Here’s Why You Need Identity, Privacy, and Device Protection

Our philosophy has always been “all security is personal”. So, whether you are a front line administrator, a CISO, or a CEO, the security of your organization begins with you and your person. If you don’t have your own personal security in order, how do you expect your business data to be secured? It starts with you.

People are often anxious about the security of their personal information and online accounts. Cybercriminals are finding new ways to invade your privacy which is why you need comprehensive protection to keep you safe online.

Here are some protection and privacy best practices that you can use to keep your identity and sensitive information away from prying eyes and restore your faith in technology.

Device Protection

Device protection refers to the measures you take to protect your hardware or physical devices from intruders and potentially harmful software, such as malware, adware, and viruses.

Protect Your Hardware

This may sound simplistic, but knowing where your smartphones, computers, iPads, and gaming consoles are and never allowing people you don’t know to use them are the first steps in protecting them.

Ensure that you protect your devices with a password to ensure that your photos, banking apps, and text messages stored on them are inaccessible if you lose your phone at a concert or leave your tablet in a restaurant. You’d be amazed at how many people don’t have a password in their mobile phone.

Back Up

It’s also a good idea to back up your files regularly so that your images, videos, and documents are lost if your laptop / phone  crashes or is stolen. Use a combination of Google, Apple, online backup services and local external hard drives, and sync software.

Protection Against Malicious Software by Updating

To keep your device safe, you’ll also have to protect it from malicious threats. There are many ways for malware and viruses to get onto your devices, including phishing scams, suspicious websites, questionable downloads, and clicking on advertisements.

When browsing sites that seem unreliable, use caution, and apply common sense when clicking on links.

Updating operating systems, browser, and various software programs, is necessary to keep your data and devices secure. These updates are for functionality purposes, but more often are critical for security updates, when and where at vulnerabilities are discovered by researchers.

Privacy Protection

Protecting your privacy involves preventing advertisers, fraudsters, and other unscrupulous organizations from obtaining access to the information you’d prefer to keep private.

It only takes a few careful modifications to your regular browsing, emailing, and social media activities to increase your internet privacy. Just be thoughtful about where you’re going, what you’re doing, and what personal or sensitive information you may be providing.

Limit What You Share on Social Media

Consider your usage of social media. Do you upload pictures containing information that could be used to identify you? Examples of information that you shouldn’t share online include your:

  • Full name
  • Birthday
  • Physical address
  • Current location

If your profile is freely accessible and anyone can view it, you might want to think about limiting what you post online. Sadly, although your loved ones may like reading your status posts, cybercriminals enjoy them even more.

Fraudsters can learn enough about you in just a few minutes of spying to pass themselves off as you or to target you. Restrict the information you post on social media and restrict the number of people you follow and befriend to those you actually know.

In the end, be thoughtful about what you post, and how a scammer might use it against you, your family, or your business.

Use a VPN

Connecting to a virtual private network (VPN) is another great way to protect your online privacy. By encrypting your connection and keeping your location hidden, a VPN enables you to browse the internet anonymously.

Protecting your privacy with a VPN is essential when using public Wi-Fi at a library, restaurant, or coffee shop.

This is because cyber criminals typically wait around unprotected Wi-Fi networks to spy on users making online purchases or paying bills to gain access to their login information.

Invest in Antivirus Software

Spyware can also threaten your online privacy. Adware, for example, can be used to spy on your online activity to help third parties learn more about your interests and preferences and target you with online ads.

One of the best ways to block spyware is by installing a reliable antivirus application to help you identify and remove malicious software. A reliable antivirus software application to help detect, identify, and remove malware and viruses that could pose a threat to your online security. A paid subscription has multiple layers of protection versus a free antivirus.

Identity Protection

Another type of fraudulent activity to look out for is identity theft. Each time identity theft occurs, dealing with the repercussions can be challenging and may even have an impact on your finances, credit rating, and future ability to obtain loans, credit cards, or mortgages.

Protecting your personal information with care is one approach to keeping your identity safe online. Never provide anyone your Social Security Number via email unless it is absolutely necessary, and you have verified the sender’s identity.

Investing in identity security services that monitors the dark web and notifies you of any suspicious activity that might point to identity theft is a good idea.

Consider getting a credit freeze which locks on your credit report and prevent unauthorized counseling, opened in your name.

