The Risk Of Electronic Fraud & Identity Theft
Electronic Fraud and Identity Theft
It's The Little Things We Tend To Overlook
Making Assumptions vs. Staying Vigilant
The purpose of this article is to share with you my thoughts and position on some of the basic things you can do to protect yourself from several types of threats. Particularly those that involve electronic fraud and Internet fraud. Although some of these items are not directly related to the Internet, the moment someone has your private or financial information (identity theft), the Internet will be one of the first places they visit.
(Protect Yourself Against Electronic Fraud)
Automated Teller Machines (ATM) & Skimmers
Did you know the cost to a bank or ATM vendor is minimal if their machine is compromised, but to you it may be severe? The company that owns the ATM only has to worry about the cost to replace the machine, plus the amount of money inside. You, on the other hand, stand to loose not only your bank account funds, but possibly your identity.
Phishing and Web Site Redirection
If you receive an e-mail from your bank, credit card company, or other online merchant like, Ebay.com or Amazon.com, requesting information such as passwords and financial info, delete it and report it immediately. Many of these e-mails link you to web sites that look exactly like that of the real company but are in fact fakes. Take a look at Ebay's Online Security and Protection section to get an idea of what you need to do in order to identify scams like these.
If you receive an e-mail from someone promising you millions of dollars if you assist them with their finances, delete it immediately!. Some of these scams have been running for years and new ones surface frequently. I recently saw one supposedly from the wife of the late Yasser Arafat, promising millions of dollars if someone would help her establish a trust fund in the US. The reasons these types of e-mail scams are so wide spread is because they are highly effective and relatively easy to do. Thousands of people get ripped off by these scams every day. To see examples of several recent scams, take a look at the following Phishing Scams page.
Another good source of information on these types of scams can be found at the State of NY Banking Department.
Credit Card Fraud
When paying for something, particularly at a restaurant, check to see if the full or partial credit card number is on the merchant receipt. In most cases, only the partial number is visible. However, when the full number is there, I cross out all but the last four digits with a pen. The merchant has already scanned the card at this point, they should not need a paper backup of the number.
If your credit card is stolen, lost, or used fraudulently, you can call your card company and speak with the fraud department. However, I recommend you contact your card company's credit line department first. This is the department that can extend your credit almost instantaneously. They can also decrease it within seconds as well. If you have a limit of $5,000, they can reduce it to $100 immediately, then pass you to the fraud department. Call your card company and request the direct number to this department and make a record of it.
If you notice someone swiping your card more than once when paying for an item, ask them why. Regardless of how sensible the answer is, call your card company and request a list of the last few transactions, you might be surprised what you find.
If your card company sends you checks to use for cash advancements and you don't plan on using them, don't keep them around, shred them immediately. We get these all the time in the mail. As far as shredders go, everyone should have one. You can pick up a small one for under $30 and it is well worth the investment.
Any statements or correspondence you have regarding your credit cards should be in a secure place or shredded.
Credit Reporting & Monitoring
If you find something strange on your credit report, contact the credit reporting agency immediately. In addition to calling them (if possible), send them a certified letter describing what you have found. It's very important to document any and all correspondence on these matters.
One of the best ways to protect yourself from electronic fraud and identity theft is to ask questions. Primarily, ask yourself whether or not the particular situation you are faced with makes sense? Why would your bank request information from you via e-mail? Why would someone in another country be willing to give you millions of dollars to assist them with their banking woes?
There is a certain percentage of our population who has absolutely no morality when it comes to the acquisition of wealth. These people know the risk of getting caught is minimal. In many cases, even if they do get caught, they are willing to deal with the consequences given the potential monetary payoff. Stay vigilant and educate yourself on these matters. It really is the best way to protect yourself against the myriad of threats and risks we are presented with everyday.
