Someone recently told me, "You would have to be a stupid to lose your personal information." While I respectfully responded to this person in the moment, the comment has stuck with me. I present on Identity Theft all over the Western United States, and thought I would respond to this particular individual in writing.
There are multitudes of ways to lose your personal information. You have undoubtedly heard of many of them. Fake web sites, data theft, stealing people's trash, stealing people's outgoing mail, check fraud, etc., are just a few of the possibilities for loss of information. Job ads are also being used for Identity Theft. Monster.com ranks fake companies posing as real companies on their web site among their biggest problems.
So, to you who think that it could never happen to you, you might want to read this next sentence twice. No matter how good you are, no matter how vigilant, no matter how much you shred or tear, no matter how many times you go to the post office so that you don't put outgoing mail in your home mailbox, regardless of how well you can hide in your home, there is no 100% effective defense against Identity Theft. Let me say that again, in case you don't read it twice. There is NO 100% effective method to defend yourself against identity theft.
Here's an example of why. Let's say you want to get health insurance, or auto insurance, or finance a car, etc. etc. etc. Let's say for purposes of this example that you are trying to get health insurance through your company. This is a relatively simple process, right? Fill out the form, and wait to get the insurance cards in the mail.
What you may not realize is that the insurance agent has taken the form you filled out and submitted it for group health. It is submitted to three different companies for underwriting. So now, the insurance agent and the insurance company has the information from you, the three companies supplying the insurance coverage have the information on you, AND all of the employees at all four points have access to the information. Think about how many employees that might be.
That information is often then passed on to a data warehouse like ChoicePoint, and anyone who has access to ChoicePoint now has access to that information. Who has access to ChoicePoint? I think with the recent news articles, the more appropriate question is, who doesn't have access to ChoicePoint?
The information is also submitted to your MIB (Medical Information Bureau) file. Anyone who has access to the MIB files, now has access to all of that information. Who has access to the Medical Information Bureau records? Anyone, at any hospital around the United States, who has even a small amount of clearance, has access to the Medical Information Bureau records.
According to John Gardner, co-author or Chicken Soup for the Entrepreneurial Soul, "This makes the Identity Theft Shield, along with a Pre-Paid Legal Services Membership, an absolute must for anyone that's breathing."
So to you, sir, who more or less said to me, "You'd have to be stupid to become a victim of Identity Theft!" I wish you my best. If you want to continue thinking that shredding your information is going to protect you, then for you I respectfully choose a phrase used by my friend Larry Smith. "Sometimes, you just can't fix stupid."
Jonathan Kraft is Colorado's foremost expert on computer-related Identity Theft. He has been helping employers and employees to protect themselves from the issues surrounding Identity Theft since long before identity theft reached today's epidemic proportions. To learn how Mr. Kraft can protect you or your company against the effects of Identity Theft, please call 877 825-7119, or email mailto:jkraft@strive4impact.com. You can also find out more online at http://www.strive4impact.com/idt
Viruses, Bugs, Worms, Dataminers, Spybots, and Trojan horses. The Internet... Read More
There is no doubt that "how-to articles" have become a... Read More
Spyware protection software is the easiest way of removing spyware... Read More
At this point, if you've got the whole "turning the... Read More
Did you know...? 1 in 5 children who use computer... Read More
The average computer is packed with hidden software that can... Read More
Spelt phishing, but pronounced as above, this despicable act is... Read More
There has not been a time in the history of... Read More
Spyware and adware are becoming major problems for online surfers... Read More
This really chapped my lips...I recently bought a new computer.... Read More
Over £5 billion pounds was spent on online shopping in... Read More
Today,on most internet user's computers, we have the ability to... Read More
This is not some new fangled techno-speak, it is a... Read More
This is the second in a series of articles highlighting... Read More
Paypal is a great site and is used by many... Read More
Whether we like it or not, we are all living... Read More
Everyone should eliminate spyware and adware from your hard drive... Read More
This is the second in a series of articles highlighting... Read More
Remember the television show about the nosy neighbor Mrs. Kravitz... Read More
What is a Firewall?The term "firewall" illustrates a system that... Read More
Sooner or later everyone with an email account will receive... Read More
It's a sad statistic, but hundreds of unsuspecting kids are... Read More
For many, the daily walk to the mailbox evokes mixed... Read More
They're out there. Individuals trying to make a quick buck... Read More
The trash folder in my main inbox hit 4000 today.... Read More
Spyware, viruses and worms... oh my!If you are connected to... Read More
Identity Theft is one of the most serious problems facing... Read More
The money being spent online is steadily growing. With billions... Read More
"Dear Bank of the West customer", the message begins. I've... Read More
Never before with Instant Messaging (IM) has a more vital... Read More
A few nights ago I received an email from "2CO"... Read More
Many of us have run into an annoying and time-consuming... Read More
Shopping for horse gifts or other gift items on the... Read More
May. 16th 2005 - MicroWorld has reported the discovery of... Read More
Have you ever had to call Symantec or McAfee to... Read More
Watching how the traditional media covers the latest virus or... Read More
Spyware is the most troublesome software to appear on the... Read More
Identity theft ? also known as ID theft, identity fraud... Read More
There are several basic concepts to keep in mind when... Read More
No longer are viruses the only threat on the internet.... Read More
1. Importance of a Virus Scanner: A Antivirus program can... Read More
Business on the internet is getting down right shameless. This... Read More
Your computer is as slow as molasses. Your mouse freezes... Read More
First off I should explain what phishing is. Phishing is... Read More
First, let's do a little recap'. As I stated in... Read More
High-tech private investigators are becoming the answer for many Internet... Read More
The Threat10 years ago you could probably have run no... Read More
Virus damage estimated at $55 billion in 2003. "SINGAPORE -... Read More
One evening, during the graveyard shift, an AOL technical support... Read More
As you know, this time the virus under the name... Read More
|