Here are some examples of identity theft:

1.    Forging an Identity

The most frequent form of identity theft is when a thief takes a victim’s Social Security number and uses it to create a new false identity.

2.    Creating New Accounts Using Someone Else’s Credentials

When a scammer successfully obtains financial data and personally identifiable information from a user, they can open new accounts such as utility accounts, credit cards, and more using the victim’s good credit rating.

3.    Taking Over Someone Else’s Account

Account takeover occurs when a fraudster takes the victim’s account login information and adds themselves as authorized parties, giving them access to the victim’s banking facilities.

Fortunately, this type of fraudulent activity is steadily decreasing due to the widespread use of EMV chip readers.

4.    Medical Identity Theft

Medical identity theft occurs when fraudsters pose as patients to access certain prescribed drugs and have their medical care covered by the victim.

5.    Corporate Identity Theft

Corporate identity fraud occurs when a criminal tries to issue new lines of credit in the name of a company, sends clients fake bills, and then takes the payments themselves. This type of identity theft is most common in small businesses.

A cybercriminal may still manage to obtain your personally identifiable information even when you follow all the rules.

When a security breach occurs at an establishment with your personal information, you’ll need to find another way to keep your information and banking accounts safe.

Protect Yourself

Considering how many ways there are to target users online, it should come as no surprise that many are uneasy about their safety when surfing the net. Fortunately, you can safeguard your devices, protect your identity, and keep your browsing history away from prying eyes by installing reliable antivirus software.

Keep up with the latest developments, and if a corporation that stores your information is the target of a cyberattack, take swift action to protect your identity and safeguard your account.

Cyber Security Newsletter Hits 10,000 Subscriber Milestone

The cyber security newsletter from Protect Now Partner and Head of Training Robert Siciliano hit a milestone of 10,000! subscribers on LinkedIn on July 17, 2023. Subscriptions for the newsletter grew exponentially as the 10,000-reader threshold neared.

In addition to LinkedIn, the CSI Cyber Security Newsletter is available via email subscription, with past issues posted to the Protect Now Blog. Each issue highlights current cyber security news of interest to small- and mid-sized-business owners, including evolving threats, regulatory updates and practical advice to avoid cyber criminals, presented in language that non-technical web users can understand.

“Tremendous thanks to everyone who has subscribed, but also everyone who has ever shared or forwarded the newsletter,” Siciliano said. “I created the CSI newsletter to fill a void that I saw in security coverage. The response over the last few months has surpassed my expectations.”

A Practical Cyber Security Newsletter for Businesses

The “void” Siciliano cites is a reliable, knowledgeable source of practical information business owners and employees can use to understand and respond to evolving cyber threats. With new cyber threats and new social-engineering techniques emerging constantly, individuals need to understand how to keep their data and systems safe.

“Finding information on cyber crime is not a problem,” Sicilano noted. “Finding relevant information with practical advice is far harder than it should be. There is a real effort in every issue to identify the most relevant threats, so that readers get a curated view of what is happening now, or what may be right on the horizon.”

Siciliano puts himself in the shoes of his clients when choosing topics and ways to present them. “The average employee is not worried about a zero-day exploit in file transfer software, but they care a lot about the growing trend of pretexting attacks, where a criminal will call and pretend to be a client or coworker to steal money or information,” he said.

The newsletter also serves as an evolving, value-added supplement for those who complete Protect Now CSI Cyber Security Employee Training. As Siciliano explains, new cyber attacks are often easily foiled using the same methods that thwart older hacking and phishing techniques. “You have to be skeptical and you have to be vigilant. We all get a feeling when something seems off. If you can learn to recognize that and apply it to online interactions, you can stop the majority of these attacks, no matter how the criminal tries to make contact. All cyber crime breaks down into two categories: A criminal breaking into systems, which is a software issue, or a criminal convincing an employee to do something, which is a people issue.”

The CSI cyber security newsletter is published monthly. LinkedIn users can subscribe via Siciliano’s LinkedIn page, or sign up to receive the email newsletter using the Subscribe for Email Updates section below.

Prevent Apple ID Phishing Scams

Apple owners have noticed something very weird: they are becoming victims of a scam using Apple IDs. Once they give up the IDs, scammers can sometimes get access to their Apple account. Here’s how it works: People get a text that says their Apple ID is going to expire, and they are asked to click a link. When they do, the scam occurs because they unknowingly give up their ID and password to a scammer. It’s not rocket science, but it’s an easy and smart scam.

