Contact us today!
(800) 588-4430

Telesys Voice and Data Blog

Telesys Voice and Data has been serving the Dallas/Fort Worth area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Do You Know What to Do When Involved in Identity Theft?

Do You Know What to Do When Involved in Identity Theft?

The unfortunate truth of increased technology use in the workplace is that there is a corresponding increase in the potential for cybercrime, more specifically identity theft, to strike the workplace. The question is, what can you do to help prevent it, and how should you react to it should it strike?

How You Can Help an Identity Thief
There are plenty of ways that an identity thief can gain the information they need to successfully take control of one of your accounts or some of your critical data. First of all, many businesses have a tendency to collect more data than they actually need from their contacts and employees. This only gives the identity thief more ammunition. Furthermore, many businesses underestimate the lengths that an identity thief will go to in order to collect the information that they need. Frankly, just throwing out documentation won’t stop someone who isn’t above dumpster-diving. Any paper records should be cross-shredded before they are disposed of.

Of course, paper records are a relatively easy way for an identity thief to get what they want in almost any circumstance. Therefore, it makes much more sense to keep your documentation stored digitally, protected by passwords and encryption that stands up to best practices.

What to Tell Your Clients if Their Identities Are Stolen on Your Watch
Unfortunately, even the smallest error can lead to a security breach, which means that you may have to inform your clients that their information has been stolen. To help them further, you will want to advise them to take the following steps immediately.

Notify Affected Banks or Creditors
One of the first orders of business that needs to happen if financial information could have been leaked is to contact the bank or credit card provider that manages the account. Your contact will want to deactivate these accounts before whomever it was that stole their identity accesses them again.

Time is of the essence, as they will need to report the theft and any unauthorized charges within two days of the unauthorized transactions to limit their liability to $50. If they report the theft before any transactions are made, they will not be liable for any activity on that account until the matter is settled.

Managing Credit Reports
Any client whose data was potentially stolen should work on managing their credit reports. First, have a fraud alert put on your account by one of the major credit reporting agencies. This will automatically provide you with a credit report from all three of these agencies, which you should check for warning signs of fraud. If your reports show credit inquiries that you didn’t make and other unexplainable activity, report the identity theft to remove the transactions and activities you are not responsible for. You may also want to consider requesting a credit freeze to prevent the credit agencies from releasing your credit information to new creditors.

Fill Out and Distribute ID Theft Report
While the FTC (Federal Trade Commission) may only follow up on larger fraud cases, they also monitor identity theft cases to try and identify suspicious patterns that suggest the involvement of organized crime. The FTC’s website also has a link to a form that will produce an identity theft complaint. Once you have that complaint, secure a police report to complete your ID theft report.

This report needs to be distributed to your creditors and credit reporting agencies, and these accounts need to be monitored to ensure that false information doesn’t persist.

Locking Down Accounts
Of course, as with any account breach, you need to update your account passwords to keep your accounts secure. Furthermore, not only should you report any false use of your Social Security Number, you should also ensure that no additional accounts have been opened in your name for any utilities, as the bill for these services can be used as proof of residence to open a new account.

Identity theft is no laughing matter, and you certainly don’t want your business to be responsible for it. For assistance with your data security solutions, call Telesys Voice and Data at (800) 588-4430.


No comments yet
Already Registered? Login Here
Saturday, 15 August 2020
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

