(937) 296-5000

Interlink Advantage Blog

What is your Identity Worth to You?

Your identity has quite a lot of value, especially in the wrong hands. Security firm ZoneAlarm put together some numbers in 2011 concerning identity fraud, and it even shocked us. Let's talk about a few of these statistics and what it means.

First of all, what shocked us the most is that according to the FTC, in the United States, 9 million individuals have their identities stolen each year. Identity theft is a little different than identity fraud, however. Theft is when personal information is exposed and taken without permission. This is happening all the time by malicious software like spyware, but it can also happen when legitimate websites and services get infiltrated by cybercriminals. If a reputable online store (or even a database for a brick and mortar store) gets hacked into, your personal information can be stolen. That's identity theft.

Identity fraud is when that data is misused for financial gain. This is when things start to get very dangerous. In 2009, $56 billion dollars were accumulated by cyber criminals through identity fraud. The good news is in 2010 that number went down to "only" $37 billion. What does that mean to the average person? On average, victims of identity fraud had $4,841 dollars stolen per victim. Trouble is, the world has had to improve drastically to protect consumers from identity fraud. This means higher costs of doing business which then get reflected on prices of products and services. In other words, because of identity fraud, we all lose.

How does your data get stolen?  There are plenty of ways, but here are a few popular methods:

  1. Hackers can pick up credentials via public Wi-Fi and public PCs.
  2. Credit Card Skimming - a process that involves your credit card data being stolen when your credit card is swiped at a standard ATM or credit card terminal.
  3. Selling or discarding used computer equipment that isn't properly wiped can expose personal information.
  4. Hackers can infiltrate networks and databases.
  5. Dumpster diving and paper mail theft.
  6. Malware and viruses
  7. Phishing.


In almost half of reported identity theft cases, the victim knew the criminal.

What do you do if your identity is stolen?

Almost half of all reports of identity frauds are discovered by the user first, although banks and credit card companies have methods in place to stay on top of it as well. If your financial credentials are stolen, you need to contact your bank and/or credit card companies immediately, both by phone and in writing. You'll want to file a police report with details about where your identity was stolen, what you believe was or could have been stolen, and documented proof of the crime.

You don't want to risk identity fraud. Monitor your credit reports closely, shred sensitive mail and documents before throwing them away, and ensure your computers and network are running latest security updates and antivirus, as well as other security measures. For a complete review of your security, contact us at (937) 296-5000 and we will help pinpoint vulnerabilities and fill in the cracks before a costly event occurs.

Disaster Recovery and Why it Matters to Dayton...
Slow Computer? Increase your memory to boost comp...
 

Comments 4

nathan dwyer on Thursday, 18 May 2017 05:42

Typically I discover websites through the remarks that different bloggers leaves on those web journals thus it adds to it just to indicate distinctive styles and thoughts. I have picked this specific site since It gives assistance to individuals to make them feel sure on the web, to know they are welcome to join the discussion and give their assessments. It's vital that they know how the structure of online journals workout.Feel free to surf custom essay writing service

Typically I discover websites through the remarks that different bloggers leaves on those web journals thus it adds to it just to indicate distinctive styles and thoughts. I have picked this specific site since It gives assistance to individuals to make them feel sure on the web, to know they are welcome to join the discussion and give their assessments. It's vital that they know how the structure of online journals workout.Feel free to surf [url=https://rospher.com/]custom essay writing service[/url]
Magistr Magistr on Tuesday, 14 November 2017 08:46

We have received fantastic news articles on best website for writing essays. Every topic is released to write more assignments and essay online reviews for the content editors and review followers.

We have received fantastic news articles on [url=https://canadianessayreviews.com/]best website for writing essays[/url]. Every topic is released to write more assignments and essay online reviews for the content editors and review followers.
qeddeviv qeddevix on Tuesday, 01 May 2018 02:02

In order to get rid of hackers for your private and important data, you may use some security and malware detector software.They could buy an essay about the identity stolen problems.The internet use should be safe and secured.

In order to get rid of hackers for your private and important data, you may use some security and malware detector software.They could [url="https://www.huffingtonpost.co.uk/mary-walton/is-it-legal-to-buy-an-ess_b_14633902.html"]buy an essay[/url] about the identity stolen problems.The internet use should be safe and secured.
Josh Greg on Thursday, 07 June 2018 19:09

Security for online transaction face sometimes difficulty to some of the users.The identity is an important fact for using the card in the online.Though this elite assignmenthelp is doing it's great level the identity will have the value.

Security for online transaction face sometimes difficulty to some of the users.The identity is an important fact for using the card in the online.Though this [url="https://eliteassignmenthelp.com/"]elite assignmenthelp[/url] is doing it's great level the identity will have the value.
Already Registered? Login Here
Guest
Sunday, January 20 2019

Captcha Image

Mobile? Grab this Article!

QR-Code

Tag Cloud

Best Practices Small Business Security Saving Money Privacy Backup Gadgets Technology Hardware Email Passwords Instant Messaging The Internet of Things Training iOS Innovation HaaS Ransomware Telephone Systems Hacking SaaS Smartphones Personal Information Quick Tips Network Security Video Games Work/Life Balance Hacker Taxes Facebook Black Market Private Cloud Cybersecurity Windows 10s Hackers Hosted Solutions Business Computing Point of Sale Data Backup Electronic Medical Records Cloud Computing Search How To Entertainment Save Money Phishing History Efficiency Computer Fan Company Culture Microsoft Flexibility Telephony Transportation Communications Server Business Continuity Solid State Drive Relocation Router Malware Microsoft Office Keyboard Supercomputer Internet Exlporer Virtualization Analytics Vendor Management Government Apps Managed IT Services Automobile Safety Television Money Current Events Politics Scam Emails Operating Sysytem Disaster Recovery Computer Managing Stress Compliance Cleaning WIndows Scalability Workplace Tips Smart Technology Consultant Android Hard Disk Drive iPhone Mobility Remote Computing Risk Management Shortcut IT Budget Windows 10 USB Law Enforcement Text Messaging Mobile Devices BDR Emergency Mobile Device Software Cybercrime Experience Employer Employee Relationship Marketing Productivity PDF Mobile Computing Education Regulation Computer Care Operating System Update Antivirus Data Management Alert Samsung Windows 10 Tip of the Week Business Management Password Wi-Fi Hiring/Firing App Advertising Virtual Reality Internet Office tips IT Support Identity Theft Users Outsourced IT End of Support Office 365 Phone System Computer Accessories Webinar Avoiding Downtime Google Drive Wireless Application Data Big Data Managed Service Provider Thank You Google Humor Holiday Productivity Employer-Employee Relationship Audit Information Technology Vulnerability Health Communication Legal VoIP Benefits Automation Smartphone Encryption Reputation Artificial Intelligence Upgrade Worker Commute Save Time Cost Management Social Media Recovery Music Browser IT solutions Business Cloud IT Services Battery Managed IT Services Books Unsupported Software Congratulations Miscellaneous Social User Tips Office Touchscreen

Blog Archive

January
February
May
June
July
August
September
October
November
December