Showing posts with label personal security. Show all posts
Showing posts with label personal security. Show all posts

Monday, April 23, 2007

What to do if your Identity is STOLEN

Please note that these guidelines are NOT an inclusive list. If your identity has been stolen, expect to spend many hours clearing your good name. It is an unfortunate reality that this process takes on average almost 200 hours of your time over a 2 year period.

DHI recommends that you be PROACTIVE in guarding your Identity. Protect your Identity BEFORE it gets stolen. Visit DHI's Identity Theft webpage for more information.

Guidelines to follow if you suspect that your identity has been stolen:

  1. Call the fraud hotlines of the three (3) major credit reporting agencies.
    Ask them to flag your account profile with a fraud alert to prevent any accounts from being opened without your approval:
    • Trans Union – (800-680-7289)
    • Equifax – (800-525-6285)
    • Experian – (888-397-3742)

  2. File a report with your local police.
    You will need a copy of the report to show creditors. In addition, you may need to contact the police department where the crime occurred. The Postal Inspector will also need to be contacted if a fraudulent change-of-address was filed.

  3. Close all false or phony accounts.
    Ask for copies of the original credit applications for your files.

  4. Close all existing accounts that have been illegally accessed.

  5. Document your calls to creditors.
    Send a certified letter reiterating your requests. Keep a log of all calls, contacts and documents. File them in a safe place and keep them indefinitely.

  6. If stolen items include anything with your Social Security Number, call the Social Security Administration to report that the number has been used fraudulently.

  7. Call the Department of Motor Vehicles to discover if a duplicate license has been issued in your name.

  8. File a complaint with the Federal Trade Commission’s (FTC’s)
    Identity Theft Hotline – (877-438-4338)


Other Resources:

Thursday, April 5, 2007

Thieves at Gas Stations

Actual footage of thieves working gas stations!! Summer is coming, please be aware of your surroundings and heed the recommendations of Sheriff Ken Jenne.

Sheriff Jenne says that the thieves are actually after items they can use to steal your identity. Protect yourself ... Please visit the DHI Identity Theft page to learn more.

Protect Your Valuables!!

Below is a link to a short article that overviews various ways to protect your valuables. Of note is #5 on the list which addresses a very affordable, state-of-the-art crime prevention technology called DataDots. Depending on its size, an asset can be protected with DataDots for pennies!

"6 Ways to Protect Your Valuables"

Wednesday, March 14, 2007

ID Theft from your Mail Box

One of the most common practices for a thief to steal your identity is to steal your mail.

A good security step is to use a locked mailbox.

However, with Lock Bumping, the security step of using a locked mailbox provides only a minor inconvenience to a thief. Most grouped mailboxes (apartment complexes, HOA mailbox centers, etc.) use a common lock with slight differences in the key for each mailbox. A thief with a master bump key for a group of mailboxes could literally steal hundreds of pieces of mail within a matter of minutes!

What can you do? Contact your HOA or apartment management (or the like) and request that they change the locks to bump-proof locks. However, although a justified cost in your eyes, the management will probably view the current setup as sufficient and not do anything.

Another step would be proactive of your part. Prevent your identity from being stolen before a thief even tries.

How? Please visit the DHI Identity Theft page to learn more.

Monday, March 12, 2007

Technical Info on Lock Bumping

Clicking on this link will take you to a Technical Analysis of Bumping written by security.org. The analysis was written in April 2006.

Why am I posting this? The information on Lock Bumping is "out there" in Cyberspace, available to anyone. I am posting this for the same reason this document was written, "This document addresses the relevant technical issues with regard to the vulnerability of mechanical locks to bumping and the security threat that results. Law enforcement agencies, security professionals, locksmiths and the consumer need to understand the issues in order to accurately gauge individual risks."

It is technical in nature and very informative.

As I have stated previously, please take any appropriate actions you feel are necessary to protect you, your family, and your assets.

From the DHI perspective, this topic offers a reminder that a home inventory is important. Please contact us if you have any questions.

Sunday, March 11, 2007

Identity Theft

I have known a few friends and associates who have experienced this most unpleasant crime. As you probably know, it is the fastest growing and most prevalent crime in the US. Fixing your identity after the fact takes an average of 177 hours and over 2 years in time.

There are various remediation, credit monitoring, and insurance companies dedicated to identity theft services. However, all of these companies address the identity theft problem after the fact - that is, after your identity has been stolen.

Recently, DHI has become affiliated with a company that takes a proactive approach to this subject. The company is called LifeLock and my family is a client of theirs. I have included my children ... young people are more vulnerable to identity theft than adults because most have not established credit records that can be monitored.

In a nutshell, LifeLock offers a $1,000,000 Guarantee that its services will protect your identity from being stolen. The LifeLock service costs $10/month (a little less with an annual subscription.)

To learn more, please visit the DHI Identity Theft page. (Yes, DHI earns a few nickels in this manner).

However, whether you go through DHI or not, I urge you to consider this service. Additionally, please continue to keep a vigilant eye on your personal information and shred any important (and unimportant) documents containing personal information.