RESCUECOM Offers Advice to Stop Identity Theft

RESCUECOM Gives Internet Security Advice in Westport News

Westport(Conn.) News, July 2006:

RESCUECOM offers ID Theft tips

Avoiding Identity Theft: Part One

Identity theft is rampant these days. It's in the news all the time. Databases are being penetrated on a regular basis. And, even if you don't fall prey to full-blown identity theft, your credit or debit card number might end up being used for a few hundred dollars worth of merchandise on some Web site in Asia. It happens all the time.

While some crime still goes down the old-fashioned way, somebody gets your credit card number during a everyday transaction, much of it is the result of the Internet. Welcome to the future. Science fiction writers predicted many things but cybercrime was foreseen by very few. The Internet, it seems, is both a blessing and a curse.

Society lags technology. The Manhattan Project, for example, created the Atom Bomb before society, and probably the inventors themselves, had a chance to absorb its full ramifications. Now the world does its best to discourage countries from developing nuclear weapons.

Similarly, DARPA created a way for professors and students to share files over a distributed computer network without really knowing where it would it lead. Few could have foreseen that it would be used by hucksters, perverts, terrorists and other assorted predators and maniacs on a global scale.

What should we do? Halt progress? Become Luddites and try to turn back the clock? Unfortunately, it's impossible to put the genie back in the bottle and return to a kinder, gentler time. But we are not entirely helpless, there are things we can do. First and foremost, have your wits about you. Never divulge sensitive information, in any situation, unless you are sure of the players. Never let anyone force information out of you without first verifying their authenticity through separate channels. Any legitimate entity should expect common-sense diligence. If they don't, there's something wrong. They are either not who they say they are or their policies need updating.

Second, educate yourself. Knowledge is power.

Some of us are far too trusting. Others are naturally skeptical and have always done things like cut up old credit cards and shred sensitive documents before throwing them out. Sound paranoid? Remember, the low-tech alternative to hacking databases is dumpster diving. After all, it doesn't really matter how thieves get your information as long as they get it. We'll deal with non-computer precautions in a subsequent piece.

According to RESCUECOM, "Although 12 percent of all identity theft cases can be traced back to online activity, the truth is that almost half of all cases cannot be traced at all. With the growing popularity of Hot Spots and municipal wireless networks, those threats will surely grow in the coming weeks and months. Anyone who uses a computer must take the proper steps to ensure they are not the next victim of identity theft."

Save sensitive documents to floppy disks, CDs, DVDs are some other external storage device. Hackers can't get at them if they're not on your computer. If you do keep sensitive files on your computer, it is a good idea to encrypt them and use password protection.

Install and update virus protection software. This will help prevent a worm or virus from sending information discovered on your computer. Some experts say that an unprotected computer will be infected within a minute if you go online without protection. If you use an Apple Macintosh computer, your risk is minimal but you should still use anti-virus software.

Be wary of Wi Fi (wireless) computer networks. They are not necessarily secure. Secure networks usually require a password or key of some sort. Also, look for a "lock icon" and a URL (Web address) that begins with https:// the "s" indicates it's an SSL (Secure Sockets Layer) encrypted connection. It's not a good idea to view or enter sensitive information on standard http:// Web sites.

Don't set your computer to automatically connect to any network, don't use ad hoc mode (it lets other people connect to you) and don't leave your computer on when you're not connected. It's easier than you think for hackers to connect to your computer through the air.

Don't respond to e-mail requests for information (phishing) unless your verify authenticity and security. Obviously, if you get a request from a bank you don't use, the chances are it's bogus. Crafty crooks, however, can make e-mails and even Web sites look very much like the real thing so it's a good idea to verify ALL requests for information. Assume that all requests are bogus until you confirm otherwise. Legitimate entities do not typically ask for information in this manner.

Limit your activity in unknown Wi Fi situations. Don't send sensitive information, pay bills or engage in financial transactions.

If you must send sensitive files over the Internet it's a good idea to password protect them. File compression software usually offers password protection.

Be careful when you instant message. Unless you use some sort of encryption, instant messaging is normally unprotected. Chat rooms and class reunion and genealogy Web sites should also be treated with wariness.

Install a firewall on your computer and turn off file sharing when you don't need it. This will help prevent hackers from getting information off your computer's hard drive.

When disposing of computers, you should wipe the hard drive clean. Simply deleting files is not good enough. Ideally, you should use utility software that writes ones and zeros over and over again, obliterating meaningful traces of data.

In summary, always be conscious of protecting personal information. If someone asks for it, alarms should go off in your head. If you're suspicious, stop talking right away and start verifying.

According to the Federal Trade Commission (FTC), if you think your identity has been stolen you should contact one of the three consumer reporting companies (Equifax, Experian or TransUnion) to place a fraud alert on your credit report. You should then get a copy of your credit report and close all accounts that may have been tampered with or opened fraudulently. Use the ID Theft Affidavit to dispute new unauthorized accounts. File a report with the local police department and file a complaint with the FTC. Depending on what information has been stolen, you may need to contact other agencies; Social Security Administration, Department of Motor Vehicles, etc.

The FTC Web site has an extensive list of agencies that should be contacted, depending on the type of fraudulent activity.

The following Web sites offer a wealth if information in avoiding and reporting identity theft: the Federal Trade Commission at www.ftc.gov/bcp/conline/pubs/ credit/idtheft.htm, the U.S. Department of Justice at www.usdoj.gov/criminal/ fraud/idtheft.html and the Social Security Administration at www.ssa.gov/pubs/ idtheft.htm

Part Two, which will appear at a later date, will deal with problems that are not necessarily related to computer use.

Google Reviews

Carli Wittkowski
Carli Wittkowski
in the last week
Amazing service! This is my first time with Rescuecom and I am extremely pleased. Great Customer se
...Amazing service! This is my first time with Rescuecom and I am extremely pleased. Great Customer service and so very helpful. I would most definitely recommend. less
Karen Beller
Karen Beller
a week ago
Rescuecom is excellent. I was scammed and Roy cleared my desktop. Excellent service and Roy was very
...Rescuecom is excellent. I was scammed and Roy cleared my desktop. Excellent service and Roy was very knowledgeable. Thank You. less
Robin Penick-Funderburk
Robin Penick-Funderburk
2 weeks ago
A hacker with the alias "DEATHRIDGE" entered a company Teams meeting via someone invited as a guest,
...A hacker with the alias "DEATHRIDGE" entered a company Teams meeting via someone invited as a guest, and started taking control of my computer and my life. They sent emails pretending to be me that really looked like they were coming from me. They tried to take control of our corporate bank accounts, added themselves as a user to my Microsoft account, and locked me out of my computer as my passwords no longer worked. My ability to run a telecom company ground to a halt, and all my company and personal information was at their fingertips. I felt so helpless, and I needed folks smarter than the hacker(s) to do battle for me. Our typical computer pros couldn't handle it, and neither could other "experts" I called. Lucky for me I called RESCUECOM, and they immediately got to work. They didn't complain though I was asking for help in the middle of the night, but immediately got to work and worked non-stop to restore everything and protect me going forward. The team at RESCUECOM are my knights in shining armor, and they're the absolute best! less
Krishna Kambhampati
Krishna Kambhampati
2 months ago
Roy was very helpful for fixing my booting issue. I called really late (10pm) and there was someone
...Roy was very helpful for fixing my booting issue. I called really late (10pm) and there was someone to answer my call. I would recommend them to anyone that needs tech support. less
View all Google reviews

Featured in:


Feature Inthe New York TimesFOX NEWSUSA TodayComputer WorldCNNForbes