CertCities.com -- The Ultimate Site for Certified IT Professionals
Visit CertCities.com Forums and Ost Your Mind Share share | bookmark | e-mail
  Microsoft®
  Cisco®
  Security
  Oracle®
  A+/Network+"
  Linux/Unix
  More Certs
  Newsletters
  Salary Surveys
  Forums
  News
  Exam Reviews
  Tips
  Columns
  Features
  PopQuiz
  RSS Feeds
  Press Releases
  Contributors
  About Us
  Search
 

Advanced Search
  Free Newsletter
  Sign-up for the #1 Weekly IT
Certification News
and Advice.
Subscribe to CertCities.com Free Weekly E-mail Newsletter
CertCities.com

See What's New on
Redmondmag.com!

Cover Story: IE8: Behind the 8 Ball

Tech-Ed: Let's (Third) Party!

A Secure Leap into the Cloud

Windows Mobile's New Moves

SQL Speed Secrets


CertCities.com
Let us know what you
think! E-mail us at:



 
 
...Home ... Editorial ... Columns ..Column Story Friday: April 4, 2014


 Zubair's Security Zone  
Zubair Alexander
Zubair Alexander


 Protect Yourself from Identity Theft
It's the fastest-growing crime in the country. Here are just a few ways you can keep yourself safe.
by Zubair Alexander  
2/15/2007 -- According to the United State Postal Service, identity theft is America's fastest-growing crime -- and one of its most expensive; last year, it cost the 9.9 million Americans who were victims of identity theft about $5 billion. We've all heard the horror stories.

Most, but not all, cases of identity theft are somehow tied to the victims' computers and networks. Companies that are responsible for safeguarding people's personal data aren't always able to keep the information confidential. There are several reasons for such breaches in security. Sometimes, it's a simple matter of carelessness on the part of organizations, such as banks. Other times, organizations become victims of dictionary attacks, dumpster diving, phishing exploits and online hacking.

In June 2006, the United States government gave federal civilian agencies 45 days to comply with new recommendations for laptop encryption and two-factor authentication. According to this memo (PDF) posted on the White House Web site, sensitive data must be encrypted on all mobile devices. The memo was prompted by a series of government-related security breaches and data thefts:

  • The U.S. Internal Revenue Service lost a laptop that contained the fingerprints of 291 employees.
  • The identities of 2.2 million active-duty military personnel were compromised at the Department of Veteran Affairs.
  • The Social Security numbers and photos of 26,000 employees were stolen from the Department of Agriculture.
  • The Department of Energy lost the personal records of 1,500 employees and contractors at the National Nuclear Security Administration.
  • The Navy found the personal records of 28,000 personnel and family members on a Web site.
  • According to the Department of Health and Human Services, an employee of an insurance company exposed the Medicare records of 17,000 people.

These are only a few examples. Unfortunately, in the private sector, the story is the same.

The bad guys are interested in your name, date of birth, address and phone number, which are all too easy to find. They're also interested in your SSN, driver's license number, credit card numbers, and they'd love to get the security code on the back of your credit card.

There are numerous companies that ask for your SSN when they have absolutely no reason to. On the other hand, banks, loan companies, your employer and the IRS have a legitimate reason to ask you for your SSN. According to the Social Security Administration, giving out your SSN is voluntary. The SSA suggests that if you're asked to provide your SSN number, you should first determine:

  • Why your number is needed
  • How your number will be used
  • What happens if you refuse
  • What law requires you to give your number

There are several places where the bad guys can go to find your personal information, though -- thanks to regulations like the Health Insurance Portability and Accountability Act (HIPAA) -- it's harder these days to get personal information right out of the doctor's office. Would-be identity thieves can still get information out of mortgage companies, schools, payment processing companies, employers, real-estate agencies or even retailers. While it may be hard to believe, a bank's dumpster is still an attractive source of information for bad guys; garbage bags left at the curb can be easily stolen. Likewise, purses and wallets are easy to steal and often contain sensitive data such as passwords and SSNs, not to mention credit cards.

In one notorious case, a convicted felon stole someone's identity and racked up over $100,000 in motorcycle and handgun purchases and even obtained a federal home loan. He taunted the victim by claiming that identity theft is not a federal crime, so he can continue to pose as the victim as long as he wanted. He even filed bankruptcy under the victim's name.

In 1998, Congress passed the Identity Theft and Assumption Deterrence Act which made identity theft a federal crime.

What Should You Do?
Here are a few tips on how you can better protect your identity. Obviously, this list is by no means complete, but it should give you some ideas. At the end of this article I've listed several references that contain more details on identity theft issues.

