An Open Letter From a So-called Stupid
Someone recently told me, "You would have to be a stupid to lose your personal information." While I respectfully responded to this person in the moment, the comment has stuck with me. I present on Identity Theft all over the Western United States, and thought I would respond to this particular individual in writing.
There are multitudes of ways to lose your personal information. You have undoubtedly heard of many of them. Fake web sites, data theft, stealing people's trash, stealing people's outgoing mail, check fraud, etc., are just a few of the possibilities for loss of information. Job ads are also being used for Identity Theft. Monster.com ranks fake companies posing as real companies on their web site among their biggest problems.
So, to you who think that it could never happen to you, you might want to read this next sentence twice. No matter how good you are, no matter how vigilant, no matter how much you shred or tear, no matter how many times you go to the post office so that you don't put outgoing mail in your home mailbox, regardless of how well you can hide in your home, there is no 100% effective defense against Identity Theft. Let me say that again, in case you don't read it twice. There is NO 100% effective method to defend yourself against identity theft.
Here's an example of why. Let's say you want to get health insurance, or auto insurance, or finance a car, etc. etc. etc. Let's say for purposes of this example that you are trying to get health insurance through your company. This is a relatively simple process, right? Fill out the form, and wait to get the insurance cards in the mail.
What you may not realize is that the insurance agent has taken the form you filled out and submitted it for group health. It is submitted to three different companies for underwriting. So now, the insurance agent and the insurance company has the information from you, the three companies supplying the insurance coverage have the information on you, AND all of the employees at all four points have access to the information. Think about how many employees that might be.
That information is often then passed on to a data warehouse like ChoicePoint, and anyone who has access to ChoicePoint now has access to that information. Who has access to ChoicePoint? I think with the recent news articles, the more appropriate question is, who doesn't have access to ChoicePoint?
The information is also submitted to your MIB (Medical Information Bureau) file. Anyone who has access to the MIB files, now has access to all of that information. Who has access to the Medical Information Bureau records? Anyone, at any hospital around the United States, who has even a small amount of clearance, has access to the Medical Information Bureau records.
According to John Gardner, co-author or Chicken Soup for the Entrepreneurial Soul, "This makes the Identity Theft Shield, along with a Pre-Paid Legal Services Membership, an absolute must for anyone that's breathing."
So to you, sir, who more or less said to me, "You'd have to be stupid to become a victim of Identity Theft!" I wish you my best. If you want to continue thinking that shredding your information is going to protect you, then for you I respectfully choose a phrase used by my friend Larry Smith. "Sometimes, you just can't fix stupid."
Jonathan Kraft is Colorado's foremost expert on computer-related Identity Theft. He has been helping employers and employees to protect themselves from the issues surrounding Identity Theft since long before identity theft reached today's epidemic proportions. To learn how Mr. Kraft can protect you or your company against the effects of Identity Theft, please call 877 825-7119, or email mailto:firstname.lastname@example.org. You can also find out more online at http://www.strive4impact.com/idt
I-Team: State Police end security post outside former Gov. Charlie Baker's Swampscott home - CBS Boston
I-Team: State Police end security post outside former Gov. Charlie Baker's Swampscott home CBS Boston
Air Force sees national security threat in Chinese-owned corn mill Successful Farming
TikTok's Transparency Campaign Echoes Effort by Huawei to Ease Security Concerns - The Wall Street Journal
TikTok's Transparency Campaign Echoes Effort by Huawei to Ease Security Concerns The Wall Street Journal
CBP proposes efforts to strengthen aviation security | U.S Customs and Border Protection
Security Principles: Addressing underlying causes of risk in complex ... - Federal Trade Commission News
Security Principles: Addressing underlying causes of risk in complex ... Federal Trade Commission News
Burlington police: Mayor condemns police's private security contract Burlington Free Press
Memphis Police Chief Trained With Israel Security Forces The Intercept
DHS Expands Abraham Accords to Cybersecurity Homeland Security
FTC approves order requiring Chegg to tighten data security Higher Ed Dive
US. Department of Homeland Security and Finnish Ministry of the ... Homeland Security
AI, Processor Advances Will Improve Application Security Security Boulevard
Gem Security emerges from stealth and raises $11 million Help Net Security
Automating security for Linux servers and applications Security Boulevard
Top Web Application Security Testing Companies Security Boulevard
ZURIK: Mayor Cantrell's security officers clocked time while nowhere ... FOX 8 Local First
Radiant Logic acquires Brainwave GRC to strengthen security ... Help Net Security
Coldwater utility board to upgrade security after vandalism, threats Coldwater Daily Reporter
Hospital Security from the Front Door to the Bedside Campus Safety Magazine
Enforcement of Fisheries Rules Will Enhance Maritime Governance ... The Pew Charitable Trusts
How to Implement an Effective API Security Strategy Security Boulevard
Keep Your Home Safe and Secure Consumer Reports
NTT and Palo Alto Networks join forces to improve security ... Help Net Security
Facilities and security prepare for dangerously low temperatures ... The Bowdoin Orient
Dallas Zoo making 'significant changes' to security FOX 4 News Dallas-Fort Worth
Omaha Target reopens after Tuesday shooting, with security KMTV 3 News Now Omaha
Checkmarx CEO on Bringing Application, API Security Together BankInfoSecurity.com
Week In Review: Auto, Security, Pervasive Computing SemiEngineering
ImagineIF Libraries Adds Security Presence to Kalispell Branch Flathead Beacon
San Francisco Chinese New Year Parade to see more spectators, floats, security for year of the Rabbit - KGO-TV
San Francisco Chinese New Year Parade to see more spectators, floats, security for year of the Rabbit KGO-TV
