTruth’s unique Faster than Fraud technology combines data from many different sources--going beyond simple credit-based protection to deliver a more complete picture of an individual’s identity risk.

The service continuously combines and analyzes any and all information that is discovered specific to an individual to detect suspicious activities, report possible fraud before it happens and provide concrete next-steps to resolve a problem that may arise.

About IdentityTruth

IdentityTruth is the leading provider of a new breed of service to help consumers safeguard their Privacy and Identity. IdentityTruth’s proprietary technology provides subscribers with advance notice of potential identity fraud so they can take better control to stop it before it becomes costly. IdentityTruth not only detects--but can actually predict--possible problems, and that is what makes IdentityTruth Faster than Fraud™. IdentityTruth is a privately-held, VC- funded company headquartered in Waltham, Massachusetts. Investors include Argonaut Ventures and Stata Venture Partners. For more information, go to www.IdentityTruth.com or call 781-684-1300.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

IoT & Smart Cities Stories
Every organization is facing their own Digital Transformation as they attempt to stay ahead of the competition, or worse, just keep up. Each new opportunity, whether embracing machine learning, IoT, or a cloud migration, seems to bring new development, deployment, and management models. The results are more diverse and federated computing models than any time in our history.
At CloudEXPO Silicon Valley, June 24-26, 2019, Digital Transformation (DX) is a major focus with expanded DevOpsSUMMIT and FinTechEXPO programs within the DXWorldEXPO agenda. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of business. Only 12% still survive. Similar percentages are found throug...
At CloudEXPO Silicon Valley, June 24-26, 2019, Digital Transformation (DX) is a major focus with expanded DevOpsSUMMIT and FinTechEXPO programs within the DXWorldEXPO agenda. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of business. Only 12% still survive. Similar percentages are found throug...
Dion Hinchcliffe is an internationally recognized digital expert, bestselling book author, frequent keynote speaker, analyst, futurist, and transformation expert based in Washington, DC. He is currently Chief Strategy Officer at the industry-leading digital strategy and online community solutions firm, 7Summits.
Digital Transformation is much more than a buzzword. The radical shift to digital mechanisms for almost every process is evident across all industries and verticals. This is often especially true in financial services, where the legacy environment is many times unable to keep up with the rapidly shifting demands of the consumer. The constant pressure to provide complete, omnichannel delivery of customer-facing solutions to meet both regulatory and customer demands is putting enormous pressure on...
IoT is rapidly becoming mainstream as more and more investments are made into the platforms and technology. As this movement continues to expand and gain momentum it creates a massive wall of noise that can be difficult to sift through. Unfortunately, this inevitably makes IoT less approachable for people to get started with and can hamper efforts to integrate this key technology into your own portfolio. There are so many connected products already in place today with many hundreds more on the h...
The standardization of container runtimes and images has sparked the creation of an almost overwhelming number of new open source projects that build on and otherwise work with these specifications. Of course, there's Kubernetes, which orchestrates and manages collections of containers. It was one of the first and best-known examples of projects that make containers truly useful for production use. However, more recently, the container ecosystem has truly exploded. A service mesh like Istio addr...
Digital Transformation: Preparing Cloud & IoT Security for the Age of Artificial Intelligence. As automation and artificial intelligence (AI) power solution development and delivery, many businesses need to build backend cloud capabilities. Well-poised organizations, marketing smart devices with AI and BlockChain capabilities prepare to refine compliance and regulatory capabilities in 2018. Volumes of health, financial, technical and privacy data, along with tightening compliance requirements by...
Charles Araujo is an industry analyst, internationally recognized authority on the Digital Enterprise and author of The Quantum Age of IT: Why Everything You Know About IT is About to Change. As Principal Analyst with Intellyx, he writes, speaks and advises organizations on how to navigate through this time of disruption. He is also the founder of The Institute for Digital Transformation and a sought after keynote speaker. He has been a regular contributor to both InformationWeek and CIO Insight...
Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settlement products to hedge funds and investment banks. After, he co-founded a revenue cycle management company where he learned about Bitcoin and eventually Ethereal. Andrew's role at ConsenSys Enterprise is a mul...