Business Identity Theft: Beware of Identity Thieving Employees

Wow, a lawyer in Memphis got scammed by his secretary—she embezzled over $362,000 from him, says an article on wreg.com. Attorney Jerry Schatz hired Teresa Sumpter, 48, in July of 2013.

10DLittle did he know that his assistant would end up stealing checks from his trust account, forging her signature on them, and opening three credit cards—all in his name. And she named herself as an authorized user.

And what did this conniving little pill do with the stolen money? Sumpter bought several vehicles, paid some bills and purchased some miscellaneous things.

After her arrest she was charged with six counts of identity theft, two counts of forgery and two counts of theft of property.

So you see, the “bad guy” is sometimes a woman. It happens more often than you think, too. An article at sacbee.com tells the case of Natashia Adams Lugo, 31, whose dirty deeds of identity theft got her a sentence of almost 15 years in a state prison.

Lugo had been employed by Job Journal LLC. Then she was fired. So she decided to get some revenge by using her former employer’s bank checking and routing numbers to polish off $40,000 of personal debt. How could she not have known that her criminal act would easily be traced back to her?

Lugo also stole $17,200 from the Job Journal’s bank account to fund her child support account. Once again, the question blares: How could she have been dumb enough to commit a crime so traceable back to her? Some times these criminals aren’t so savvy, other times they are. Regardless, the employers usually never see the money again.

Prior to the Job Journal employment, Lugo had worked for Balanced Body, which fired her. You guessed it: After being fired, she used the company’s personal identifying information, as well as that from some of its patrons, to steal over $11,000.

Businesses need to beware of firing employees. But the logistics of protecting themselves from these kinds of crimes can be enormous. Big companies can’t close out their bank accounts and open new bank accounts every time someone is fired. Maybe small companies can, that hardly ever fire anyone, but the bottom line is that businesses just have to keep their fingers crossed whenever they give someone the pink slip.

The big thing is to hire forensics accountants to look at your books, frequently. Especially in family owned businesses. Sad, but true.

Robert Siciliano is an identity theft expert to BestIDTheftCompanys.com discussing identity theft prevention.

Covert Camera Apps to be aware of

Have you ever tried to take a picture or video of someone with your phone without them knowing? Sometimes it’s possible, but sometimes it’s not. Well, maybe you knew it was coming: “Ghost apps” are available that let you take images and videos without the target’s knowledge. You can then hide the images and videos in secret folders.

CAMYou can now spy on people with apps like Private Ninja Cam, Stealth Cam and Top Secret Camera. Scary enough, many users of these apps use this technology on sexting and other porny activities.

This spying-type of technology, however, can be put to good use, such as capturing a teacher abusing a student or a spouse doing some cheating. You can build evidence for a lawsuit, for instance, amassing videos at the workplace of various forms of harassment. You can be sitting in your boss’s office, getting chewed out by him over nothing, recording everything without him having the slightest clue.

Be careful though, as some states have laws against these practices when audio recording is involved.

So how do you get away with the spying?

  • The camera can record with a motion sensor.
  • The screen can be made blank when taking a picture.
  • The preview window can appear like a Web browser.
  • The shutter sound can be muted.

You can then hide the loot so that someone who gains access to your phone won’t be able to find it. Such secret vaults include Best Secret Folder and Keep Safe Private Photo Vault.

Snoopers can’t get into them because they require a password. But snoopers may also be tricked into overlooking the vault because the vault can masquerade as another type of application. The vault may also snap a picture of the snooper or sound an alarm.

Imagine all the things someone can do with these apps, such as a man sitting on a subway “upskirting” standing women. But remember, good things can be done too, such as recording a crime, recording being mistreated by a family member, capturing your husband’s boss hitting on you at the Christmas party, and so much more.

Just sayin’

Robert Siciliano is an identity theft expert to BestIDTheftCompanys.com discussing identity theft prevention.

