Protecting Your Social Security Number

Many people wonder if it is safe in certain situations to give out their Social Security number. We sure are asked for it a lot, but do you have to give it? When is it necessary? Here is some perspective:

One of the best rules you can live by is this: just because a person asks for your Social Security number, it doesn’t mean you have to give it. But also remember there are situations where you will not be provided various services unless you get it out.

You might feel that you have to, though, and freely give it. This could be a huge mistake, though. There are many times when you want to, though, and you should, but you have to do it with discretion.

Here’s the thing. Some of the people and organizations that ask for your Social Security number really have no business asking. Even when they ask for the last four digits of your SSN, don’t give that out, either, unless you know that the company already has it on file.

Really, when the IRS is involved, or other government agencies, or it is something financial that’s credit driven, such as getting a loan, you likely need to give out your Social Security number. In other cases, like applying for a job, you can tell a business you are not comfortable giving your number unless you are hired, and then they would need it for tax purposes.

I give out my Social Security number when required, with a little scrutiny, but in the end, I’m not worried about identity theft due to the fact that I have ID theft protection and a credit freeze which in most cases makes my Social Security number useless to a thief.

Tips to Protect Your Social Security Number

Here are some tips you can use to protect your Social Security number:

  • Don’t put your SSN on any written application or document. If your application is denied because of this, ask them if it’s really necessary, otherwise, give them your SSN.
  • Ask your bank if they absolutely require your SSN to verify your identity. There are other options they can use. But the Patriot Act might require it.
  • Consider extending your ID theft protection to include your children’s SSNs. Teach them to never give it out.
  • If you are at the doctor’s office, find out if you can use another number, such as the account number for your insurance.
  • Don’t send your SSN via email. If someone wants it, call them and give it to them verbally. Even then, don’t give the number out unless you know without a doubt that it’s legitimate.
  • You should get a statement from the Social Security Administration concerning your account each year. If your income is too high, someone else is probably using your number.
  • Don’t keep your Social Security card in your wallet. Instead, memorize the number and keep the card at home.
  • Don’t ever use your SSN as a password for anything.
  • If, for any reason, your SSN is in your PC, make sure the document is encrypted or password-protected.
  • Before you throw away any paperwork that has your SSN on it, black it out, and then shred the documents.

Really, all you have to do is have some common sense when it comes to your Social Security number. For instance, if you are applying for credit, it makes sense that they would need this. If you are getting a gym membership, unless they are granting a credit, they don’t need it.

Written by Robert Siciliano, CEO of Credit Parent, Head of Training & Security Awareness Expert at Protect Now, #1 Best Selling Amazon author, Media Personality & Architect of CSI Protection Certification.

Keeping Your SMB Bring-Your-Own-Devices Secure

If you have a small or medium sized business, it is likely that you have staff who are bringing their tablets, phones, iPads, and laptops to work every day. However, all of this puts your business to risk as they can also bring malware into your network.

On top of this, any of these devices can be lost, misplaced, or stolen. Since its extremely likely that your staff are using these devices for their work, think about all of the information that could be on there about your company…and it happens because Joe in accounting left his cell phone on the counter at a local coffee shop, and a hacker picked it up.

Also, think about this: depending on how successful your company is, there also might be a list of clients found on the devices, or at least a few. Now, someone has access to your clients, and what is stopping them from contacting your competitors and sharing your sensitive company information…for a price, of course.

Hacking also often involves the act of phishing where an employee will open up an email and then click on a link or open an attachment. When this happens, malware is unleashed, and the device and network is at risk.

Here are some tips to keep devices secure that you can share with your staff:

  • Only use apps that have been purchased from a reliable source like iTunes or Google Play.
  • Do not reuse passwords and use a different password for each login that you have.
  • Keep all apps and operating systems updated. Any update that comes in should be downloaded and installed immediately. Don’t choose to update later, as this is a great opportunity for hackers to get into a vulnerable app.
  • Start using anti-virus software. These apps can be found in iTunes or in the Google Play store.
  • Be cautious when installing anything with a “free download.” Sometimes viruses and malware can be found there, and they can get out onto your network before you know it.
  • Choose the feature where device passwords are protected and wiped clean after a certain number of log-in attempts.
  • Make sure that all staff understands that free Wi-Fi spots are not secure. So, they should be using a VPN anytime they are trying to connect to a free Wi-Fi network.
  • Phishing scams are becoming more common than ever before, so make sure that your staff knows how to recognize scams like this.
  • Don’t trust email addresses that you don’t know and don’t trust any email that claims it is coming from the CEO or Board of Directors unless it’s an email that you can verify.
  • Do not use any device that is jailbroken. This opens it up to too many viruses.