  • Do not keep your SSN in your wallet.
  • Do not give out your SSN number or your mother's maiden name to companies that don't need it. Ask to speak to a supervisor and fight, argue and challenge the company before giving out your SSN. As I mentioned earlier, there are only certain types of businesses that should be asking you for your SSN, such as your employer, banks, loan companies, the IRS, etc. If they still insist, ask them to send you a written request.
  • Don't keep your PIN numbers, passwords or other confidential data in your wallet.
  • Don't print your SSN and home telephone number on checks.
  • When typing your PIN number at an ATM machine, shield yourself so no one can watch you type the code.
  • Even if you think no one is watching, when in public make sure that when you enter your voicemail code on your cell phone that you cover it with your other hand.
  • Put a fraud alert on your credit cards.
  • Examine your credit report periodically.
  • When you receive pre-approved credit cards in the mail, make sure you discard them by shredding the application so no one can activate the credit cards under your name.
  • If possible, use a post office box as your mailing address rather than have mail delivered to your house.
  • Look at your bills each month and make sure there are no unexpected charges.
  • Use a passphrase, rather than a password, for your computer and other confidential data. Check out the article "How Secure is Your Password?" to see how long it can take for someone to crack your Windows password.
  • Keep valuables out of sight in your car by locking it in the trunk or glove compartment.
  • Only download anti-spam and anti-spyware software from known vendors. Shareware and freeware are ideal means to spread viruses, Trojan horses and other means to steal your identity.
  • Use disposable e-mails to sign up for newsletters and to make purchases over the Internet.

If you'e curious to see how safe you are from identity fraud, you can take an online quiz here. Here are some additional resources that you might find useful:

  • Better Business Bureau
  • Department of Justice
  • Federal Trade Commission
  • Identity Theft Resource Center
  • Social Security Administration
  • U.S. Postal Service

Do you have any stories, experiences or ideas for prevention related to identity theft? If so, I would love to hear them. Write me at .


Zubair Alexander, MCSE, MCT, MCSA and Microsoft MVP is the founder of SeattlePro Enterprises, an IT training and consulting business. His experience covers a wide range of spectrum: trainer, consultant, systems administrator, security architect, network engineer, author, technical editor, college instructor and public speaker. Zubair holds more than 25 technical certifications and Bachelor of Science degrees in Aeronautics & Astronautics Engineering, Mathematics and Computer Information Systems. His Web site, www.techgalaxy.net, is dedicated to technical resources for IT professionals. Zubair may be reached at .

 


More articles by Zubair Alexander:

