Posts Tagged ‘identity fraud’

4 Tips to Prevent Elderly Identity Theft

More than 12 million people had their identities stolen last year—a shocking statistic that continues to rise. While anyone can become a victim of identity theft, this crime especially impacts seniors who often have more wealth and have spent a lifetime developing good credit.

Elderly identity theft is common among seniors for many reasons. They are generally more trusting than younger adults, not as aware of identity theft risks and scams, and are also more likely to know the identity thief. They are prime identity theft targets online, over the phone, and even in their own homes since they’re less likely to suspect loved ones of the crime.

elderly identity theftWhether you’re a senior or a family member looking for ways to prevent elderly identity theft, there are many things you can do to stay protected. Let’s take a closer look at four tips to prevent identity thieves from claiming another senior victim.

1. Be Safe Online

Seniors who are typically less familiar with Internet security should avoid risky behavior online. This includes online banking and providing personal information in response to email spam. Encourage them to conduct all of their banking in person and ignore emails from people they don’t know. It is also a good idea to install security software on their computer to help prevent hackers from accessing their private information.

2. Freeze Credit

You should also implement a credit freeze. Freezing credit is easy to do and it’s an effective way to avoid elderly identity theft. To freeze a loved one’s credit you will need to contact the three credit agencies (TransUnion, Equifax, and Experian) and request a freeze. You will be required to provide the full name, address, Social Security number, a copy of a government-issued ID, and a copy of a bank statement, insurance statement, or utility bill. The freeze won’t allow any new credit accounts—including loans, bank accounts, and rental agreements—to open unless you give the credit bureau the permission and the password to unfreeze the account.

3. Stop Junk Mail

It’s easy to ignore junk mail, but many of us forget how much personal information it can contain. You can help your elderly loved one opt-out of receiving junk mail by following the instructions on www.OptOutPreScreen.com or by calling 1-888-567-8688. This eliminates or at least significantly reduces junk mail such as pre-approved credit card offers that provide opportunities for identity thieves. To prevent elderly identity theft you also want to make sure you shred all promotional mail that includes personally identifying information. Remember that simply tossing this type of mail in the trash makes it easier for dumpster divers to steal your loved one’s identity.

4. Keep Private Information Private

elderly identity theftCredit cards, Medicare cards, and Social Security numbers are among the most sought after sources of information identity thieves use to commit elderly identity theft. Seniors should keep information such as Medicare statements in a safe or safe deposit box, and shred them after confirmed treatments. They should never carry their Social Security card with them and carry their Medicare card only to doctor visits.

Identity thieves regularly take advantage of the fear many seniors have about their Social Security benefits and Medicare coverage. A trusting senior may assume that the person at the door, on the other end of the phone line, or in an email are simply doing their job when they ask for their Medicare information. However, a common elderly identity theft scam is for a thief to call a senior and claim to be from the Medicare office. The thief asks for verification of the senior’s Medicare account number so that benefits can be paid, and then disappears with all of the information he needs to create a new identity. Make sure your loved one is aware that the Medicare office will never ask for this type of verification via phone, email, or in person.

Start Preventing Elderly Identity Theft

In addition to following these tips, you should also stay in regular contact with your elderly loved one to keep track of any suspicious behavior. There are also several ways to proactively stop identity theft. Sign-up with a prevention and recovery service such as ID Theft Solutions so the solutions for protecting your identity are all in one place. When your identity is compromised, you will have a personalized, one-to-one partner to take on the time-consuming recovery process on your behalf.

As always, you can rely on The Identity Advocate to keep bringing you tips to safeguard the identity of all of your family members. Learn more about preventing elderly identity theft, medical identity theft, social media identity theft, and all other forms of identity fraud by visiting www.TheIdentityAdvocate.com or by calling 310.831.4400.

Beware of Skimming Devices-Tips to Protect Yourself-ITRC

A skimming device is a piece of hardware that is attached to any credit/debit card processing machine and will record all the data that is contained on the magnetic strip on the back of your card. The skimming device is often supplemented with a camera discreetly positioned so that it can secretly record you enter your PIN number if using a debit card. A skimming device can be placed on ATM machines, gas station pumps and at the cashier at your local retailer.