12 Simple Smart Ways to secure your Home

Burglars actually peruse social media to see who’s on vacation. In fact, 69 burglars were interviewed by Edith Cowan University in Australia, and perusing social media kept coming up as a way to find victims.

3BKeep your cyber mouth shut till you return. Here are more tips:

Get to know your neighbors. This way they’ll be more inclined to ask a stranger, who’s loitering around your yard, what they’re doing there.

Don’t show off. Like anyone else, burglars are attracted to the niftiest house on the block. Keep a low profile, consider how a new outside decoration might attract the wrong kind of attention

Apps for your smartphone. There are so many ways you can use your mobile device when away from home to keep tabs on your house.

Advertise your home security system. Burglars are repelled by the alarm company signs, decals and stickers on the property.

Hide valuables in clever places. Put small jewelry boxes inside an old Starbucks bag. Or stash money inside an empty cereal box in the pantry.

Don’t let mail pile up. And put your mail and newspaper delivery on vacation hold when you travel.

Close your curtains, blinds and shades. It’s shocking how many people leave them open at night, making it so easy for burglars to see what’s inside, including the 105-pound adult occupant. Even in broad daylight, a burglar casing the area will be brazen enough to step right up to a window and peer inside.

Make your place look like someone is always home. Use timed lighters. Keep the lawn mowed. Arrange to have someone park their car in your drive when you’re traveling. Mute the ringer on your phone.

Never leave the garage door open. Not only can a thief see what goodies you have in your garage (yes, burglars steal “garage stuff” for resale), but they can potentially get into the house through the laundry room door.

Don’t leave empty boxes for trash pickup that reveal you have brand new pricey items. Break down the boxes.

Don’t let shrubs grow around doors and windows where they can conceal a prowler. But do plant thorny bushes close to windows.

One minute. That’s how long the average crook needs to get into a house. Keep your doors and windows locked with top-notch devices.

Robert Siciliano personal and home security specialist to BestHomeSecurityCompanys.com discussing burglar proofing your home on Fox Boston. Disclosures.

How to unsend or cancel an E-mail

If the person you are sending an e-mail to pretty much instantaneously receives it, how on earth can you unsend or cancel it? Well, you have several options.

emailCriptext

  • This is a browser plug-in that works for Chrome and Safari.
  • Your message including attachments will be encrypted.
  • You will know when it’s been opened.
  • You can recall messages and assign them expiration times. The recall, of course, comes after the recipient has possibly opened the message, but if they’re, for instance, away from their computer when it comes in, and you recall the e-mail, they will never know it was there. Or maybe they will have seen it and decided to open it later, and when that time comes, they see that it has vanished and think they’re going crazy.

UnSend.it

  • Like Criptext, this plug-in will let you know when messages have been opened. In addition, it allows you to recall them and also set expiration times.
  • Missing, however, is the encryption feature.
  • It’s compatible with more browsers than is Criptext.

What about Gmail users?

  • Enable the “Undo Send” feature as follows.
  • In the upper right is a gear icon; click on it.
  • Select Settings to bring up the “General” tab.
  • Scroll to Undo Send.
  • Click checkbox for Enable Undo Send.
  • You can choose a cancellation time of five, 10, 20 or 30 seconds. A grace period of only five or 10 seconds doesn’t make much sense, so you may as well choose 30 seconds unless you routinely need recipients to receive your messages less than 30 seconds after you send them.
  • Hit Save Changes.

Virtru

  • This plug-in is compatible with Chrome and Firefox.
  • Those with Yahoo, Gmail or Outlook accounts can use it.
  • For $2/month, you can have message recall and self-destruction, along with message forwarding.
  • The free version does not offer any kind of recall or cancellation features, only secure messaging.

Robert Siciliano is an identity theft expert to TheBestCompanys.com discussing  identity theft prevention.