About The Author
If someone you know has sent youthis article, please take a moment to visit our site andregister for the free newsletter at http://www.defendingthenet.com/subscribe.htm
What happens when an organization has no security culture? World Economic Forum
What To Know: New Laws on Education, Public Safety and Water Security Go Into Effect Today - Arizona Governor's Office (.gov)
What To Know: New Laws on Education, Public Safety and Water Security Go Into Effect Today Arizona Governor's Office (.gov)
Anable: Cyber Security Month highlights 'team effort' of internet safety Daily Independent
How the CIO's relationship to IT security is changing Help Net Security
Opinion | The Uber Hack Exposes More Than Failed Data Security The New York Times
Two Republican audit committee leaders launch an inquiry into security costs for Gov. Evers and Lt. Gov. Barnes - Milwaukee Journal Sentinel
Two Republican audit committee leaders launch an inquiry into security costs for Gov. Evers and Lt. Gov. Barnes Milwaukee Journal Sentinel
Lakeland Downtown Development Authority to focus on security, cleanliness, drinks in 2023 - The Ledger
Lakeland Downtown Development Authority to focus on security, cleanliness, drinks in 2023 The Ledger
Security Monitoring System Market Size-Share, Emerging Demands 2022 | Growing Factors and Future Market Outlook Till 2030 | Cost Analysis, New Entrants, Innovative Trends, Consumer Behavior, Competitor Ecosystem, Expansion, and Acquisition - Yahoo Finance
Security Monitoring System Market Size-Share, Emerging Demands 2022 | Growing Factors and Future Market Outlook Till 2030 | Cost Analysis, New Entrants, Innovative Trends, Consumer Behavior, Competitor Ecosystem, Expansion, and Acquisition Yahoo Finance
U.S. slips down rankings in food security index Food Safety News
Complete Guide to SCADA Security Security Boulevard
Back to Basics: Parking Garage Security - Total Security Advisor Total Security Advisor
Maritime Security Market Size to Reach over US$38 Bn by 2027 End, Forecasts Fairfield Market Research in a New Study - GlobeNewswire
Maritime Security Market Size to Reach over US$38 Bn by 2027 End, Forecasts Fairfield Market Research in a New Study GlobeNewswire
US CISA/NSA release new OT/ICS security guidance, reveal 5 steps threat actors take to compromise assets - CSO Online
US CISA/NSA release new OT/ICS security guidance, reveal 5 steps threat actors take to compromise assets CSO Online
KPRC 2 Investigates years-long HOA debate over security guard gate KPRC Click2Houston
High-level independent panel on security and development in crisis-torn Sahel region launched at UN - UN News
High-level independent panel on security and development in crisis-torn Sahel region launched at UN UN News
How Integrated Security Ecosystems Can Improve Campus Safety - Campus Safety - Campus Safety Magazine
How Integrated Security Ecosystems Can Improve Campus Safety - Campus Safety Campus Safety Magazine
NextGen 2.0 helmets on the way to security forces across DAF Air Force Link
Pentagon launches effort to assess crypto's threat to national security The Washington Post
Security guarding in the future: Robocop meets sensor integration Security Magazine
Mark Knudson’s 3 Strikes: Broncos winning formula, Dorrell job security and Avs success - Mile High Sports
Mark Knudson’s 3 Strikes: Broncos winning formula, Dorrell job security and Avs success Mile High Sports
Joint Statement on the High-Level Meeting on the Safety and Security of Civil Nuclear Facilities in Armed Conflicts - United States Department of State - Department of State
Joint Statement on the High-Level Meeting on the Safety and Security of Civil Nuclear Facilities in Armed Conflicts - United States Department of State Department of State
Politics impede long-advocated growth of UN Security Council The Washington Post
Homeland Security Investigations Renews Partnership with Palantir for Case Management Software that Supports Investigations into Human Trafficking, Drug Smuggling, and Transnational Criminal Organizations - Business Wire
Homeland Security Investigations Renews Partnership with Palantir for Case Management Software that Supports Investigations into Human Trafficking, Drug Smuggling, and Transnational Criminal Organizations Business Wire
5 Network Security Threats And How To Protect Yourself The Hacker News
Albuquerque church security guard killed, suspect arrested The Associated Press - en Español
National security risk review of material Trump kept at Mar-a-Lago resumes after appeals court ruling - POLITICO
National security risk review of material Trump kept at Mar-a-Lago resumes after appeals court ruling POLITICO
How Does FAIR Fit into Cybersecurity? Security Boulevard
Security Priorities Are Shifting as 90% Of Organizations Fail To Address Cybersecurity Risks - CPO Magazine
Security Priorities Are Shifting as 90% Of Organizations Fail To Address Cybersecurity Risks CPO Magazine