Check the machine you are using for any suspicious additional hardware attached to it or for a warning sticker that has been cut or torn.

A skimmer can be small and inconspicuous, but it is nonetheless an additional piece of hardware that must be physically attached to any machine that you are using. Always be sure to check for any hardware that looks like it was manually added and does not conform to the rest of the machine.  On some machines, the skimmer can be attached in a hidden compartment such as a gas station pump. The gas station pump credit/debit card swipe is often covered and you will not be able to see a skimmer that is attached to it because it is hidden behind a panel or compartment that must be opened in order to access it. Many gas stations place a sticker over the panel opening so that it must be removed, cut or torn in order to reach the component the skimmer must be attached to. Whenever one of these stickers looks stretched, excessively worn, or severed, you should look for a different pump or gas station.

Use a credit card over a debit card whenever possible.

The reason for this is due to the differences between how a credit card and debit card work. A credit card is simply a line of credit extended to you from a financial institution. When you pay for something with a credit card, you are creating a debt with the financial institution that you will have to pay later. A debit card is different in that it is not a line of credit, but a conduit to your bank account which contains your hard earned money. This is related to two problems that   occur when your debit card is used for fraud as opposed to your credit card. First, since your debit card is attached to your bank account, a criminal can potentially drain all the money out of your bank account leaving you with no money to pay your bills. A criminal using your credit card can run up a nasty bill, but at least you will still have the money in your bank account to be able to pay bills such as rent and car payments. Second, banks treat debit cards and credit cards differently when it comes to fraudulent transactions. Credit cards are offered much more robust liability protection in that, generally, your liability for fraudulent transactions will usually be at maximum $50.00. A debit card on the other hand will have liability limited to $50.00 so long as you report the fraudulent transaction within two days. Your liability will be limited to $500.00 if reported between 2 and 60 days, and you will be liable for the entire fraudulent transaction if you fail to report it within 60 days.

Monitor your credit and debit card accounts as often as possible.

In order to reap the benefits of limited liability and to prevent a thief from using your card information over several days or weeks, you must be vigilant in monitoring your accounts to find evidence of fraudulent transactions. The sooner you detect a fraudulent transaction, the faster you will be able to report the fraud to your financial institution, limit your liability for the purchase, and shut down the card so that it can no longer be used.

“Three Tips to Avoid Skimming Device Consequences” was written by Sam Imandoust, Esq. He serves as a legal analyst for the Identity Theft Resource Center. We welcome you to post/reprint the above article, as written, giving credit to the author and linking back to the original posting.

Protecting Your Medical Information from Identity Theft

Have you thought medical identity theft wouldn’t happen to you? Is your thought “why would anyone want my medical information?” Well, they don’t want your “medical history” —  they want your insurance information. They might be out of work, or have a friend who needs assistance, or belong to an identity theft ring, and is in it for the money they can earn by selling your medical identity! Today it is more valuable then just your social security number.

When your medical information is stolen and used by someone to seek treatment, your own medical history will change. You may receive bills from doctors you have never seen or even heard of. You may discover they have a different blood type, or have cancer. Then to remove the mis-information and change your information back to who ‘you really are’ becomes an arduous task in itself. Also, you might find yourself responsible for bills that are not yours, and this affects your credit rating when it goes to collections!

Be proactive, protect your medical identity  by asking  your physician the following questions:

Does s/he do a complete background check on his employees?

Does s/he encrypt the records in his office?

If you should change physicians, what happens to those records? Does s/he outsource billing and receivables and if so, are they cleared as well. You want to know who is in his office and if there are prying eyes or someone who can walk off with all your information on a device such as a laptop or flash drive with all your electronic health information?

Read this article from Fox Business News and see why your medical information and insurance are a valued resource in the the black market; and why it is so difficult to keep your information PRIVATE:  http://www.foxbusiness.com/on-air/willis-report/blog/2013/05/21/protect-yourself-against-medical-identity-theft..