There are some ways to determine if a message is a scam. First, your Apple ID isn’t going to expire, ever. Apple will occasionally request you log into your account, they will occasionally lock your account, and they will occasionally make things difficult because well, they are Apple and they and you are a big target. As long as you are not responding to and clicking links in text messages or emails then you aren’t going into the scammers rabbit hole. Only engage in Apple ID requests on your Apple device in the settings menu or in your browser preferably on a laptop or desktop when logging directly into Apple’s website.

Beyond Apple ID scams, always look for anything weird like misspelled words or grammar that seems off. Messages that make promises that you will win something, or create a sense of urgency, like “you must do this now,” are also very sketchy. Honestly, any text that you get from a number that is not recognizable is probably a scam. If you think a text from a company might be legit, give the business a call.

This is a really tricky scam as it seems very real, and it is fairly simple for scammer to pull off.

As you can see from the above screen shots, it is not easy to choose which of the photos is the real Apple ID request and the fake one. Keep in mind that the fake one only comes up if you click a link in a text. However, that same pop-up to sign in will generally only come from activity in your settings menu iTunes iMessage FaceTime etc.

First, take a deep breath. Instead of blindly filling out your information every time you get a password request, and be sure of the source of that request. To do this, hit the home button, and then touch “Settings.” Look at iTunes, iMessage, and FaceTime. When you enter each of them, if your account needs authenticating, you will see a pop-up. This is a legitimate one.

Your Apple ID Doesn’t Expire and other Facts 

News flash – as previously stated, your Apple ID will not expire. Even if you forget your password, your username, or you haven’t used it in years, your ID is active.

Another thing you should know is that if you use two-factor authentication, you should use it with your Apple ID. This prevents most phishing scams that use “authentication.”

You also might want to consider taking a screen shot of any scam message your get and report it to Apple by sending it to imessage.spam@apple.com. You can also use the “Report Junk” option if you get an iMessage from someone who is not a contact. This also sends the info directly to Apple. Mind you, I don’t do this. I don’t have the time. And there are millions of other people doing it.

If you get a scammy message from SMS (the green message) and or the iMessage (the blue message,) you can report those, too. Or just delete it and reported as junk so you don’t get it again. But, if you are inclined, you will have to do that via the FTC website. Major mobile phone providers including Verizon, T-Mobile, and AT&T also allow customers to forward messages to 7726.

As of today, this password scam is out there, and it’s easy enough for people to create others, so use caution…and don’t forget to set up Apples two-factor authentication and account to recovery details.

Written by Robert Siciliano, CEO of Credit Parent, Head of Training & Security Awareness Expert at Protect Now, #1 Best Selling Amazon author, Media Personality & Architect of CSI Protection Certification.

Identity Theft — Types, Signs, and Protection for Victims

The internet is an awesome place where you can do things like shop or interact with family and friends you may not see all of the time. For as much fun as it is, though, it can also be quite dangerous.

Identity Theft --- Types, Signs, and Protection for VictimsAccording to the U.S. Federal Trade Commission, in 2020, there were about 2.1 million fraud reports, and many of these were for the purpose of stealing another person’s identity.

Victims of identity fraud may lose a lot of money, and their credit could be damaged for years. They also might have a lot of mental anguish and stress to deal with. There is a threat of identity theft for almost anyone, but if you know how to do your best to avoid it, as well as signs of ID theft, you can help to protect yourself and your family.

The Definition of Identity Theft

Most of us have heard of identity theft, but do you really know the definition? It is when a cybercriminal steals a person’s personal or financial data, generally in order to use the information for financial gain. It means they may try to get information on full names, Social Security numbers, birthdays, address, credit/bank account information, or even driver’s license information. Once they have this information, they can use it to apply for credit cards, open bank accounts, get insurance, or even do things like buy a house or car…all in the name of the victim.

How Does ID Theft Happen?