Keeper Security Lands on GigaOm Radar Reports for Password Management and Privileged Access Management - Business Wire
Keeper Security Lands on GigaOm Radar Reports for Password Management and Privileged Access Management Business Wire
OLLI symposium to explore global food security | Nebraska Today | University of Nebraska–Lincoln - Nebraska Today
OLLI symposium to explore global food security | Nebraska Today | University of Nebraska–Lincoln Nebraska Today
Afghanistan Is a Threat to Global Security Once Again The National Interest Online
Phonexa Fortifies Its Telecommunications Security With STIR/SHAKEN Compliance Certification - PR Newswire
Phonexa Fortifies Its Telecommunications Security With STIR/SHAKEN Compliance Certification PR Newswire
Early Edition: September 26, 2022 Just Security
Tougaloo to receive $420000 for security and mental health care in wake of HBCU bomb threats - Mississippi Today
Tougaloo to receive $420000 for security and mental health care in wake of HBCU bomb threats Mississippi Today
'Fat Leonard,' Navy scandal mastermind, had relaxed security before escape The Washington Post
A 'School Within A School' Is Building Community And Food Security In Hana Honolulu Civil Beat
Beaumont ISD set to hold biannual, state-mandated safety and security meeting on Monday - 12newsnow.com KBMT-KJAC
Beaumont ISD set to hold biannual, state-mandated safety and security meeting on Monday 12newsnow.com KBMT-KJAC
UNC System Board Approves Student Fee for Campus Security Campus Safety Magazine
US Commits More Civilian Security Aid to Ukraine Voice of America - VOA News
Workers at Brewvies movie theater in Ogden go on strike, citing safety and security concerns - FOX 13 News Utah
Workers at Brewvies movie theater in Ogden go on strike, citing safety and security concerns FOX 13 News Utah
January 6 Defendant Says He Attended Events as Security Detailee The Epoch Times
Microsoft Releases Out-of-Band Security Update for Microsoft Endpoint Configuration Manager | CISA - US-CERT
Microsoft Releases Out-of-Band Security Update for Microsoft Endpoint Configuration Manager | CISA US-CERT
Lebanon: Calls to put security forces charged with torturing Syria refugee on trial in criminal court - Middle East Monitor
Lebanon: Calls to put security forces charged with torturing Syria refugee on trial in criminal court Middle East Monitor
IT Security Takeaways from the Wiseasy Hack The Hacker News
As catalytic converter thefts continue across the country, these security devices can help keep your car safe - WPRI.com
As catalytic converter thefts continue across the country, these security devices can help keep your car safe WPRI.com
United States Security Manual Job Template 2022: Excel Security Audit Program and 22 Full Job Descriptions - ResearchAndMarkets.com - Business Wire
United States Security Manual Job Template 2022: Excel Security Audit Program and 22 Full Job Descriptions - ResearchAndMarkets.com Business Wire
When Ransomware Meets IoT: What’s Next? Security Boulevard
Executive Order on Ensuring Robust Consideration of Evolving National Security Risks by the Committee on Foreign Investment in the United States - The White House
Executive Order on Ensuring Robust Consideration of Evolving National Security Risks by the Committee on Foreign Investment in the United States The White House
N.Y.C. Subway System to Install Security Cameras in Train Cars The New York Times
$675 Million in Additional Security Assistance for Ukraine > U.S Department of Defense
DHS Establishes First-Ever Tribal Homeland Security Advisory Council Homeland Security
DHS Publishes Fair and Humane Public Charge Rule Homeland Security
Uber Boss Testifies He ‘Could Not Trust’ Ex-Security Chief The New York Times
Queen Elizabeth II's funeral: U.K.'s biggest security detail post-WWII The Washington Post
Whistle-Blower Peiter Zatko Says Twitter ‘Chose to Mislead’ on Security The New York Times
Before Midterms, Election Officials Increase Security Over Threats The New York Times
A CISO's Ultimate Security Validation Checklist The Hacker News
FTC Releases Final Agenda for Public Forum on Commercial Surveillance and Lax Data Security Practices - Federal Trade Commission News
FTC Releases Final Agenda for Public Forum on Commercial Surveillance and Lax Data Security Practices Federal Trade Commission News
How To Clean the Spies In Your Computer?
Manual Spy Bot Removal > BookedSpaceBookedSpace is an Internet Explorer Browser Helper Object used to show advertising.Free PC Health Check - find bad files fast! How many corrupt and redundant files are lurking inside your PC ready to cause harmful errors? Find these harmful "time-bomb" files instantly and keep your computer ERROR FREE 24 hours a day!VariantsBookedSpace/Remanent : early variant (around July 2003) with filename rem00001.
Is My PC Vulnerable on the Internet?
