Contact us today!
(800) 588-4430

Telesys Voice and Data Blog

Telesys Voice and Data has been serving the Dallas/Fort Worth area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Do You Know What to Do When Involved in Identity Theft?

Do You Know What to Do When Involved in Identity Theft?

The unfortunate truth of increased technology use in the workplace is that there is a corresponding increase in the potential for cybercrime, more specifically identity theft, to strike the workplace. The question is, what can you do to help prevent it, and how should you react to it should it strike?

How You Can Help an Identity Thief
There are plenty of ways that an identity thief can gain the information they need to successfully take control of one of your accounts or some of your critical data. First of all, many businesses have a tendency to collect more data than they actually need from their contacts and employees. This only gives the identity thief more ammunition. Furthermore, many businesses underestimate the lengths that an identity thief will go to in order to collect the information that they need. Frankly, just throwing out documentation won’t stop someone who isn’t above dumpster-diving. Any paper records should be cross-shredded before they are disposed of.

Of course, paper records are a relatively easy way for an identity thief to get what they want in almost any circumstance. Therefore, it makes much more sense to keep your documentation stored digitally, protected by passwords and encryption that stands up to best practices.

What to Tell Your Clients if Their Identities Are Stolen on Your Watch
Unfortunately, even the smallest error can lead to a security breach, which means that you may have to inform your clients that their information has been stolen. To help them further, you will want to advise them to take the following steps immediately.

Notify Affected Banks or Creditors
One of the first orders of business that needs to happen if financial information could have been leaked is to contact the bank or credit card provider that manages the account. Your contact will want to deactivate these accounts before whomever it was that stole their identity accesses them again.

Time is of the essence, as they will need to report the theft and any unauthorized charges within two days of the unauthorized transactions to limit their liability to $50. If they report the theft before any transactions are made, they will not be liable for any activity on that account until the matter is settled.

Managing Credit Reports
Any client whose data was potentially stolen should work on managing their credit reports. First, have a fraud alert put on your account by one of the major credit reporting agencies. This will automatically provide you with a credit report from all three of these agencies, which you should check for warning signs of fraud. If your reports show credit inquiries that you didn’t make and other unexplainable activity, report the identity theft to remove the transactions and activities you are not responsible for. You may also want to consider requesting a credit freeze to prevent the credit agencies from releasing your credit information to new creditors.

Fill Out and Distribute ID Theft Report
While the FTC (Federal Trade Commission) may only follow up on larger fraud cases, they also monitor identity theft cases to try and identify suspicious patterns that suggest the involvement of organized crime. The FTC’s website also has a link to a form that will produce an identity theft complaint. Once you have that complaint, secure a police report to complete your ID theft report.

This report needs to be distributed to your creditors and credit reporting agencies, and these accounts need to be monitored to ensure that false information doesn’t persist.

Locking Down Accounts
Of course, as with any account breach, you need to update your account passwords to keep your accounts secure. Furthermore, not only should you report any false use of your Social Security Number, you should also ensure that no additional accounts have been opened in your name for any utilities, as the bill for these services can be used as proof of residence to open a new account.

Identity theft is no laughing matter, and you certainly don’t want your business to be responsible for it. For assistance with your data security solutions, call Telesys Voice and Data at (800) 588-4430.


No comments yet
Already Registered? Login Here
Friday, 24 January 2020
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

