Categories
Security

Are American Voting Systems Secure?

american_voting_secure_400.jpg

Election Day for the United States is November 6th, and regardless of your feelings regarding U.S. politics, the fact of the matter is that millions of Americans will soon go to the polls and cast their ballots. Unfortunately, what many of them don’t realize is how insecure their voting machines actually are, and how they are potentially putting their vote at risk.

What Most Polling Places Have
The majority of American polling places are operating with equipment that is fast approaching 15 years old. For reference, here’s a brief list of products and technologies that haven’t even been around for ten years yet:

  • Google Chrome
  • Airbnb
  • Spotify
  • Kickstarter
  • 4G
  • Mobile GPS
  • Instagram
  • The iPad

One cofounder of nonprofit group Open Source Election Technology, Greg Miller, puts it this way: “You have equipment that was introduced in 2005. In that time frame, how many times have you changed your mobile phone? And how many times have we replaced our laptops?” In short, the American voting system is reliant on, as Miller described it,”… obsolete hardware [and] software that relies on a diet of spare parts.”

The other cofounder of the nonprofit OSET, John Sebes, has demonstrated just how vulnerable these systems could potentially be to manipulation.

Most polling places collect all of the voting data onto a piece of portable media, like a CD or a USB drive, and bring it to a separate location to be tallied. Unfortunately, the machines used here are also usually outdated, as is the software used to process the results of the vote.

In a live demonstration on a national news network, Sebes used one of these machines to tally votes for two fictional candidates, Thorfer and Varda. In the example, Thorfer had won in a landslide with over 3,000 votes, the opposing Varda only receiving 100. However, with a very simple malware, Sebes was able to just switch the tallies, making “Varda” a fraudulent winner – and while access to these tallying computers is secured, some may not be secured as well as others are.

Furthermore, many polling places maintain a paper backup of the vote, just in case there needs to be a recount, but there are also many who have no paper backup at all. This includes some states known as “battleground” or “swing” states, where a much smaller number of votes can potentially have a significant impact on the final outcome.

How to Minimize the Issue
Unfortunately, the easiest solution to this problem is also impossible. One would think that there would be a singular set of standards for all polling places to abide by – but since the American Constitution specifies that each state is in control of its own electoral procedures, this consistency is effectively made impossible.

However, there are other ways that have been suggested to protect voting technology… some of which are decidedly lower-tech.

Temporarily Eliminate Online Voting
Some states have made online voting available, primarily to service members or other citizens who may be abroad, and many allow email ballots to be submitted. However, until security is improved for these methods, it has been suggested that they are suspended.

Utilize Physical Backups
Yes, we know. We generally say that all of your backups should be saved to the cloud, but in this case, that would be counterproductive. After all, a physically-generated paper backup that records each vote isn’t hackable (unlike a digital system) and could easily be used to cross-check any contested results.

Invest in Improved Voting Equipment
As one might imagine upon hearing that most American voting machines are over a decade old, updating the infrastructure that enables the prime responsibility of democracy is clearly not a priority for those dispersing the funds. It has been suggested that Congress get involved, funding research into improving these machines and replacing the problematic older machines, as was last done in 2002.

Americans view the right to vote as a basic human right, so it seems especially bad that their infrastructure can get in the way of their doing so. Don’t let your business technology do the same to your employees and their work. Reach out to COMPANYNAME for a better solution by calling PHONENUMBER.

Categories
Casserly Consulting Blog

Our 2018 Business Technology Overview

look_at_business_tech_400.jpg

Businesses have a lot to think about, especially regarding best practices and upcoming trends in technology. Has your business been doing all it can to keep up? We’ve outlined some of the best IT innovations that we expect to see in 2018 as time goes on.

Security Worries
It should be clear that in today’s business world, security is everything. There are so many threats out there that one organization alone can’t possibly keep up with all of them, much to the chagrin of security companies. Most notable of these is the Internet of Things, a term used to refer to the collective body of mobile devices out there with interconnectivity features. Machine learning and improved methodologies have allowed organizations to better protect themselves from these emerging threats. Predictive technologies powered by machine learning have also greatly enhanced the ability of organizations to take on threats. Alongside new innovations like blockchain technology and the zero-knowledge proofs associated with it, machine learning will likely pave the way toward the future of security.