-- advertisement --


There are 17 CertCities.com user Comments for “Protect Yourself from Identity Theft”
Page 1 of 2
9/7/10: admin from adminssd says: I have been looking for this info for the previous few 60 minutes. Keep us updated I would like to hear more!http://www.usa-watch.com
6/12/13: Richard Brown from USA says: We are pleased to invite you to our upcoming CISSP (Certified Information System Security Professional) Certification Training Workshop scheduled in Houston, TX on June 25-28, 2013. The CISSP® program is a credential for professionals who develop policies and procedures in Information Security. The CISSP® exam tests one's competence in the ten domains of the (ISC)² CBK, which cover critical topics in security today, including risk management, cloud computing, mobile security, application development security and more. Course Features 1. Offers a career differentiator, with enhanced credibility and marketability 2. Provides access to valuable resources, such as peer networking and idea exchange 3. Makes broad-based security information resources readily available 4. Adds to credibility with the rigor and regimen of the certification examinations 5. Provides a business and technology orientation to risk management 6. Provides a business and technology orientation to risk management 7. Offers a solutions-orientation, not specialization, based on the broader understanding of the (ISC)² CBK Course Kit: 1. 4-days of Intensive classroom training from our highly qualified & experienced instructor 2. 90 days of Online Coaching 3. Life-time enrollment to CISSP® Discussion Forums 4. A copy of "Official (ISC)² CISSP® CBK" 5. Attain Live weekly webinars (weekends) 6. Avail_35 CPE Certificates Complimentary Online Course of your choice: CISA CISM, ASTQB CTFL, ITIL Foundation or Agile & Scrum e-learning course (worth USD175) Grab this opportunity now. “Register Now” http://www.simplilearn.com/it-security-management/cissp-certification-training/ Daniel Irwin, Global Manager, Simplilearn Americas LLC. 281-668-7691 [email protected]
12/16/13: jordan pas cher from [email protected] says: Popcorn, soda, candy bars the size of floor tiles - is that all your local movie theater has to offer?
12/16/13: chaussures air jordan pas cher from [email protected] says: From $6 daiquiris at El Floridita, Ernest Hemingway's favoured watering hole, to the ubiquitous hustlers looking to con visitors into buying knock-off cigars, much about the Cuban capital seems geared toward separating travellers from their money.
12/18/13: moncler sito ufficiale from [email protected] says: Although the protection of civilians was among the stated purposes of both the 2011 Libya action and Obamas case for Syria, I just hope the space isnt too small! which I started exhibiting at last year. thumb-wrestling with Iowa voters to try to get them to vote for his wife. Michele Bachmann and former Pennsylvania Senator Rick Santorum. Extra charges Riders pay 50 cents for "each piece of luggage the operator places in his or her trunk. bags of groceries and parcels of similar size are exempted from the luggage charge.The late-season chase even when it fails is one of baseballs pleasant bonuses Fans in towns with successful baseball traditions know that once youve endured the disappointment of falling behind you get the free ride of sniffing a big comeback but shrugging if it doesnt happen Washington has had so few talented teams in 80 years that many fans dont get what seems obvious to fans of "miracle-comeback" teams such as the 2011 Cardinals who were 10½ games out of the wild card Aug 25 but won the World Series or the 2012 As who went 33-13 to erase a 13-game deficit and won the divisionTherell be a year or for young fans several when the Nats make up or almost overcome huge late-season deficits Each time the odds will be hard against it But when it does happen theres nothing nuttier Stats sites do the correct math to give the Nats miserable 33-to-1 odds to make the playoffs But what simulations dont capture is the factor that stock market models missed five years ago: The radical "fat tail" outcomes when human emotions usually fear distort the bell-curve of "normal" outcomesA Wall Street panic and a pennant-race collapse feel similar But in baseball they are far more frequent In just the past two years six teams have imploded to lose division titles or a playoff spot Its tempting to think the team ahead of you "only has to play 500 the rest of the way and were dead" But thats not baseball There is no "play 500" button to push In 12 the Pirates on a 93-win pace the Dodgers leading the NL West and the White Sox leading the AL Central had late-season collapses of 9-23 9-17 and 12-21 to murder their seasons This year the Red Sox Rays As and Reds are the teams in roughly similar spots The Pirates are printing playoff tickets and discussing October rotation issues But theyre just eight games ahead of Arizona in wild-card standingsInstead of "oh-they-only-have-to-play-500" lazy-think plug last seasons collapses into this seasons standings and see what insane possibilities suddenly ariseIn 11 the Red Sox (8-21) and Braves (8-18) had the ignominious slumps that wouldnt stop until they were snuffed from the postseason on the last day of the season Movie script: "It Happens Every September"Every Tuesdaya's inventive right hand and intricate chord work have shared musical space with Meshell Ndegeocello.
12/23/13: nike air max from [email protected] says: cette litanie grégaire et sans arguments, vous serez le premier.. La clientèle sera-t-elle au rendez-vous ?aise and I've never been.. se rêve t-il président d'une région Bretagne réunifiée et affranchie de la tutelle parisienne. culture et politique." On imagine ces deux silhouettes devisant sous le portique des sto? Ceinture noire de karaté, conclut-il. Taylor a tout fait pour bloquer l'accès de ses usines aux inspecteurs du travail et a eu de violents affrontements avec les syndicats. nike air max http://www.sia.fr/css/nikeairmax-fr.asp
12/25/13: ugg pas cher from [email protected] says: Hyundai simplifies things by offering just one Veloster trim level starting at $17,300, distinguished only by three interior color schemes, which include gray, black and a red-and-black combination. The interior choices depend on the exterior color chosen. Options include an automatic transmission for $1,250 and two feature-filled packages. With currently known options, the Veloster tops out at $23,310.
12/25/13: ugg pas cher from [email protected] says: Fat32Formatter est un logiciel gratuit qui vous permettra enfin davoir des disques durs compatibles en écriture et en lecture avec les PC mais aussi les Mac.Fat32Formatter vous permet de partitionner et/ou formater vos disques durs en FAT32 via la police de limmigration et des douanes, qui ont jusquau 21 janvier pour soumettre leurs applications, depuis sa fondation jusqu'à nos jours, Cependant, estime . les analystes financiers considèrent quApple a fait mieux que prévu,aises ?Nous avons rencontré Férid Tounsi.
12/26/13: nike air jordan pas cher from [email protected] says: 2. Contrat
12/30/13: Christian Louboutin Botte Pas Cher from [email protected] says: The population of elderly people in the U.S. is growing, and the health-care field is growing along with it. The reports that the health-care and social assistance sector is projected to gain more jobs than any other sector between 2010 and 2020.
First Page   Next Page   Last Page
Your comment about: “Protect Yourself from Identity Theft”
Name: (optional)
Location: (optional)
E-mail Address: (optional)
Comment:
   

-- advertisement (story continued below) --

top