Best Practices for Setting Up A Wireless Network

More and more of us are using wireless routers.  A recent post by Aditi Jhaveri Consumer Education Specialist for the FTC takes us through the best practices of setting up a wireless router.

We need to fight the temptation to rush through the set-up process. Here’s why you should pay close attention while setting up your router, and afterwards.

Heard of ASUSTeK? Among other things, they sell ASUS-branded wireless routers for home use. Some of their routers come with features — called AiCloud and AiDisk — that allow people to attach a hard drive to their routers and create their own “cloud” storage.

More and more of us are using wireless routers. A recent post by Aditi Jhaveri Consumer Education Specialist for the FTC takes us through the best practices of setting up a wireless router.
We need to fight the temptation to rush through the set-up process. Here’s why you should pay close attention while setting up your router, and afterwards.

Heard of ASUSTeK? Among other things, they sell ASUS-branded wireless routers for home use. Some of their routers come with features — called AiCloud and AiDisk — that allow people to attach a hard drive to their routers and create their own “cloud” storage. According to the FTC’s complaint, ASUS routers had major security flaws that allowed hackers to harm consumers in several ways, including getting access to sensitive personal information — like tax documents — that people stored through these “cloud” services.
If you have an ASUS router at home, take these steps right away:
• Download the latest security updates for your router. According to the FTC, the ASUS router update tool often indicated that software was current when it wasn’t, putting people’s home networks at risk. Moving forward, ASUS is required to provide accurate information about software updates. So check the router’s software update tool and the ASUS support site again for the newest security updates.
• Check if access to your network storage is limited. Make sure access to AiCloud and AiDisk is limited to what you want. The FTC took issue with the default option during AiDisk’s set-up, which gave anyone on the Internet access to your storage. For more privacy, choose “limited” or “admin rights” access instead of “limitless.”
• Change pre-set passwords. According to the FTC, ASUS pre-set weak default passwords on every router. So create new passwords that are strong and unique for both your router and any “cloud” services — something only you know. This can help prevent hackers from getting easy access to your network.

No matter what brand wireless network you set up, it is important to be deliberate about each step of set up and maintenance process.

For more on best practices in the realm of identity theft protection please visit www.legalshredinc.com

 

Tax Time Vigilance Part 3

This week we wrap up our tips for tax time vigilance.

We are now deep into tax season 2016, an especially vulnerable time of year when we need to remind ourselves of best practices regarding identity theft protection particularly as they relate to filing taxes.

Identity theft still tops the list of taxpayer concerns. According to the most recent Javelin Strategy & Research, identity thieves stole $16 billion from 12.7 million US consumers in 2014.

  1. Protect your social security number: Because it one a unique way to identity individuals, many companies ask for your Social Security Number to use it as a way to build their database. That may be easier for them, but it could spell disaster for you.  Before you give out your Social Security Number, determine whether the company really needs the information – and why. If there’s not a legitimate purpose, don’t provide your Social Security Number when asked and don’t submit it online.
  2. Just like eating your vegetables–it’s important to monitor your credit report.By law, you’re entitled to one free copy of your credit report each year from each of the major credit bureaus (Equifax, Experian, and TransUnion): that’s a total of three reports every year (you may be entitled to additional copies if you’re the victim of identity theft). Review your credit report like you do your credit card or banking statements: check to make sure that the transactions and credit requests are those that you’ve approved.
  3. Finally, keep your eyes and ears open for fraud alerts.  Institutions will alert you whenever there’s a suspicious transaction on your account. It can be a little inconvenient if the transaction is legitimate but it’s loads better than having your card actually compromised and not knowing about it. Ask if your bank or lender has fraud alerts – and use them.

For more helpful tips and suggestions for best practices in the world of identity theft protection, please visit legalshredinc.com

Hudson Valley Pharmacy Compromises Patients’ Information

Not that we needed any more reasons to monitor our credit cards and the like, but right here in our Hudson Valley a Rite Aid Pharmacy is the scene of identity theft to an unknown level.

Anyone who shopped at Rite Aid’s 238 Hooker Ave. store in the past year should keep an eye on their bank and credit card statements, according to the Rite Aid Corporation.

A Rite Aid associate at the Poughkeepsie location “may have obtained limited customer information” including customer names, addresses and payment card information in order to make “unauthorized payment card transactions,” according to a press release from the corporation.

The Rite Aid associate accused of the thefts is no longer employed at the store, according to Rite Aid. City of Poughkeepsie Police charged Kevin Thomas, 26, of the Town of Poughkeepsie, on Nov. 24 with second-degree identify theft, a class E felony.

The exact number of victims of the alleged thefts is unknown, police said. Rite Aid and the City of Poughkeepsie police are still investigating the incident and are asking customers to report any unaccounted for transactions.

More charges may be filed against Thomas if additional victims come forward, according to city police.

There is no indication that customer health information or Social Security numbers, or any customer information from other Rite Aid stores, was compromised.

Rite Aid is encouraging all customers at the 238 Hooker Ave. location to monitor and review payment card account statements.

