The ways of identity theft

Fdbryant3 blog described the ways by which the identity thieves may acquire your personal information.

Identity thieves may get sensitive information from businesses or other institutions by:

*stealing records or information while they’re on the job

*bribing an employee who has access to these records

*hacking these records

*conning information out of employees

In order to get access to your financial information, identity thieves may do one of the following:

• They may steal your mail, including bank and credit card statements, credit card offers, new checks, and tax information.

• They may rummage through your trash, the trash of businesses, or public trash dumps in a practice known as “dumpster diving.”

• They may get your credit reports by abusing their employer’s authorized access to them, or by posing as a landlord, employer, or someone else who may have a legal right to access your report.

• They may steal your credit or debit card numbers by capturing the information in a data storage device in a practice known as “skimming.” They may swipe your card for an actual purchase, or attach the device to an ATM machine where you may enter or swipe your card.

• They may steal your wallet or purse.

• They may complete a “change of address form” to divert your mail to another location.

• They may steal personal information they find in your home.

• They may steal personal information from you through email or phone by posing as legitimate companies and claiming that you have a problem with your account. This practice is known as “phishing” online, or pretexting by phone.

Most often, identity thieves acquire personal financial information directly from the victim’s PC.

To prevent sensitive data leaks from your PC, make sure all of your financial files are identified and secured properly.

This blog is run by the authors of FindProtected.
FindProtected is an effective security program that allows you to search your network for password protected files. With FindProtected, you can properly identify protected files and relocate them if necessary.

Leave a Reply