Sunday, November 25, 2012

Identity Theft In Border States - Why Is Identity Theft Much Worse In Border States?

Identity Theft is a vast and rapidly growing crime in the U.S. It has been ranked the #1 offense against local and federal law. The size of population is a factor when it comes to statistics of which states are more affected by identity theft, but this plays no part when it comes to states that are among the U.S and Mexico's border and also Canada. ID theft has been increasing rapidly among families in the states that fall on the border due to the advancing amount of illegal immigration. This puts a lot of our families at risk, including our children. With out properly knowing how these thieves are getting our personal information, we are defenseless against their attacks.

Facts On Identity Theft

As technology increases, and drug wars on the border continue to escalate, Americans are more susceptible to this type of crime, allowing different doorways for thieves to steal our personal information. According to the FTC, ID Theft affects more than 10 million people each year, jumping from 500,000 in 2001 to a whopping 1900% increase in 2010. These crooks aim for one valuable piece of information that's key to destroying everything else that lies ahead, your social security number.

Why Is The Amount of Victims Increasing Among Border States

I was not able to get a precise statistic in increase of identity theft in border states due to illegal immigration, because government agencies state they have not implemented this type of research for this category as of yet. However, with some research we were able to find that MSNBC reported, according to Betsy Broder an assistant director with the FTC, the agency had seen a rise in prosecution of workers using other people's information to be employed, particularly for using fraudulent Social Security numbers.

With the increase in drug wars amongst the border cities of Mexico, many immigrants have fled for their lives to the United States. Some are here legally and many are here illegally. Let's not forget that Canada also plays their part in illegal immigration. Despite the matter, most illegal immigrants don't acquire our personal information by stealing it, they buy it. As profound as it may seem, the source of identity theft starts in our own backyard. On the other hand, with the increase of illegal immigration, the more the demand for falsified documents, the more the demand for the crime to be committed.

Which Border States Are Experiencing This Crime

The top six states that rank amongst identity theft happening among border states is 1.Arizona, 2.California, 3.Texas, 4.New York, 5.Washington, and 6.New Mexico. Arizona ranks #1 in identity theft all across the nation, in 3rd is California, and in 4th is Texas. It is not only due to the size of the state because as you can see Arizona is a whole lot smaller than both California and Texas, and Nevada ranks 2nd in the nation which is also smaller in population.

In Conclusion...

The Federal Trade Commission stated that the number one thing that everyone should do to protect themselves is to become AWARE. Get yourself up-to-date on ways identity thieves can steal your information, ways on how to prevent this crime from happening to you and your family. Yo need to know what these thieves are doing with your personal information when they do have it. We all need to be aware and to recognize just how serious this crime is destroying lives because once the damage is done, it's never done. There are ways to begin minimizing the threat of Identity Theft, we you just have to be willing to get you and your family informed.

Five Myths Concerning Identity Fraud   A Review of Krolls Identity Theft Shield Program   The Urgency of ID Theft Prevention   

These Simple Activities Can Put You at Risk of Fraud and Identity Theft

Thieves are everywhere looking for the perfect opportunity to steal from you. Always, no matter where you are, it's important to be aware of your surroundings, even while out shopping at the grocery store. Here's an example for woman. You put your purse in your basket and then get busy shopping and forget about it, not very concerned because your purse is right next to you in the basket. Just realize that thieves may also be right there along side you as well, appearing to shop, but really they're looking for the perfect opportunity to take advantage. While you're busy shopping, the thief can simply walk by and steal your purse. You probably won't even notice it's missing until they're long gone.

You've now lost your purse and everything in it including your ID, credit cards, your home address, house and car keys, and much more. With all of this taken, there's now many more ways they can take advantage of you. And if they do happen to get your keys, you may find your car is stolen.

The same thing applies to guys. You're in a hurry, you rush out the door, you get to the store wearing shorts without pockets and so you drop your wallet and keys in the cart. I know I've been tempted but don't do it.

Always keep these items secure, and close to you. Carry them and don't set them down no matter how safe you think it is.

Another place to be aware of your surroundings is gas stations. You pull up. As you get out of one side of the car, the thief is waiting to steal from you, on the other side of the car. While you're busy filling up, the thief can crouch down and quietly open your door and steal anything within reach. To avoid this, be sure that your windows are rolled up, take your keys and lock your car.

The same thing applies when you're pulling up to a stop sign or red light. As you stop, if you've left your window down and your purse or briefcase is on the front passenger seat, someone can easily reach in and take it. To protect yourself, don't put anything important there that can be easily reached if your window is down.

The last thing that I want to leave you with is that "Friendly fraud" is on the rise. Friendly fraud is fraud that takes place from someone you know; such as a family member, a roommate, a co-worker, your housekeeper, anyone you know personally. It's unfortunate but you have to keep your personal information at home and at work safe and secure from everyone; even those you trust...because you never know.

Copyright © 2011 / Protect Yourself, LLC

Five Myths Concerning Identity Fraud   A Review of Krolls Identity Theft Shield Program   The Urgency of ID Theft Prevention   

Copiers And Identity Theft

Well, here we go again. This has been going on for years now however, it does not get the press or recognition that it deserves. But before I get into the meat of this story here's a real quick history lesson. Before 2002 the majority of copiers that were manufactured had been "Analog" technology. Meaning that when you made a copy of a document the image was positively charged and put on a rotating piece of film where a piece of paper that was negatively charged was mechanically placed on the film and the toner stuck to the paper. If you wanted, say 15 copies of your document, the original had to be scanned 15 times to make 15 copies.