Free Consultation

Tag Cloud

Security Tip of the Week Technology Business Computing Cloud Best Practices Hackers Privacy Malware Business Email Productivity Hosted Solutions Microsoft Network Security Software Internet Productivity IT Services Computer Windows 10 Data Backup Managed Service Provider Backup Innovation Mobile Devices Ransomware Business Continuity Hardware Outsourced IT Smartphone Efficiency Google Upgrade Android Data User Tips Disaster Recovery Data Recovery Social Media Managed IT services Browser Communication IT Support Workplace Tips IT Support Small Business Business Management Managed IT Services Data Management Smartphones Cloud Computing App Miscellaneous Internet of Things Holiday Phishing Microsoft Office Network Cybersecurity Server Office Remote Monitoring VoIP Windows WiFi Facebook communications Password Office 365 Paperless Office Tech Term Artificial Intelligence Gmail Collaboration Big Data Spam Passwords Encryption Save Money Compliance Customer Relationship Management Bandwidth Firewall Vendor Management Apps Hosted Solution Unified Threat Management Windows 10 Recovery Document Management Wi-Fi Employer-Employee Relationship Robot Risk Management Saving Money Remote Computing Work/Life Balance Healthcare Word Hacker Managed Service Windows 7 Chrome Infrastructure Content Filtering Managed IT Apple Avoiding Downtime Downtime Tip of the week Office Tips Mobile Device Management Customer Service How To Operating System Government Money Analytics BYOD Business Growth The Internet of Things Presentation Computers IT Management Mobile Device Outlook Antivirus Redundancy Education File Sharing Project Management Data loss Applications Cybercrime BDR Business Technology Automation Going Green Health Software as a Service Alert Printing Social Telephone Systems Hacking Data storage Website Mobile Computing Computing Meetings Storage Tech Support Vulnerability Two-factor Authentication Virtual Reality Help Desk Settings Training Data Security SaaS Virtual Private Network Electronic Health Records Automobile Consultation Upgrades Digital Payment Budget Augmented Reality Maintenance End of Support IBM Running Cable Specifications Mouse Regulations Legal Bring Your Own Device Search User Display Sports Time Management IT service Tablet Twitter Cortana Mobility Virtualization Politics Monitors Retail Net Neutrality Administration Travel Proactive Google Drive Best Practice Smart Technology Websites Lithium-ion battery IT solutions Safety Remote Monitoring and Management Physical Security Business Owner HIPAA Router Taxes Wireless Technology Botnet Mobile Security Wireless Marketing Samsung Solid State Drive Competition Patch Management YouTube Scam Identity Theft Unified Communications Laptops Information Technology Computer Care Access Control Humor LiFi IoT VPN Assessment Analyitcs Server Management Licensing Hard Drives Troubleshooting Utility Computing Microsoft Excel Laptop Downloads Virtual Desktop Techology Cables Professional Services Cooperation Software Tips Fort Worth Web Server Statistics Monitoring User Management Update Mail Merge Refrigeration Cyberattacks Phone System Blockchain Halloween Multi-Factor Security Disaster Resistance Administrator Wires Virtual Assistant 3D Printing Staff flu shot Deep Learning Fun Cameras Bluetooth Consulting Batteries Chromebook Address Law Enforcement Corporate Profile Cost Management Bookmarks Network Congestion Permissions Scary Stories Google Calendar Proactive IT Quick Tips Voice over Internet Protocol Unsupported Software Flexibility Emoji History Fort Worth IT CCTV Remote Work Undo Gadget WannaCry Hard Drive Favorites Fraud Hacks Legislation IT Consulting IP Address MSP Mobile Data Operations Cabling Social Networking DFW IT Service Alt Codes File Management iPhone Recycling Conferencing Staffing Current Events Data Breach Mobile Office Network Management Manufacturing Wearable Technology Telephone Processors Motherboard Typing G Suite Buisness VoIP Management Employees GPS Internet Exlporer Technology Laws Motion Sickness Touchscreen Gadgets Google Maps Mobile VoIP Disaster Google Docs Distributed Denial of Service Cryptocurrency Knowledge Lenovo Digital Enterprise Resource Planning Zero-Day Threat Writing Tracking data services IT Technicians Technology Tips Unified Threat Management WPA3 Proactive Maintenance Personal Information Windows Server 2008 Uninterrupted Power Supply Modem PowerPoint Managed IT Service Bitcoin Experience IT Consultant Shortcut User Error Superfish Machine Learning Spyware Mobile Backup and Disaster Recovery Social Engineering Hotspot Consumers Mirgation Comparison business communications systems Fleet Tracking Processor Computer Repair Co-Managed IT Notifications Cookies Break Fix Windows 8 Cleaning Printer Domains Relocation How To Company Culture RMM Language Migration Google Wallet Black Friday Internet Protocol 5G Webcam Heating/Cooling Asset Tracking Entrepreneur Electronic Medical Records Application Business Telephone Crowdsourcing Hard Disk Drive eWaste Nanotechnology Dark Data Dark Web IT Sevices Users Networking Public Speaking Private Cloud Firefox Vulnerabilities Procurement Supercomputer Computing Infrastructure Chatbots Drones Cyber Monday VoIP streamlines Point of Sale Servers Remote Workers Active Directory Biometric Environment Data Warehousing SharePoint Error Geography Remote Worker IT Budget Alerts Identity flu season business network infrastructure Information Windows Server

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...