Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Do You Know What to Do When Involved in Identity Theft?

Do You Know What to Do When Involved in Identity Theft?

The unfortunate truth of increased technology use in the workplace is that there is a corresponding increase in the potential for cybercrime, more specifically identity theft, to strike the workplace. The question is, what can you do to help prevent it, and how should you react to it should it strike?

How You Can Help an Identity Thief
There are plenty of ways that an identity thief can gain the information they need to successfully take control of one of your accounts or some of your critical data. First of all, many businesses have a tendency to collect more data than they actually need from their contacts and employees. This only gives the identity thief more ammunition. Furthermore, many businesses underestimate the lengths that an identity thief will go to in order to collect the information that they need. Frankly, just throwing out documentation won’t stop someone who isn’t above dumpster-diving. Any paper records should be cross-shredded before they are disposed of.

Of course, paper records are a relatively easy way for an identity thief to get what they want in almost any circumstance. Therefore, it makes much more sense to keep your documentation stored digitally, protected by passwords and encryption that stands up to best practices.

What to Tell Your Clients if Their Identities Are Stolen on Your Watch
Unfortunately, even the smallest error can lead to a security breach, which means that you may have to inform your clients that their information has been stolen. To help them further, you will want to advise them to take the following steps immediately.

Notify Affected Banks or Creditors
One of the first orders of business that needs to happen if financial information could have been leaked is to contact the bank or credit card provider that manages the account. Your contact will want to deactivate these accounts before whomever it was that stole their identity accesses them again.

Time is of the essence, as they will need to report the theft and any unauthorized charges within two days of the unauthorized transactions to limit their liability to $50. If they report the theft before any transactions are made, they will not be liable for any activity on that account until the matter is settled.

Managing Credit Reports
Any client whose data was potentially stolen should work on managing their credit reports. First, have a fraud alert put on your account by one of the major credit reporting agencies. This will automatically provide you with a credit report from all three of these agencies, which you should check for warning signs of fraud. If your reports show credit inquiries that you didn’t make and other unexplainable activity, report the identity theft to remove the transactions and activities you are not responsible for. You may also want to consider requesting a credit freeze to prevent the credit agencies from releasing your credit information to new creditors.

Fill Out and Distribute ID Theft Report
While the FTC (Federal Trade Commission) may only follow up on larger fraud cases, they also monitor identity theft cases to try and identify suspicious patterns that suggest the involvement of organized crime. The FTC’s website also has a link to a form that will produce an identity theft complaint. Once you have that complaint, secure a police report to complete your ID theft report.

This report needs to be distributed to your creditors and credit reporting agencies, and these accounts need to be monitored to ensure that false information doesn’t persist.

Locking Down Accounts
Of course, as with any account breach, you need to update your account passwords to keep your accounts secure. Furthermore, not only should you report any false use of your Social Security Number, you should also ensure that no additional accounts have been opened in your name for any utilities, as the bill for these services can be used as proof of residence to open a new account.

