ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

Identity Theft Mitigation

Updated on April 21, 2019
clivewilliams profile image

An I.T Professional with over 15 years in the industry. A Microsoft Certified Professional, Microsoft Certified Systems Administrator.

Identity Theft Protection
Identity Theft Protection

What is Identity Theft?

Simply put, a person gains access to your personal and private information and uses that data in pretense of you. This means that the person who stole your identity is capable of all actions you could do. Most of the times though, identity theft is geared towards financial gains such as using someones credit card to make purchases.

1. Dispose of Identification Cards and Bank cards Properly

When your cards expire, don't just take them and throw in the bin or dash them through your car window when you are in the drive through and realize you have no credit to pay for a burger. You need to ensure that expired credit, debit, drivers licence and any other card tied to you is totally destroyed before disposal. The best way to destroy these cards is to run them through a shredder. Then collect the shredded pieces and dispose of them in seoerate garabage bags. Or, you can simple burn those cards. This is a sure way to ensure that no one can get them and copy the data.

2. Keep Card Receipts and Dispose properly

You never leave anything up to chance when protecting your identity. Not many people actually look at the credit card receipt in debt, they will just glimpse at the amount of money spent and crumble it up and toss it in the bin. But the credit card receipt contains a description of the transaction, which usually includes the date, the merchant name/location, a portion of the primary account number, the amount and the reference number. A good identity thief can piece the information together to gain access to your full credit card information and steal your identity. Carry all credit card receipts home and then keep them in a nice big envelop and tuck them away safely. After a period, you can burn them.

3. Never Let Anyone Swipe Your Credit Card In a Back Room / Skimmer Trap

Many customers take this back room swiping for granted. Have you ever been to a store and the sales clerk tells you that the card machine is not working at the front so hey have to bring your card to the back room for swiping? Don't! if there card machine is not working at the front, leave the goods and come back when the machine is functional. You can also insist that you go with them to the back room to witness your card being swiped. The backroom swiping is a simple decoy to gain access to your credit card detail by using a skimmer. Credit card skimming is a type of credit card theft where crooks use a small device to steal credit card information in an otherwise legitimate credit or debit card transaction. When a credit or debit card is swiped through a skimmer, the device captures and stores all the details stored in the card's magnetic stripe. The stripe contains the credit card number and expiration date and the credit card holder's full name. Thieves use the stolen data to make fraudulent charges either online or with a counterfeit credit card.

4. Secure Your Online Transactions

There are many pseudo sites out there just waiting on some naive person to log o to their computer and enter their credit card data to try to make a purchase. When you are doing online transactions, ensure that your device being used is secure and that the website you enter you information on is legitimate. Never do a transaction on a website which does not have security enabled which encrypts your information entered as well as the transfer of that data. Websites with encryption always have a HTTPS. The S on the HTTP means secure. It uses special protocols and ports which allows the data to be protected.

5. Never Click on Unknown Links Telling You To Change Password

Do not click on links telling you that your password has expired and needs to be changed. These kind of links are never sent out by legitimate online business. This is normally triggered when you make a request via the legitimate website for a password reset if you believe your password is compromised or you simply forgot your password. Links telling you that your account /password has expired and you need to click to change your password are normally not legitimate and should be avoided and deleted from your computer immediately. If you are not sure about the link and believe it may be legitimate, simply call the online business to verify or logon directly to the site to change your password. Hackers steal passwords from legitimate customers who have credit card information saved on comely visited websites. They then use these passwords to shop online on behalf of you with you ever receiving the goods they bought!

6. Never Use Public WiFi With Credit Cards

If you feel like giving away your identity today, simply go find a public wifi and begin entering all your person information on your device. I am sure that within a couple of days you will be busting and struggling in your thankless 9-5 job while your twin is somewhere in Switzerland on vacation eating cheese, drinking wine and snowboarding. People who steal identity love public WiFi. It gets them all tingled up to know that Grandma Pearl is online shopping for new dentures with her credit card. They will slither their dirty paws into whatever wallet they can to steal money. The thing is, you don't know who controls public wifi and most of the time the connections are not secure and are basically opened without any kind of encryption. This can allow hackers to easily hop in someones computer and steal whatever information they think is important.

7. Secure Your Device

If you use a Laptop or PC, ensure that the device has the best internet security application installed that can block viruses and also block network intruders. Shop online for a good antivirus and keep the antivirus definitions up to date to ensure you always have updated protection against person who hack and try to steal your identity. Scan you computer at least twice a month to ensure that you don't have any malware sitting on your PC that may cause you to become vulnerable.

8. Collect All Mails Ontime

Don't allow your mail to sit in the mailbox indefinitely. Normally mails sent to you may contain a whole lot of personal information. Some companies will even email a brand new credit card to you which sits in the mailbox for weeks without being picked up. All it takes for the identity stealer is to take those mails and use the information in them and there goes your identity.

