Child Identity theft is becoming Solvable

You’ve seen TV commercials and print ads about identity theft, and the “victim” is always an adult. That’s not realistic. The actor-portrayal should be that of a child. Yes, a kid.

Children are 51 times more likely than adults to have their identity stolen, says research from Carnegie Mellon University’s CyLab.

Crooks want kids’ Social Security numbers. And crooks like the fact that kids are debt-free. Wow, with no debt to the child’s name, the thief could easily open up a line of credit in that victim’s name and have a field day. Or, they can file a fraudulent income tax return.

The thief can then sit back and relax for many years because usually, the victim doesn’t learn something’s wrong until they’re 18 and applying for loans or a line of credit. By then, lots of damage has already been done.

Many thieves of children’s identity are family members. It’s easy for them to get their hands on the victim’s Social Security number and other data. Relatives coming and going in the victim’s house could make it too simple for someone to get ahold of private information if it’s not hidden and non-accessible.

How can we protect children’s identity from being stolen?

  • If you live in s state that offers a “credit freeze” then apply, right now. As of the writing: Arizona, Delaware, Florida, Georgia, Illinois, Indiana, Iowa, Louisiana, Maryland, Michigan, Montana, Nebraska, New York, Oregon, South Carolina, Texas, Utah, Virginia and Wisconsin.
  • Consider opting out of providing schools with personal information about your child. This can be done due to FERPA: Family Educational Rights Privacy Act. FERPA gives parents the right to authorize how much of their child’s personal information they want shared with a third party.
  • If a school fails to alert parents to this on a yearly basis, the school is breaking the law.
  • The FERPA does not necessarily apply to extracurricular activities of the school. Parents should investigate these on an individual level to see how much private information might be shared. For instance, a child’s Social Security number absolutely does not have to be given just for them to be on a softball team, member of the band, chess club, this or that.
  • Identity theft protection on a family plan should be a consideration. Generally these services will watch for activity regarding your childs SSN and new lines of credit.

Robert Siciliano is an identity theft expert to BestIDTheftCompanys.com discussing identity theft prevention.

It’s Time for You to Use a Password Manager

If you are like me, you have several online accounts, each with a user name and password. Though it is tempting to use one password for every account, this can be troublesome as it is a huge security risk. So, what is your only option? To use a password manager.

2DAccording to a recently concluded survey conducted by uSamp and sponsored by Siber Systems, creators of the RoboForm Password Manager:

  • 42% write them down
  • 23% reported always using the same password**
  • 25% reported using personal information
  • Only 8% use a password manager tool
  • Only 37% report using phrases with a combination…

The statistics clearly show that a lot of the data breaches we see today are a result of poor password management.

A Password Manager? What Is It?

At a basic level, a password manager is a service that allows people to secure all of their account log in information with one master password.

  • With a password manager, you won’t have to worry about password compromises, and you can easily have a different password for every account without the need to remember them.
  • If one password is compromised, such as a Facebook password, you can be sure that the scammer will not have access to other accounts as they don’t have the same password any longer.
  • It is easier than you might think to hack into an account, but with this software, your passwords are protected, unique and strong.

Choose the Right Password Manager for Your Needs

There are many services out there offering password management software, some are free, some are paid, but all of them offer better protection than you would get by choosing nothing.

  • Some password managers are device specific, so make sure that if you use Apple products, for example, that you ensure the manager will work with your hardware.
  • Most password managers work on multiple platforms.
  • There are online and local password managers, too. An online manager allows passwords to be stored online, but they may not be as secure or as reputable as a local password manager.
  • Fortunately, there are many great online password managers, such as RoboForm. It can be used on all major browsers and across most devices. I’ve been using RoboForm for at least 10 years. It works lovely.

Password Managers: Final Thoughts

  • Take some time to research before choosing your password manager. It must be a trustworthy company.
  • You will be more secure than ever before, but nothing is fool-proof, so you still need to keep your devices security software updated and make sure you have copyies of all your passwords in an encrypted Excel file.

Robert Siciliano is a personal privacy, security and identity theft expert to RoboForm discussing identity theft prevention. Disclosures.