After 2002 the "digital" age of copiers came into being and things were about to change. Now, if you wanted to make 15 copies of a document the original only had to be scanned one time and the digital information was processed by the copiers' mother board and the document information was stored in a "Hard Drive." A normal black and white copier hard drive can hold upwards of 20,000 plus pages of information. Millions of these copiers have been sold and a percentage of them would end up in "self-serve" copy centers. Just imagine going into one of these copy centers and make copies of your bank statement or some other pieces of information for a bank loan. The images of what you printed would still be on the copiers' hard drive. Eventually the hard drive fills up and the images start being replaced by others so your document images would eventually be deleted.

Identity thieves buy used copiers at wholesale clearing houses for cheap. They then remove the copiers' hard drive and hook it up to a program that can read the information and it shows up on a computer screen. This turned out to be an absolute "Treasure Trove" of information for the Identity Thief. When the machines were purchased they don't need to know where it came from, only the personal identifiable information is all they cared about.

One batch of machines, that was being reported by a news agency doing a story on this subject, were purchased by identity thieves at a clearing house were used in the past at a police station. Think about that for a second. What kind of information can be had from a copier inside of a police station? It just so happens that the copier was located in the investigations unit of the police facility! That's not good at all.

So what do you do to protect yourself from this type of identity theft? Obviously, don't make copies of your sensitive information at a copy center. Do it at home on your PC and printer. If and when you do replace your old copier with a new one take the hard drive out of the old one and drill holes in it or smash it up and destroy it. Even home copiers can be tapped for useful information.

Five Myths Concerning Identity Fraud   A Review of Krolls Identity Theft Shield Program   The Urgency of ID Theft Prevention   

Are You High Risk for Identity Theft? Get Protection

Identity thieves originally went after high value targets that had the most money. Nowadays, they have gone out of that comfort zone and target lower income groups who make for easier pickings. Identity theft cases have skyrocketed in the 21st century fueled by technological advancements. It is becoming easier for identity thieves to get information about people which they eventually use to carry out fraudulent activities. Although identity thieves prefer richer people, their information is not as easy to come by compared to low income earners. The following people are more vulnerable to identity theft.

Frequent users of social networks. Research suggests that people who frequently use social networks are vulnerable to identity theft due to the possibility of sharing personally identifiable information. People who have used such networks online for over five years are twice as likely to fall victim to identity theft.

People who reside in apartments in major cities. Identity theft in this case is made possible by the ease by which mail can be intercepted by identity thieves. This group of people also move house frequently. This means that mail can easily land in the wrong hands at a previous residence.

It has become fairly obvious that online shoppers have the highest risk factor when it comes to becoming a victim of this kind of theft. This is because they usually give out loads of sensitive personal information and even credit card numbers.

A proactive approach can serve as a good means of preventing theft. The following are some steps that can be taken to deal with the risk of identity theft.

Always ensure that on changing addresses, you inform the people that send you regular mail such as banks. This will prevent your mail from landing in the wrong hands.

Always shred documents that have personally identifiable information before throwing them in the trash. Even better, burn items with highly sensitive data.

Always cancel all credit cards that you no longer use. People usually get shocked to see purchases made with unused credit cards.

Always have passwords that are hard to guess. Password-protected accounts usually have personal information within them.

Memorize all important numbers such as social security numbers so as not to leave them lying around on a written piece of paper. If not, save them in a secure password-protected location.

Check your bank statement every month to make sure that all transactions were performed by you.

Always make sure that any website you use to make online purchases is genuine. Such websites are usually validated and make use of secure connections.

Five Myths Concerning Identity Fraud   A Review of Krolls Identity Theft Shield Program   The Urgency of ID Theft Prevention   

Identity Theft Threatens Every Small Business

Identity theft has become one of the fastest growing crimes in the United States. Estimates from the FTC are as high as nearly 12 million identities stolen in the U.S. in 2009.

Now identity thieves are taking on a new target. The target has more money, is easier to steal larger sums of money and the theft may not be noticed for quite some time. Who is the new target? Small and mid-sized businesses!

A study conducted by the Ponemon Institute found that the number of cybercrime incidents reported increased by 56 percent and the average cost to a mid-sized business now totals $6 million. Included in that estimate is the "direct, indirect, and opportunity costs that resulted from the loss of theft of information, disruption to business operations, revenue loss, and destruction of property, plant and equipment."

The study goes on to say the time needed to respond to a cyberattack on mid-sized businesses increased from 14 days to 18 days, and the daily cost of responding to cyberattacks has increased from $17,600 to $23,000. Resolving the consequences of a data breach is costly, on average $416,000.

A recent Javelin Strategy & Research Study found that although identity fraud among small businesses had decreased since 2008, they still it at a rate of 4.1 percent in 2010, compared with 3.5 percent of consumers.

Only one in 700 identity thieves ever get caught. Relative to other crimes, identity theft is a low risk and high reward crime. Many identity thieves have turned their attention to small businesses since small business identity theft offers even higher rewards. Philip J. Bland, Javelin's marketing director states that, "Overall there's about $8 billion lost in this particular small business market.

