5 days until Christmas: Safe shopping tips

Here are some quick tips that are good all year long for protecting your identity while shopping.

ONLINE SHOPPING

  1. Make sure you have a secure connection before sending private information (https not http on the address bar)
  2. Use a credit card instead of a debit card for better protection.
  3. Print out receipts so you have a back up copy in case of computer problems.

OFFLINE SHOPPING

  1. Only keep essential information in your wallet/purse.
  2. Never leave your purse hanging over the back of a chair.
  3. Make sure the ATM has not be tampered with before using it. 
  4. Use a credit card instead of a debit card for better protection.
  5. Keep your receipts.

Now matter how you shop be wary of unknown charges on your cards, notices for credit you didn’t apply for, packages arrive that you did not order, or change of address notices. These are all signs of identity theft.

Please visit www.hvshred.com for more information.

Best wishes from your friends at HV Shred for a happy, healthy holiday!

THE COMMUNITY GETS STRONGER-THINKING LOCAL FIRST!

It was with great pleasure this past Wednesday that we read the news about the consolidation of the Dutchess Regional and Greater Southern Dutchess Chambers of Commerce.  As a member of both since the inception of HV Shred over 3 years ago, we are thrilled to see the two chambers join forces to create an even more solid  regional Chamber to serve local businesses.

We look forward to seeing our colleagues from both chambers at the first joint meeting this upcoming Wednesday, December 15th.  It’s as good a holiday gift as they could give to reduce the monthly membership meeting from two to one each month. 

Our goal remains the same–to be THE shredding service for the Hudson ValleyHere’s to working together and, of course, thinking local first!

We love feedback so please visit https://www.hvshred.com/testimonials/send-testimonial

MORE TIPS TO STEER CLEAR OF ID THEFT

A recent article by Paul Coleman, vice president of compliance at International Banking Group, is a good refresher of how to steer clear of identity theft—particularly in a bad economy that brings out the criminal in otherwise honest people.  Coleman has more than 40 years experience in the banking industry. He is a professionally qualified expert in Operational and Business Risk, Internal Audit, Anti Money Laundering and Regulatory Compliance.

Starting with the basics, identity theft is a form of fraud, in which someone pretends to be someone else by assuming that person’s identity.

To identity thieves, everyone is reduced to information, such as national insurance numbers, credit card details, bank account details, addresses and dates of birth. The more information identity thieves can get about an individual, the more there is the opportunity to impersonate that individual.

Such impersonation ranges from highly organized crime rings to individuals who see the benefits of impersonating someone else, perhaps of a person who lives their life very close to them.

Don’t just assume that identity theft is all about the high-tech world of computer hackers. Old fashioned pick-pocketing and street theft recently saw such a high profile person as Ben Bernanke, the U.S. Federal Reserve Board chairman, become one of hundreds of victims of an elaborate identity fraud ring that stole more than $1.2 million from unsuspecting consumers.

So what can we do as individuals do to protect ourselves?

  • Make sure that you shred all personal information rather than throw it in the trash.
  • Ensure that redundant information technology (IT) equipment you may throw onto a dump site is sanitized by removing all personal information from personal computers, servers, mobile phones, USB memory sticks, hard drives and other similar items.
  • Ensure that you have the most up-to-date anti-virus software and firewalls on your personal computers to prevent malware such as key logging software being loaded onto your computer without your knowledge.
  • Only respond to e-mails, SMS text messages, phone calls or other forms of communication from trusted organizations. Without such caution, you may be duped into disclosing personal information or login credentials.
  • Take extreme care with social network sites, such as Facebook, not to disclose sufficient about yourself that your personal information could be guessed.
  • Take care not to be overlooked when using IT equipment located in public places, allowing observers to see you typing in login credentials, credit or calling card numbers, etc.

If you have a business, then ensure that you screen your employees, particularly if in the normal course of their business they have access to the personal information of your customers.

For more information on steering clear of id theft visit www.hvshred.com

Be prudent with on-line holiday shopping!

With the holiday season fast upon us, we felt it timely to review on-line safety measures:

  • Install a firewall to protect your information.    A firewall can be thought of as a traffic cop: it blocks traffic or permits traffic.    A firewall, when used properly, can prevent access by unauthorized external attempts to connect to your computer.  Install a firewall and keep it ENABLED.
  • Install reputable anti-spam and anti-virus software.    Most reputable anti-spam software programs today are also programmed to identify known spyware, possible malware threats and viruses, which could contain Trojan horses as well.    Many threats are delivered by email, specifically spam.    A good anti-spam program will help reduce your risk of inadvertently opening an email that contains a threat.

 

  • Keep your anti-virus, firewall and operating systems updated.   Set your computer to update the Windows system automatically for critical updates.   

 

  • Be certain of BOTH the source AND content of each file you download! Don’t download an executable program just to “check it out.”   
  • Be cautious of dealing with pop-ups.   This is a perfect place to plant a virus or Trojan program.    You never know who wrote the program, or that person’s intent.    If you don’t know the supplier, do not allow it to run or install!
  • Backup your system!    One of the best ways to protect yourself in the result of a virus attack is to have a clean set of backup disks/tapes/CDs that will fully restore your system (without the virus) and the applications you are using
  • Turn off your computer when not in use.    If you are not connected to the Internet, because your computer is off, you cannot be infected, hacked or hijacked.
  • Use common sense.    When in doubt, assume the unknown attachment is a virus.    Pay attention to virus alerts.    Don’t even consider trying to outsmart those who have created these malicious programs.    Reconsider storing personal information in your computer.   Instead, transfer it to a CD and use the CD when you need the information.    This is especially true of passwords, Social Security Numbers, tax and financial records.

Identity thieves are on the prowl this holiday season.  For more information on how to protect your identity, please visit www.hvshred.com