And then call me or email me for solutions available to  protect and recover your identity in the event that your identity is compromised or stolen

www.theidentityadvocate.com

310-831-4400

Cyber Criminals Using Photo-Sharing Programs to Compromise Computers – FBI Press Release

The FBI has seen an increase in cyber criminals who use online photo-sharing programs to perpetrate scams and harm victims’ computers. These criminals advertise vehicles online but will not provide pictures in the advertisement. They will send photos on request. Sometimes the photo is a single file sent as an e-mail attachment, and sometimes the victim receives a link to an online photo gallery.

The photos can and often contain malicious software that infects the victim’s computer, directing the user to fake websites that look nearly identical to the real sites where the original advertisement was seen. The cyber criminals run all aspects of these fake websites, including “tech support” or “live chat support” and any “recommended” escrow services. After the victim agrees to purchase the item and makes the payment, the criminals stop responding to correspondence. The victims never receive any merchandise.

The FBI urges consumers to protect themselves when shopping online. Here are a few tips for staying safe:

  • Be cautious if you lose an auction on an auction site but the seller contacts you later saying the original bidder fell through.
  • Make sure websites are secure and authenticated before you purchase an item online. Use only well-known escrow services.
  • Research to determine if a car dealership is real and how long it has been in business.
  • Be wary if the price for the item you’d like to buy is severely undervalued; if it is, the item is likely fraudulent.
  • Scan files before downloading them to your computer.
  • Keep your computer software, including the operating system, updated with the latest patches.
  • Ensure your anti-virus software and firewalls are current—they can help prevent malware infections.

If you have fallen victim to this type of scam, file a complaint with the Internet Crime Complaint Center at www.ic3.gov.

If you need education and resources to protect your identity click on http://www.theidentityadvocate.com/identity-advocate-services.php

The Monthly Newsletter from ID Theft Solutions USA Partnering with The Identity Advocate for Education, Protection and Recovery

ID header
ID Theft Takes its Toll on the Workplace
  This past winter one of the top box-office movies was “Identity Thief,” a comedy about a guy chasing a woman across the country after she had stolen his identity. The message of the movie was simple: getting your identity stolen can be funny. But try telling that to the more than 11 million victims who each year suffer the devastating emotional toll of knowing they no longer have control over their lives. Identity theft is not just a financial burden, but also a feeling of vulnerability and violation. ID theft victims also have to cope with the long road needed to be traveled to try and resolve the situation.

ID stressed worker

   Research shows it can take up to 33 hours for a victim to come to a satisfactory ID theft resolution. With some reports suggesting it can take up to 600 hours for truly serious breaches to be rectified, and occasionally the problem never gets resolved. That’s a lot of time spent on phones, emails, copying documents, running to the post office, etc. It also takes a lot of direct telephone interaction with a live person, a person who works your basic 9-5 schedule.
   This means when a person has their identity stolen there’s also an innocent bystander about to become collateral damage: the employer.
   James LaPiedra, President of ID Theft Solutions USA in Mahwah, NJ, recently wrote an article on how employers are affected when an employee falls victim to ID Theft. It has appeared in Transport Topics, Crain’s Tire Business, Central NY Business Journal, Food Industry News, Michigan Business Update, and Broker World. Read the article in Business NH magazine.
 
Case Study: Credit Card Fraud
ID magnifying glass    It came to the attention of a Human Resources Director for a large West Coast pharmaceutical company that something was terribly wrong when she received notices that she had “opened” six credit cards with retailers. She discovered her identity had been stolen and the thief had already run up purchases close to $2,000. She immediately took steps to figure out what was wrong by contacting us to handle the situation. We needed to work quickly on the client’s behalf (through Limited Power of Attorney) before the situation spiraled out of control, beginning with working with the retailer’s Credit Customer Service Representatives and Credit Card Fraud Investigators to close the accounts.
   We then proceeded to take the necessary actions to recover the victim’s information and resolve the situation. Although the client wasn’t able to obtain a Police Report at first, we were able to do so by providing the client with a memo from the FTC to give to the police, explaining that this was in fact, a case of fraud. A Police Report is needed in order to complete “Affirmation of Unauthorized Use” for all retailers, which includes the Police Department’s Date of Report, Officer Name and Phone, Case or Report Number. This memo and Police Report ultimately brought closure for our client. We also sent extended (7 years) fraud alerts for our client to Experian, Equifax and TransUnion. The result was it was determined that our client was not responsible. A Proof of Fraud was submitted, the accounts were closed and there was no monetary obligation to our client.
 