Big Data
Similarly, in order to make a meaningful impact on your business, you need to collect data that can be used to make educated decisions. There are plenty of sources out there that can help businesses acquire and accumulate data, if you know where to look. If your business utilizes solutions that allow it to collect and organize data, you’ll be able to make predictions about which decisions will most benefit your company over time. It can also help you make decisions based on trends in security, user experience, processes, and efficiency.

Artificial Intelligence
A.I. is the future of many business strategies. Since businesses today collect more information than any before them, A.I. can be the most efficient way to benefit from it. A.I. can help your business and its employees better manage both time and resources, and with this comes greater opportunity for innovation and savings to your bottom line. In essence, A.I. can potentially allow businesses to save time by automating redundant or time-consuming tasks, all while learning from the experience.

Accountability
Artificial intelligence presents an interesting problem that businesses haven’t had to deal with to this moment–accountability. If something goes wrong and an A.I. does something illegal, who’s to blame? Issues like these, and many more, all need to be addressed before innovations can be leveraged to the best of their ability.

What are some of your most anticipated trends for the future of business technology? Let us know in the comments.

Categories
Casserly Consulting Blog

Tip of the Week: Avoiding Scams

totw_scams_400.jpg

Uh oh. One of your employees sat down at their workstation and was presented with a pop-up telling them that Microsoft has detected a fatal issue with their workstation, and if they don’t let someone remote in to fix it, all of their data will be lost. This could be a serious problem… especially if your employee falls for this scam and lets in a threat.

Tech support scams are not an uncommon thing, blending social engineering and phishing together to deliver the desired result to a scammer. For our tip, we’ll discuss how to identify and avoid these scams and deprive a scammer of that result.

A Global Problem
Make no mistake, these scams are an issue all around the world. While the impact is felt the greatest in the United States, China, and India, scammers clearly don’t discriminate by region.

However, there’s another layer to the issue of tech support scams.

There is an intense level of competition in India for employment opportunities, especially among the generation who should now be entering the workforce. For some reference as to how intense this competition is, 2016 saw a state-owned bank receive over one and a half million applications for just 1,500 open positions. This makes it not uncommon for many job applicants to be grossly overqualified for the position they are seeking, recipients of a master’s degree in business administration often applying to be a street sweeper. Naturally, this provides ample motivation for the populace to take any job that presents itself – even if it is at the expense of another.

Many call centers in India will take full, unabashed advantage of this, hiring young job-seekers through a convoluted and secretive process – sometimes not even informing the applicant who they are actually working for. This process can also cost the applicant a not-insignificant sum, as they are often charged for these interviews and trainings. Once the training is complete, an applicant leaves with a start date.

However, these jobs are often not what is expected. Instead of working in customer service, these youths are tasked with initiating a scam. They will call a target, deliver their “pitch,” and transfer the primed caller to a senior scammer who seals the deal. However, despite abysmal pay for being involved in these scams and the emotional burden placed on them by interacting with their often-helpless and terrified targets, many of these scammers find that scams are, again, one of the few effective ways to make money. As a result, many of these young scammers – effectively exploited themselves – end up embracing their role, working to get as big a piece of the pie as possible.

Thwarting These Attempts
Of course, while those on the other end of the line may not be in a great position themselves, you want to make sure that their efforts to scam you are ultimately wasted. To accomplish this outcome, it is important to remember a few key warning signs.

  • Don’t Call Us, We’ll Call You – The first thing to remember is that, if a Microsoft representative suddenly calls you without warning, they probably aren’t actually with Microsoft. You should even take your caller ID with a grain of salt, as that can be spoofed to look official enough to trust.
  • Weak Link in the Chain – Links are another favorite weapon of scammers, as they can be shared in an email to direct a user to a website filled with fake warning pop-ups. Avoid clicking on these links, and if you are presented with an alert screen, restart your computer. Scammers will also work to ensure that they reach the top results of search engines through sponsored ads to attract those legitimately looking for help. These links should be avoided as well. Google has made serious efforts to not allow scammers to run Remote IT Support ads, but it hasn’t stopped everything yet.
  • Remain in Control – Unless you are absolutely sure that a third party is trustworthy, never give up control of your computer. Otherwise, you could hand precious data over to a scammer or otherwise land yourself in hot water.

