Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Do You Know What to Do When Involved in Identity Theft?

Do You Know What to Do When Involved in Identity Theft?

The unfortunate truth of increased technology use in the workplace is that there is a corresponding increase in the potential for cybercrime, more specifically identity theft, to strike the workplace. The question is, what can you do to help prevent it, and how should you react to it should it strike?

How You Can Help an Identity Thief
There are plenty of ways that an identity thief can gain the information they need to successfully take control of one of your accounts or some of your critical data. First of all, many businesses have a tendency to collect more data than they actually need from their contacts and employees. This only gives the identity thief more ammunition. Furthermore, many businesses underestimate the lengths that an identity thief will go to in order to collect the information that they need. Frankly, just throwing out documentation won’t stop someone who isn’t above dumpster-diving. Any paper records should be cross-shredded before they are disposed of.

Of course, paper records are a relatively easy way for an identity thief to get what they want in almost any circumstance. Therefore, it makes much more sense to keep your documentation stored digitally, protected by passwords and encryption that stands up to best practices.

What to Tell Your Clients if Their Identities Are Stolen on Your Watch
Unfortunately, even the smallest error can lead to a security breach, which means that you may have to inform your clients that their information has been stolen. To help them further, you will want to advise them to take the following steps immediately.

Notify Affected Banks or Creditors
One of the first orders of business that needs to happen if financial information could have been leaked is to contact the bank or credit card provider that manages the account. Your contact will want to deactivate these accounts before whomever it was that stole their identity accesses them again.

Time is of the essence, as they will need to report the theft and any unauthorized charges within two days of the unauthorized transactions to limit their liability to $50. If they report the theft before any transactions are made, they will not be liable for any activity on that account until the matter is settled.

Managing Credit Reports
Any client whose data was potentially stolen should work on managing their credit reports. First, have a fraud alert put on your account by one of the major credit reporting agencies. This will automatically provide you with a credit report from all three of these agencies, which you should check for warning signs of fraud. If your reports show credit inquiries that you didn’t make and other unexplainable activity, report the identity theft to remove the transactions and activities you are not responsible for. You may also want to consider requesting a credit freeze to prevent the credit agencies from releasing your credit information to new creditors.

Fill Out and Distribute ID Theft Report
While the FTC (Federal Trade Commission) may only follow up on larger fraud cases, they also monitor identity theft cases to try and identify suspicious patterns that suggest the involvement of organized crime. The FTC’s website also has a link to a form that will produce an identity theft complaint. Once you have that complaint, secure a police report to complete your ID theft report.

This report needs to be distributed to your creditors and credit reporting agencies, and these accounts need to be monitored to ensure that false information doesn’t persist.

Locking Down Accounts
Of course, as with any account breach, you need to update your account passwords to keep your accounts secure. Furthermore, not only should you report any false use of your Social Security Number, you should also ensure that no additional accounts have been opened in your name for any utilities, as the bill for these services can be used as proof of residence to open a new account.