Those who believe they have been affected should contact their bank or payment card company, according to the release. Customers with questions about the incident can call 1-800-877-2611 or email privacyoffice@riteaid.com.

 

For more information on best practices for identity theft protection, please visit www.legalshredinc.com

More on Tax Time Vigilance

Picking up where we left off last week, tax time is a time to step up our vigilance regarding identity theft.

Once again, identity theft still tops the list of taxpayer concerns. According to the most recent Javelin Strategy & Research, identity thieves stole $16 billion from 12.7 million US consumers in 2014.

More tips for best practices in identity theft protection:

  1. Be mindful of the information you are sharing on-line.  Data-mining is the practice where companies gather information people are sharing about themselves on line.  When making purchases or signing up for newsletters, only provide the information that the company needs: you don’t have to give out all of your information. When you do opt in to offer personal information, check the site’s privacy policy to find out how that information might be shared with other companies.
  2. It’s an old chorus but that because it’s critical: use smart passwords.  Use a password keeper to help you keep track but do not cut corners on passwords!
  3. Games and memes are fun—but also frequently ask for personal information like your mother’s maiden name or the street you grew up on. Definitely DO NOT post such information on your social media—that’s like opening your wallet and giving it away!
  4. Be wary of phishing schemes. Phishing often comes in the form of an unsolicited email or a fake website that poses as a legitimate site such as the IRS or your bank in order  to get you to disclose your personal or financial information. Don’t follow any links from these e-mails to any websites where you might be asked for your personal information. Verify that you’re on a legitimate site before sharing your data; if you must access a particular site, log out from any links that you’re not sure about and navigate directly to the site instead. And remember: the IRS will not initiate contact with you by email (or phone) to discuss your account.

We’ll finish with one more round of tips next week.

We always invite you to view more on identity theft protection at www.legalshredinc.com

Tax Season 2016: Time to Step Up Vigilance

As we enter tax season 2016, it’s that time of year to reset our vigilance and remind ourselves of best practices regarding identity theft protection particularly as they relate to filing taxes.

 

Identity theft still tops the list of taxpayer concerns. According to the most recent Javelin Strategy & Research, identity thieves stole $16 billion from 12.7 million US consumers in 2014.

 

Still, some good news was reported: the numbers are actually down from the previous year. The drop is likely the result of an increased awareness from consumers together with increased protections in place from industry and government. The more you know about how to protect yourself, the better chance you have to not be a victim.

 

We will spend the next couple of weeks emphasizing best practices.

  1. Understand that public wi-fi access really does mean public.  You may be sharing your information with more than you think.  Unless you know the wi-fi connection is 100% to be trusted, do not use it to access anything containing your private information
  2. Remember your paper documents are vulnerable as well. We get so excited about internet hackers we can forget the easiest thing to do is dumpster dive for your credit statements, bank receipts and copies of old tax returns.  Protect you private information on paper as well as on-line.
  3. Keep your mailing address current. More and more people are moving around more and more.  When you move, it’s vital to make sure you contact your financial institutions and tax authorities so your private information doesn’t just get delivered like a layup into the wrong hands.
  4. Along those lines, keep an eye out for bills including your credit card statements. Read them over and make sure they are accurate.  Also check credit reports a couple of times of year to scan for fishy activity.

More to come next week.  Yes, next week is February!

 

Always more available on www.legalshredinc.com

Setting up Secure Home Networks

This week’s blog is adapted from the FTC’s OnGuard OnLine Blog.  In a recent post, Attorney Lisa Weintraub Schifferle from the FTC Division of Consumer and Business Education addressed the importance of making sure home networks are set up securely.  To keep it secure, Weintrabu Schifferle urges homeowners to secure the router.

Why pay attention to that little box with the flashing lights? Your router lets you connect with the internet and communicate with other devices in your home. So, it’s your first line of defense in guarding against attacks by identity thieves and hackers.

How can you make your router more secure? Start with these steps:

  • Change the name of your router.The name of your router (also called the SSID or service set identifier) is usually a default ID assigned by the manufacturer. Change it to something only you know.
  • Change your router’s pre-set passwords.Your router also usually comes with a default password. Hackers know these default passwords. So, change yours to something unique, long and complex – think at least 12 characters, with a mix of numbers, symbols and upper and lower case letters.
  • Turn off any “remote management” features. Some routers offer remote management for tech support. Don’t leave these features enabled. Hackers can use them to get into your home network.

Maintenance is also important.  Once your router is set up, don’t just stick it in a corner gathering dust. Instead, keep it up to date. Over time, the software that comes with your router may need updates. Visit the manufacturer’s website periodically to see if there’s a new version available for download. Or register your router with the manufacturer and sign up to get updates. If you lease a router, check if your internet service provider issues updates automatically.

