Identity Theft - Protect Your Information

Identity theft is the unauthorized acquisition of a person's personally identifiable information (PII). The unauthorized acquisition may occur if the individual does not safeguard their own personal information. It may also occur if an organization that stores the PII does not have sufficient or effective security controls.

How safe is your social security number? With your name and birth date, someone may be able to buy your Social Security number on a web site that sells numbers to businesses that conduct background checks. Since many individuals obtained their social security number when they started their first job, all an identity thief needs to do is ask the individual where they were first employed. On June 25, 2011, Social Security changed the Social Security Number assignment process. Prior to that date, an individual's social security number was based upon where they lived. For example, if the individual lived in Wyoming, the first three digits of the social security number were 520. If the person lived in North Carolina, the individual's social security number stared with 232. Bingo, simply by knowing where you first worked, the thief had three of your nine digits. How many times does someone ask for the last four digits of your Social Security Number? Now the thief has seven out of the nine digits. It won't take long to get (or guess) the remaining two digits.

Once your personal information is obtained, identity fraud can occur. Identity fraud examples include:

Identity Theft Protection For Individuals
By following some basic procedures individuals can help to minimize their risks and protect against identity theft and subsequent identity fraud.

Preparation

Using electronic equipment

Safe habits

If You Are a Victim of Identity Theft
Take the following steps if you become a victim of identity theft:

Report Fraud
A variety of resources are available to you to report fraudulent activities.

Reduce Future Risks
The bad guys will try and find out information about you before they perform identity theft. By reducing the amount of information available, you reduce the likelihood of a future attack.

Summary
Individuals and organizations need a proactive approach to managing threats related to identity theft, identity fraud, and data breaches. We also offer suggestions on how to protect your business from a security breach that can lead to identity theft.

Security Blog
verified If You Want a "Security Audit"
You Need a Certified Auditor.
Certified Information Systems Auditors

Unlike a security consultant, Altius IT is certified as a Certified Information Systems Auditor to perform a security audit of your environment and issue reports and recommendations to secure your systems. After your audit, Altius IT's Auditor Opinion Letter and Secure Seal let your clients and prospects know you meet security best practice/compliance requirements.

See our In the News page for video clips of our experts on national television as well as over 40 publications featuring Altius IT. In addition to our auditor certifications we hold many security, technical, and project management credentials. More information is available on our About Us page.

Our comprehensive audit service uncovers gaps in your existing defenses so that you can better:

  • Fortify your information systems, applications, and network infrastructure
  • Comply with regulatory requirements
  • Protect your valuable assets