Understanding MDM

Mobile device management software, or MDM, should be used. This software helps to protect devices, and it is a safety net for any type of business or personal device. For instance, if a mobile device is lost and the person who finds it tries to enter the passcode a certain number of times, the device will lock out the person doing it. You can also set it so that the entire device is erased if there are too many login attempts. MDM also offers firewall protection, encryption, and antivirus capabilities. Additionally, it can monitor the system to add another level of security. There should be a policy in place that every employee must use this software on their device, or they can’t use it.

Utilize Additional Experts

“Do it yourself” information security for small business in theory might seem to save a few bucks. But in the long run it might cost your small business a lot more. Engaging experts such as Managed Security Service Providers, or for smaller businesses, also known as a Virtual CISO’s (chief information security officer), can run the most comprehensive vulnerability scanning software among other ethical hacking tools, will make sure bad guy hackers can’t get in and make a mess of all you have worked for.

Written by Robert Siciliano, CEO of Credit Parent, Head of Training & Security Awareness Expert at Protect Now, #1 Best Selling Amazon author, Media Personality & Architect of CSI Protection Certification.

Protecting Yourself from Cyber Extortion

You might not think that you could ever be a victim of cybercrimes, but you would be incorrect. You are just as much of a possible victim than anyone else, and you have to know how to protect yourself.

passwordOne of the easiest ways that hackers can get victims is to trick people into clicking links in emails or opening attachments. Something as simple as this can easily lead to viruses and other security issues, like ransomware, and no one is ready to deal with this.

Cyber extortion is on the rise, and it involves infecting a computer with ransomware, which means the victim will not be able to access their files unless they pay money via bitcoin to the attacker. This software is installed when the victims click on links in emails.

Many of these emails ask for information that is sensitive. If you get one of these emails, you should have alarm sounding off. If you don’t, you could, blindly, give the hacker information about you, such as your passwords, account numbers, or worse.

Extortion Prevention

Here are some things that you can do to prevent yourself from cyber extortion:

  • Install a password manager software
  • Don’t use the following in your passwords: words or names that are obviously yours, any keyword sequence (ZXCVB), any password under eight characters, or anything easy to guess.
  • Make sure every account has a unique password.
  • If an account offers it, enable two-factor authentication. Each time you try to log in, you cannot gain access to the account unless you insert a one time code, which is delivered to your phone via text. If someone contacts you and asks for a code like this, you should hear alarm bells in your head.
  • Create passwords with a mix of letters, symbols, and numbers. Randomly choose these like a toddler would if they were typing and add them to your password manager.
  • Don’t ever click on any link that comes to you via email unless you confirm its legitimacy with the sender. A single click might download a virus, or you might be directed to a site that can lure you into typing your username, password, and other information. A red flag that you might be at risk of doing this is if you get an email that says, “Your Account Was Suspended.”
  • Often, these emails seem like they come from a source you trust like PayPal, a bank, the IRS, or your employer.
  • You also might see a sense of urgency in these emails, such as “Act within 24 hours” or “You must…”
  • Don’t open any attachments including those from a person or company that claims they want to offer you a job.
  • Do not post any sensitive personal information on your social media accounts. Hackers can use this information to figure out login information.
  • Have a business email account and a personal one.
  • Don’t connect to public Wi-Fi and do anything like shopping or banking. If you don’t have a choice, you can browse by using a VPN, virtual private network.

Some of this might sound like a pain, or even inconvenient, but believe it or not, you are a target for hackers, and they are just waiting for you to take the bait.

Written by Robert Siciliano, CEO of Credit Parent, Head of Training & Security Awareness Expert at Protect Now, #1 Best Selling Amazon author, Media Personality & Architect of CSI Protection Certification.

When is a Good Age for a Kid to Get a Smartphone?

Do you have kids who have been asking you for a smart phone? You might even know people who have kids your kids’ ages, and they have smart phones. How old is old enough for a smart phone and what age is it a good idea?

kids with smartphoneThis might sound like I’m bragging, but I’m not, people tell me ALL THE TIME “Your kids are amazing!” And then they follow up with, “My brothers kids grunt one-word answers when you ask them a question, they don’t look you in the eye, they don’t “talk” and they are always seemingly preoccupied and want to be somewhere else, whereas your kids are present, socially engaged and they actually look you in the eyes and have full blown conversations!”