9. Don't Fill Out Online Forms To Enter any Ridiculous Sweepstakes or To Get any Ridiculous Prize

One way they have managed to gain access to your personal information is you freely giving it to them. Many freebie websites and other annoying and phishing websites will tell you that you have won some stupid prize and you must fill you a form to get the prize or to enter some fictitious sweepstakes. But the only sweepstakes that is taking place is someone collection personal information and then selling it to marketers and sometimes hackers. This information you so freely gives will have your name, address, email, date of birth and many times even credit card numbers. Don't fill out these scam forms, delete any mail telling you to give them your data to collect prizes.

10. Never Give Friend Or Family Credit Card to Use on Your Behalf

It is not that you don't trust them, (Well not all of them) but it is the fact that friends and families may not take the same precaution as you do when using your credit cards. You know what the risk involves when someone steals your identity and all the hassle you have to go through to clear the mess up. Family or friends only just want to get that card swiped or entered into what ever device so they can get whatever it is you gave them your card to get. Remember, never lower you fraud guard for anyone.

What To Do If Identity Stolen
What To Do If Identity Stolen

What If Your Identity Was Stolen?

Contact one of the credit reporting agencies' fraud alert departments and place a fraud alert on your credit report. This prevents identity thieves from opening accounts in your name.

  1. Contact your lenders, banks, and insurance companies and let them know the situation. Ask to close accounts. Open new ones with new personal identification numbers (PINs) and passwords.
  2. Victims of identity theft are entitled to a free credit report. Wait about a month before you request it. Some activity may take a while to show up on your report. When you get it look for:
    • Personal information that has changed: your name, date of birth, Social Security number, address, and employer
    • Inquiries from companies you didn’t contact
    • Accounts you didn’t open
    • Debts on your accounts you can’t explain
  3. File a police report—it is proof of the crime. If the credit reporting agencies need to investigate fraudulent activity on your report, they will need this police report.
  4. Periodically check your credit reports over the next year to make sure no new fraudulent activity has occurred

This article is accurate and true to the best of the author’s knowledge. Content is for informational or entertainment purposes only and does not substitute for personal counsel or professional advice in business, financial, legal, or technical matters.

© 2019 Clive Williams

Comments

    0 of 8192 characters used
    Post Comment
    • always exploring profile image

      Ruby Jean Richert 

      6 months ago from Southern Illinois

      This is really good info. There are so many scammers out there. I like your idea of burning. Thanks again Clive.

    • FlourishAnyway profile image

      FlourishAnyway 

      6 months ago from USA

      Wonderful idea

    • Ericdierker profile image

      Eric Dierker 

      6 months ago from Spring Valley, CA. U.S.A.

      Interesting. I kind of want someone to be me. What an idiot.

    • clivewilliams profile imageAUTHOR

      Clive Williams 

      6 months ago from Jamaica

      Flourish, just bring it to a Blacksmith..and watch him burn it to smithereens.

    • clivewilliams profile imageAUTHOR

      Clive Williams 

      6 months ago from Jamaica

      Good thing you are doing Pam. Keep it up

    • clivewilliams profile imageAUTHOR

      Clive Williams 

      6 months ago from Jamaica

      Yes Louise, keep those fraudsters at bay

    • Pamela99 profile image

      Pamela Oglesby 

      6 months ago from Sunny Florida

      This is great advice to protect your credit and idenity. I always cut the expired cards in numerous pieces as I thought they were too thick for my shredder, but maybe not. I check my bank and the credit card I use the most frequently to make sure there is nothing unexpected. Thanks for this thorough review of these safety tips.

    • FlourishAnyway profile image

      FlourishAnyway 

      6 months ago from USA

      Some credit cards are now thick high grade metal and say do not shred. I have one and am puzzled how in the world I would properly destroy the thing when it expires. You have good tips here.

    • Coffeequeeen profile image

      Louise Powles 

      6 months ago from Norfolk, England

      There's some very useful information here, thankyou.

    working

    This website uses cookies

    As a user in the EEA, your approval is needed on a few things. To provide a better website experience, hubpages.com uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

    For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at: https://hubpages.com/privacy-policy#gdpr

    Show Details
    Necessary
    HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
    LoginThis is necessary to sign in to the HubPages Service.
    Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
    AkismetThis is used to detect comment spam. (Privacy Policy)
    HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
    HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
    Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
    CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
    Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the googleapis.com or gstatic.com domains, for performance and efficiency reasons. (Privacy Policy)
    Features
    Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
    Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
    Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
    Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
    Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
    VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
    PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
    Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
    MavenThis supports the Maven widget and search functionality. (Privacy Policy)
    Marketing
    Google AdSenseThis is an ad network. (Privacy Policy)
    Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
    Index ExchangeThis is an ad network. (Privacy Policy)
    SovrnThis is an ad network. (Privacy Policy)
    Facebook AdsThis is an ad network. (Privacy Policy)
    Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
    AppNexusThis is an ad network. (Privacy Policy)
    OpenxThis is an ad network. (Privacy Policy)
    Rubicon ProjectThis is an ad network. (Privacy Policy)
    TripleLiftThis is an ad network. (Privacy Policy)
    Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
    Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
    Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
    Statistics
    Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
    ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
    Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)
    ClickscoThis is a data management platform studying reader behavior (Privacy Policy)