Protect your Identity when saying “I Do”

7WWho has time to think about identity protection when planning a wedding? And why, for that matter? Well, there’s good reason: Marriage begets a change in identities. The months preceding the big day should be when the couple starts taking action to avoid identity theft.

  • If you’re using any website or smartphone application to organize your wedding, make sure it’s protected with a password—a long password that contains zero clues about your wedding, identity or anything else personal. An ideal password is upper/lowercase, numbers, long and can be remembered without keyboard sequences or actual words or proper names, and includes various symbols. Please, no HoneyBunch1 or St.LuciaWeGo.
  • Health insurance will be merged once you are husband and wife, so make sure that old insurance documentation is eradicated.
  • Wedding preparations involve a lot of spending, right down to the custom made napkins at the dinner reception. Some say pay with currency as much as possible, as checks and credit cards contain information that a thief could obtain. But really, pay with a credit card and closely watch your statements.
  • Make sure nobody can get into your mail box, because it will soon be receiving scads of documents reflecting a woman’s new last name, such as a driver’s license, credit card, Social Security card, to name a few. Get a locking mail box, and maybe have the post-wedding mail delivered to a P.O. box or to your post office and then retrieve it in person.
  • Buy a shredder. This is so that you can destroy all the reams of old documents with the previous surname. This would include old checks, the old ATM card, bank statements, driver’s license, auto insurance information and so much more.
  • Once on the honeymoon make sure your wireless devices that are connected to free WiFi are protected with a VPN to prevent hackers from snooping over free WiFi.

Now ideally, people should have already, long before meeting their soulmate, gotten into the habit of identity protection. This should be an ongoing process—as much ongoing for the chronically single person as for the gushing bride-to-be.

But it’s never too late to establish smart habits for identity protection. You will need to work with your spouse on just how very personal documents will be managed and filed. There are so many things to be aware of, including keeping monthly tabs on your credit card statements and yearly tabs on your credit reports.

And here’s a tip: Don’t assume your young child’s identity can’t be stolen. Crooks are out there stealing the identities of kids—who often don’t learn about this until it’s time to apply for a college loan or a loan for their first car.

Robert Siciliano is an Identity Theft Expert to Hotspot Shield. He is the author of 99 Things You Wish You Knew Before Your Identity Was Stolen See him discussing internet and wireless security on Good Morning America. Disclosures.

The Password Reset Isn’t How to Remember a Password

Consider a keychain for a moment. For most of us, a keychain holds all of our necessities such as home keys, car keys, work keys and even forgotten keys, that we aren’t quite sure what to do with. Now, think about this. What if your keychain had keys that look identical, but each key only opens one door.

5DIf you are like most people, this key scenario is almost identical to the way you treat your account passwords online. What happens when you want to use a key, but you don’t know which one goes with which door? It can be very easy to forget and identify the key to the door or the password to the website.

What do you do in this situation? You probably wouldn’t have a friend that had a key to your home, and you certainly don’t want to break down the door. Should you call a locksmith every time you forget which key works? This sounds ridiculous, right? Well, it is no different than using the password reset feature when it comes to forgetting the password on a website. Instead, step up your password game.

Don’t Change Your Password Every Time You Forget It

You wouldn’t want to call a locksmith every time you lock yourself out of the house, and you should not rely on a password reset feature every time you forget your password.

  • If you have a number of accounts and don’t want the hassle of creating strong, long passwords, consider a password manager.
  • These services will help you to create a strong, secure password for every website you frequent, plus you will have a single master password, that allows you to manage it all.
  • A password manager eliminates having to reset a password.

Create the Best Password for Your Online Accounts

When it comes to creating the best password for any online account, According to Bill Carey, VP Marketing for the RoboForm Password Manager “It’s not a matter of if your password will be leaked, it’s a matter of when.  So protect yourself by using a strong and unique password for every website.”

  • Passwords must be a minimum of eight characters long, and they should include mismatched numbers, characters and letters.
  • The best passwords do not spell any words.
  • Use a password for each account, especially if using high-value websites such as banking sites.
  • Make sure to change your passwords regularly.