My response, NO, my kids are nothing special, they are just normal. That’s how it’s supposed to be. When an entire generation of parents raise their kids on digital devices and video games, you get kids who are disconnected from other humans and grunt.

Beyond “socialization”, there are certainly advantages and disadvantages to giving your kid a smart phone, and we will look into all of this, below:

Advantages of Saying “No” to a Smart Phone

  • Kids are present, socially engaged and they actually look you in the eyes and have full blown conversations.
  • Kids will have to take notes the old-fashioned way with paper and a pencil or a computer, but this enhances learning.
  • Kids will have to communicate in non-anonymous way.
  • Eliminates the chances of being tricked by an online predator.
  • Eliminates cyberbullying and rude behavior that is usually anonymous.
  • Stops you from worrying that your kid will download inappropriate content.
  • Your kid won’t have the chance to video chat with people you don’t know.
  • Forces your kids to interact with people face to face where they can learn how to read body language.
  • You won’t have to worry about electronics stunting your kids’ social development.

Advantages of Saying “Yes” to a Smart Phone

  • Perfect for kids who are shy, socially awkward, or for those who have issues with face-to-face interactions. This however is debatable. I still say NO.
  • Kids who are not assertive in person can be more assertive online without seeming like a bully. It could also help them develop positive assertive skills. This is also debatable.
  • The kid always has a way to get help.
  • You can monitor your child’s whereabouts in real time.
  • You can connect with your child at any time by texting or calling them.
  • Kids can keep up with technology.
  • They can figure out ways to get paid using all the amazing tools the internet has to offer.

Does a Smart Phone Help to Develop Social Skills?

 Parents often wonder if a smart phone can help to develop social skills. This is a common question, and this is what we know. Before smart phones came onto the scene, many kids were having issues with social skills. We also know that many kids who have smart phones also have very good social skills.

It’s important to remember that in-person communication isn’t always the solution. A kid who is socially awkward, for instance, can speak to 1,000 people face to face and still be just as awkward in the 1,000-th conversation as they were in the first. This is also debatable.

It really might just all come down to parenting. A good parent might not have to worry about the mobile devices their kids are using because they have already laid the track for social development. This isn’t debatable. I’ll take credit!

Here are Some Solutions

 Here are some solutions to address when it’s appropriate for a kid to get a smart phone.

  • Consider a compromise. A kid who is 11 might benefit from having a phone just because you can track where they are, or they can get help very quickly if they need it.
  • You have to enforce the rules, too, such as no smart phones when having dinner, and you should be approving any app they want to download.
  • You also should have access to all of your child’s accounts, or they lose their phones.
  • You should also encourage your child to tell you, immediately, if they feel like they are being bullied.
  • There’s a time and a place. A phone isn’t a babysitter or a device to simply keep them occupied. It needs to serve a purpose.

If my older kid is on her phone, she’s being social, as in communicating with someone, because she doesn’t have social media where she’s self-aggrandizing or FOMO’ing. Or she’s using Duolingo, google it, she’s learning Spanish and Italian. Or she’s building out our father daughter project on Insta and YouTube “Minx The Pup” (subscribe) and learning how to use social creatively as a potential business tool while still maintaining a degree of anonymity and still being social.

Written by Robert Siciliano, CEO of Credit Parent, Head of Training & Security Awareness Expert at Protect Now, #1 Best Selling Amazon author, Media Personality & Architect of CSI Protection Certification.

Understanding Familiar Fraud

Have you heard the saying “familiar fraud?” If not, you should. This is a crime that is as old as they come; essentially, it’s a crime where someone is taken advantage of by someone they know. For instance, a woman named Axton Betz-Hamilton had her entire savings account drained and the person responsible was unknown…that is until Axton’s mother passed away, and it was discovered that it was her, Axton’s own mother, who had drained the account.

credit fraudIt’s believed that familiar fraud is not often reported, likely because victims of these crimes think that police won’t take them seriously, or that it will negatively affect their relationship with their family. There is also the fact that, in many cases, these crimes go undetected because people just can’t believe a member of their family would do something like this.