The problem is so big the National Association of Secretaries of State formed a Business Identity Theft Task Force to deal with this issue. They recently met in Atlanta, Georgia to discuss small business identity theft prevention strategies and explore safeguards for state business filing systems.

Identity thieves and cybercriminals have moved from larger businesses to small businesses because they don't have the sophisticated computer network protections, or ability to monitor for criminal activity like larger businesses and corporations. They know small businesses aren't as aware of the problem or willing to proactively protect their information like larger businesses because the of the added expense.

At risk are their bank accounts, credit card information, and customer and employee information. Small businesses must take proactive steps to protect against identity theft or risk going out of business from just one incident. They can't wait or count on government agencies to guard against small business identity theft.

To prevent identity theft, businesses of every size must monitor their bank accounts and credit cards on a daily basis, monitor their Duns File and credit reports looking for unusual activity, and check their state business registration for unauthorized changes.

It is an unfortunate fact; you can't stop or prevent identity theft. All you can do is catch the breach as quickly as possible and limit the impact on your business. Proactive monitoring efforts now could save your business in the future.

Five Myths Concerning Identity Fraud   A Review of Krolls Identity Theft Shield Program   The Urgency of ID Theft Prevention   

Do You Need Identity Theft Repair?

I could tell you in about 2 short sentences why you need it and be done with it, but to truly understand what is involved in the process we have to delve into how or why anyone would need identity theft repair to begin with.

Let me attempt to paint a picture for you... Lets say that you have lost or someone has stolen your wallet or purse. The "Disaster" clock has already started ticking way before you realize that your wallet or purse went missing. If this has ever happened to you, how can you forget the empty and nauseous feeling that accompanied your stomach ache the exact moment immediately after you become conscious of what just happened? Take it from me, that is not a feeling that you want to experience...EVER! After a few anxious minutes you fumble around or look up the numbers of the credit card companies that were in your wallet so you can call them and report your credit cards stolen. Then you call the bank and let them know that your checks were stolen. This is the fun part.... well, not really but, you sit with your head in your hands trying to think or recall any other form of.... Oh shoot... my drivers license! You need to call the DMV. You continue, "...what else was in my purse or wallet that I should take care of?" I think you get the idea.

Now most of those things you can take care of yourself by calling the bank, DMV and other agencies in a timely matter and not have to worry too bad about any repercussions.

This next scenario is exactly why you need identity theft repair because believe it or not, this situation happens more frequently than you can imagine. You lose your purse or wallet and within a half hour or so someone, the so-called Good Samaritan, comes up and gives it back to you. Nothing is missing, all your cash is intact, driver's license, all credit cards are accounted for and you are so ecstatic that you even give the person $20 for their "Honesty". That makes for a good story. But here's what really happens....The thief just bought some time by COPYING the information of the contents of the purse or wallet. The thief now has time on his side to slowly and methodically manipulate the information in his favor to where you have absolutely no clue that your slowly becoming a victim of Identity theft. The thieves change your address, get a new drivers license, later on open up a new bank account, all without you having the least bit of knowledge that its happening.

Now you have to deal with government agencies, banks, financial institutions and try to prove that you are not YOU!! It's your information, now you have to prove that you didn't open those accounts. It is a massive undertaking and most people do not possess the skill or knowledge or the expertise to unravel the complexities of true identity theft.

If you want to have a look at the best identity theft repair in the country go to my link down below and download a free comprehensive report on Identity theft.

Five Myths Concerning Identity Fraud   A Review of Krolls Identity Theft Shield Program   The Urgency of ID Theft Prevention   

What You Do When This Happens To You? Identity Theft Shield - Proactive Monitoring and Restoration

We often are not very careful in guarding our privacy and personal information. We share our birthdays and addresses on many social sites. But what are you going to do if you became a victim of identity theft? Do you know where to get that shield which will help you in every phase of Identity Theft?

Identity theft is a nightmare, like a fictional story told to warn people how much damage it can cause-only it is not fiction. There are alarming stories about how personal information can be obtained by hackers and used for their own evil schemes. They are usually passed around cyberspace as forwarded mails hoping to inform people about what can possibly happen.

Unfortunately, not many people are as careful in guarding their privacy and personal information. Just look around social media sites and you can see how people readily share their birthdays and addresses. If they only knew that identity thieves can make use of such information for their own credit, people will be much more careful.

In this day and age when personal information can be easily taken, it helps to be protected from identity thieves. You just never know when they will strike. The next thing you know, someone stole your name to open a credit card or someone used your name to commit a crime.

In such grave circumstances, it helps to have someone you can trust explain to you in detail how the process goes. You have to consider Identity Theft Shield protection you can avail to protect you from identity thieves.

One of my friends said that she is so glad to have come across this kind of protection a few years back. Having consultations with lawyer at such a low price definitely gave her an opportunity to be better informed about legal matters.

She came to appreciate this service much more when she became a victim of identity theft herself. Back then, she was not the type to take forwarded mails seriously. After all, does it really happen? Or so she used to think. Boy, did she regret being too carefree.

One time she got off work and decided to stay for a while in a cafe while waiting for a friend. To pass time, she decided to surf online with a laptop and the cafe's public wireless internet connection. She got caught up in all the lovely stuff when suddenly, her friend told her that they needed to make it to a reservation. And so she scurried out and did not think about what just happened. She even forgot that she was in the middle of an online transaction to buy shoes.