Before we get into the types of identity theft, it’s important to know how ID theft happens:

  • A Phishing Scam – These days, phishing scams are all over the place, and they often happen via email or websites. Generally, with these scams, a person pretends to be someone you know or trust, such as posing as a customer service worker from your bank, in order to get information and personal data.
  • Data Breaches – Many companies store the information of their customers, including your doctor, your ISP provider, your credit card company, and more. If there is a data breach, criminals will have easy access to this information, and it might even get sold on the dark web.
  • Snooping on Social Media – Criminals often will get information to steal an identity by using social media. Most people, for instance, have their birthday on their Facebook page, and they might even have their home address. That, along with their name, might be all they need to gain access to other accounts. They can also look for things like pet names or kid’s birthdays, as many people use these for passwords or PINs.
  • Hacking – A hacker can easily get into phones, tablets, or computers if they aren’t protected. They use malware and viruses to do this. Having a good antivirus software can help stop this, and it can help to protect your personal information and devices from the bad guys.
  • Theft – Some criminals really go back to basics to steal someone’s identity. They can really just take it. By stealing your wallet, your purse, or even your phone can give them all of the information they need.
  • Dumpster Diving – A criminal might also simply pull your information right out of the trash. If you are throwing away documents that have information such as your name, address, birthday, or other information, a thief can find this right in the garbage. Keep in mind that things like a bank statement or credit card statement can contain your number, and a pay stub may have your Social Security number on it. Always take a couple of minutes to shred any paperwork before you throw it out.

The Five Main Types of ID Theft

 There are a ton of different types of identity theft, but there are five main ones:

Financial ID Theft

 The most common type of identity theft is the financial variety. This is when a scammer uses a victim’s data for financial gain. This type of ID theft may take the following forms:

  • A scammer might use your credit card information to buy things online.
  • A hacker can literally steal money right out of your bank account – they often do this by taking small amounts here and there from unknowing victims. This amount might be so small that you may not even notice it — but when they do this over and over again, they can collect millions.
  • A criminal can open new accounts in your name, too, by simply using your Social Security number and supporting data. For example, a person can open a credit line in your name, and then use all that credit…leaving you with the pay back.

The good news, however, is that it is fairly simple to protect yourself from ID theft by keeping an eye on your bills, your bank account, and credit card statements. If you see something that looks strange, you should immediately notify your bank or credit card company. You should also check your credit report for any changes. A decrease that you were not expecting could mean that there is some type of fraud going on. You can check your credit report in a number of ways, and most credit card providers offer it as a perk for customers.

You can also choose to place a fraud alert on credit reports, so that you can stop anyone from opening any new accounts by using your information. This means that lenders and creditors must take extra steps to verify your identity before they offer a credit increase or loans. A credit freeze might also be a great idea.

Medical ID Theft

Another type of identity theft is medical identity theft. This is when a criminal takes a person’s identity to get health care by posing as the victim. They can use this information to do things like obtain prescription drugs or even get expensive surgery done. This means that you will get the bills for all of this, and it can also negatively affect your health records. This can mean you will have difficulties getting insurance in the future, and it can also mean you won’t get the care you need in a health crisis.

You can help to minimize the risk of medical identity theft by taking the time to review any and all medical claims you might get in the mail. If you see anything that doesn’t look right, such as a prescription you didn’t get, you should immediately contact your doctor’s office and your insurer. You should also contact the U.S. Department of Health and Human Services to make a claim.

Criminal ID Theft

This type of identity theft occurs when a person is arrested for a crime, but then they use the name of someone else. They might be able to do this by using a fake or stolen ID, such as a driver’s license, to show the cops.

This can be a difficult type of ID theft to notice if you are a victim until some type of consequence happens, such as –

  • You get a court summons for a crime you didn’t commit
  • You get a bench warrant for your arrest
  • You get information that someone is performing a background check on you

One of the things that you can do to protect yourself against criminal ID theft is to protect your ID. If your driver’s license or state-ID is stolen or lost, you should immediately report it to law enforcement or the DMV. Also, you should make an effort to limit the type of information you share online.

Synthetic ID Theft

 This is the fastest growing type of ID theft in the US, and it is the practice of people creating a fake ID using the real information of the victim. The bad guys might, for instance, use information such as the Social Security number, birthday, and address of three different people, and then combine this information to create a new ID. They can then use this information to commit fraud.

The most important thing to know about synthetic ID theft is that you may be able to stop it by knowing that it’s happening, and then acting quickly. For instance, if you get a piece of mail that has your address on it, but a different name, or you get a phone call to your number asking for someone you don’t know over and over again, this could be an issue. Again, you should be checking your credit reports for anything strange, which could indicate that there is an issue. An identity monitoring service may also help to catch this type of ID theft.