The Better Method
Of course, if you enlist the services of COMPANYNAME, a fair amount of these points become moot, as you will have access to an experienced team of trustworthy IT professionals who have your business’ interests at heart. For more information, give us a call at PHONENUMBER.

Have you ever encountered a scam like this before? Tell us about it in the comments!

Categories
Casserly Consulting Blog

Hackers Plus Artificial Intelligence Equals Big Trouble

artificial_hacker_400.jpg

Thanks to the advent of artificial intelligence, cybersecurity professionals have to reconsider how they approach these threats. Machine learning is one option, as it can help today’s modern solutions learn how to be more effective against advanced threats. On the other hand, what’s stopping the other side from also taking advantage of artificial intelligence? The answer: nothing, nothing at all.

If you think about it, this makes a lot of sense, as computers are capable of working much faster than humans. Plus, they are less prone to user error. Hackers have found A.I. to be effective for the deployment of phishing attacks. According to a study conducted by ZeroFOX in 2016, an A.I. called SNAP_R was capable of administering spear-phishing tweets at a rate of about 6.75 per minute, tricking 275 out of 800 users into thinking they were legitimate messages. In comparison, a staff writer at Forbes could only churn out about 1.075 tweets a minute, and they only fooled 49 out of 129 users.

A more recent development by IBM is using machine learning to create programs capable of breaking through some of the best security measures out there. Of course, this also means that we’ll eventually have to deal with malware powered by artificial intelligence, assuming that it isn’t already being leveraged somewhere.

IBM’s project, DeepLocker, showcased how video conferencing software can be hacked. The process involved the software being activated by the target’s face being detected in a photograph. The IBM team, including lead researcher Marc Ph. Stoecklin, has this to say about these kinds of attacks: “This may have happened already, and we will see it two or three years from now.”

Other researchers have demonstrated that A.I. can be used in cyberattacks, even going as far as using open-source tools to make them happen. What do you think about this development? Do you think that these threats are already present, or do you think that the biggest threat is yet to come? Let us know in the comments.

Categories
Casserly Consulting Blog

Don’t Be Fooled When Scammers Threaten to Spill a Dirty Little Secret

dirty_little_secret_400.jpg

What would you do if a stranger claimed to have compromising webcam footage of you and threatened to share it with your contacts? A new, very convincing email scam is making some users very nervous.

The Sextortion Scam
It’s as screwed up as it sounds. A scammer emails you saying that they got access to your passwords, and then started to run amok to see how much trouble they could get you into. They even show you one of your passwords to prove it (the password will likely come from lists found on the dark web from online businesses and services that have been hacked and stolen over the years). Then the scammer admits they’ve been watching what you do on your computer and recording your webcam, and they happened to catch you at a very inopportune time… Well, let’s let the email explain it for us. 

“You don’t know me and you’re thinking why you received this email, right?

Well, I actually placed a malware on the porn website and guess what, you visited this web site to have fun (you know what I mean). While you were watching the video, your web browser acted as a RDP (Remote Desktop) and a keylogger which provided me access to your display screen and webcam. Right after that, my software gathered all your contacts from your Messenger, Facebook account, and email account.

What exactly did I do?

I made a split-screen video. First part recorded the video you were viewing (you’ve got a fine taste haha), and next part recorded your webcam (Yep! It’s you doing nasty things!).

What should you do?

Well, I believe, $1400 is a fair price for our little secret. You’ll make the payment via Bitcoin to the below address (if you don’t know this, search “how to buy bitcoin” in Google).”

The reader is then given the address to a Bitcoin wallet, where they are to send the ransom.

The email continues:

“Important:

You have 24 hours in order to make the payment. (I have an unique pixel within this email message, and right now I know that you have read this email). If I don’t get the payment, I will send your video to all of your contacts including relatives, coworkers, and so forth. Nonetheless, if I do get paid, I will erase the video immidiately [sic]. If you want evidence, reply with “Yes!” and I will send your video recording to your 5 friends. This is a non-negotiable offer, so don’t waste my time and yours by replying to this email.”