Identity theft is no laughing matter, and you certainly don’t want your business to be responsible for it. For assistance with your data security solutions, call Voyage Technology at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 02 August 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Efficiency Hardware Internet Malware IT Support Privacy Google Email Computer Phishing Workplace Tips IT Services Hosted Solutions Users Collaboration Mobile Device Ransomware Workplace Strategy Quick Tips Small Business Microsoft Cybersecurity Backup Passwords Communication Saving Money Data Backup Smartphone Managed Service Android VoIP Business Management Smartphones Mobile Devices Upgrade communications Data Recovery Disaster Recovery Social Media Productivity Browser Microsoft Office Managed IT Services Windows Current Events AI Tech Term Network Remote Internet of Things Artificial Intelligence Facebook Automation Cloud Computing Covid-19 Holiday Gadgets Server Managed Service Provider Information Remote Work Training Miscellaneous Outsourced IT Spam Compliance Encryption Employee/Employer Relationship Office Windows 10 Business Continuity Government Data Management Bandwidth Blockchain Windows 10 Wi-Fi Business Technology Virtualization IT Support Apps Data Security Mobile Office Vendor Two-factor Authentication Employer-Employee Relationship Chrome Budget Networking Apple App BYOD Mobile Device Management Gmail Managed Services Voice over Internet Protocol How To Hacker BDR Avoiding Downtime Marketing HIPAA Applications Computing Information Technology Access Control WiFi Tip of the week Office 365 Conferencing Augmented Reality Healthcare Storage Managed IT Services Password Computers Bring Your Own Device Website Router Operating System Virtual Private Network Health Risk Management Help Desk Big Data Analytics Office Tips Retail Telephone Scam Data loss Customer Service Cooperation Free Resource Project Management Windows 7 Patch Management Save Money Microsoft 365 Remote Monitoring End of Support Vulnerability Vendor Management Solutions Going Green Physical Security Firewall Display Cybercrime Printer Windows 11 Paperless Office Infrastructure Monitoring The Internet of Things 2FA Excel Social Document Management Remote Workers Maintenance Money Antivirus Customer Relationship Management Humor Downloads iPhone Licensing Hacking Vulnerabilities Sports Entertainment Presentation Data Privacy Mouse Images 101 Wireless Technology Administration Robot Mobility Telephone System Multi-Factor Authentication Cost Management IT Management Word Settings VPN Employees Meetings Wireless Integration Printing Content Filtering User Tip Modem Computer Repair Mobile Security YouTube Processor Cryptocurrency Safety Holidays Data Storage Smart Technology Supply Chain Video Conferencing Virtual Desktop LiFi Machine Learning Managed Services Provider Data storage Professional Services Saving Time Virtual Machines Outlook Managed IT Service Download Net Neutrality Twitter Alerts SQL Server Technology Care Financial Data Error History Business Communications Social Engineering Break Fix Scams Hacks Scary Stories Browsers Smartwatch Connectivity IT Fun Upload Procurement Competition Remote Computing Azure Hybrid Work Deep Learning Social Network Telework Cyber security Multi-Factor Security Tech Human Resources Dark Web Cables CES Tablet IoT Communitications Trends Supply Chain Management Alert Education Managed IT Customer Resource management FinTech File Sharing Regulations User Dark Data Google Calendar Term Google Apps Star Wars IT Assessment How To Microsoft Excel IT Maintenance Mobile Computing Data Analysis Search Gamification Flexibility Notifications Staff Value Business Intelligence Legislation Shortcuts Best Practice Organization IP Address Travel Social Networking Google Maps Smart Devices Ransmoware Buisness Techology Fileless Malware Digital Security Cameras IT solutions Content Remote Working Wearable Technology Memory Vendors Legal Comparison Google Play Be Proactive Business Growth Health IT Unified Threat Management Motherboard Data Breach Recovery Assessment Electronic Health Records Hard Drives Permissions Workforce Unified Threat Management Directions Videos Cortana Domains Wasting Time Threats Network Congestion Specifications Security Cameras Workplace Strategies Alt Codes Trend Micro Internet Exlporer Software as a Service Refrigeration Fraud Meta Downtime User Error Microchip Hosted Solution Username Public Speaking Managing Costs Amazon Black Friday SSID Typing Lithium-ion battery Point of Sale eCommerce Database Surveillance Virtual Assistant Outsource IT Entrepreneur Knowledge Network Management Tech Support IT Technicians Virtual Machine Environment Google Drive Media Monitors Cyber Monday Medical IT Proxy Server Reviews Cookies 5G Tactics Development Undo Hotspot Transportation Small Businesses Unified Communications Experience Websites Mirgation Hypervisor Displays Google Docs PowerPoint Bitcoin Running Cable Shopping Nanotechnology Optimization Addiction Electronic Medical Records Language Employer/Employee Relationships Outsourcing Google Wallet SharePoint Management PCI DSS Chatbots Navigation Writing Distributed Denial of Service Workplace Windows 8 Laptop Lenovo Gig Economy Screen Reader Application Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Drones Server Management Regulations Compliance IBM Private Cloud Identity Evernote Paperless Co-managed IT Halloween Superfish Bookmark Identity Theft Smart Tech Memes

Blog Archive