Child ID Theft

Finally, we have child ID theft. In this case, a scammer steals the information from a child to open a new account or credit line in that child’s name. Then, they can use that information to do things like apply for benefits, get a driver’s license, or even purchase a home. It is easier for a scammer to get away with this than with an adult’s information, as most children don’t have any type of credit nor financial accounts.

A sad fact, here, is that the ID theft of a child is often done by their own family or family friend, as they will have easy access to the child’s information. Most of the time, they can get away with it for years, as a minor typically won’t even realize that they are a victim until they try to do something like take out a student loan for college.

The best way to check on this is to see if your child has any type of credit report with TransUnion, Experian, or Equifax. If they do, look at the report, and then let authorities know if there is anything suspicious. You also might consider placing a freeze on your child’s report to help to minimize any type of fraud from occurring.

Signs that You are a Victim of ID Theft

None of us want to be left in the cold when it comes to ID theft, so by knowing the signs you can use to spot it, you can get ahead of it quickly.

Finally, here are some of the signs you should look for:

  • Fraud alerts from a bank or other financial institution – most banks have some type of security in place to notify them and the customer if there is something weird going on. For instance, if you are in Chicago, and your credit card is used in Tokyo, there could be a big problem.
  • Your credit score changes unexpectedly – A credit score that rises unexpectedly could mean that someone is attempting to extend your credit, and a strong dip in your score might mean that someone is trying to get a loan in your name or there is a bill in your name that has gone to collection.
  • Your financial accounts have changes – It is important to check your bank statements at least every few weeks and look for anything that seems unfamiliar to you. You should also look to see if there are any new credit accounts or lines of credit in your name.
  • You apply for credit, and you are denied – if you have a decent credit score, and you apply for credit, you probably think that you are going to get approved…. if you don’t, you should check your credit report, as someone could be up to something.
  • You get strange phone calls from a collection agency – If you start getting phone calls from a debt collector or collection agency that you don’t owe, there could be an account open in your name that you don’t know about. Check your credit report, immediately.
  • You get mail that is odd – You may also get some mail that is sent to your address that seems strange. This might be medical bills or other bills that you do not recognize.
  • Your tax filing is rejected – Additionally, you may notice that when you try to file your taxes that they are rejected. This could mean that someone has already filed in your name. If this happens to you, contact the IRS immediately.

Written by Robert Siciliano, CEO of Credit Parent, Head of Training & Security Awareness Expert at Protect Now, #1 Best Selling Amazon author, Media Personality & Architect of CSI Protection Certification.

Tips to Protect Your Identity from Cyber Thieves

There are several tried and true ways that you can use to protect yourself from ID theft, and some of them you might have never even considered:
Check Your Passwords – Every online account you have should have a different password. Never use the same password for more than one account. You can easily fix this issue by using a password manager. Also, don’t use specific words/phrases or keyboard sequences when creating passwords. A password manager can even generate passwords for you.

Don’t Post Personal Information on Social Media – This including things like your kid’s school or teacher, the town your parents live in, your pet’s name, or even where and when you are going on vacation. Cyber thieves can use this information to guess passwords.

Ignore Any Email from People You Don’t Know – If you get emails from people you don’t know that have a link or attachment, never, ever click or open them.

Put a Password on Your Phone – This way, if your phone is lost or stolen, you don’t have to worry.

Shred Important Documents – Anything that comes in that has personal information, that would go in the rubbish, should be shredded. This includes credit cards bills and medical records.

Never Give Your Social Security Number Out – Unless you absolutely have to, you should not give up your Social Security number. Just because someone asks for it, that doesn’t mean they actually need it, or you should hand it over. That said, I give up my social all the time. But only on documents or applications that absolutely require it.

Check Out Your Credit Report Each Year – Every year, or every quarter, you can get access to your credit report for free. Check it out when you can to make sure it’s accurate.

Inspect Your Statements – Look for anomalies or unauthorized transactions. This includes any banking and credit card statements, and you should do this each month.

Get a Locking Mailbox – A locking mailbox is available at most big box hardware stores or online.  Or pay for a PO Box.

Stop Your Mail When You Travel – You should also stop your mail delivery when you take a long trip.

Freeze Your Credit – Consider freezing your credit. This will stop an ID thief from opening new accounts in your name.

Written by Robert Siciliano, CEO of Credit Parent, Head of Training & Security Awareness Expert at Protect Now, #1 Best Selling Amazon author, Media Personality & Architect of CSI Protection Certification.

