Deprecated: trim(): Passing null to parameter #1 ($string) of type string is deprecated in /home3/hvshredc/public_html/wp-content/plugins/feedwordpress/feedwordpress.php on line 2106
Data Security News | HV Shred - Part 26

Category: Data Security News

  • TAX TIME IS TIME TO BE EVEN MORE WARY OF IDENTITY THEFT

    It is the time of year where a tremendous amount of your personal information is coming in the mail. Just one tax document has your name, address, and social security number. To protect yourself you need to make sure nothing gets lost. If you have moved make sure you notify all the financial institutions you used in the past year. Everyone should make a list of the financial institutions, jobs, or other sources of tax documents. As each one comes in, check them off the list. If one doesn’t show up, call the institution to make sure they sent it. The bonus is your trip to the accountant will already be organized.

    Good advice for your identity protection and for getting organized!

    For more information on identity theft protection, please visit www.hvshred.com

  • Latest statistics on ID Theft in from Javelin Research

    Javelin is the leading provider of independent, industry-specific, quantitative research and strategic direction for payments and financial services initiatives. Javelin conducts rigorous research and analysis to create successful strategies related to financial institutions, payments firms, technology vendors, merchants and billers, regulators and other policy-makers, associations, and consumer or business end-users.

    According to Javeline’s latest research,  in 2010, identity theft and fraud claimed fewer victims than in any other period since Javelin began conducting surveys in 2003. Driving that decrease was the reduced rate of existing account fraud, although incidents of all types of fraud dropped from 2009. Meanwhile, consumer costs, the average out of pocket dollar amount victims pay, increased, reversing a downward trend in recent years. This increase can be attributed to new account fraud, which showed longer periods of misuse and detection and therefore more dollar losses associated with it than any other type of fraud.

    The Javelin 2011 Identity Fraud Survey Report provides a detailed, comprehensive analysis of identity fraud in the United States to help consumers and businesses better understand the effectiveness of methods used for its prevention, detection and resolution. A nationally representative sample of 5,004 U.S. adults, including 470 fraud victims, was surveyed via a 50 question phone interview, providing insight into this crime and the affects on its victims. This report, supported by the Better Business Bureau, is issued as a longitudinal update to the Javelin 2005, 2006, 2007, 2008, 2009 and 2010 Identity Fraud Survey reports and the Federal Trade Commission’s (FTC’s) 2003 report.

    Javelin’s eighth annual Identity Fraud Survey Report is the most comprehensive research study of the subject in the United States. It assesses the effectiveness of methods used for fraud prevention,  detection and resolution and provides the basis for fact based benchmarking and recommendations.  For more, visit https://www.javelinstrategy.com/research/Brochure-209

  • 26 RED FLAGS FOR ID THEFT

    Concluding this round of guidance for the Red Flags Rule in effect as of December 31, 2010, here are the 26 Red Flags identified by the FTC–the government agency charged with enforcing compliance with this latest legislation related to identity theft prevention. 

    1. A fraud alert included with a consumer report.

    2. Notice of a credit freeze in response to a request for a consumer report.

    3. A consumer reporting agency providing a notice of address discrepancy.

    4. Unusual credit activity, such as an increased number of accounts or inquiries.

    5. Documents provided for identification appearing altered or forged.

    6. Photograph on ID inconsistent with appearance of customer.

    7. Information on ID inconsistent with information provided by person opening account.

    8. Information on ID, such as signature, inconsistent with information on file at financial institution.

    9. Application appearing forged or altered or destroyed and reassembled.

    10. Information on ID not matching any address in the consumer report, Social Security number has not been issued or appears on the Social Security Administration’s Death Master File, a file of information associated with Social Security numbers of those who are deceased.

    11. Lack of correlation between Social Security number range and date of birth.

    12. Personal identifying information associated with known fraud activity.

    13. Suspicious addresses supplied, such as a mail drop or prison, or phone numbers associated with pagers or answering service.

    14. Social Security number provided matching that submitted by another person opening an account or other customers.

    15. An address or phone number matching that supplied by a large number of applicants.

    16. The person opening the account unable to supply identifying information in response to notification that the application is incomplete.

    17. Personal information inconsistent with information already on file at financial institution or creditor.

    18. Person opening account or customer unable to correctly answer challenge questions.

    19. Shortly after change of address, creditor receiving request for additional users of account.

    20. Most of available credit used for cash advances, jewelry or electronics, plus customer fails to make first payment.

    21. Drastic change in payment patterns, use of available credit or spending patterns.

    22. An account that has been inactive for a lengthy time suddenly exhibiting unusual activity.

    23. Mail sent to customer repeatedly returned as undeliverable despite ongoing transactions on active account.

    24. Financial institution or creditor notified that customer is not receiving paper account statements.

    25. Financial institution or creditor notified of unauthorized charges or transactions on customer’s account.

    26. Financial institution or creditor notified that it has opened a fraudulent account for a person engaged in identity theft.

