RESCUECOM Offers Advice to Stop Identity Theft

RESCUECOM Gives Internet Security Advice in Westport News

Westport(Conn.) News, July 2006:

RESCUECOM offers ID Theft tips

Avoiding Identity Theft: Part One

Identity theft is rampant these days. It's in the news all the time. Databases are being penetrated on a regular basis. And, even if you don't fall prey to full-blown identity theft, your credit or debit card number might end up being used for a few hundred dollars worth of merchandise on some Web site in Asia. It happens all the time.

While some crime still goes down the old-fashioned way, somebody gets your credit card number during a everyday transaction, much of it is the result of the Internet. Welcome to the future. Science fiction writers predicted many things but cybercrime was foreseen by very few. The Internet, it seems, is both a blessing and a curse.

Society lags technology. The Manhattan Project, for example, created the Atom Bomb before society, and probably the inventors themselves, had a chance to absorb its full ramifications. Now the world does its best to discourage countries from developing nuclear weapons.

Similarly, DARPA created a way for professors and students to share files over a distributed computer network without really knowing where it would it lead. Few could have foreseen that it would be used by hucksters, perverts, terrorists and other assorted predators and maniacs on a global scale.

What should we do? Halt progress? Become Luddites and try to turn back the clock? Unfortunately, it's impossible to put the genie back in the bottle and return to a kinder, gentler time. But we are not entirely helpless, there are things we can do. First and foremost, have your wits about you. Never divulge sensitive information, in any situation, unless you are sure of the players. Never let anyone force information out of you without first verifying their authenticity through separate channels. Any legitimate entity should expect common-sense diligence. If they don't, there's something wrong. They are either not who they say they are or their policies need updating.

Second, educate yourself. Knowledge is power.

Some of us are far too trusting. Others are naturally skeptical and have always done things like cut up old credit cards and shred sensitive documents before throwing them out. Sound paranoid? Remember, the low-tech alternative to hacking databases is dumpster diving. After all, it doesn't really matter how thieves get your information as long as they get it. We'll deal with non-computer precautions in a subsequent piece.

According to RESCUECOM, "Although 12 percent of all identity theft cases can be traced back to online activity, the truth is that almost half of all cases cannot be traced at all. With the growing popularity of Hot Spots and municipal wireless networks, those threats will surely grow in the coming weeks and months. Anyone who uses a computer must take the proper steps to ensure they are not the next victim of identity theft."

Save sensitive documents to floppy disks, CDs, DVDs are some other external storage device. Hackers can't get at them if they're not on your computer. If you do keep sensitive files on your computer, it is a good idea to encrypt them and use password protection.

Install and update virus protection software. This will help prevent a worm or virus from sending information discovered on your computer. Some experts say that an unprotected computer will be infected within a minute if you go online without protection. If you use an Apple Macintosh computer, your risk is minimal but you should still use anti-virus software.

Be wary of Wi Fi (wireless) computer networks. They are not necessarily secure. Secure networks usually require a password or key of some sort. Also, look for a "lock icon" and a URL (Web address) that begins with https:// the "s" indicates it's an SSL (Secure Sockets Layer) encrypted connection. It's not a good idea to view or enter sensitive information on standard http:// Web sites.

Don't set your computer to automatically connect to any network, don't use ad hoc mode (it lets other people connect to you) and don't leave your computer on when you're not connected. It's easier than you think for hackers to connect to your computer through the air.

Don't respond to e-mail requests for information (phishing) unless your verify authenticity and security. Obviously, if you get a request from a bank you don't use, the chances are it's bogus. Crafty crooks, however, can make e-mails and even Web sites look very much like the real thing so it's a good idea to verify ALL requests for information. Assume that all requests are bogus until you confirm otherwise. Legitimate entities do not typically ask for information in this manner.

Limit your activity in unknown Wi Fi situations. Don't send sensitive information, pay bills or engage in financial transactions.

If you must send sensitive files over the Internet it's a good idea to password protect them. File compression software usually offers password protection.

Be careful when you instant message. Unless you use some sort of encryption, instant messaging is normally unprotected. Chat rooms and class reunion and genealogy Web sites should also be treated with wariness.

Install a firewall on your computer and turn off file sharing when you don't need it. This will help prevent hackers from getting information off your computer's hard drive.

When disposing of computers, you should wipe the hard drive clean. Simply deleting files is not good enough. Ideally, you should use utility software that writes ones and zeros over and over again, obliterating meaningful traces of data.

In summary, always be conscious of protecting personal information. If someone asks for it, alarms should go off in your head. If you're suspicious, stop talking right away and start verifying.

According to the Federal Trade Commission (FTC), if you think your identity has been stolen you should contact one of the three consumer reporting companies (Equifax, Experian or TransUnion) to place a fraud alert on your credit report. You should then get a copy of your credit report and close all accounts that may have been tampered with or opened fraudulently. Use the ID Theft Affidavit to dispute new unauthorized accounts. File a report with the local police department and file a complaint with the FTC. Depending on what information has been stolen, you may need to contact other agencies; Social Security Administration, Department of Motor Vehicles, etc.

The FTC Web site has an extensive list of agencies that should be contacted, depending on the type of fraudulent activity.

The following Web sites offer a wealth if information in avoiding and reporting identity theft: the Federal Trade Commission at www.ftc.gov/bcp/conline/pubs/ credit/idtheft.htm, the U.S. Department of Justice at www.usdoj.gov/criminal/ fraud/idtheft.html and the Social Security Administration at www.ssa.gov/pubs/ idtheft.htm

Part Two, which will appear at a later date, will deal with problems that are not necessarily related to computer use.

Google Reviews

Keoni Jefferson
Keoni Jefferson
in the last week
When I say, I am truely expressed. David and his team are a blessing in disguise. I was just hired f
...When I say, I am truely expressed. David and his team are a blessing in disguise. I was just hired for a work at home postion. My compter had several, multiple virues. David stayed with me over the phone to fix, and resolve the issues. His personality and the ability to show me what not to install, was comforting. I'm greatly appreciative of RUSCUECOM. less
Sheila O'connor
Sheila O'connor
a week ago
When I called my compute was completely dead. Going away on Sunday and needed to have access to my c
...When I called my compute was completely dead. Going away on Sunday and needed to have access to my computer to get emails out before I left. I talked with T and she was very pleasant and understanding. Take all my information and had tech David call me back. Davis was so awesome and worked with me to get to the point were he could take over my machine. I am so thankful for David he was patience, understand, working with me. He went above and beyond to ensure me that everything will be okay and he would work all night if he had to get my computer fixed. I worked as a supervisor, office manager for many years, I would have been delighted to have David on my team. Once again I am thankful I gave rescue Com I have never any problems with any of the techs. I really appreciate David approach to customer service. Once again he was AWESOME! less
Katie Chuong
Katie Chuong
2 weeks ago
David is awesome!! He is so patient with all my issues and caring and I would definitely recommend t
...David is awesome!! He is so patient with all my issues and caring and I would definitely recommend this 5 star company to everyone, friends and family! less
Karen Gutfeld
Karen Gutfeld
a month ago
These guys are very helpful and know what they are doing. I am a complete dummy when it comes to tec
...These guys are very helpful and know what they are doing. I am a complete dummy when it comes to tech matters and David always walks me through it patiently so that in the end my problem is solved. Very appreciated. less
View all Google reviews

Featured in:


Feature Inthe New York TimesFOX NEWSUSA TodayComputer WorldCNNForbes