As you might imagine, the fallout of familiar fraud can run deep. Think, for a minute, how it would feel to find out that your best friend of 30 years has stolen your identity. Something similar happened to a man named Thomas Nitzsche. He hired his cousin to remodel his bathroom, and he gave his cousin his credit card. What did Thomas’ cousin do? He took the card, bought a bunch of merchandise, and then he sold the merch on the streets.

Even when this happens, it’s common for people who learn that they are a victim of familiar fraud to want to naturally protect their loved ones. This might be due to protecting relationships or to avoid backlash from others. There is also the fact that your family might not believe you when you tell them your sister or your father has been stealing from you.

What Should You Do?

 If you think that you are the victim of familiar fraud, you should do the following:

  • Do your best to keep your emotions out of it.
  • Keep an eye on your credit report. You should also place a fraud alert or better, get a credit freeze on your credit file.
  • Think about resolving things without police intervention if it is pretty minor.
  • If not, you might want to contact the cops, but think about the pros and cons of this.
  • If you do report this, expect some turmoil within the family, but also realize that you are protecting your credit.

If you file a police report, you will also be able to get an extended fraud statement, which can last for seven years. This may or may not mean you won’t be responsible for any charges. Lenders sometimes look at familiar fraud as an approved purchase and will not negotiate forgiveness.

Other Safety Measures 

  • Each month review your credit card statements.
  • If you see changes, even small ones, you should report it immediately
  • Don’t give out your debit or credit card to your friends or relatives. If you want to give them money, give them cash.
  • Set up push notifications or push alerts so you are aware of charges in real time.

Written by Robert Siciliano, CEO of Credit Parent, Head of Training & Security Awareness Expert at Protect Now, #1 Best Selling Amazon author, Media Personality & Architect of CSI Protection Certification.

Protecting Yourself from Gift Card Scams

It doesn’t matter what the occasion is, gift cards are a popular gift. However, if you are giving them, or getting them, you could be part of a scam. There are more gift card scams out there than you might think, and it includes both digital and physical cards.

gift cardIt doesn’t matter where you get the card, here are two ways that scammers use them to make money:

The “Assistant Gift Card Scam”

Small businesses are often the target of the assistant gift card scam. We see this a lot in the financial services industry, or really any other industry where you have a service professional who has assistant that manages administrative tasks.

The scam works like this: the scammer scopes out the service professionals website, he might make a phone call or send an email seeking out a secretary or assistant, and then reaches out to that assistant usually via email or even text, spoofing the communication medium and posing as the service professional.

In that communication, the criminal posing as the service professional requests the administrator go out and buy five gift cards for clients and to send pictures of the gift cards with the activation codes on the back scratched off.

Once the criminal receives the photos with the codes, he immediately cashes them in.

The best way to prevent this, is always by getting on the telephone and calling your boss to make sure that the request for gift cards is a legitimate one.

Using a Gift Card to Transform it to Cash

If you get a $200 gift card to a store, and then it’s stolen, it’s like you have lost money. It’s essentially the same as if someone stole $200 from your pocket. You might be wondering how a scammer can turn a gift card into cash. Here’s how it works:

  • The thief takes a gift card out of your gym locker.
  • Instead of using it it at the store, he puts an ad online offering it at a $50 discount saying he’s in a rough spot and needs cash.
  • Someone takes him up on the offer and sends him $150 via Venmo.
  • The thief then goes and uses the gift card at the store. He takes the item he bought and sells it on eBay….and never ships the card to the person who bought it.
  • So now, he has the $150 plus the cash he got from selling the item he bought.

Infiltrating Gift Card Accounts Online

Another way that a thief can scam people by using gift cards is by taking advantage of software. They use a botnet which is also a robot network of computers design to hack, to gain access to an online gift card account. Here’s how it works:

  • You log into your gift card account.
  • The botnet also tries to log into your account. They randomly keep trying until they guess the password/code.
  • Though it’s not guaranteed, the botnet could guess the password/code for your gift card, and if it does, you can say goodbye to the balance.

Protecting Yourself from Gift Card Scams

  • Don’t believe everything you read online. If a deal is too good to be true, it probably is.
  • Anytime a service professional requests a straighter buy a bunch of gift cards, get on the phone and talk to that person directly to confirm the legitimacy of the request.
  • Buy a gift card straight from the source, not from a random Facebook ad.
  • Don’t buy any gift cards at a high traffic location as it’s easy for scammers to hide their scam.
  • Change the security code of the card if you can.
  • If you have access to an online account, change your password and username.
  • As soon as you suspect something fraudulent is going on, report it.
  • Spend the money on the card as quickly as possible.

