Tag Archives: Sparks

Could You be a Victim of Social Engineering?

Do You Put Your Birth Date on Facebook? There are three pieces of Private Identifying Information thieves want: Your Name Do you have a nick name? Use it on social media rather than your legal name. Your Birthday If you … Continue reading

Posted in Identity Theft Protection, Security Culture | Tagged , , , , , , , , , , , , , | Leave a comment

What is your prepaid card costing you?

Prepaid Cards can Protect you from Credit Card Fraud You go out to eat at a local restaurant and pay with your Debit Card. The waiter copies the Debit Card information and buys a new 42″ HD TV. You are … Continue reading

Posted in Identity Theft Protection | Tagged , , , , , , , , , | Leave a comment

What is Identity Theft?

Identity theft happens. It’s an unfortunate fact of modern life. But there are certain steps you can take to help keep your personal information from falling into the wrong hands. Every day, you do things to protect what’s most important … Continue reading

Posted in Identity Theft Protection | Tagged , , , , , , , , , , , | 1 Comment

Criminal Identity Theft can happen to Anyone

Criminal identity theft occurs when a criminal fraudulently identifies himself to police as another individual at the point of arrest. The charges may then be placed under the victim’s name. Often the victims of Criminal Identity Theft do not find … Continue reading

Posted in Identity Theft Protection, Security Culture | Tagged , , , , , , , , , , , , | Leave a comment

Is Your Family Prepared for an Aged Parent’s Life Events?

You cannot know all the future holds, but it is possible to prepare for the legal challenges that you, your parents and your loved ones may face as all grow older. Seniors and their children must prepare now to meet … Continue reading

Posted in Family Law, Identity Theft Protection, Medical Identity Theft, Security Culture | Tagged , , , , , , , | Leave a comment

Identity Thieves are Destroying Our Children’s Future

Judiciary Subcommittee on Immigration Policy and Enforcement Hearing “Document Fraud in Employment Authorization: How an E-Verify Requirement Can Help” April 18, 2012 Testimony of Jennifer Andrushko Mother of child victim of SSN identity theft by an illegal alien for the … Continue reading

Posted in Child Identity Theft, Family Law, Identity Theft Protection, Medical Identity Theft, Security Culture | Tagged , , , , , , , , , , , , , , | Leave a comment

Consumer Reports: Setting your Facebook privacy settings

The Best Facebook Privacy Setting The very best security is to never put any Private Personal Information in your Facebook profile. Do not provide your real birth date, not even the month and day without the year. Do not provide … Continue reading

Posted in Identity Theft Protection, Security Culture | Tagged , , , , , , , , , , , , , , , | Leave a comment

Medicare: Will it stop using my SSN? – Answer Man – bnd.com

Re-Post of Medicare: Will it stop using my SSN? – Answer Man – bnd.com. BY ROGER SCHLUETER – News-Democrat Q. Credit card companies and financial institutions have gone to great lengths to protect us from identity theft. However, the U.S. government … Continue reading

Posted in Identity Theft Protection, Medical Identity Theft | Tagged , , , , , , , , , , , , , , , | Leave a comment

Someone Used My Credit Card Number Am I An Identity Theft Victim?

Credit Card Fraud When an existing credit card, debit card, checking account or other financial account is used without your permission it is “Credit Card Fraud” or “Bank Account Fraud”, not Financial Identity Theft. When someone opens a new account … Continue reading

Posted in Identity Theft Protection, Security Culture | Tagged , , , , , , , , , , , , , , , , , | Leave a comment

The Global Gangs that Can Break Banking Institutions

4 Crime Rings to Watch The Brothers’ Circle, a group based primarily in Russia with connections to the Middle East, Africa and Latin America that focuses on card fraud; The Camorra, based in Italy and focused on counterfeiting and narcotics … Continue reading

Posted in Business Identity Theft, Identity Theft Protection | Tagged , , , , , , , , , , , , , , | Leave a comment