The next thing she knew, her credit card bill came with tons of expenses she did not even make. She was shocked - she never thought she can be a target. Because my friend already signed up for that service that time, she called them right away. It was her first time to encounter such a situation that everyone needed help every step of the way. They told her the possible scenario on how it happened, and they took care of restoring the records and clearing the bills.

While most people never think they will need legal services, it feels much better to be prepared for such circumstances. With the help of this service, my friend Kim was enlightened about my rights. After consultations with a lawyer as knowledgeable and understanding as the one from the provider law firm, Kim became more relaxed and at ease. This is what Kim wants to say to everyone: "I am so happy with their service that whenever I need any consultation, I immediately call them. It is so great that they offer these services as Identity Theft Shield! They can surely save you whenever you need them-just like how they saved me."

Five Myths Concerning Identity Fraud   A Review of Krolls Identity Theft Shield Program   The Urgency of ID Theft Prevention   

Online Privacy - Your Life Is Online and Giving You Away

If you're trying to disappear, protect yourself against identity theft, or just get a job, your information is all over the internet. And it gives you away at the click of a mouse.

One of the best gifts you can give yourself - regardless of your situation - is to clean up and clear out the information on you that's available to anyone.

After all, do you really want that burglar in the next state over knowing where you live, what you bought recently, or that you're going to be out of town this weekend?

Do you really want to help an identity thief get enough information on you so they can live the lifestyle to which they'd like to become accustomed - on your credit and salary?

Do you really want a stalker, collection agency, or skip tracer to track you down and make your life hell even if you don't have any money?

And do you really want a prospective employer to discover certain information about you - including hobbies - that might make them decide to give that job to someone else because they don't like what they found online?

I didn't think so.

And don't even think these are crazy scenarios

If you think any of the questions I asked above are far-fetched, think again. It happens all the time. And thieves, employers, lawyers, skip tracers, stalkers, and anyone else you can think of, are getting very good at checking online for anything they can find on you. And they're using it for their advantage. Not yours.

Many companies now do background checks on prospective employees - sometimes even before they offer them a job. Maybe you know you'd pass a background check because you've never been in trouble.

But what about the information and pictures you've posted on Facebook, Twitter, MySpace, YouTube, Flickr, and all the other social media and whatever sites that proliferate the internet? Have you considered what's out there that might not make you look like the kind of employee they want?

An identity thief can take that same information and use it to put together a pretty good profile of you that will help them get their hands on enough of your information to help them live a great life at your expense.

Your online information is not private

The FTC (Federal Trade Commission) has said that research into what you do on your personal time does not violate your privacy - especially if it's online. Meaning, what you put out there is fair game to anyone who comes along. Whether you want them to have it or know about it - or not.

This is just like the trash you put out on trash day. Once it's on the curb, it belongs to anyone who wants to get into it. Or the phone calls you make in public. There's no expectation of privacy. So think twice before you start talking about personal information that someone else can (and probably will) overhear.

I was in a hotel lobby not too long ago and could hear a man 20 feet away giving his credit card information to whoever was on the other end of the line (and whoever else was in the lobby). It was identity thief heaven.

Once you put it out there, it's no longer yours. It's theirs. It belongs to anyone who wants it.

What you can do

Name Search

Do a search for your name on all the search engines - Google, Bing, Yahoo, and Dogpile - and see what shows up. (Dogpile is a search engine that checks ALL the search engines and gives you a lot more results.)

Social Media

Then check all the social media sites for your information.

Think about what you find. You may not consider it all that bad. But what about an employer? How would they interpret that picture or information? (And don't think searches are things only prospective employers do. Your current employer might check you out from time to time to make sure they know everything about you, too.)

Is any of it inappropriate? Immature? Does it match the image you're trying to project?

Does any of it give away where you live? Your birthdate? Where you went to school?

If it gives away too much information - remove it. You don't want any accurate personal information about you out there. It's just too easy to use against you.

Also, if there's anything out there that you don't like - get it removed.

Sometimes it's easy. Sometimes it's not. And sometimes it takes time.

Blogs

Do you have a blog? Do you appear in a blog? If so, take a close look at everything on there and remove all the personal information that could be used by someone else. Remove anything that might make you look to an employer.

Picture and Video Sites

Do the same for these sites. It's amazing how videos can make their way across the planet in no time at all and ruin your life.

You've probably heard about the video of the woman on an Asian train. Her dog had an accident on the train and she refused to clean it up. Someone on the train videotaped her (of course) and the story (and her picture) went all over YouTube and everywhere else and ruined her life.

It doesn't take much.

Privacy Settings

The problem with privacy settings is that the rules are always changing. So something that was private, isn't the next time you think to check.

Check your privacy settings and make sure none of this information is available. I also recommend putting bogus information on the site - especially birth date information, phone, address, or anything else personal - even though no one else is going to see it.

Use a different month, day and year. So if you were born on August 3, 1983, put down that you were born on February 18, 1985. Pick a date you can remember - maybe a cousin's birthday. Or someone famous who you admire.

You might not think it's such a big deal. But should a hacker get into my information on Facebook, they won't get anything that they can do anything with. None of the information is real. For example, the little I have on Facebook is all all private, so it's not as if I'm deceiving anyone. Except a thief or someone else with evil intentions. So even a skilled identity thief won't get very far with what's there.

Could you say that about your information? Could a hacker get anything that they could then sell to an identity thief? And actually ruin your reputation, credit, and life by pretending to be you?