Lack of Natural Gas Storage Seen as 'National Security Issue' in ... Natural Gas Intelligence
Gigamon Appoints Chaim Mazal Chief Security Officer Business Wire
Dodgers: Roster Security is Helping Trayce Thompson on the Mental Side of Things - Sports Illustrated
A look inside Columbus City Schools security and safety efforts ABC6OnYourSide.com
‘Disturbing’ force used at Fresno homeless shelters by private security. Here’s what happened - Fresno Bee
‘Disturbing’ force used at Fresno homeless shelters by private security. Here’s what happened Fresno Bee
Ride-hailing company, inDrive, uses new platform to prevent fraud Security Magazine
Suspects sought after security guard interrupts smash-and-grab robbery at Dior pop-up on Melrose - KABC-TV
Suspects sought after security guard interrupts smash-and-grab robbery at Dior pop-up on Melrose KABC-TV
ChatGPT and API Security Security Boulevard
Tracking weapons found at metro Richmond schools; how expert says schools can improve security - CBS 6 News Richmond WTVR
Tracking weapons found at metro Richmond schools; how expert says schools can improve security CBS 6 News Richmond WTVR
Unlawful Southwest Border Crossings Plummet Under New Border ... Homeland Security
Security dangers of key fobs KSDK.com
Biden Administration Announces Additional Security Assistance for ... Department of Defense
Joint Statement of the Security Consultative Committee (“2+2 ... Department of State
DHS Continues to Prepare for End of Title 42; Announces New ... Homeland Security
QNAP Fixes Critical Vulnerability in NAS Devices with Latest ... The Hacker News
More Than $3 Billion in Additional Security Assistance for Ukraine Department of Defense
Website Security - Creating a Bulletproof Site in 5 Easy Steps
When it comes to a secure website and passwords it is all in your hands to create a password that a hacker simply cannot crack. However, this will require that you be creative and use everything at your fingertips to create the strongest password possible for a secure web site.
The Move to a New Anti-Virus Model
This is the second in a series of articles highlighting reasons why we need a new model for anti-virus and security solutions.Reason #1: the Basic ModelAnti-virus software vendors still rely on yesterday's methods for solving today's problems: they wait for the next virus to wreak havoc and then produce a solution.
Spyware symptoms happen when your computer gets bogged down with spyware programs running in the background without your knowledge. Spyware, adware, malware and even spamware can cause your computer to behave very strange.
Web Browsing - Collected Information
You may not realize it, but as you are surfing the web all sorts of details are being left behind about your computer and where you have been. Most of this information is used harmlessly in website statistics, but it could also be used to profile you, or identify you as a vulnerable target for an exploit.
Watching the Watchers: Detection and Removal of Spyware
If spyware were a person and he set himself up in yourhouse, you are likely going to do one of two things. You'llkick him out yourself or you'll call someone (such as thepolice) to do it for you.
Online Cell Phone Scams and Spam
They're out there. Individuals trying to make a quick buck at your expense.
The Importance of Protecting Your PC from Viruses and Spam
Today the internet is a mine field of malicious code looking to harm your computer. Hackers want to have access to your PC for both fun and profit.
P C. owners are constantly at risk from attacks by hackers.
Its Time to Sing the Encryption Song - Again!
Yes, I'm wearing my encryption hat again. Why you may ask? Well I just finished reading about the newest security hole in Microsoft's latest server product.
8 Surefire Ways to Spot an EBAY Scam E-Mail and Protect Yourself from Identity Theft
Ebay is a great site and is used by many to buy and sell new and used Items. It truly is the worlds Largest Garage Sale Unfortunately when an online site becomes as big and popular as E-Bay the scam artists seem to just naturally follow.
How To Give Away Your Personal Information
Identity Theft and Your Personal Information--------------------------------------------Identity theft is apparently the "in thing" these days. By media accounts, hackers and evildoers lurk everywhere trying to steal your personal information.
Preventing Online Identity Theft
Identity theft is one of the most common criminal acts in society today. Criminals will use your personal information such as banking accounts and passwords, to pretend that they are you.
5 Tips For An Unbreakable Password
Despite the current wave of identity theft and corporate security breaches it's amazing how very few people treat their passwords with any level of seriousness. Most computers users, both at home and in the office, see passwords as a nuisance and therefore make them as easy to remember as possible.
Parental Control - Dangers To Your Child Online & Internet Child Safety Tips
Did you know..
The Never Ending Spyware Story
It's been with us since 1993, it's gotten more intrusive, more complicated.It's created a whole ecosystem, so to speak.
The Saga of the Annoying Adware
When we think of adware, what comes to mind are those annoying and pesky ads that pop up out of nowhere whenever we are surfing the net. Anybody who has surfed through the net has encountered those irritating pop-up adwares advertising everything from computer software down to Viagra.
Top Spyware Removers Considerations
Only the top spyware removers are successful at detecting and removing spyware and adware from your computer. You should look for complete protection against these threats: spyware, adware, keyloggers browser hijackers and Remote Access Trojans.
Online Shoppers, Beware of a New Scam
Beware of a New Scam Aimed at Bargain-HuntersTrying to buy something cheap is absolutely natural--and online crooks set traps for unwitting bargain-hunters. On April 6 Panda Software warned Internet users of a new particularly brazen scam aimed at stealing confidential information.
Avoiding Scams: If It Sounds Too Good to Be True, It Probably Is
A week or so ago, I received an inquiry from a man in Indonesia about buying multiple copies of certain items on my website. I immediately suspected fraud, so I explained that I only had one piece of each.
File Sharing - What You Need to Know!
File sharing on p2p is soaring despite the music and movie industryefforts to curb the practice. Regardless of which side of the arguement you are on it is likely that sharing of copyright materialwill continue in one form or another for the foreseeable future.
|home | site map|