Identity theft is no laughing matter, and you certainly don’t want your business to be responsible for it. For assistance with your data security solutions, call Voyage Technology at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 22 March 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Workplace Tips Privacy Computer Phishing Google Email Workplace Strategy Hosted Solutions Collaboration Small Business Users Backup Managed Service Ransomware Mobile Device Productivity Microsoft Quick Tips Passwords Saving Money Communication AI Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android Upgrade VoIP Smartphones Business Management Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Miscellaneous Information Holiday Automation Artificial Intelligence Facebook Gadgets Cloud Computing Covid-19 Training Compliance Remote Work Server Managed Service Provider Outsourced IT IT Support Encryption Spam Employee/Employer Relationship Office Windows 10 Government Business Continuity Data Management Blockchain Wi-Fi Business Technology Windows 10 Bandwidth Virtualization Data Security Apps Vendor Two-factor Authentication Mobile Office Managed Services App Employer-Employee Relationship BYOD Tip of the week Mobile Device Management Chrome Voice over Internet Protocol Budget Gmail WiFi Apple Networking BDR HIPAA Computing Physical Security Applications Hacker Information Technology Avoiding Downtime Access Control Office 365 Marketing Conferencing Managed IT Services How To Operating System Router Computers Virtual Private Network Risk Management Health Website Help Desk Analytics Office Tips Augmented Reality Retail 2FA Storage Password Healthcare Bring Your Own Device Big Data Windows 7 Social Going Green Patch Management Save Money Microsoft 365 Remote Monitoring Vulnerability End of Support Vendor Management Solutions Cybercrime Customer Service Display Printer Paperless Office Infrastructure Monitoring Document Management Firewall Windows 11 Managed IT Service Remote Workers Telephone Scam Data loss Excel The Internet of Things Cooperation Free Resource Project Management Images 101 Telephone System Multi-Factor Authentication Robot Mobility Cost Management Settings Printing Customer Relationship Management Wireless Data Privacy Content Filtering IT Management VPN Employees YouTube Meetings Integration Hacking Cryptocurrency Presentation User Tip Modem Computer Repair Mobile Security Processor Wireless Technology Virtual Desktop Holidays LiFi Data storage Data Storage Smart Technology Video Conferencing Outlook Word Machine Learning Managed Services Provider Professional Services Money Saving Time Virtual Machines Humor Maintenance Antivirus Sports Supply Chain Downloads Safety iPhone Mouse Licensing Vulnerabilities Entertainment Administration Technology Care How To Microsoft Excel Application Legal Data Analysis IT solutions Star Wars IT Assessment Business Growth Gamification Flexibility Notifications Staff Value Business Communications Organization Travel Social Networking Scams IBM Legislation Hybrid Work Cortana Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Alt Codes Content Remote Working Wearable Technology Memory Human Resources Health IT Downtime Unified Threat Management Motherboard Data Breach Cables Comparison Google Play Hosted Solution Assessment Electronic Health Records Permissions Unified Threat Management Directions Videos Typing Wasting Time Google Apps Competition Network Congestion Specifications Security Cameras Trend Micro IT Maintenance Internet Exlporer Software as a Service Business Intelligence Knowledge Fraud Google Drive User Error Microchip Username Managing Costs Shortcuts 5G Black Friday SSID User Point of Sale eCommerce Ransmoware Unified Communications Database Surveillance Vendors Experience Virtual Assistant Google Docs Bitcoin Network Management Running Cable Tech Support IT Technicians Virtual Machine Be Proactive IP Address Monitors Cyber Monday Medical IT Google Wallet Proxy Server Reviews Cookies Workforce Tactics Development Threats Hotspot Transportation Windows 8 Laptop Websites Mirgation Hypervisor Workplace Strategies PowerPoint Recovery Drones Shopping Nanotechnology Optimization Meta Addiction Amazon Electronic Medical Records Language Employer/Employee Relationships Hard Drives SharePoint Management PCI DSS Halloween Chatbots Domains Navigation Writing Distributed Denial of Service Lenovo Gig Economy Screen Reader Outsource IT Service Level Agreement Internet Service Provider Environment Virtual Reality Computing Infrastructure Teamwork Media Refrigeration Hacks Server Management Regulations Compliance Scary Stories Private Cloud Identity Public Speaking Evernote Small Businesses Lithium-ion battery Fun Superfish Bookmark Identity Theft Smart Tech Memes Deep Learning Download Net Neutrality Displays Twitter Alerts SQL Server Entrepreneur Financial Data Error History Outsourcing Social Engineering Break Fix Browsers Smartwatch Education Connectivity IT Upload Procurement Remote Computing Azure Undo Mobile Computing Social Network Telework Cyber security Workplace Multi-Factor Security Tech Hiring/Firing Search Dark Web CES Tablet IoT Communitications Best Practice Trends Supply Chain Management Alert Paperless Managed IT Customer Resource management FinTech Buisness File Sharing Regulations Co-managed IT Dark Data Google Calendar Term

Blog Archive