Protecting Your Parents from ID Theft

When we look at statistics,most of the people who are victims of ID theft are 50 years old or older. Unfortunately, cyber criminals have no issue taking advantage of older adults and seniors, including your parents.

old parentsThese crooks violate their trust and take advantage of their ignorance of the online world. People over 50 also tend to have more money and savings including retirement funds.

Here are some scams that are commonly pulled on older adults and seniors…like your parents.

Common Scams Targeting Your Parents

  • They get an email that seems like it is coming from their bank, the FBI, IRS, etc. The email claims that there is an issue that needs to be taken care of ASAP. Typically, it’s financial, so the scammer asks for their bank account information, or it’s for information, and they ask for a Social Security number.
  • They get a call with a sad story…their kid/grandkid needs help, and they need money wired immediately.
  • They might also get a call, email, or letter concerning their mortgage. If a scammer can get access to information like your parents’ bank information, Social Security number, or even the deed to their home, they can refinance your parents’ mortgage and keep the equity they get back.
  • There are also retirement home scams. In these scams, scammers get a job at a retirement home, and then manipulate the residents to tell them personal information.

How to Prevent These Scams

Here are some ways that you can prevent scams like these:

  • Make yourself a guardian over the personal information of your parents. When they get some type of contact that seems suspicious, you should instruct them to get in touch with you. Any information, even your mother’s maiden name, can be used in an identity theft attempt. Tell your parents to never give their personal info to anyone over the phone or via email.
  • Make sure they know to never share any personal information on social media accounts.
  • Tell your parents to check their bank accounts and credit accounts regularly. You should work with them to sign up for alerts for suspicious transactions.
  • Give them a shredder so that they can get rid of things like bank statements safely. Anything with account information, a Social Security number, or other personal info should be shredded.
  • If your parent is using a Wi-Fi hotspot, you should install a VPN for them.
  • If your parent has recently passed away, make sure you don’t put too much unnecessary information in their obituary. These are hot zones for ID theft, so leave out any info an identity thief could use.
  • Show your parents that they should only put information into a website that starts with https://, NOT http://.
  • Also, talk to your parents about emailing safely. Phishing scams are very good, so tell them not to click on any link in an email.
  • Sign your parents up for the website OptOutPrescreen.com. This helps to cut out any unnecessary offers they might receive.

Keep an Eye Out for Scammers

Don’t let your parents become a victim. You can easily prevent it, and more importantly, your parents won’t have to go through the process of rebuilding their credit and recovering their identity. Taking action now is the best way to protect against ID theft. Knowing if your parents are doing something that is risky could definitely be in your favor, as you can help them figure out what is going on and stop it.

Protecting Their Identity

We are all pretty vulnerable when it comes to ID theft, but older people are much more vulnerable. You can’t totally protect yourself and your parents, but you can make it much less likely that something will happen if you take the advice above. It’s always also worth it to invest in ID theft protection for both you and your parents, and you also might even consider a credit freeze.

Written by Robert Siciliano, CEO of Credit Parent, Head of Training & Security Awareness Expert at Protect Now, #1 Best Selling Amazon author, Media Personality & Architect of CSI Protection Certification.

Synthetic Identity Theft: What Is It?

You might know what identity theft is. It’s when someone takes someone else’s personal and private information so that they can get something out of it…namely, money. What you might not know is what synthetic identity theft is. The goal is the same, but it’s a little different.

Synthetic Identity Theft

In the case of synthetic identity theft, a person makes up a new and fake identity by mixing up information from a real person with information that they create. You might not immediately see that this is a bad thing, but it can be pretty devastating.

Here are three ways that hackers can create a synthetic identity:

They Can Create a New Credit Profile

By far, the most common way that the bad guys use a synthetic identity is to create a new credit profile. Basically, they use a valid Social Security number, which they take from the victim, and pair it with a made-up name. Then, they start applying for credit with this information. Typically, these applications will get denied, but during this process, a credit profile is created. Even with poor credit, there are companies that give credit to people with bad credit, so the hackers know they can get a few hundred dollars out of this which can turn into a few thousand dollars or more.