    It’s a long, but not exhaustive list.  The most important thing for companies is to have a written Red Flags policy to demonstrate due diligence.  We will all be working together in the spirit of the law–helping head off the high cost of identity on individuals, companies, and the county at large.  For more information visit www.hvshred.com

  • Shredding service is good for your heart

    Since February is heart health month and today is Valentine’s Day, let’s review why shredding is good for your heart.

    Heart disease and stroke are the #1 and #3 killers of women in the United States respectively.  Here’s how shredding can help: 

    • SECURITY-Shredding is done ON-SITE while you watch on a color monitor
    • COMPLIANCE-The certificate of destruction supports your due diligence
    • WELL BEING-Quickly purge old files without worries about staples, paperclips, jams or broken shredders!
    • GREEN-All shredded paper is recycled!
    • NO RISK-No long-term contracts

    We have shredding solutions for all Hudson Valley businesses and residents–check out https://www.hvshred.com for more information.


  • What is the right approach to the Red Flags Rule?

    Continuing with our project of helping our community weed through the new legislation, this week we turn our focus to “What is the right approach to the Red Flags Rule?”

    At its core, the Red Flags Rule requires a risk-based approach.  Each financial institution or creditor must conduct a risk assessment in order to develop and implement a program that is appropriate to the size and intricacy of the organization and the nature and scope of its activities.  In addition, the Program must allow the organization to address changing identity theft risks.  The risk assessment should document a complete analysis of the identity theft risks in a succinct manner so that it can be easily shared and communicated across the organization, including to the board of directors, management, and appropriate staff.  Examples of risk factors that should be used to identify red flags include:

    • Types of covered accounts the organization offers or maintains;
    • Methods the organization offers to open covered accounts;
    • Methods the organization provides to access covered accounts;
    • Previous experiences with identity theft

    The program must incorporate oversight of third-party service providers to ensure regulatory compliance on their part as well.  Guidelines issued by the FTC are helpful.

    Keep heart everyone–we will get through navigating this new legislation together.

    For more information on identity theft prevention visit www.hvshred.com


  • MORE ON RED FLAGS

    Our goal is to use this space to educate our community about issues relevant to identity theft; the long-time in coming Red Flags Rule has finally been enacted into law and we will be doing our best to help weed through—“What does it mean?”

    We’ll start with the good news for many of our clients—thanks to the diligence of the American Institute of Certified Public Accountants (AICPA), and other groups, the language of the Red Flag Program Clarification Act of 2010 signed by the president on December 20th narrowed the definition of creditor to exclude professional firms that often to not receive full payment at the time service is rendered.  The AICPA and the American Bar Association dropped their lawsuits, leaving the FTC free to enforce the fule.

    The Red Flags rule requires creditors or financial institutions with covered accounts to implement a written identity-theft prevention program.  The program should identify and detect signs of identity theft in a client’s normal course of business and spell out appropriate actions they will take when they detect red flags.  Creditors would include entities that loan money, such as banks, finance companies, automobile dealers, and mortgage brokers, but many other businesses and nonprofits will be subject to the rule.

    In the coming weeks, we’ll be doing our best to help clarify.

    In the meantime, be assured that on-site shredding is an integral part of ensuring data security for any business.  For more information visit www.hvshred.com


  • PART 2: BE WARY OF THESE SCAMS

    Continuing with our thread from last week, we finish off our focus on the top scams to be wary of in 2011.  Last week we addressed job hunt lures, debt solutions, not-so-free trial offers, time share resellers, and work from home secrets.  This week we urge you to be wary of:

    1. Itinerant home repairers and roofers. Better Business Bureaus across the country received complaints from consumers who answered a knock from a door-to-door salesman or itinerant worker who eventually failed to deliver on promises to fix their roof or do other work to their homes.
    2. Lotteries and sweepstakes. The victim receives a letter in the mail or a phone call from someone
      pretending to be with Reader’s Digest, Publisher’s Clearing House or a phony foreign lottery. The
      catch: A winner must first wire hundreds or even thousands of dollars to cover taxes or some other
      bogus fee. The victim wires the money, but the prize never arrives.
    3. Identity theft. A person can become a victim of identity theft in both low-tech and high-tech ways,
      including theft and mail theft, e-mails, phone calls, text messages, or as the result of a corporate data breach.
    4. Advance-fee loans. Victims are told they qualify for large loans but must pay upfront fees — often
      more than $1,000. The victim wires money to the scammers but never receives the loan.
    5. Overpayments. These typically target small-business owners, landlords or individuals with rooms to rent and sellers on classifieds or sites like Craigslist. The scammers overpay the amount requested and then ask the victim to wire the extra amount back to them or to another fraudulent entity. Ultimately, the check is forged and the victim loses the money wired back.

