![]() | |
![]() | |
![]() |
Security Information |
|
![]() |
An Open Letter From a So-called Stupid
Someone recently told me, "You would have to be a stupid to lose your personal information." While I respectfully responded to this person in the moment, the comment has stuck with me. I present on Identity Theft all over the Western United States, and thought I would respond to this particular individual in writing. There are multitudes of ways to lose your personal information. You have undoubtedly heard of many of them. Fake web sites, data theft, stealing people's trash, stealing people's outgoing mail, check fraud, etc., are just a few of the possibilities for loss of information. Job ads are also being used for Identity Theft. Monster.com ranks fake companies posing as real companies on their web site among their biggest problems. So, to you who think that it could never happen to you, you might want to read this next sentence twice. No matter how good you are, no matter how vigilant, no matter how much you shred or tear, no matter how many times you go to the post office so that you don't put outgoing mail in your home mailbox, regardless of how well you can hide in your home, there is no 100% effective defense against Identity Theft. Let me say that again, in case you don't read it twice. There is NO 100% effective method to defend yourself against identity theft. Here's an example of why. Let's say you want to get health insurance, or auto insurance, or finance a car, etc. etc. etc. Let's say for purposes of this example that you are trying to get health insurance through your company. This is a relatively simple process, right? Fill out the form, and wait to get the insurance cards in the mail. What you may not realize is that the insurance agent has taken the form you filled out and submitted it for group health. It is submitted to three different companies for underwriting. So now, the insurance agent and the insurance company has the information from you, the three companies supplying the insurance coverage have the information on you, AND all of the employees at all four points have access to the information. Think about how many employees that might be. That information is often then passed on to a data warehouse like ChoicePoint, and anyone who has access to ChoicePoint now has access to that information. Who has access to ChoicePoint? I think with the recent news articles, the more appropriate question is, who doesn't have access to ChoicePoint? The information is also submitted to your MIB (Medical Information Bureau) file. Anyone who has access to the MIB files, now has access to all of that information. Who has access to the Medical Information Bureau records? Anyone, at any hospital around the United States, who has even a small amount of clearance, has access to the Medical Information Bureau records. According to John Gardner, co-author or Chicken Soup for the Entrepreneurial Soul, "This makes the Identity Theft Shield, along with a Pre-Paid Legal Services Membership, an absolute must for anyone that's breathing." So to you, sir, who more or less said to me, "You'd have to be stupid to become a victim of Identity Theft!" I wish you my best. If you want to continue thinking that shredding your information is going to protect you, then for you I respectfully choose a phrase used by my friend Larry Smith. "Sometimes, you just can't fix stupid." Jonathan Kraft is Colorado's foremost expert on computer-related Identity Theft. He has been helping employers and employees to protect themselves from the issues surrounding Identity Theft since long before identity theft reached today's epidemic proportions. To learn how Mr. Kraft can protect you or your company against the effects of Identity Theft, please call 877 825-7119, or email mailto:jkraft@strive4impact.com. You can also find out more online at http://www.strive4impact.com/idt
MORE RESOURCES:
I-Team: State Police end security post outside former Gov. Charlie Baker's Swampscott home CBS Boston Air Force sees national security threat in Chinese-owned corn mill Successful Farming TikTok's Transparency Campaign Echoes Effort by Huawei to Ease Security Concerns The Wall Street Journal CBP proposes efforts to strengthen aviation security | U.S Customs and Border Protection Security Principles: Addressing underlying causes of risk in complex ... Federal Trade Commission News Burlington police: Mayor condemns police's private security contract Burlington Free Press Memphis Police Chief Trained With Israel Security Forces The Intercept DHS Expands Abraham Accords to Cybersecurity Homeland Security FTC approves order requiring Chegg to tighten data security Higher Ed Dive US. Department of Homeland Security and Finnish Ministry of the ... Homeland Security AI, Processor Advances Will Improve Application Security Security Boulevard Gem Security emerges from stealth and raises $11 million Help Net Security Automating security for Linux servers and applications Security Boulevard Top Web Application Security Testing Companies Security Boulevard ZURIK: Mayor Cantrell's security officers clocked time while nowhere ... FOX 8 Local First Radiant Logic acquires Brainwave GRC to strengthen security ... Help Net Security Coldwater utility board to upgrade security after vandalism, threats Coldwater Daily Reporter Hospital Security from the Front Door to the Bedside Campus Safety Magazine Enforcement of Fisheries Rules Will Enhance Maritime Governance ... The Pew Charitable Trusts How to Implement an Effective API Security Strategy Security Boulevard Keep Your Home Safe and Secure Consumer Reports NTT and Palo Alto Networks join forces to improve security ... Help Net Security Facilities and security prepare for dangerously low temperatures ... The Bowdoin Orient Dallas Zoo making 'significant changes' to security FOX 4 News Dallas-Fort Worth Omaha Target reopens after Tuesday shooting, with security KMTV 3 News Now Omaha Checkmarx CEO on Bringing Application, API Security Together BankInfoSecurity.com Week In Review: Auto, Security, Pervasive Computing SemiEngineering ImagineIF Libraries Adds Security Presence to Kalispell Branch Flathead Beacon Lack of Natural Gas Storage Seen as 'National Security Issue' in ... Natural Gas Intelligence Gigamon Appoints Chaim Mazal Chief Security Officer Business Wire A look inside Columbus City Schools security and safety efforts ABC6OnYourSide.com ‘Disturbing’ force used at Fresno homeless shelters by private security. Here’s what happened Fresno Bee Ride-hailing company, inDrive, uses new platform to prevent fraud Security Magazine Suspects sought after security guard interrupts smash-and-grab robbery at Dior pop-up on Melrose KABC-TV ChatGPT and API Security Security Boulevard Tracking weapons found at metro Richmond schools; how expert says schools can improve security CBS 6 News Richmond WTVR Unlawful Southwest Border Crossings Plummet Under New Border ... Homeland Security Security dangers of key fobs KSDK.com Biden Administration Announces Additional Security Assistance for ... Department of Defense Joint Statement of the Security Consultative Committee (“2+2 ... Department of State DHS Continues to Prepare for End of Title 42; Announces New ... Homeland Security QNAP Fixes Critical Vulnerability in NAS Devices with Latest ... The Hacker News More Than $3 Billion in Additional Security Assistance for Ukraine Department of Defense |
![]() |
![]() |
![]() |
RELATED ARTICLES
Website Security - Creating a Bulletproof Site in 5 Easy Steps When it comes to a secure website and passwords it is all in your hands to create a password that a hacker simply cannot crack. However, this will require that you be creative and use everything at your fingertips to create the strongest password possible for a secure web site. The Move to a New Anti-Virus Model This is the second in a series of articles highlighting reasons why we need a new model for anti-virus and security solutions.Reason #1: the Basic ModelAnti-virus software vendors still rely on yesterday's methods for solving today's problems: they wait for the next virus to wreak havoc and then produce a solution. Spyware Symptoms Spyware symptoms happen when your computer gets bogged down with spyware programs running in the background without your knowledge. Spyware, adware, malware and even spamware can cause your computer to behave very strange. Web Browsing - Collected Information You may not realize it, but as you are surfing the web all sorts of details are being left behind about your computer and where you have been. Most of this information is used harmlessly in website statistics, but it could also be used to profile you, or identify you as a vulnerable target for an exploit. Watching the Watchers: Detection and Removal of Spyware If spyware were a person and he set himself up in yourhouse, you are likely going to do one of two things. You'llkick him out yourself or you'll call someone (such as thepolice) to do it for you. Online Cell Phone Scams and Spam They're out there. Individuals trying to make a quick buck at your expense. The Importance of Protecting Your PC from Viruses and Spam Today the internet is a mine field of malicious code looking to harm your computer. Hackers want to have access to your PC for both fun and profit. HackAttack P C. owners are constantly at risk from attacks by hackers. Its Time to Sing the Encryption Song - Again! Yes, I'm wearing my encryption hat again. Why you may ask? Well I just finished reading about the newest security hole in Microsoft's latest server product. 8 Surefire Ways to Spot an EBAY Scam E-Mail and Protect Yourself from Identity Theft Ebay is a great site and is used by many to buy and sell new and used Items. It truly is the worlds Largest Garage Sale Unfortunately when an online site becomes as big and popular as E-Bay the scam artists seem to just naturally follow. How To Give Away Your Personal Information Identity Theft and Your Personal Information--------------------------------------------Identity theft is apparently the "in thing" these days. By media accounts, hackers and evildoers lurk everywhere trying to steal your personal information. Preventing Online Identity Theft Identity theft is one of the most common criminal acts in society today. Criminals will use your personal information such as banking accounts and passwords, to pretend that they are you. 5 Tips For An Unbreakable Password Despite the current wave of identity theft and corporate security breaches it's amazing how very few people treat their passwords with any level of seriousness. Most computers users, both at home and in the office, see passwords as a nuisance and therefore make them as easy to remember as possible. Parental Control - Dangers To Your Child Online & Internet Child Safety Tips Did you know.. The Never Ending Spyware Story It's been with us since 1993, it's gotten more intrusive, more complicated.It's created a whole ecosystem, so to speak. The Saga of the Annoying Adware When we think of adware, what comes to mind are those annoying and pesky ads that pop up out of nowhere whenever we are surfing the net. Anybody who has surfed through the net has encountered those irritating pop-up adwares advertising everything from computer software down to Viagra. Top Spyware Removers Considerations Only the top spyware removers are successful at detecting and removing spyware and adware from your computer. You should look for complete protection against these threats: spyware, adware, keyloggers browser hijackers and Remote Access Trojans. Online Shoppers, Beware of a New Scam Beware of a New Scam Aimed at Bargain-HuntersTrying to buy something cheap is absolutely natural--and online crooks set traps for unwitting bargain-hunters. On April 6 Panda Software warned Internet users of a new particularly brazen scam aimed at stealing confidential information. Avoiding Scams: If It Sounds Too Good to Be True, It Probably Is A week or so ago, I received an inquiry from a man in Indonesia about buying multiple copies of certain items on my website. I immediately suspected fraud, so I explained that I only had one piece of each. File Sharing - What You Need to Know! File sharing on p2p is soaring despite the music and movie industryefforts to curb the practice. Regardless of which side of the arguement you are on it is likely that sharing of copyright materialwill continue in one form or another for the foreseeable future. ![]() |
home | site map |
© 2006 |