X

  

Voting and Absentee Ballots

The application, the ballot, the primary, the election

0

The new normal - issues arising over absentee ballots, applications, and long lines at polling locations have become commonplace in 2020 - meddling with our inalienable right to vote.

genusConnect App

with Joe Gleason, CEO of Genus, Inc.

0
Joe Gleason, creator of genusConnect, discusses this comprehensive healthcare app which provides an innovative way for families, patients, and caregivers to work together through hardship and...

Your Driving Skills

Tips and technology for the road

0
When you’ve been driving for decades it’s easy to feel like you know it all. Yet for years, national surveys have shown that about one in five of us would flunk a written driver’s test. This...

Covid-19 and the Courts

with Chief Justice Bridget McCormack, Michigan Supreme Court

0
Chief Justice Bridget McCormack, Michigan Supreme Court, addresses how the Covid-19 pandemic has changed the way the courts conduct business with Zoom technology, the pros and cons of this...
First6162636466686970Last

Sponsored Content

  

Sponsored Content

  

Search

Sponsored Content

  

Recent

12

Coronavirus Resources

Identity Theft and Personal Data Security
Laurie Blume

Identity Theft and Personal Data Security

Protecting yourself from identity theft

Imagine that yesterday you began receiving unsolicited credit cards in your mailbox at home. You get calls from the new bank accounts or credit cards asking for more information on the account that you just opened. Or, you get bills for credit cards that you did not open, usually for high dollar amounts. You check your credit report and you find that your credit score has dropped. So, you call a Credit Bureau and find out that someone has stolen your identity.

Your first step is to freeze your credit, which the Credit Bureau does for you. Then you find out that it all started when you moved residences and never cancelled the old internet service account with your old vendor. The computer network at your old home did not have a firewall turned on, and someone hacked into your computer. They stole your address book and your email account, all without your knowledge. When you moved, they logged into your old email address and learned more about you. They learned your spending habits from your email, credit card statements sent to your email account, and your online e-commerce accounts. They logged into your social media accounts and learned more about you. They got your account passwords, because you saved it in a folder that could be accessed from your email account.

In order to help identify the cyber criminal that stole your identity, you should enlist the services of a Computer Forensics Expert. A digital forensics expert can investigate your computers, cell phone, email accounts, Apple ID’s, Google accounts, Bank Accounts, etc. to help unearth evidence of the how and the who behind the identity theft.

While it is critical to seek the aid of a computer forensics expert after an incident of Identity theft, what can you do to proactively to help prevent such a theft from occurring?

5 Things You Can Do Now To Help Protect Yourself From Identity Theft:

  1. Use a Credit Monitoring service. These services will alert you when a new card or account has been opened.
  2. Check your insurance policy to see if you have coverage. Some carriers may reimburse you for necessary and reasonable expenses to restore your identity. Coverage amounts may vary based on the insurance company and their forms. This coverage may include the costs incurred to recover control of your identity.
  3. Install computer security software to protect your computer and email accounts from malware. Paid security software will stop attacks to your computer, especially for malware and Ransomware.
  4. Use Two-Factor Authentication (2FA) on all of your web-based accounts. This allows a special code to be sent to your mobile phone to verify that you actually requested access into an account. Without the special code entered on the device that is asking for access, it is impossible to access the account.
  5. Use a Password Keeper to store all of your personal passwords. Keep the main password to access the Password Keeper not in an electronic format (i.e. on your computer or in your email). Make the main password at least 16 characters in length.

Personal Identity Theft has been rising continually, but consulting with your trusted IT provider can help increase your security. If you do become a victim of Identity Theft, it is critical to reach out to your trusted Computer Forensic Expert to help you mitigate the damage and to seek restitution.

Founded in 2003, ELIJAH is a multi-award-winning leader in providing expert digital forensic, data security solutions, and managed IT. ELIJAH is owned and managed by former litigation partners and is an efficient boutique digital forensic, cybersecurity and IT solutions provider that makes clients’ lives easier through effective communication and white glove service. For additional information, please visit https://www.elijaht.com or call 866-354-5240.

Article By:
Jon Isenberg, Elijah Information Technology

Print
13750

All Categories

Sponsored Content