They Can Piggyback

Another thing that people do with synthetic identity is a practice known as the piggyback. At a basic level, they look for individuals with great credit, and then they access their account. When they do this, they add a fake person as an authorized user. However, they don’t use this account. Instead, they bide their time and let it sit. While they wait, the major credit card agencies create a report of this synthetic identity, and the criminal hacker can use this new, great credit profile to apply for loans and credit cards.

They Practice Data Furnishing

Finally, they might use data furnishing. This is an effective, sophisticated method, and it requires someone else to help. Basically, the hacker needs access to someone like a manager or a small business owner from an established business. The company is already well-known, and it is approved to offer info on their customers…which they give to the hackers. A setup like this takes several months to set up, but once it is established, it can make the thieves a lot of cash.

Currently, it’s difficult to pinpoint how much financial impact these synthetic identities have, although it is thought that it could be billions of dollars in losses. For someone who gets into the business of identity theft, this could mean billions of dollars. Thankfully, there are a number of things that you can do to protect yourself, including being careful about what type of information you are sharing, especially when it comes to social media. Also, consider a credit freeze and ID theft protection, and make sure that you check your credit report regularly.

Written by Robert Siciliano, CEO of Credit Parent, Head of Training & Security Awareness Expert at Protect Now, #1 Best Selling Amazon author, Media Personality & Architect of CSI Protection Certification.

How Much Do You Know About Identity Theft?

You would think with all of the attention on the news out there about hacking, data breaches, and identity theft, that people would be very focused on privacy and protecting their information from the bad guys.

Identity Theft Awareness Check

We all have a lot going on, and identity thieves know this. Always watching, these guys are betting on us being too focused with our day to day lives to notice who we are ultimately sharing our important information with. They literally are waiting for us to make one wrong move.

Are You a Victim of Identity Theft?

The shocking truth is that most of the people who become victims of identity theft don’t even realize it. You could be a victim right now and be none the wiser.

Why? Because generally, a person doesn’t know if they are a victim until they get a notification from their bank or other financial institution Each year, there are more than 16 million people who have their identity stolen.

How is it possible to share your information so easily? Well, there are a couple of ways to do it. For instance, you might have gotten married, you may give away too much information on your social media accounts, or you might have replied to a fake email, phone call, or text.

On top of this, a major life event can put you at a higher risk of becoming a victim, such as getting a new job or having a baby.

How Dangerous is Identity Theft?

Most of us consider identity theft to just be something like credit card fraud, but it is a lot more than that. Though this is common, an identity thief can do a lot more than simply open up a credit card in your name. They can also:

  • Open up a bank account and make changes to your billing address, meaning you would have no idea.
  • Taking out a big loan, such as an auto loan or mortgage, and not paying it off.
  • File a fake tax return, and then taking the money that comes from it.

If you are a victim of identity theft, you might be dealing with it for a number of years to come, and it is a big struggle to clear your name and fix your credit score.

How to Protect Yourself

Thankfully, there are a number of ways that you can protect yourself from being a victim of identity theft. Some of them include:

  • Don’t give your Social Security Number out unless it is totally necessary
  • Don’t allow mail to sit around
  • Don’t respond to any requests for information that seems suspicious
  • Don’t create simple passwords for online accounts

Written by Robert Siciliano, CEO of Credit Parent, Head of Training & Security Awareness Expert at Protect Now, #1 Best Selling Amazon author, Media Personality & Architect of CSI Protection Certification.

When its Tax Time, Protect Your Identity

Tax time comes around every year, and though you technically have until April 15th each year, if you can, file earlier. There is a good reason for this; you can avoid putting yourself in a position to get your identity stolen.

How Filing Your Taxes Can Compromise Your Identity

Robert Siciliano, CSP, SAFR.MEYou might be wondering how you can become a victim of an identity thief just by filing your taxes. There are a couple of ways scammers do this. First, the thief will use your Social Security number to file taxes, but plug in their mailing address and then when your refund comes around, they take your refund.

The second way that a scammer can steal your identity is that they take your Social Security number, get a job with it, and the employer will report their earnings to the IRS. When this happens, the IRS sees it as very suspicious, and you could get stuck paying a huge tax bill.

In both cases, there could be big problems ahead for you. For example, you might not be able to get a refund or even file your taxes. There is also the chance that they have used your Social Security number to get a loan, a credit card, or cash.

How Thieves Access Your Information

The main question you might be thinking here is this: how would an ID thief get your Social Security number in the first place? Typically, they would do this by hacking. For example, there was the huge Equifax hack. 145 plus million people were affected, and you could have been involved in it. It’s easy, when these breaches happen, hackers bathe in your information.