    The old cliché holds true—the best defense is a good offense.  When it comes to identity theft, best practices suggest shredding is the highest level of defense for personal information.  For more information about our on-site shredding service, check out www.hvshred.com


  • SCAMMERS ARE OUT IN FORCE IN 2011

    Especially in these tough economic times, the Better Business Bureau warns Americans to be wary of these top  scams.  We’ll hit the a few this week and finish off the list next week: 

    1. Job hunt lures.  These days all the talk is about JOBS, JOBS, JOBS!  Unfortunately, further complicating the underemployment situation are scams targeting job hunters.  These include attempts to gain access to personal information such as bank account or Social Security numbers and requirements to pay a fee to even be considered for a job.
    2. Debt relief and settlement services. Again, capitalizing on those in vulnerable loan positions find themselves fending off sharks.  The council warned consumers in 2010 to scrutinize third-party assistance for getting out of debt. These companies often require upfront fees and potentially leave the consumer drowning in even more debt.
    3. Work-from-home secrets. Some promise to teach the secrets to making money online; others claim you can make money assembling items at home or get paid to be a mystery shopper. Some victims even found that their opportunity to work from home was a job to fence stolen goods. The end result is that instead of getting paid, you can end up losing hundreds — if not thousands — of dollars.
    4. Timeshare resellers. Complaints about the timeshare industry — including deceptive resellers — increased by more than 40 percent, according to 2010 estimates. Timeshare owners who are desperate to get rid of vacation property that requires monthly fees are being targeted by companies that claim they have an eager buyer. The company tells the seller they must pay up to several  thousand dollars up front. After paying the fees, the seller never hears from the company again.
    5. Not-so-free trial offers. Misleading free trial offers online for diet supplements, penny auctions and money-making opportunities blanket the Internet. The free trials seem no risk but complainants state they were billed monthly and found it extremely difficult to cancel.
    6. Identity theft. A person can become a victim of identity theft in both low-tech and high-tech ways,
      including theft and mail theft, e-mails, phone calls, text messages, or as the result of a corporate data breach.

     The old cliché holds true—the best defense is a good offense.  When it comes to identity theft, best practices suggest shredding is the highest level of defense for personal information.  For more information about our on-site shredding service, check out www.hvshred.com


  • Here comes the Red Flags Rule

    Effective December 31, 2010, the Red Flags Rule requires organizations extending payment terms to customers and that have personal information on file to:

    1-Create written “Program” that identifies where personal customer information is vulnerable to unauthorized access ro where the organization is vulnerable to ID Theft.

    2-Institute precautions that address those ID Theft vulnerabilities and train employees to comply with those precautions.

    3-Intervene, alert the authorities, or warn the potential victims when there is a threat of ID Theft.

    4-Have the “Program” controlling ID Theft vulnerabilities signed by the Board of Directors or the company owners annually.

    5-Require audits of data-related vendors with access to personal information of customers.

    The Federal Trade Commission is in charge of enforcing the law and estimates that nearly 11 million organizations are legally required to comply.  That is close to 40% of all US Businesses.

    Shredding is among the most secure ways to ensure confidential paperwork is kept confidential.  Businesses should strongly consider including regularly scheduled on-site shredding service in their Red Flags “Program”.

    At HV Shred, we know our community of businesses has long been aware of following through on their fiduciary duties to properly dispose of confidential information and would like to help make that program even easier with on-site shredding.  Check out www.hvshred.com for more information.


  • 5 days until Christmas: Safe shopping tips

    Here are some quick tips that are good all year long for protecting your identity while shopping.

    ONLINE SHOPPING

    1. Make sure you have a secure connection before sending private information (https not http on the address bar)
    2. Use a credit card instead of a debit card for better protection.
    3. Print out receipts so you have a back up copy in case of computer problems.

    OFFLINE SHOPPING

    1. Only keep essential information in your wallet/purse.
    2. Never leave your purse hanging over the back of a chair.
    3. Make sure the ATM has not be tampered with before using it. 
    4. Use a credit card instead of a debit card for better protection.
    5. Keep your receipts.

    Now matter how you shop be wary of unknown charges on your cards, notices for credit you didn’t apply for, packages arrive that you did not order, or change of address notices. These are all signs of identity theft.

    Please visit www.hvshred.com for more information.

    Best wishes from your friends at HV Shred for a happy, healthy holiday!