And before you pooh-pooh it - it happens all the time. And there's no reason it can't happen to you.

For example, should a hacker get into my information on Facebook, they won't get anything that they can do anything with. None of the information is real. So even a skilled identity thief won't get very far with what's there.

If you put bogus info there you won't have to constantly monitor your privacy settings, nor will you have to worry about someone getting that information.

Put up positive information

Don't just remove the negative or misleading things. If you have a blog, put information there that talks about the good things you're doing. Things you would want your friends or prospective employer to know about you.

If you talk about an event, post about it afterwards - not before. A burglar can't break in if they don't know you're going to be gone. And a stalker can't show up if they don't know where you're going to be.

Always be thinking

Finally, always be thinking about what you're putting out there. Always consider what someone else might be able to do with that information.

There are a lot of people out there who will take advantage of the information you put out there.

You have to be very clear about the fact that they do not care about you. They do not care about the people they hurt. The idea that you might be hurt doesn't even cross their mind. You have what they want and that's all it's about.

Five Myths Concerning Identity Fraud   A Review of Krolls Identity Theft Shield Program   The Urgency of ID Theft Prevention   

What Is Phishing and How to Detect a Phishing Email

Here's How Phishing Works:

You receive an email from what appears to be a legitimate company. Most, if not all of the time, it is addressed to "( Company's Name)Customer" or "Valued Account Holder" or "Dear ____ User". The "Phishers" use a generic salutation because these emails are sent out in huge batches. And who has time to address each one with the recipients name! If you don't see your name, be cautious.

The premise of the email is to get you to click on a link in the email. If they are successful in persuading you to do so, you will be directed to a fake website where your personal information is requested. Another possibility is a pop-up window will appear and direct you to enter your information after clicking the link. Remember, a legitimate company would never request any of your personally identifying information through an email.

Beware of links in email. If you see a link in a suspicious email message, don't click on it. Rest your mouse (but don't click) on the link to see if the address matches the link that was typed in the message. Clicking on a link might also lead you to.exe files. These kinds of files are known to spread malicious software. This technique may also be called "social engineering."

Here's What A Phishing Email Message Might Look Like:

FROM: XYZEE Company <accounts@xyzeeco.com>

SUBJECT: Please update account information

DATE: February 29, 2012

Dear Valued Account Holder,

Per our company policy, XYZEE conducts a periodic account verifcation process.

During the most resent process, we could not verify any of your account information.

In order to insure your account is secure, you must visit

(Example):comapnywebsite.com/account-updateinfo.com

Please click on the above link and update your current account information. If you do

this your account will stay in good standing. Failur to do this will mean your account

will be placed on a 60 day hold.

Sincerely,

XYZEE Company

Did you notice the spelling? Cybercriminals are not known for their grammar and spelling. Professional companies or organizations usually have a staff of copy editors that will not allow a mass email like this to go out to its users. If you notice mistakes in an email, it might be a phishing email scam.

Also, Internet criminals want you to provide your personal information now. They do this by making you think something has happened that requires you to act fast. The faster they get your information, the faster they can move on to the next victim. The best way to protect your identity against theft and keep your personal information safe from a phishing scam is to know what to look for. Recognizing and avoiding email scams can help keep you safe online.

If you do suspect a phishing email scam, report it to: phishing-report@us-cert.gov

Be safe and stay informed.

Five Myths Concerning Identity Fraud   A Review of Krolls Identity Theft Shield Program   The Urgency of ID Theft Prevention   

What To Do If Your Wallet Is Stolen Or Lost

If you've ever been in a situation where you've lost your wallet or purse, you understand how terrible the situation can be. You spend all day looking in every nook and cranny you can think of, and it still never manages to turn up. You start worrying that someone might have used your identification card and credit cards to commit identity theft. In this article, I'll explain what to do if your wallet is stolen or lost.

As mentioned, you really need to search your house or apartment thoroughly. Chance are, you've simply misplaced it. Check under the bed, in the couch cushions, and anywhere else you might have been since you last had it. Of course, if you're reading this article, you've probably done all of that already.

Once you've ruled out a simple misplacement, you should call any establishment that you have visited recently, including bars, restaurants, hotels, etc. If you visited a place and the wallet or purse was dropped while you were there, someone might have found it and turned it in to lost and found.

If you're still out of luck, calling your banks to cancel all of your debit and credit cards is a very important next step. If your wallet was stolen or found by some unsavory criminal, you want to try and minimize the damage early. Contacting each of your financial institutions quickly will inform them that you aren't responsible for any new transactions that occur. You can generally find their contact information online by visiting their website.

After you've informed the bank of your lost or stolen wallet, you should also contact the local police department. The police will help your file a report, and if anyone happens to turn in your wallet to them, you will be easier to find. Banks and credit card companies may also want to see that report in order to prove that any fraudulent transaction were not your responsibility.

If you had a drivers' license in your wallet or purse, it's important to contact the Department of Motor Vehicles to request a new license. They will generally charge a fee for processing a new license.

In the unfortunate event that your wallet contained a large sum of cash, call your home owners or renters insurance provider immediately. You might get lucky if your policy contains a provision for this, but they will most certainly require a police report. Insurance companies are aware the fraud happens frequently in this type of case, so be prepared to plead your case and provide ample proof.