What Can You Do if You are a Victim?

If you are a victim of a scam like this, there are some things you can do:

  • Submit Letter 5071C to the IRS – This is a form that the IRS will send if your tax return looks suspicious.
  • Submit Form 14039 – This form alerts the IRS that you believe you are a potential victim of tax ID theft.
  • Ask for an Identity Protection PIN – The IRS will give you this number so that it can confirm your identity for your future tax returns.
  • Make a Report to the Federal Trade Commission – You also should file a report with the FTC by going to IdentityTheft.gov.
  • Contact the Tax Office in Your State – Your state’s tax office might have other recommendations based on your personal situation.

If you have tried to file your taxes electronically and get rejected, you should still file a return by mail. Additionally, call the IRS Identity Protection Unit for assistance. An agent can help you start the process of taking care of the problem and ensuring your return is filed correctly.

Written by Cyber Security Expert Robert Siciliano, CEO of Credit Parent, Head of Training & Security Awareness Expert at Protect Now#1 Best Selling Amazon author, Media Personality & Architect of CSI Protection Certification.

The Ultimate Guide to Spotting Fake News

Do you know when something is “fake news?” If you have half a brain, you should. However, when someone in authority makes a claim, the masses who elected that person into that authoritative position, automatically trust what has been said and spread that fake news. That needs to stop. My mother one said believe nothing of what you hear and half of what you see. And today no matter what, don’t automatically believe what you read.

fake newsThere has been a lot of talk about fake news since the 2016 presidential election, and a lot of controversy from those who spread fake stories for the purpose of influencing hearts and minds and of course the outcome of the election. This is dangerous for dozens of reasons, many of which threaten our democracy and in many cases can lead to people getting killed which has happened many times this year.

Keep in mind that not all people who spread or start fake news stories are propagandists, some are thieves and even more are advertisers. Some people just want you to come to their website so they can get clicks and traffic. Advertisers use fake news, as a way to get more clicks. This isn’t really dangerous to you, but someone is getting money because you are clicking on their site.

Other people use fake news, too, including those who want to facilitate identity theft. There are fake news sites that you click on, and then when you visit the site, you get a virus. From there, a hacker can get access to your personal information including your logins and passwords, bank account information, or even your Social Security number.

Here are some things to look out for:

  • Use common sense when looking at fake news stories. If it sounds too sensational, it probably is fake.
  • If a story is an obvious parody, it’s also obviously a fake news story.
  • If you already know some of the facts of the story, and something seems weird about the story you are reading, it’s very possible that the news is fake.
  • Look at the URL where the story is found. If it looks strange, the story is likely fake. For example, if you see a URL ending with “.com.co,” it’s a website from Colombia.
  • If there is a photo and the photo looks fake, the story is likely fake, too. But, this isn’t always the case.
  • Don’t just automatically trust.
  • The main stream media has been vilified over the past four years. And while their news is often “biased”, it’s not fake. It’s based on fact, but again those facts may be slanted in favor of the readership. Fake and biased are definitely not the same thing.

Look Closer at the Photos

Many fake news stories have photos that accompany them. Here’s how to test if a realistic photo is accompanying a fake news story.

  • Take a screenshot of the photo, making sure to exclude any graphics that are not relevant.
  • Open Google Images.
  • Upload or drag the screen shot to the search area in Google Images.
  • You will then see information about the “best guess” for the image. If the information doesn’t correlate to the story, you are probably reading a fake news story.

You can use this trick in other ways, too. For instance, if you do online dating, you can see if the person you are talking to is actually who they say they are. If not, they are a faker.

Additionally, you can do this with any image that you have. If the Google Image search gives you information that doesn’t correlate with what you think it does, it is likely a scam. Keep in mind that crooks like identity thieves often steal images and use them as their own.

When you are in doubt, it is always best to do a search on the item to see if other news sources are reporting on it, too. If the only place the story is seen is on a no-name site, you should suspect that it’s fake. If it’s not also being reported by the New York Times or Wall Street Journal, it’s probably fake.

ROBERT SICILIANO CSP, is a #1 Best Selling Amazon author, CEO of CreditParent.com, the architect of the CSI Protection certification; a Cyber Social and Identity and Personal Protection security awareness training program.