ID Theft… In the News
COLUMBIA, S.C. — State and federal officials say an international hacker broke into the South Carolina Department of Revenue computer files and gained access to about 3.6 million tax returns. Govenor Nikki Haley said the hacked files included state returns submitted since 1998 with unencrypted Social Security numbers. There also were about 387,000 credit and debit card numbers of which 16,000 were unencrypted.
MARCH 2013
President’s Message
ID president
  Seemingly overnight some stranger you’ve never met has taken over your life. This person has purchased items in your name, taken employment in your name, maybe even committed crimes in your name. In essence, they have become….you.
   What sounds like science fiction actually affects over 9 million people a year in the United States:  Identity Theft.  There is no more helpless, frightening, and lonely feeling.
   Each month “Protect What’s Yours” will provide helpful tips to stay ahead of the bad guys, fraud updates from across the U.S., case studies and much more. We welcome your feedback.
– James R. LaPiedra, President
ID Theft Solutions USA
9 Ways to Avoid ID Theft when Traveling Abroad
ID wallet    Like ordinary identity theft, identity thieves specifically target certain types of personal information of travelers, including; credit and debit account numbers, Social Security number, date of birth, and driver’s license number. According to the Corporate Travel Safety website, there are several things you can do during your travels to safeguard your personal information and ensure you aren’t amongst the next group of victims. Check out their tips.
Prepare to take back what’s yours with
Lock Down Guide
A step by step guide to securing your personal information and avoiding risk. Written by Law Enforcement Professionals and offered upon enrollment.
Contact us today at Info@IDTheftSolutionsUSA.com,
or call
1-855-728-8743
ID Theft Solutions USA
One International Blvd

Mahway, NJ 07595

Social Networking Identity Theft

Are You a Target for Social Networking Identity Theft?

Social networking. Most of us do it. For some of us it’s an addiction. But it can be dangerous. Social networking identity theft is on the rise as more and more identity thieves adapt to this increasingly easy way to steal your identity. Once they have your identity, the sky’s the limit. They can drain your bank account, run up your credit, and virtually destroy you financially. And it all starts with some “innocent” communication online.

Social Networking Identity Theft Statistics

The statistics are in, and they aren’t pretty. According to PC World, one third of members of social networking sites like Facebook, LinkedIn, Twitter, and MySpace have at least three pieces of personal information posted on their profile that can make stealing their identity easy for identity thieves. These include full names, birth dates, addresses, phone numbers, names of parents, and names of children. When pieced together, this information makes stealing your identity on social networking Web sites as easy as creating a fake profile on one of these sites.

Although nearly 80% of people in the PC World poll said they were concerned about their privacy on social networking sites, about 60% said they had no idea what their privacy settings were and who could see their personal information on those sites.

Scary statistics? Yes. A playground for social networking identity theft? You bet.

Prevention Tips

Follow these tips to avoid becoming a victim:

Personal Information: How much do you want the world to know about you? Remember: Your friends aren’t just finding you on Facebook. Scammers may be seeking you out as well. Keep your personal information safe by not posting your full name, birthday, address, phone number, and other private information that could be used to find you. Don’t even think about posting seemingly harmless information like when you’ll be out of town or when you’re at the gym. A growing identity theft tactic is to identify when you’re gone and then pounce to break-in and rob your home. Sound crazy? It happens all the time. Think before you tweet “Going on vacation for a week.”
Learn the Rules: All social networking sites are different and they all have their own rules. Identity thieves take advantage of this vulnerability and prey on you before you even know what happened. They know the faster they get to you, the faster they can rob you. Before you register with a site, read the privacy policy and terms of use to avoid becoming another victim.
Restrict Access: You’re in control. Always remember that. You don’t have to share everything to the world. Most social networking sites allow you to restrict access to your page so only “real friends” can keep up with you. Steer clear of social networking identity theft by only allowing people you actually know (not even friends of friends who could be posing as identity thieves) to be friends and follow you.
Google Alerts: This is free and easy. Just setup a free Google Alerts notification for your full name. You’ll get an email every time your name shows up in a search online. This helps prevent identity theft because you can see where, how, and why your name is being searched for online. If it looks suspicious, such as someone pretending to be you, you can take immediate action.
Post for Posterity: Everything you post online “lives” forever. Even if you think you’ve deleted information from a site it exists on people’s computers that they can then use to steal your identity-even years after you posted it!