Lastly, you need to be aware of identity theft on your financial transactions going forward. Check each of your financial statements (online where applicable), and keep an eye peeled for any suspicious looking activity. Check your credit report frequently after your wallet has been stolen or lost, because you never know when someone might try to open a new account in your name.

Losing a wallet or purse is a terrible thing to have happen to you, but if you're diligent in taking action right away, you can help mitigate any long-term damage. Check your credit report at Equifax, TransUnion, and/or Experian, call the police, and hope for the best. Stay safe!

Five Myths Concerning Identity Fraud   A Review of Krolls Identity Theft Shield Program   The Urgency of ID Theft Prevention   

Identity Theft - 3 More Ways Identity Thieves Get Your Information

If you assume that identity thieves are lurking wherever you go, you might just be able to keep your information safe. Think I'm exaggerating? Well, think again. Here are three more ways identity thieves get their hands on your information that you probably never knew about.

Dumpster diving in business trash bins

Maybe you're good about not putting sensitive information in your trash or recycling bin at home. But did you know that a lot of businesses are not nearly as careful with your information?

Have you seen these stories in the news?

- How records with sensitive personal information have been blown from trucks heading for the dump or shredding facility

- How unpurged medical records have been found in dumpsters

- How unpurged tax records have been found in dumpsters

And that's just the tip of the iceberg.

Identity thieves know that they have a good chance of finding your personal information in the dumpsters sitting in the alleys behind certain businesses. Whatever the yuck factor, it's worth it just for all the money they're going to make on your information.

What you can do

Don't give out sensitive, matching information to anyone!

If you're seeing a tax preparer, doctor or any other professional - don't give them your social security number or home address. They certainly do not need your social security number (no matter what they say). And they don't need your physical address. Give them your PO Box for their records only. If the tax person wants that information so they can fill it in, tell them you'll do that yourself.

This will also protect you in case someone in their office is selling your information on the side for a little travel money.

Skimming your credit card

This is where a special storage device is installed in a credit card machine. It captures your credit card information when your card is swiped. Later, the thief can download that information to their computer, make duplicate credit cards and use them until your money is gone and your credit is trashed.

This can happen at any business. Restaurants, however, are a particularly fertile ground for many identity thieves. How often have you handed your credit card to a waiter to pay for a meal? If there's regular turnover at a restaurant, it's possible one of the new waiters is capturing your information on the way to the cash register.

What you can do

First, monitor your credit card records frequently. It's a pain in the neck, but can save you in the long run. The big drawback is that if they use your card as part of an identity theft project for more than just mone, you'll have long term headaches.

The second technique is to only use a prepaid credit card at restaurants. What makes this especially helpful is that you don't have to use your real information on the card. So you can use an alias, your name misspelled, and a fake address. That way, even if your card is skimmed, the most they will get is the amount on the card. And if you don't keep a lot on it, you'll lose very little.

You'll still want to monitor this card so that if an unauthorized transaction shows up, you can dump the card, notify the restaurant, and get a new prepaid card.

Phony s

As people have moved activities online, so have identity thieves. They've created a practice known as Phishing.

This is where they send you an that looks as if it came from your bank, Paypal, eBay, or any other organization or business.

The usually tells you that there's a problem with your account and that you need to click on the link in the , sign into your account, and get the problem fixed.

A lot of people panic, click on the link, and sign in.

This gives the thief your information because the address and website are dummies designed to get your information. Now they can move on to get more information and money from you.

What you can do

First, and most importantly, never click on a link that comes from anyone telling you to login to do something. Especially if it's your bank.

If you get an that looks like it's from your bank, open a browser window and go to your bank's site on your own, login and check. Better yet, call them and check.

Secondly, make sure the address where you're getting this warning is actually the you have on file with your bank.

One of the best things you can do is have an address that is only used for your bank or other financially related activities. And never use it to sign up for anything online.

Make sure the address is not something someone could guess - even if they run it through an iteration process that comes up with all possible name combinations. Make sure it has numbers and at least one odd character in it (like # or %).

That way, when you get an that looks like it's from your bank and it came to the Gmail address that you only use for online stuff, you'll know immediately that it's a phishing attempt.

And, by the way, a Gmail address is a great idea for your online activities. Use an odd name (like RV*Mama35@gmail.com or Red%Corvette3@gmail.com) to cut down on spam possibilities. The great thing about Gmail, however, is that they have an excellent spam filter that will cut down on a lot of garbage. It acts as an early warning system so you won't panic and do something that will cost you big time down the line.

If you'd like to discover more ways to protect yourself, check out my book, How to Disappear.

Five Myths Concerning Identity Fraud   A Review of Krolls Identity Theft Shield Program   The Urgency of ID Theft Prevention   

Safeguarding Your Privacy With The Help Of a Private Investigator

You can never be too careful when it comes to protecting your privacy. And that has never been more true than in this day in age where it's so easy for us to be watched without our knowledge or our consent. Sometimes in order to protect our privacy we need a little help, and private investigators are just the people to turn to.

Private investigators are great for private citizens, public citizens and businesses as well. It doesn't matter who you are or where you are; you're susceptible to being spied on or being mislead. Investigators are great for conducting background checks on potential employees. You'll want to know who you're hiring before you hire them. Investigators can gather information about a person's work history, employment profile, neighborhood profile, contacts, corporate ownerships and more.