Stop being a blabber on Social Media

Are you a cyber-blabber? Even a post about your daily afternoon foray to the sub sandwich shop could get you in trouble: A burglar reading this knows when to rob your house. But it doesn’t end there. STOP THE MADNESS!

14DThe Giants: Facebook and Twitter

  • Be careful what you post on Facebook and tweet about. It can be used against you in court, even something as innocuous as: “I’m training for my very first 10K.” Not good if you’re suing someone who hit your car for back pain and suffering.
  • Lawyers will take the time to scroll the Facebook timeline and your tweet history for evidence that can kill your case.

Reputation and Safety

  • Seemingly harmless posts and tweets can indicate to burglars when it’s a good time to break into your house.
  • Worse, posts and tweets can indicate to pedophiles when and where to lure your child into their car.
  • Less malevolent, but potentially annoying though, are the data mining companies that piece together your tidbits to then design an ad campaign targeted towards you.
  • Are your posts replete with language? This won’t look good to a potential employer. Nor will endless posts about how fatigued you always are.
  • That image of your young child’s specially hand-crafted spanking paddle won’t go over well with the mother you were recently interviewed by for a nanny position.

I think you are starting to get it.

Obsessions

  • Facebook and Twitter can certainly amplify a pre-existing whacked sense of priorities. An example is that of obsessively checking your friend’s page to see what new thing she’s bragging about, then getting worked up with anger that you can’t match this, such as a new sports car.

Solutions

  • Set a timer out for, say, 30 minutes a day, and that’s your limit on Facebook and Twitter.
  • Avoid social media for one week to kill your hunger for obsessing over a family member’s bigger house, fancier car and more prestigious job.
  • Set your privacy settings on high.

Stop making inane posts about everything that happens to you. Nobody will go to bed in distress just because they didn’t read that you had an upset stomach after eating too much at BurgerVille.

Robert Siciliano is an identity theft expert to BestIDTheftCompanys.com discussing identity theft prevention.

15 Ways to protect your Identity

There are tried and true ways to protect yourself from identity theft—ways that you may not have even considered. Check them out (no specific order): PSH

  1. Evaluate your passwords. Does every online account have a different password or are you using the same one for multiple accounts? Fix this problem immediately.
  2. However, make the new passwords at least eight characters ideally, and include symbols, not just letters and numbers. Avoid using actual words or names, or keyboard sequences. Password-cracking software will easily find shorter passwords that contain words, names and keyboard sequences.
  3. Never post anything personal on social media. Yes, this includes your pet’s name, name of your kids’ school or teacher, where you’re going on vacation, the town your parents live in, etc. I don’t, why do you?
  4. Would you open your door to strangers knocking on it all day long? Of course not. So why would you “answer” e-mails from strangers? Ignore e-mails whose senders you don’t know. If the sender appears to be from a company you do business with, but you never gave them your e-mail, delete it. If they DO have your e-mail but there’s no reason they should be sending you a message, just ignore it.
  5. If that all sounds too confusing, then follow this simple rule: Never click links in e-mails or open attachments you’re not expecting.
  6. If you’re not using Bluetooth on your phone, turn it off.
  7. Set your phone up with a password. If it’s lost or stolen, you’ll have no worries.
  8. Shred all your credit card offers, medical records, billing information and other personal information before tossing.
  9. Memorize your Social Security number. Never give it out unless it’s absolutely mandatory like for a job application. However, just because someone says they can’t process your request without your SSN doesn’t mean you must hand it over. For instance, a major retail chain may tell you they need your Social Security number to issue you a charge card for their store. It’s best to just forego the charge card. The objective is to minimize how much your SSN is “out there.”
  10. Request your free credit report every year from the three major credit reporting bureaus. Refute unauthorized accounts immediately.
  11. Inspect your credit card and banking statements every month for suspicious activity.
  12. Use a locking mailbox or have your mail delivered to the post office and pick up.
  13. Before taking any trips have the post office put a stop on your mail delivery.
  14. Consider getting a credit freeze. Thgis is a no brainer to protect you from new account fraud.
  15. Invest in identity theft protection. There is no cure for identity theft. But with a protection plan in place, the restoration component will fix most of what goes wrong.