Free Consultation

Tag Cloud

Security Tip of the Week Technology Business Computing Cloud Best Practices Hackers Malware Privacy Business Email Productivity Hosted Solutions Microsoft Network Security Internet Software IT Services Computer Windows 10 Productivity Backup Data Backup Managed Service Provider Ransomware Innovation Business Continuity Mobile Devices Outsourced IT Smartphone Android Hardware Efficiency Upgrade Google Data Managed IT services User Tips Data Recovery Disaster Recovery Social Media IT Support Browser Communication IT Support Workplace Tips Small Business Data Management Managed IT Services Business Management Cloud Computing App Smartphones Internet of Things Office Remote Monitoring Phishing Miscellaneous Server Holiday Microsoft Office Network Cybersecurity Password Facebook VoIP communications Paperless Office WiFi Office 365 Windows Gmail Big Data Encryption Save Money Spam Passwords Artificial Intelligence Tech Term Bandwidth Firewall Unified Threat Management Apps Saving Money Hosted Solution Recovery Robot Customer Relationship Management Employer-Employee Relationship Risk Management Collaboration Windows 10 Document Management Hacker Mobile Device Management Customer Service Operating System Content Filtering Remote Computing How To Windows 7 Downtime Government Wi-Fi Money Office Tips Chrome Work/Life Balance Managed IT Infrastructure Analytics Apple Avoiding Downtime Tip of the week Vendor Management Compliance Word Managed Service Tech Support Automation Going Green Vulnerability Alert Education Help Desk Printing Data Security Data storage Applications Cybercrime Computing Software as a Service Presentation Business Growth IT Management Social Virtual Reality Website Training Mobile Device Antivirus Outlook SaaS Redundancy BYOD Data loss Project Management BDR Two-factor Authentication Settings Business Technology Health The Internet of Things Telephone Systems Computers File Sharing Healthcare Hacking Mobile Computing Scam Identity Theft Google Drive Competition Websites Physical Security Bring Your Own Device Regulations Search Sports Taxes Information Technology IT service Botnet Cortana VPN Net Neutrality Humor Virtualization Assessment Samsung Proactive Administration Server Management Licensing Meetings Virtual Private Network Smart Technology Analyitcs Consultation Digital Payment Storage Remote Monitoring and Management IT solutions HIPAA Safety Maintenance Router Mobile Security Wireless Technology Computer Care Wireless Specifications YouTube Tablet Upgrades Unified Communications User Automobile Budget Access Control End of Support LiFi Retail Mouse Best Practice Lithium-ion battery Business Owner Legal Display Augmented Reality Marketing Twitter Laptops IBM Running Cable Politics Monitors Solid State Drive Patch Management Travel Scary Stories Permissions Consumers G Suite How To Processors Cost Management Active Directory Internet Protocol Flexibility Heating/Cooling Google Calendar Motion Sickness Hard Disk Drive Remote Worker Fort Worth IT Networking Fraud Undo Firefox Supercomputer Google Docs Hard Drive Windows Server Writing MSP VoIP streamlines Operations Electronic Health Records eWaste IP Address Servers Legislation IT Sevices Personal Information Alt Codes Social Networking Professional Services DFW IT Service IT Consultant IT Budget Recycling User Management Social Engineering business network infrastructure Wearable Technology Cyberattacks Environment Mobile Office Machine Learning Computer Repair Typing Motherboard Virtual Assistant Buisness Techology Internet Exlporer Cleaning Notifications Management Batteries Bookmarks Troubleshooting Statistics Relocation Software Tips Webcam Electronic Medical Records Google Wallet Cryptocurrency Voice over Internet Protocol Knowledge Mail Merge Distributed Denial of Service Disaster Resistance data services Crowdsourcing Dark Data Enterprise Resource Planning Remote Work WPA3 IT Technicians Favorites Bluetooth Technology Tips Phone System Private Cloud Point of Sale Corporate Profile Drones Bitcoin Modem Experience Address Managed IT Service Proactive IT Hotspot Quick Tips User Error Mobile File Management Fleet Tracking Mirgation Conferencing Comparison Error History WannaCry Windows 8 Cookies Manufacturing Break Fix IT Consulting Language Domains Time Management Printer Company Culture Telephone Asset Tracking Migration Employees 5G Mobility Black Friday Entrepreneur Cabling Application Web Server Update Staffing Nanotechnology Gadgets Dark Web Users Data Breach Computing Infrastructure Public Speaking Network Management Vulnerabilities Mobile VoIP 3D Printing Remote Workers Chatbots Zero-Day Threat iPhone Cyber Monday Administrator Cameras VoIP Chromebook GPS IoT Proactive Maintenance Data Warehousing Windows Server 2008 Technology Laws Alerts Touchscreen SharePoint Law Enforcement Google Maps Network Congestion Geography Unsupported Software Information Identity Backup and Disaster Recovery flu season Disaster Hard Drives CCTV Digital Emoji Tracking Utility Computing Processor Laptop Lenovo Microsoft Excel Cables Co-Managed IT Virtual Desktop Unified Threat Management Cooperation Downloads Gadget Mobile Data Monitoring Hacks RMM Shortcut Fort Worth Uninterrupted Power Supply Superfish Blockchain Refrigeration Spyware Halloween Wires Business Telephone business communications systems Staff Multi-Factor Security PowerPoint Consulting Current Events Deep Learning Procurement Fun flu shot

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...