Bugs can be a serious nuisance whether they be the kind that fly and crawl or the kind that listen in on what would otherwise be private conversations. Electronic bugs can be concealed in ceilings, power boxes, wiring, sockets, smoke and fire detectors, clocks, stationary items, picture frames and much more. You may want a private investigator to check conference rooms for bugs as competing companies may want to learn how your company's business is progressing, business strategies and more.

Private investigators can also check to see if a company's product is being counterfeited or not. The integrity of a business goes a long way, and that integrity can be compromised and tarnished when there is a counterfeit product being produced without the company's knowledge. Business can either be lost or halted when clients and customers are worried and concerned about the product they are receiving.

Private citizens may want to use the services of a private investigator to make sure that their spouse is being faithful. It's a shame that we even have to think about hiring an investigator to make sure that our husband or wife isn't committing adultery, but knowing, although possibly painful, is better than suffering in ignorance in a loveless marriage. There are some people who hire a private investigator to check their fiancee's background before they get married so they know just what they're getting into before the make a commitment.

Although many people may be hesitant to hire a private investigator and fear that they could be growing paranoid, it's always better to be safe than sorry. And in any case, no one has to know that they hired a private detective. Keep your private life private and your business secure with the help of a qualified private investigator.

Five Myths Concerning Identity Fraud   A Review of Krolls Identity Theft Shield Program   The Urgency of ID Theft Prevention   

Do You Know How To Protect Yourself From Mail Theft?

Most mail theft is done by so called low key criminals. Because stealing mail from a mailbox is so easy it's a low tech crime. I doesn't take much brain power to open the mailbox door and take the mail out.

There are 3 ways to cut down the chance of mail theft. The most obvious is don't use a mailbox. Use a locking mailbox is another way. There is also a way to know when your mail has come so a thief doesn't have a chance to take it.

The number one way to thwart mail theft is to not use a home mail box. Though the most positive, it is a big pain. You have to take your mail to work or take it to the post office. Even mail at work may not be theft proof. Having a Post Office Box is pretty safe. There are many problems with a P.O. Box like not having your key or not being open all hours.

The second way to discourage mail theft is a locking mailbox. A lot of people think a locking mailbox will solve the mail theft problem. Though partially correct, a locking mailbox is not theft proof.

I am going to tell you how I know this stuff. I am a retired rural mail carrier. I drove my own car mostly in rural areas and delivered mail. I delivered mail to a woman's shelter. They had a locking mailbox, for a good reason. One day the mailbox was gone. I found out that an irate husband wanted his wife's mail. Because the box was locked, he wrapped a chain around the post, hooked it up to his truck and took box and all down the street until he was caught.

The third way to stop mail theft is get the mail as soon as the mail person puts it in the mailbox. If there is someone home during the day like a retired, disabled or work at home person, getting the mail as soon as it comes is easy. You just need to know when the mail has come.

I am going to add a few tips to help you safeguard your mail. Put your mail in the box to go as late as you can before the mail carrier comes. Have the mail carrier leave a note if you have a package that won't fit in the mail box. As a carrier I disliked leaving a package on the porch. That was an open invitation saying: we are not home. Don't ever leave your mail in the mailbox over night. A flag up at night is saying: come and get it. If you are going to be gone for a day or two ask your regular mail carrier to hold the mail. In most instances he or she will remember to hold your mail. It is not easy as a mail carrier to remember to hold someones mail if there are a few people asking. If you are going to be gone three or more days go on line and fill out a hold request.

Five Myths Concerning Identity Fraud   A Review of Krolls Identity Theft Shield Program   The Urgency of ID Theft Prevention   

Your Credit Report Is Your Most Valuable Asset for Identity Theft Protection

Keeping tabs on your credit report can be your most important weapon in the fight against identity theft. It contains all of your vital statistics, including your date of birth, legal name, any alias, current and previous employers and addresses. Keeping this information safe is a great way to prevent identity theft.

The report also shows status of your credit, current as well as past this includes a count of open and closed accounts. If your account balances are current or delinquent this is documented. It will show any bankruptcies, liens, judgments and even child support information. If a credit inquiry has been issued in your name this will show in your credit report. The report has very detailed account history information such as loan payments, credit card history as well as your current credit score.

The standard credit score numbers range from 330 to 830. The higher numbers indicate a better credit score, this will increase your ability to get a loan or revolving credit account. There are numerous credit reporting agencies around the country but the big three are Experian, TransUnion, and Equifax. These credit bureaus gather, document and distribute your credit information.

Your credit report is not used solely for financial purposes. Insurance companies typically request copies of our credit reports in order to determine their risk in providing us auto insurance. Potential employers might review our credit report in order to evaluate you for a position you are being considered for. Your credit report may also be your first hint that you have become victim of identity theft!

The criminal act of identity theft happens when your personal financial information is accessed through illegal methods and used for purchases and transactions without your knowledge. The prevalent forms of identity theft are via credit card and bank fraud.

These thieves have no personal regard to the use of your information. The result of this misuse can result in serious financial damage which can affect you for many years to come. While here are a number of things you can do to help minimize your risk of becoming a victim of identity theft we are focusing on your credit report in this article. Getting and reviewing your report is your first step in defending yourself from identity theft. Unless you make the efforts to obtain you credit reports, you may not find out that you have been targeted until the damage is long done.