Protect Yourself!

The moral of the story? Have fun on social networks, but be cautious. You never know who may want to be your “friend.” If you want to learn more about fool-proof ways to prevent social networking identity theft, contact The IdentityAdvocate at 310.831.4400 or email info@theidentityadvocate.com.

Hospice – Homecare – Preventing Medical Identity Theft

How to Prevent Homecare and Hospice Medical Identity Theft

As more and more baby boomers reach their golden years, more and more of them need the services of homecare and hospice agencies. This rapid influx is good for the industry, but agencies need to be as vigilant as ever in their hiring practices of caregivers.

Why? Because medical identity theft is on the rise, and homecare and hospice agencies are easy targets. You need to take immediate action to safeguard your agency, reputation, and clients from the growing threat of medical identity theft.

Medical identity theft is an insidious crime in which an identity thief uses someone else’s identity to gain access to medical services, treatment, or equipment. Since elderly patients are particularly vulnerable to the dangers of medical identity theft, your agency must take extra precautions. This includes stringent hiring protocols and foolproof IT policies and procedures.

Most agencies consult with experts to ensure their entire operation is protected from medical identity theft. Through a comprehensive review of the organization, medical identity theft experts ensure that homecare and hospice agencies:
• Perform thorough background checks on all employees: Employees are the first line of defense to prevent medical identity theft, so it’s critical that homecare and hospice agencies put employees through a rigorous screening process. A medical identity theft expert assists with criminal background checks, speaking with references, and setting up a system for maintaining extensive employee records.
• Create medical identity theft policies and procedures: Professional agencies need to have a strict set of policies and procedures in place to safeguard protected health information (PHI) under the Health Insurance Portability and Accountability Act (HIPAA).
• Ensure patient records are secure: Agencies should also have a secure IT network that only allows authorized users to access sensitive patient information. A medical identity thief can run rampant and ruin lives with the push of a button unless safeguards are built into the system. Complex passwords should be implemented only for those employees who need access to patient records.
• Make sure both the doctors and patients are “real”: Many medical identity thieves prey on the system by actually impersonating doctors and patients for monetary gain. This includes pretending to be a doctor to prescribe medication for the thief and/or his cohorts, as well as using another person’s insurance card to obtain medical services. Do your homework to ensure that physicians have professional references and admitting privileges to medical facilities.

As a homecare or hospice agency, you can significantly reduce your vulnerability to medical identity theft by working with a medical ID theft expert. Visit www.TheIdentityAdvocate.com or call 310.831.4400 to schedule your comprehensive medical identify theft review. And, don’t forget to ask how you can safeguard your agency with an eye-opening “Lunch and Learn” for your employees.

Identity Theft using your Tax Return

Did you know that the IRS works on a first come first serve basis, so if someone has stolen your identity and filed, you will not be the one receiving your tax return! Watch the NBC video clip here:
Maybe it is time to consider Identity Theft Protection Services as endorsed by the Identity Advocate. Review here: https://www.entrustamerica.com/signup1.aspx?sp=theidentityadvocate

Cyber Fraud Protection Tips from the FBI

Here are some tips you can use to avoid becoming a victim of cyber fraud:

Do not respond to unsolicited (spam) e-mail.

Do not click on links contained within an unsolicited e-mail.

Be cautious of e-mail claiming to contain pictures in attached files, as the files may contain viruses. Only open attachments from known senders. Scan the attachments for viruses if possible.