No longer are viruses the only threat on the internet. In recent years other threats have evolved which include spyware, adware, hacking, identity theft, information theft, pop-ups and the loss of information.
Hacking the Body Via PDA Wireless Device
First I would like to stress I am condoning the art of hacking. Nor am I condoning the control and manipulation of the human race by way of frequencies interacting with the biological systems, which run the human body.
Consumers: Shop Online and Get Information Safely
Do you really have to know how feeds work? Not really. But you do need to understand how they can benefit you as a consumer or as an information seeker.
Firewalls: What They Are And Why You MUST Have One!
A firewall is a system or gateway that prevents unauthorized access to your computer or private network. It is usually the first line of defense in protecting your private information or data.
How To Cover Your Tracks On The Internet
Every single time you access a website, you leave tracks. Tracks that others can access.
Spyware Programs Are Out To Get You!
The average computer is packed with hidden software that can secretly spy on online habits.The US net provider EarthLink said it uncovered an average of 28 spyware programs on each PC scanned during the first three months of the year.
5 Simple Steps to Protect your Digital Downloads
A couple of days ago, I was searching for a popular eBook online. Now I'm not going to tell you the name of this eBook for reasons you'll understand in the next few minutes.
How to Fight Spyware
If you are wondering how to fight spyware for safe web surfing, this Internet privacy article will answer some of your questions. By now you have probably heard about the dangers of spyware.
Is The Internet Over Regulated
Today's Internet or World Wide Web is being over regulated.But, are you being taken for a ride, are you lead to believe that Governments World Wide are creating new legislation for your benefit or are there underlying factors that these laws are more beneficial to Governments and big business?First we had the Can-Spam and other laws passed regulating the sending of unsolicited commercial e-mail, that contains false or deceptive subject information, or that is sent from invalid e-mail addresses, but for me, my inbox still seems to always be full of junk mail.
Phishing: An Interesting Twist On A Common Scam
After Two Security Assessments I Must Be Secure, Right?---------------------------------------Imagine you are the CIO of a national financial institution and you've recently deployed a state of the art online transaction service for your customers. To make sure your company's network perimeter is secure, you executed two external security assessments and penetration tests.
NETWORK SECURITIES: IMPORTANCE OF SECURITIESComputers and securities must form a strong partnership to keep information safe and secure. It is important for people who spend time surfing the web to understand much of the information given out is easily accessible by individuals who desire to eavesdrop on the data.
3 Things You Must Know About Spyware
1)Spyware is on your system. Like it or not, statistically speaking, you probably have spyware on your machine right now.
Mail Forwarding - Why Would You Do It?
First of all we need to get some terms stated. I have been in the business for just over two years and there is still some confusion over the topic.
Traditional Antivirus Programs Useless Against New Unidentified Viruses!
Every now and then you can read about a new virus and the damage it causes. The millions viruses costs companies each time they strike.
Make Money Online - Defend Against The Latest Scam
First, let's do a little recap'. As I stated in the first part of the article, "Make Money Online - The Latest Scam Disclosed", "refund policy scammers" affect the websites that make money online by selling digital products by buying the product and asking for refunds, while keeping the product.
6 Ways To Prevent Identity Theft
These six ways to prevent identity theft offer you valuable tips against the fastest growing crime in America today. In 2004, more than 9.
Is Your Music Player Spying On You?
In today's times spyware is a very serious issue and all computer users should be aware of the possible damage it can cause. It is estimated by well known industry insiders that nearly 90% of all computers are infected with some kind of spyware.
Corporate Security for Your Home Business
The words Corporate Security may conjure up images of a group of techies working in a wire-filled basement room of Microsoft or HP, combating hackers and terrorists online using words like algorithm and encryption. If you own your own business, do not allow yourself to think that security is only for big corporations.
Firewall Protection - Does Your Firewall Do This?
The first thing people think about when defending their computers and networks is an up-to-date antivirus program. Without this most basic protection, your computer will get a virus, which could just slow it down or potentially bring the pc to a complete standstill!So anti-virus software is the answer?An anti-virus solution on it's own is not the answer to all of your problems, it can only protect you so much; in fact test have shown that a new pc running Windows XP if left connected to the Internet unprotected will be infected with viruses and remotely controlled via unauthorised persons within 20 minutes! To protect you against hackers and often to prevent spyware and 'scumware' from communicating directly with their servers about information it may have picked up from your pc, a firewall should form the key part of your e-security solution.
|home | site map|