In order to make sure no one has obtained your identity you need to frequently check your credit report. It may never happen to you, but it is better to be safe than sorry. If you find any inkling that your identity has been compromised you can quickly act upon it. This will avoid the many problems associated with identity theft that can take years to get over.

When you get the copy of your credit report you should first look at the section showing inquiries against this report. Every time you apply for a loan or credit card this will be documented. If you find an inquiry that you did not initiate you should notify the credit bureaus right away.

If you notice any accounts that you do not recognize as yours, notify the credit-reporting agencies. You may want to contact the financial institutions involved as well. While reviewing the report look for any bill which was paid off but still show as outstanding. If any are found notify the agency and request for it to be removed. You must follow-up personally on these corrections and make sure that your specific request has been acted upon.

We need to take identity theft seriously and always be on alert for any signs of fraud. You must ensure that your private information stays out of the hands of criminals. This will help to protect you and your families future.

Five Myths Concerning Identity Fraud   A Review of Krolls Identity Theft Shield Program   The Urgency of ID Theft Prevention   

Identity Theft - 5 Ways You Can Become a Victim - Identity Theft Protection and Credit Card Fraud

Across the country, the threat of identity theft continues to climb, this white collar crime continues to plague American consumers, and while it has a direct impact on your wallet, its not just about the money anymore. From using your medical benefits to enable illegal immigration to more insidious crimes, identity fraud criminals are continually inventing new ways to use stolen information.

1.) Drivers License Identity - In America, our driver's licenses, issued by each state's Department of Motor Vehicles or Department of Transportation, have become our national identification card. Unlike a passport, we carry our driver's license with us almost everywhere, multiplying the potential for theft. If your driver's license is stolen and used by someone who receives a DUI or DWI and then fails to appear in court, you may be arrested.

A Pre-Paid Legal membership with the Legal Shield add-on gives you access to an attorney 24-hours a day via a toll-free phone call. It's easy to understand the value of having a lawyer on call in the event that you're stopped by police and there's a warrant for your arrest for failure to appear in court.

2.) Medical Identity - When someone uses your name, Social Security Number, birth date or your insurance card to obtain medical services, they've attacked your medical identity. Whether they assume your identity for the purpose of getting tests, or to receive treatment, not only will your name be on the bill, but the results may become part of your medical history. In some instances medical identity theft means someone else is using your medical benefits.

Setting the Medical Information Bureau straight - and restoring your medical identity - in most cases requires an attorney. With a Pre-Paid Legal membership, you'll have qualified legal counsel at your fingertips.

3.) Social Security Number Identity - When your Social Security Number is used by an identity thief to file with the Internal Revenue Services (IRS), you are stuck in the middle with the tax bill, and a serious need for an attorney. If an undocumented worker uses your Social Security Number to get a job, the income reported to the IRS from the W-2 will raise a red flag as unreported income on your tax return. Alternately, if the thief files before you, the IRS will believe that you have already filed and received your refund, and the return you submitted is a second copy or duplicate. With a Pre-Paid Legal membership you have access to legal counsel and to IRS audit legal services if needed.

4.) Character Identity - It may seem like something out of a movie, but when someone assumes your identity and commits a crime in your name, the drama is real. If your being detained or arrested for a crime you did not commit, you will obviously want to speak to an attorney. The Legal Shield (if available in your jurisdiction) gives you access to an attorney across North America by telephone 24 hours a day if you are being detained or arrested. In a situation like this, it's not likely that your credit card company will be of any assistance. Quick detection is essential in the fight against identity theft. The Identity Theft Shield alerts you when there has been a change on your Experian credit file, which could be a change of address or change to your public records, including felonies.

5.) Financial/Credit Identity Theft - This form of fraud is the one most commonly recognized as identity theft: stealing your identity for financial gain. A thief may set up accounts in your name, use your existing accounts, borrow money against your home, or purchase cars or even a house in your name. When your credit has been exhausted - and ruined - the thief disappears and leaves you with the daunting task of clearing your own name.

One of the greatest misunderstandings about identity theft is that consumers do not lose money. In fact, nothing could be further from the truth. If your credit transaction is covered by Regulation E, you only have two days to report a charge before you start losing money. If you do not deny the debt within 60 days, your financial institution is under no obligation to relieve you of the debt. Because identity thieves often change the mailing address on file with creditors, it is common for victims to be unaware of a theft situation until months after the crime has occurred. In situations like these - and many others - the early detection and restoration services that come with the Identity Theft Shield and the legal services of a Pre-Paid Legal membership, provide an added layer of protection. The hours involved in dealing with identity theft add up. It's reported that it takes 600 hours to deal with true identity theft, do you understand now how the Pre-Paid Legal membership combined with the Identity Theft Shield can be an invaluable service to you and your family. Pre-Paid Legal is the only company that offers a suite of products that fights identity theft before during and after the crime.

Remember no one is immune, an experienced thief can assume your identity and ruin your credit and your reputation. A while there are measures you can take to safeguard your identity, including Pre-Paid Legal's Identity Theft Shield, no one is immune. The difference for those who employ the services Pre-Paid Legal offers is that when you become a victim, you have the power of legal counsel and the experience of licensed investigators working on your behalf. You have the power to fight back.

Five Myths Concerning Identity Fraud   A Review of Krolls Identity Theft Shield Program   The Urgency of ID Theft Prevention   

Twitter Facebook Flickr RSS



Français Deutsch Italiano Português
Español 日本語 한국의 中国简体。