Avoid filling out forms contained in e-mail messages that ask for personal information.

Always compare the link in the e-mail with the link to which you are directed and determine if they match and will lead you to a legitimate site.

Log directly onto the official website for the business identified in the e-mail, instead of “linking” to it from an unsolicited e-mail. If the e-mail appears to be from your bank, credit card issuer, or other company you deal with frequently, your statements or official correspondence from the business will provide the proper contact information.

Contact the actual business that supposedly sent the e-mail to verify if the e-mail is genuine.

If you are asked to act quickly, or there is an emergency, it may be a scam. Fraudsters create a sense of urgency to get you to act quickly.

Verify any requests for personal information from any business or financial institution by contacting them using the main contact information.

Remember if it looks too good to be true, it probably is.

To receive the latest information about cyber scams, sign up for e-mail alerts on this website. If you have received a scam e-mail, please notify the IC3 by filing a complaint at www.ic3.gov.

Medical Identity Theft: Will you be the next victim?

Preventing Medical ID Theft: Are You At Risk ?

Preventing medical ID theft has become a hot topic as Americans increasingly hear about the safety of their private medical records as more medical breeches continue to be discovered. Medical ID theft happens when a person uses someone’s identity to obtain medical services or steal money by falsifying claims for medical services. Identity thieves use a person’s Social Security number, insurance information, or other forms of identification to commit the medical ID theft.

Medical ID theft can have a devastating effect on victims, causing collections issues, credit problems, and even bankruptcy. But that’s not all. The type of medical treatment obtained by the identity thief can also prevent the victim from getting medical insurance or medical services themselves because, as far as the insurance company is concerned, the victim now has a “pre-existing” condition.

According to the FTC, medical ID theft accounts for three percent of all ID theft cases, or approximately 250,000 cases per year. Unfortunately, these medical ID theft statistics are expected to grow, especially with the shift to electronic medical records.

Preventing Medical ID Theft: The Unemployed and Uninsured

Due to their difficult circumstances, some groups are at a higher risk for becoming identity thieves. The unemployed and uninsured may use another person’s identity because of a belief that it’s the only way they can receive quality medical care. Since they’re unemployed, they don’t have access to an employer’s healthcare benefits, and they can’t afford to buy medical insurance because they don’t have a job. It’s a vicious cycle, and it can make good people do bad things.

Preventing Medical ID Theft: Illegal Immigration
Illegal immigration also poses a serious threat as medical ID theft continues to rise. When an illegal immigrant steals private information such as an individual’s Social Security number, he or she can obtain identification and numerous services reserved for legal residents. If precautions aren’t taken to prevent medical ID theft, an illegal immigrant can get a passport, driver’s license, bank account, credit card, loan, mortgage, insurance, medical treatment, and many other services.

Preventing Medical ID Theft in Five Steps
Begin preventing medical ID theft by following these five easy steps:
1. Have your Social Security number removed from your insurance records. If your Social Security number is currently on your insurance card, don’t carry your card with you. Keep it in a safe place and only carry a photocopy with all but the last four digits of your Social Security number blacked out.
2. Obtain copies of your credit reports, insurance claims, and medical records. Lock them in a safe or safety deposit box, or place them on a CD or flash drive.
3. Next, regularly review your credit reports, insurance claims, and medical records for suspicious entries, such as a medical treatment that was never performed on you.
4. Immediately address disputes on your explanation of benefits, bills for medical services you never received, or any other charges that could be sent to collections and damage your credit. These need to be investigated and removed from your records.
5. Don’t leave a paper trail. Destroying sensitive information you no longer need is another critical step in preventing medical ID theft, so shred claims that are more than seven years old. Also, ask if your provider’s office performs background checks employees to prevent medical ID theft rings and stolen medical information.

Preventing medical ID theft takes vigilance. Medical ID thieves are doing everything to stay one step ahead of you and the authorities, so use medical ID theft prevention strategies to protect your private information.

Want to learn more about preventing medical ID theft? Contact The Identity Advocate at 310.831.4400 or via email at info@theidentityadvocate.com.
Visit us online at www.theidentityadvocate.com.