Robert Siciliano is a personal privacy, security and identity theft expert to RoboForm discussing identity theft prevention. Disclosures.

Home Security App/Camera witnesses two Burglars

Danny Wheeler was alerted by his smartphone that had a home security app and a do it yourself camera/home security system that his home was being robbed. He was at work and could do nothing but send the real time video to New York City police, reports a story on abcnews.go.com. The burglars got away, however, by the time the place was swarming with police.

ANG3Such an application and system can allow the user to remotely access all the “goings-on” and in some case set off a loud alarm. Even if you have the most elaborate home security system, having one of these smartphone-alerting systems will add an extra layer of protection, and for sure, result in capture of thieves who are less quick at getting away.

These systems should be adjuncts to a full security system, as they don’t have round the clock monitoring and don’t directly contact police. And even though Wheeler’s thieves got away, their images have been retained for possible identification.

Wheeler posted the video on social media, reports an article on nydailynews.com. An intruder is seen entering via a window, and then a second man enters through another window. The men spent only about a minute rummaging through the home, exiting just before an alarm sounded.

There are over 15,000 views so far. Someone is bound to be able to identify the burglars.

Wheeler regrets calling the police before remotely triggering the house alarm. Had he set off the alarm the moment he realized what was happening, it’s possible that his J. Crew silver bracelet would not have been stolen from his bedroom.

Possessing one of these systems, as mentioned, adds a layer of security. The Angee home security system, see them on Kickstarter, is the only one with a video camera that rotates 360 degrees as it detects motion. And this high definition camera has smart zones; you can set up specific zones for monitoring. But Angee is more than just a video surveillance setup. It’s a self-monitored home security system.

Robert Siciliano, personal and home security specialist to Angee. Learn more about Angee in this Video. Support Angee on Kickstarter. See Disclosures.

Beware of these 10 Job Hunting Scams

Just because a job recruiter says he’s from (fill in blank—any huge corporation) doesn’t mean the job can’t be a scam. Anyone could say they’re from Microsoft or Google. Impersonating a representative from a big-name company is one way to fool gullible job seekers.

9DAnother way is to advertise the scam jobs on radio because the scammer knows that listeners will think, “It has to be legit if it’s on the radio.” Scammers will post their job ads anywhere.

An article on consumer.ftc.gov lists the following signs of a fraudulent job advertisement:

  • There are plenty of totally legitimate jobs that involve money out of your pocket. And in some cases, this may be described as an application fee, reference check fee, background check, cost of training materials or anything else. Only pay when the site itself has been vetted by you and everyone else. Do your research!
  • The ad talks of “previously undisclosed” federal government positions. The scammer is banking that you have no idea that usajobs.gov lists all federal job openings to the public.
  • They want your bank account or credit card information. Be very aware.

Similarly, scammers may prey on people seeking a job placement service. The consumer.ftc.gov names the following red flags:

  1. Fictitious jobs are promoted.
  2. Payment is made but no job materializes—and the service suddenly falls off the radar.
  3. If the ad mentions a company, contact that company to verify they’re contracted with the job placement service before you make your next move.
  4. Never make major decisions without first getting everything in writing: cost, what it gets you, etc.
  5. Ask them what happens if they can’t place you in a compatible position. Then listen good. If the response doesn’t make sense or is vague, move on. If they assure you you’ll get a refund within a certain period of time, make sure this is in writing.
  6. But if you decide to go with them, read your contract word for word. If they show impatience with this, it’s a red flag.
  7. Beware of ads that sound like job openings, but actually are just worded to sound that way. These semi-scammers want you to pay them to give you information you can easily find online. A classic example is an ad for writing jobs. It’s worded to sound like the ad placer can connect you with clients—whom they are working for—who need a writer. Instead you’ll be paying for a list of freelance markets, such as some boating magazine seeking submissions—when you specialize in a completely unrelated niche.
  8. Make sure you know precisely what you’re getting into. Are you seeking help with job placement or looking for someone to construct your resume?
  9. See what the BBB says about the company and what a Google search pulls up.
  10. Just because you have to pay doesn’t mean it’s a scam. However…ask yourself why you need to pay someone thousands of dollars to find you a job, what with all the online (and legitimate) job postings and the ability to blast out hundreds of e-mail queries in just a few days with your resume attached?

