Preventing ID Theft !
Before getting rid of your old computer consider the personal information inside it being handed to thieves. Insight with Seth Grossman, QGSI President & COO and CNBC's Joe Kernen.
The reality of identity theft Computer users upgrade to newer PC technology every four years
Gartner, Inc. estimates that consumers refresh their personal computer technology an average of every three to four years. Most PC users recognize that a computer contains toxins that are regulated by the EPA and they prefer to recycle their old PC and prevent it from ending up in a landfill.
Some plan to sell the computer and others will donate the computer to charity. Whether the computer is to be recycled or you plan to dispose of your computer, one must face the reality of identity theft.
Identity theft is reaching epidemic proportions with over 700,000 cases reported last year. The average identity theft victim will spend $3,000 repairing their credit history. Good people with a solid credit record are spending months cleaning up the mess caused by identity theft.
In the meanwhile, identity theft victims may lose job opportunities, be refused for loans or may get arrested for crimes they did not commit.
Other resources to learn about identity theft
The Federal Trade Commission: National Resources for Identity Theft
Privacy House Clearinghouse: Identity Theft Resources
Department of Justice: Identity Theft and Fraud
CastleCops: Security Professionals
Before you sell your computer, donate your computer or dispose of your computer, protect your personal identity with eraseyourharddrive.com.
2006: The Year of the Data Breach?
December 27, 2006 - NASHVILLE, Tenn. – The nation may remember 2006 as the year the Democrats won the mid-term elections, Gerald Ford and James Brown died, and data breaches made an indelible mark on American business in general and the insurance industry in particular.
As the year draws to a close, security experts report that high-profile data breaches, growing sophistication among cyber criminals, increased media attention and unprecedented legislative activity have changed perceptions and practices around identity theft.
“More has changed in the world of data protection and identity theft over the past year than in the prior six or seven years combined,” says Troy Allen, chief operating officer in the fraud solutions practice at Kroll Background America Inc., a Nashville, Tenn.-based employment screening company. Allen specializes in data breaches and thefts.
Allen attributes the spike in reported data breaches to more use of electronic data in day-to-day business, less expensive data storage options, proliferation of laptop computers and portable memory drives, and weak policies and procedures by businesses.
Meanwhile, more organizations are beginning to recognize what data breaches look like and are responding, Allen says.
He lists five factors that caused shifts in the ID theft landscape in 2006.
1. Government gaffes--The Veterans Administration loss of 26.5 million records, and data loss by big agencies, such as the Internal Revenue Service and The Department of Agriculture, and small entities, like local school districts, captured the attention of policymakers and the public. “Scrutiny of the VA breach raised the bar for everything,” says Allen.
2. Regulatory requirements—Twenty-five states passed laws related to identity theft and members of the United States Congress introduced 34 bills pertaining to the subject. Most of the legislation called for notification of individuals whose data was exposed. Now, even where notification is not required, the public expects it and no longer seems willing to consider breached businesses “victims.”
3. Organized crime--Identity theft is tied to organized crime, and proceeds finance drug operations, illegal immigration and other criminal activity. Crime rings are training people to steal data and providing easy and profitable channels to market the data. “There’s now an online auction to buy and sell identities, where you can even read reviews of the sellers,” says Allen. “This is way beyond smash-and-grab laptop theft, because criminals are learning they might get as much as $40 per clean identity.”
4. Educated consumers—Large-scale efforts by the Federal Trade Commission and others have helped teach consumers to protect their personal information. More people are reluctant to divulge their identification to businesses and organizations that don’t need it. Even employees are getting savvy and demanding employers use proxy numbers instead of Social Security numbers. “There’s progress, but there also are still a lot of bad practices to be remedied, and it’s not changing fast enough,” according to Allen.
5. The Growing “Business of Identity Theft”--The demand for identity theft and data protection services has created an explosion of companies marketing identity-theft related products and services. Some are experienced organizations with security expertise, but others are questionable Internet or telemarketing operations that have sprung up overnight. False promises and marketing by fear are tainting the industry, says Allen. “Consumers need to understand that--although some businesses are offering guarantees--when it comes to protecting identities, there is no such thing. Period,” he says.
Just as 2006 brought increases in awareness, confusion and uncertainty, Allen predicts 2007 will produce its own trends., including the following:
1. Corporate preparedness—More companies will assign individuals or cross-functional teams the responsibility for data security and breach response. Employee training will increase, too.
2. Corporate restrictions--More companies will limit the use of computers and data devices, like flash drive USBs. Some businesses will disable the capability to download information. “Portable memory and CD downloads are conveniences--not necessities,” says Allen. Employers will begin insisting that more information exchange takes place via secure online transfer.
3. Social engineering crimes--Criminals will look for more efficient ways to get larger amounts of data. One scheme that is gathering momentum is bribing employees or planting employees who stay in jobs only long enough to steal records. Such criminals are tough to catch, because they use stolen identities when they apply for positions, Allen says.