Robert Siciliano is an identity theft expert to BestIDTheftCompanys.com discussing identity theft prevention.

Is your Daughter chatting with a Pedophile?

That’s a horrible question to ask. There is a very alarming report on nbcsandiego.com, about a dad who regularly checked on his kids in the middle of the night, and one night at 2 a.m., upon checking his 12-year-old daughter’s room, saw that she was gone. The window was open.

10DHe fled down the street where he saw her just about to get into an SUV, which turned out to be driven by a 27-year-old man the girl had met online a month prior. The predator’s name is Scott Stilwell, and he insisted to dad Tim LeBlanc that he was 16.

A fight ensued and LeBlanc knocked him out and held him until authorities arrived.

What can parents do?

  • Well, it’s fair to wonder why the girl didn’t consider what her dad would do (such as go through the roof with anger) upon discovering her absence—unless she had no idea he checked on her every night. So the first thing is to make sure your kids know that you do check up on them.
  • Lay down the rules about what’s off-limits online.
  • Let your kids know that they will not be shamed or judged if they report any kind of weird interactions online, though predators will typically behave properly to lure a child into meeting them, as did Stilwell when he promised the girl gifts.
  • Parental control/monitoring software will help parents keep their kids safe. The smartphone apps for this are best.
  • Use spyware to keep tabs on your kids (yes, this is legal from parent to child). Spyware will track the user’s online activities and is quite thorough, though it may be overkill if your child is a normal, typical child.
  • Before buying your child a computer or smartphone, lay out the big rule: You get to periodically check the device; you will meet new online friends; you will even have your child’s passwords. If your child already has a computer or phone, well, you’ll have to put some metal in your spine and mandate these stiffer rules.
  • Research shows that girls are more likely to traipse off with a charming predator when the relationship with their father is weak. The predator, in a way, comes off as a father figure. Though you may be checking on your kids in the middle of the night, make sure that your waking relationship with them is a healthy one.

 

Tips for backing up and protecting your data while traveling

The season of giving is now upon us — but don’t forget, it’s also the season of stealing — and no, I don’t mean your wallet or the gift package at your doorstep, but your Social Security number, credit card information, medical records and any other highly confidential information that you have stored on your computers.

1DThieves want your data — the information stored in your smartphone, laptop and other devices. People are especially vulnerable to this crime when they travel. Don’t let the hustle and bustle of holiday travel detract you from protecting your data!

  • Make sure your devices have updated security software.
  • Remove all the sensitive data (e.g., medical records) from your device prior to travel — but not before you back it up.
  • One way to protect your data is cloud backup. Protecting your data begins with keeping your computer in a safe, secure, locked location, but when you are traveling, this is simply not an option. Therefore, automatically back up data to the cloud. The third layer is to use local backups; ideally sync software that offers routine backups to an external drive.
  • Before the trip, an IT expert should install disk encryption for your laptop– especially if you’ll be bringing along lots of sensitive data. If the laptop ends up in the wrong hands, the crook will see only scrambled data.
  • Even with the aforementioned security measures in place, you should also use a virtual private network when conducting online transactions at public Wi-Fi spots, so that snooping hackers “see” only encrypted transmissions.
  • All of the above tactics still aren’t enough. “Shoulder surfers” could visually snatch your login credentials while you’re typing away at the airport lobby or coffee shop. “Visual hackers” may also use binoculars and cameras. A privacy filter for your screen will conceal what’s on your screen. If they’re right behind youthis technology will alert you. You should use a privacy filter even when your back is to a wall.

Never let your device out of your sight, and if you must, like at a relative’s dinner gathering, lock it up.

Robert Siciliano is an expert in personal privacy, security and identity theft. Learn more about Carbonite Personal plans. See him discussing identity theft prevention. Disclosures.