Written by Robert Siciliano, CEO of Credit Parent, Head of Training & Security Awareness Expert at Protect Now, #1 Best Selling Amazon author, Media Personality & Architect of CSI Protection Certification.

What the Equifax Data Breach Can Teach Us About Security Fatigue

If you buy anything, anywhere, you are at risk of a cyber threat. Though you probably know that cyber threats exist, if you are like most of us, you don’t’ know what to do when it comes to being safe online, and if you become a victim, you really don’t know what to do. This is all important as we prepare for the next big breach like the one that happened with Equifax. If you use credit, you are a potential victim here.

According to Equifax, more than 147 million people were affected by the breach, and most of us had or have no idea what we can do about it, or how it might affect us in the future. On top of this, when we look at statistics, we can see that almost 27 billion…not million, but billion…additional records were exposed due to data breaches in 2020, and things are only going to get worse.

The issue is that people are frustrated, scared, and confused, and because these cyber-attacks are so common now, people are just getting apathetic about it. Of course, this is very dangerous. Additionally, there are other issues, too, specifically “security fatigue.”

What does this mean? It means that people just want nothing to do with worrying about computer security at all, and they get annoyed when they hear all of the rhetoric that comes from security experts like “keep an eye out for blah, blah, blah.”

Cyber Attacks are More Common Now Than Ever in the Past

It should be no surprise that cyber attacks are more common today than they were in the past. That also means that the chances of becoming a victim of identity theft are higher. Internet fraud is playing a big role in this, but it’s not just human error and bad passwords that are causing this. Instead, it’s the lack of people doing anything to stop it. And here’s the thing…if you think it can’t happen to you, you are wrong.

Tips for Protecting Yourself Online

It is not difficult to protect yourself online. Here are seven tips to keep yourself safe:

  • Download a program for your browser that tells you if a site you are going to go to is dangerous. These can be seen right from your browser, and if a site is safe, you will immediately know. A full suite of antivirus should include a browser plug-in to serve this purpose.
  • Keep your passwords safe with a password manager. It is very important to use a different password for every account.
  • Get some type of ID theft coverage through your employer, your bank, or other business. It’s not easy to 100% fully protect your identity, but using something like this can make things much, much easier.
  • Set up two-factor authentication and text alerts for sensitive accounts like bank accounts, email, and social media.
  • Freeze your credit. This way, a scammer can’t open any new accounts in your name.
  • Learn more about common internet scams. You should understand what ransomware is, phishing, scareware, and more.

One of the biggest things you should take away from this is to understand that if you become a victim of something like this, it doesn’t just affect you; it also can affect your family, friends, co-workers, and more. Yes, it might be annoying to some to have to take these steps, but it could be the difference between staying safe and becoming a victim.

Written by Robert Siciliano, CEO of Credit Parent, Head of Training & Security Awareness Expert at Protect Now, #1 Best Selling Amazon author, Media Personality & Architect of CSI Protection Certification.

Make your Mobile a Tough Target: Strengthening Your Mobile Device

Do you pay attention to how secure your mobile phone is? Most of us do not do this, which makes it very easy for a hacker to get in and target us. Here are some tips that you can use to protect your phone from becoming a target:

mobile

Always Set a Passcode 

One of the best things you can do to strengthen your mobile device’s security is to make sure you have a passcode on it. All mobile phones have a passcode option, and some phones, like the iPhone, even allows you to remotely lock it if you believe the phone has been stolen.

Use Biometrics 

You can make your device even safer by setting up some type of biometric access like a fingerprint or facial recognition.

Use “Find My”

If you have an iPhone and it gets stolen, you can use the Find My iPhone app. This app is already on your iPhone, and it’s totally free. It uses GPS to locate your iPhone as long as the GPS capabilities are enabled. If you have an Android, you can do a similar thing with Find My Device.

Check Up on Your Privacy Settings

It is also a good idea to take a peek at your privacy settings. Your data is very important, and there are constant threats. Thankfully, you can set up your privacy settings to make it difficult to get into. Depending on your phone, you can look at privacy settings, location settings, VPN settings, and encryption settings.

Is Phone Antivirus Software Necessary?

Many people think that you can make your phone a lot safer by using anti-virus software. When you put this on your computer, it certainly helps a lot. However, it doesn’t do much, or isn’t even available for an iPhone. If you have an Android, though, it’s best to load one up. You can find a ton of them on Google Play.