By keeping your scam radar on high during a job search, job seekers can prevent their personal information and financial data pout of the hands of criminals.

Robert Siciliano is an Identity Theft Expert to Hotspot Shield. He is the author of 99 Things You Wish You Knew Before Your Identity Was Stolen See him discussing internet and wireless security on Good Morning America. Disclosures.

Weak Passwords Mean Data Breaches

Studies across the board indicate that weak usernames and passwords are one of the top causes of data breaches, and I find that information to be unfortunate, because it is preventable. According to a recently concluded survey conducted by uSamp and sponsored by Siber Systems, creators of the RoboForm Password Manager: 70% reported forgetting a password, or had a password become compromised, in their professional life in the US.

  • More organizations are enacting policies where employees can use their own devices and store information on a cloud.
  • This means that it is more important than ever before to protect accounts with strong passwords.
  • A strong password is the first line of defense against scammers and hackers, and it helps to keep data safer.

The Research on Passwords Doesn’t Lie

The data from these studies indicates that there is no organization in any industry that is not vulnerable to a breach of data.

  • Every company, no matter what size, should put in some effort to protect their sensitive data.
  • Many breaches of data could have been prevented by implementing stronger security controls, improving credentials used to long in and employing safety best practices in the workplace.
  • Weak or stolen usernames and passwords are one of the top causes of data breaches, and more than 75 percent of attacks on corporate networks are due to weak passwords.
  • Almost half of all instances of hacking is due to stolen passwords, which are obtained through the theft of password lists.

Know The Risks of Choosing Weak Passwords

Experts have warned for many years that there are risks associated with relying on weak usernames and passwords to restrict the access of data.

  • Verizon estimates that about 80 percent of all data breaches could have been stopped if a stronger, better password was used.
  • Experts, including the IT team of companies, can offer assistance to employees seeking to improve their passwords and reduce risk.
  • Too many companies protect their data with passwords that are too weak or too easy to guess, such as the name of the organization or other obvious words.
  • It is also difficult to enact policies for improved passwords in the workplace because employees are not informed of the facts.
  • The best passwords are long and varied, with symbols, letters and numbers. These passwords should also not be obvious, such as the name of a company, address or company motto.
  • One of the best investments in ones personal security is in a password manager. Frankly, I don’t know how anyone can use a PC and not have a password manager in place.

Robert Siciliano is a personal privacy, security and identity theft expert to RoboForm discussing identity theft prevention. Disclosures.

Introducing Angee Home Security

Meet Angee.

ANG2Angee (pronounced like Angie) will revolutionize home security in more ways than one. One of the features that sets Angee apart from other home security systems is that this system can learn about you and your family members, and then operate accordingly. Angee is the future, but this future is now here.

Check out what Angee offers:

  • Operates even during a power outage due to a built-in battery and 1.5 Gb storage.
  • Is small and portable, a handsome cylindrical design that can blend in with home decor.
  • Has data military grade encryption.
  • Motion and proximity detection tags that can be quickly and easily placed at all entryways and windows, so you need only one of the small portable units, regardless of the size of your house. Thus, a detection tag in a room on the third floor will allow the Angee unit, which is on the first floor, to tell when someone enters that third-floor room.
  • Recognition of household members’
  • Can connect to your mobile device, tablet or smartwatch.
  • Operation is voice controlled (as well as via smartphone) and includes personal-assistant-type tasks such as answering the phone.
  • Surveillance cameras (which rotate 360 degrees) that will follow intruders by detecting their presence; there’s no escaping “getting caught on tape.” But if you don’t want Angee to watch you during an intimate moment, no problem; just say “Turn away.” And remember, if the burglar says “Turn away,” Angee will disobey because it won’t recognize his voice.
  • Zero subscription fees.
  • The projected retail price will be $429.

The Birth of Angee

Angee Inc., is a start-up company that formed about a year and a half ago. Its founders had an ultra-strong vision and thus, introduced their system on Kickstarter. The founders needed experts in serial production, so hence teamed up with Dragon Innovation.