Should Stalking or Spying Apps be banned?

The words “spying” and “stalking” have negative connotations, but there’s a flipside to the coin: parents monitoring their kids’ online activities and physical locations. And how about middle-aged adults keeping track of the whereabouts of their aged parents with dementia?

7WIf you fear that apps for “spying” might get banned, here’s bad news: U.S. Senator Al Franken is pushing for this.

However, Franken’s proposed law will actually permit these constructive uses. His plan is to require companies to give permission to users before collecting location data or conducting any sharing of it. But suppose a real stalker poses as a concerned parent, how would the company know?

And when spying and stalking apps are used malevolently, should their makers bear responsibility? Is this like saying that the company that makes steak knives is responsible for the man who used one to stab his ex-friend?

However, maybe that all depends on whom the stalking and spying app company targets for customers. A now defunct maker of stalking apps targeted people who wanted to stalk their spouses, and its CEO was indicted last year and fined half a mil.

Another such maker, markets their product for good uses like keeping tabs on kids: a smarter move. Their site even calls their software “monitoring” rather than “stalking” or “spying.”

With that all said, it’s illegal to spy on someone with these apps without their permission. The line is very blurry, because it’s not illegal for a manager at the workplace to follow a subordinate and watch his every move, including what he’s doing on his computer during work hours.

Banning these kinds of apps will not go over well with the many parents who see them as a godsend for keeping a watchful eye on their kids, not to mention the many middle-agers who, without these apps, would fear that their elderly parents with dementia might wander off and get lost or in harm’s way.

Robert Siciliano is an identity theft expert to BestIDTheftCompanys.com discussing identity theft prevention.

Protect Yourself from Holiday Shopping Scams

Even though the highly publicized retail data breaches have involved off-line brick and mortar stores, this doesn’t mean that security is high with online shopping. Scammers and hackers are waiting for you in more ways than you know, such as: 9D

  • Fake product reviews
  • Non-existent products
  • Delivered products that don’t match what was seen on the retail site
  • Shoppers being tricked into typing their credit card information into a purchase form on a phony shopping site
  • Malicious attachments and phishing emails offering too good to be true discounts to install malware on your device.

Let’s explore online shopping scams in more detail.

First up are malicious links and malments (malicious attachment).

  • You receive an e-mail pitching a great product deal; click on the link to learn more or to make the purchase. The scammer often makes the e-mail look like it came from a leading retailer. Clicking the e-mail may download a virus, or take you to the scammer’s website where you’re tricked into “buying” non-existent products—giving out your credit card information.
  • An e-mail may contain an attachment that, when opened, downloads a virus.
  • The e-mail may appear to come from UPS (but it’s really from the crook), and if you just by chance recently ordered something for delivery by UPS, you’re then easily tricked into clicking a “track your order” link.
  • Never click links or open attachments from e-mails that you’re not outright expecting, especially if there are typos in the message.

Coupons

  • If it’s too good to be true, then it’s too good to be true.
  • Be suspicious if a coupon site with fantabulous deals wants all sorts of personal information from you, as in, “What do they need to know that for?”
  • Fraudulent coupon sites often have typos including poor punctuation.
  • Annoying pop-up windows should send you running.

Gift Cards

  • Same thing as above: If it’s too good to be true, then assume it’s a scam.
  • Just delete any gift card e-mails pitching amazing deals, especially if there’s a link in the message.
  • Never fill out personal information in a form inside an unsolicited e-mail for some fantastic deal.

Not every gift card related e-mail is fraudulent. If the e-mail appears to be from someone you know, contact that person for verification before opening any attachment or following any links. A tip that it’s legitimate is that it has a code so that you can claim the gift; a tip that it’s a scam is that it’s asking you for your credit card information.

Robert Siciliano is an identity theft expert to TheBestCompanys.com discussing  identity theft prevention.