Don’t Jailbreak or Root Your Device

 You should also not jailbreak your iPhone nor root your Android device. Many people do this because they get more freedom for customizing their device, and you can download apps that Apple hasn’t approved. However, this can open your device up to hackers, which could be a devastating thing.

Encrypt Your Backups

 Finally, make sure that you are backing up and encrypting your backups. When you backup your device, the data just sits on your computer or in the cloud, and in some cases that might mean it can get hacked. So, make sure you encrypt the information that’s there, so even if the computer is hacked or your cloud based backup is compromised, the hacker can’t access this data.

Written by Robert Siciliano, CEO of Credit Parent, Head of Training & Security Awareness Expert at Protect Now, #1 Best Selling Amazon author, Media Personality & Architect of CSI Protection Certification.

Protect Your Mail From Thieves

Do you have Informed Delivery from the US Postal Service? If not, you should. Every day, it sends you an email that shows what is coming in your mail.

Robert Siciliano, CSP, SAFR.MEHowever, there is also the possibility that someone could pose as you and get your Informed Delivery. This means that they could get your mail before you do.

In fact, this is already happening. The bad guys are signing up with the addresses of other people, and then collecting their mail. Why? Because they want to get access to things like credit card applications or new credit cards.

What if your mail contains a check? The thief could easily cash it before you even realized it was gone.

There are numerous reports that show groups of thieves in actually used the USPS to apply for credit cards via an application that we all get in our mail. They then just had to wait. They knew the exact day the credit cards would arrive because they had access to the owners’ mail via Informed Delivery. By doing this, they were able to spend around $400,000, and the owners didn’t realize it until it was too late.

A locking mailbox could certainly help, and you can also opt out of informed delivery by emailing eSafe@usps.gov. This prevents anyone from signing up for it in your name.

You can also consider a credit freeze. This does not guarantee that a thief won’t be able to steal your identity and open a credit card, but it makes it much more difficult.

Other Things You Can Do

Here are a few other things you can do:

  • Check your credit cards statements each month for any charges that look strange or unfamiliar, and then immediately report them, even if it is a small amount.
  • Contact the three major credit reporting agencies and sign up for alerts to get any changes in your credit report.
  • Get a mailbox that locks. There is too much information out there not to have this.

Written by Robert Siciliano, CEO of Credit Parent, Head of Training & Security Awareness Expert at Protect Now, #1 Best Selling Amazon author, Media Personality & Architect of CSI Protection Certification.

Tips to Protect Your Identity from Cyber Thieves

There are several tried and true ways that you can use to protect yourself from ID theft, and some of them you might have never even considered:
Check Your Passwords – Every online account you have should have a different password. Never use the same password for more than one account. You can easily fix this issue by using a password manager. Also, don’t use specific words/phrases or keyboard sequences when creating passwords. A password manager can even generate passwords for you.

Don’t Post Personal Information on Social Media – This including things like your kid’s school or teacher, the town your parents live in, your pet’s name, or even where and when you are going on vacation. Cyber thieves can use this information to guess passwords.

Ignore Any Email from People You Don’t Know – If you get emails from people you don’t know that have a link or attachment, never, ever click or open them.

Put a Password on Your Phone – This way, if your phone is lost or stolen, you don’t have to worry.

Shred Important Documents – Anything that comes in that has personal information, that would go in the rubbish, should be shredded. This includes credit cards bills and medical records.

Never Give Your Social Security Number Out – Unless you absolutely have to, you should not give up your Social Security number. Just because someone asks for it, that doesn’t mean they actually need it, or you should hand it over. That said, I give up my social all the time. But only on documents or applications that absolutely require it.

Check Out Your Credit Report Each Year – Every year, or every quarter, you can get access to your credit report for free. Check it out when you can to make sure it’s accurate.

Inspect Your Statements – Look for anomalies or unauthorized transactions. This includes any banking and credit card statements, and you should do this each month.

Get a Locking Mailbox – A locking mailbox is available at most big box hardware stores or online.  Or pay for a PO Box.

Stop Your Mail When You Travel – You should also stop your mail delivery when you take a long trip.

Freeze Your Credit – Consider freezing your credit. This will stop an ID thief from opening new accounts in your name.

Written by Robert Siciliano, CEO of Credit Parent, Head of Training & Security Awareness Expert at Protect Now, #1 Best Selling Amazon author, Media Personality & Architect of CSI Protection Certification.