Who are the founders?

Tomas Turek is a serial software entrepreneur. He and his team have been working tirelessly for over 18 months to bring Angee to life.

If you’d like to support this futuristic layer of home security to bring it to the present, go to the Kickstarter campaign.

Robert Siciliano, personal and home security specialist to Angee. Learn more about Angee in this Video. Support Angee on Kickstarter. See Disclosures.

Choosing a Home Security System

Choosing a home security system may be dizzying, what with all the possibilities, but the good news is that there’s a system for every budget and personality.

3HGone are the days in which the only security systems available were the ones with all the clunky wires that had to be put throughout the house. Systems are now offered by Internet providers and cable companies. But choose carefully.

Wireless

  • These often include do-it-yourself installation.
  • The provider may or may not yield an equipment charge.

Get the police involved.

  • Ideally the system should automatically send an alert to a call center who dispatch the police. However some home security companies don’t offer monitoring services that trigger a call to the police when the alarm is tripped. Look into this.

Smartphone

  • For not much more than $25-30 a month, you can have a basic system that includes motion sensors using an application for your phone.
  • With your mobile device connected to your home, you can monitor it in real time, get alerts, control other functions or arm your system if you forget to do it after you leave.

Customer Service

  • The industry of home security systems is highly competitive. Basically they offer the same things, so a good company will try to stand out by offering superior customer service.
  • It would be wise to check out reviews before committing to any service.
  • One thing to keep in mind is that customer service should be available ‘round the clock.

Home-made Security

  • Until you get an official home security system, you can buy security company stickers off of eBay and put them on your windows to fool burglars into thinking your house is protected.
  • Use timed lighting devices so that your house never looks dark and unoccupied.
  • Timed devices can also produce flickering light to simulate a TV being on.
  • Keep shrubbery away from windows so that intruders can’t hide in it.
  • Always keep the lawn well-kempt. An overgrown lawn suggests that the home’s occupants have been away on vacation.

Robert Siciliano personal and home security specialist to BestHomeSecurityCompanys.com discussing burglar proofing your home on Fox Boston. Disclosures.

What are Consumer Reports?

You’ve heard the term “consumer report.” Many times, I’m sure. But do you really know what one is? If you’re nodding your head, would you be able to explain it to a Martian? If not, then you probably do not have a solid understanding of what one is.

12DBut lenders, landlords, creditors, employers and insurers certainly know what a consumer report is, because every time they’re about to deal with a new client, they put themselves at risk.

  • Is he in good health?
  • Will she stop paying her mortgage?
  • Will he total his car?
  • Will she be productive on the job?
  • And more questions abound.

An article on privacyrights.org explains that all sorts of businesses need to assess the risk of every new client. However, it would be quite unwieldy for businesses to sit every potential client down and run through a list of 100 questions, then wonder if the applicant is being truthful.

Enter the consumer report.

  • Credit report: Lenders can see the applicant’s financial status and bill payment habits.
  • Fair Credit Reporting Act: Encompasses entire financial status.
  • Miscellaneous companies are targeting consumer reports specifically for landlords, insurers and employers.

The article explains that the businesses that put together these targeted reports are called consumer reporting agencies. Consumer reports don’t just deal with finances and credit. Other types of reports come from nationwide specialty consumer reporting agencies. These other kinds of reports may detail one’s medical history, employment history, history of insurance claims and check writing history.

You are entitled to a free report every 12 months from a nationwide specialty consumer reporting agency.

  • Make your request to each specialty reporting agency; they act independently of each other.
  • Every agency has a toll-free number.
  • Some agencies allow faxed, mail-in or online requests. For online requests, the agency’s site must provide a FAQ or help page.
  • You are entitled to an update on your request’s status.
  • There is no deadline for the agency to honor your request.
  • The agencies gather information on people from a number of sources such as bankruptcy filings, driving records, credit history, public records of court cases and insurance companies.

Robert Siciliano is an identity theft expert to BestIDTheftCompanys.com discussing identity theft prevention