For more on best practices for identity theft protection and on-line safety, please visit www.legalshredinc.com

A Refresher for Identity Theft Protection Basics

Let’s get the new year started with a review of the basics for identity theft detection.  There are many ways that you might discover someone is using your information:

  • You see withdrawals from your bank account that you can’t explain.
  • You don’t get your bills or other mail.
  • Merchants refuse your checks.
  • Debt collectors call you about debts that aren’t yours.
  • You find unfamiliar accounts or charges on your credit report.
  • Medical providers bill you for services you didn’t use.
  • Your health plan rejects your legitimate medical claim because the records show you’ve reached your benefits limit.
  • A health plan won’t cover you because your medical records show a condition you don’t have.
  • The IRS notifies you that more than one tax return was filed in your name, or that you have income from an employer you don’t work for.
  • You get notice that your information was compromised by a data breach at a company where you do business or have an account.

 

If you see one of these warning signs of identity theft, act quickly. Taking these steps will help you limit the damage.

  1. Call the companies where you know or suspect fraud occurred.
  2. Place a fraud alert on your credit reports and get copies of your report.
  3. Report identity theft to the FTC.
  4. File a report with your local police department.

Then, take a deep breath and begin to repair the damage. Depending on your situation, your next step might be closing accounts opened in your name, or reporting fraudulent charges to your credit card company. There are some good resources at IdentityTheft.gov.

Another great resource is www.hvshred.com; we can help securely dispose of your confidential data.

Starting the new year with a new name and more enthusiasm than ever

We are so excited for our new name and new horizons I am posting the news 2 weeks in a row.

Like each year before it since we incorporated in 2007, 2015 has been our best year yet!

We shred and recycled enough confidential paperwork to protect over 20,000 trees and nearly 4000 cubic feet of landfill.  That’s over 45% more than 2014.

As Legal Shred, we will surely surpass those numbers and hit another record in 2016.

Whether you’ve been a client since the beginning or just joined us recently; whether you have used our service just once or twice or on a weekly, monthly, or on-call basis, we are grateful for your support.

In 2016, we will continue to deliver heartfelt, relationship-focused service. Ensuring security, compliance, and sustainability for the business and local community is our top priority. Our team of professionals will provide secure data destruction to safeguard confidentiality and preserve the environment through recycling. We are the identity protection company who puts the confidence in confidential.

One thing is changing…to facilitate our growth, we are transcending our HV Shred cocoon and renaming ourselves Legal Shred of the Hudson Valley. This will help us grow into neighboring markets north, south, east, and west spreading our brand beyond our hometown.

As president, I am still at your service and always welcome your feedback, questions, and concerns.

We consider our clients part of our extended family and look forward to continuing to grow and improve with your support and partnership.

Happy New Year–and please let us know what we can do better and what we can offer to satisfy all your data security needs!

More information www.hvshred.com

HV Shred changes name to mark growth in 2016 and beyond!

Like each year before it since we incorporated in 2007, 2015 has been our best year yet!

Whether you’ve been a client since the beginning or just joined us recently; whether you have used our service just once or twice or on a weekly, monthly, or on-call basis, we are grateful for your support.

In 2016, we will continue to deliver heartfelt, relationship-focused service. Ensuring security, compliance, and sustainability for the business and local community is our top priority. Our team of professionals will provide secure data destruction to safeguard confidentiality and preserve the environment through recycling. We are the identity protection company who puts the confidence in confidential.

One thing is changing…to facilitate our growth, we are transcending our HV Shred cocoon and renaming ourselves Legal Shred of the Hudson Valley. This will help us grow into neighboring markets north, south, east, and west spreading our brand beyond our hometown.

As president and owner, I am still at your service and always welcome your feedback, questions, and concerns.
We consider each of our clients part of our extended family and look forward to continuing to grow and improve with your support and partnership.

Happy New Year to all!

HV Shred will now operate as Legal Shred as we expand our family beyond the borders of the Hudson Valley region.

HV Shred will now operate as Legal Shred as we expand our family beyond the borders of the Hudson Valley region.

Resolve to Protect Your Identity in 2016

It’s that time of year for New Year’s resolutions and always a good time to take stock of how mindful you are of protecting one of your most valuable assets—your identity. Javelin Strategy & Research reported that about 12.6 million people were victims of identity theft in 2012, an increase of more than one million from the previous year. One likely reason: a spike in Web site data breaches. LinkedIn, Sony and Zappos are among the high-profile businesses attacked in recent years. Javelin found that nearly one in four people who were notified that their data had been compromised in a breach became victims of identity theft last year. The fix: Create a variety of passwords so that a thief won’t be able to use a password stolen from one site to enter another. Passwords for your e-mail and financial accounts, in particular, should be unique. Create longer passwords that contain a mix of upper- and lowercase letters, numbers, and symbols.

Resolve to review your credit reports quarterly this year and each bank and credit card statement you receive for unauthorized transactions. Bills from medical providers for services you never received could mean someone is posing as you to get treatment. Make a habit of shredding documents that contain sensitive information.

Resolve to be more protective of your phone number and birthday—avoid the temptation of sharing too much information on social media. It’s not just your “friends” who are monitoring your posts!

Resolve to keep your security software up to date and get notices from your bank and credit card companies for suspicious transactions.

For more on identity theft best practices, please visit www.hvshred.com