This email comes in a few different versions in the wild, but all of them follow the same pattern and end with the same threat… fork over the cash, or everyone will see you in your most private moments.

Is This a Serious Threat?
This is a very real concern for many people, who will be relieved to hear that, no, there is no indication that these threats are for real. The first clue is the fact that the passwords that the email provides are usually a decade old, indicating that they came from some (relatively) ancient database from some long-forgotten hack.

However, in some ways, this is even worse news, because this threat has made a tidy sum of money: as of the 31st of July, the scam had brought in $250,000, as compared to just over $50,000 by the 19th. Clearly, this scam has been plenty effective for the perpetrators, and this won’t deter others from following its example.

Keeping Yourself Safe from an Actual Attack
Granted, this attack is just an unfair wager, but scams like this are more than possible for a criminal who actually means what they say/threaten. As a result, the security lessons we can take away from this particular attack still apply.

The first thing to remember is also the first rule of passwords – change them frequently. Again, this scam has made quite a bit of money based on a total bluff… a bluff that, paid in increments of $1,400, was worth $250,000 and counting. From this, we can infer that quite a few people who received this message had online activities that they wanted to hide, and more critically, that their passwords had remained the same for all those years.

This is an excellent example of why it is so crucial to regularly update your passwords, without repeating them – if an old database is hacked, as happened here, you won’t have to worry if your password is revealed – it won’t be any good anymore.

The second thing to remember? If you aren’t actively using your webcam, keep its lense covered up.

For more best practices to follow, including those that will improve your business’ security, make sure you keep checking back to this blog – and if you want to take more action, reach out to us at PHONENUMBER.

Categories
Casserly Consulting Blog

Know Your Tech: Encryption Key

encryption_key_400.jpg

Security is a necessity. Every technology professional will tell you this, but in an age where employees are taking information on the go, it’s trickier than it’s ever been before. Encryption is one of the ways that businesses are attempting to shore up their security, but this also requires having an encryption key. This week’s technology term is all about encryption, as well as how encryption keys protect your business’ data.

Defining Encryption and Encryption Keys
Encryption is the act of scrambling your organization’s data so that it can’t be seen by prying eyes. Anyone who doesn’t have the encryption key will see nothing but a bunch of nonsense. Through the use of algorithms, these keys are guaranteed to be unique, meaning that there are no two patterns that are alike. Of course, depending on the type of encryption being used, there could be one or two keys needed to decrypt information.

Symmetric algorithm: Symmetric algorithms are often called secret key encryption. This uses one key to encrypt and decrypt data. Since this makes for an efficient encryption method, it can be used to encrypt large amounts of data. The bad side of this encryption is that it only uses one single encryption key, so you need to make sure that it remains in your possession at all times.

Asymmetric algorithm: Asymmetric algorithms are commonly used in public/private encryption, in which there are two keys involved. The public key–the one used to encrypt data–can be shared, whereas the other–the private key–is private, and used to decrypt the data later. Asymmetric is considered the more secure of the two options, since the private key that decrypts the data isn’t actually shared.

What Are These Keys Used For?
Encryption keys are used for a variety of objectives, but the ultimate goal is still the same: security of both the data and the encryption keys themselves. The strength of the encryption key depends on several variables, including the length of the symmetric keys and the algorithm used to create it. These keys usually have short shelf lives called a crypto-period, meaning that you should understand details about how the encryption key will be used before committing to it and expecting it to work for you indefinitely.

  • Data encryption keys: These keys prevent data from being read by anyone who isn’t authorized to view it. These keys are also held onto for a bit past their crypto-period.
  • Authentication keys: An authentication key is used to determine that the data encrypted has not been altered at all while it’s in transit. This is ideal for sending and receiving data so that authenticity is guaranteed.
  • Digital signature keys: Digital signature keys are similar to authentication keys, but they take it a step further by applying a digital signature to the user. This means that someone who digitally signs a document can’t actually deny that they’ve done so.
  • Root keys: The public key infrastructure is used for authentication and digital signatures, and the root key is the highest level of key in this infrastructure. Due to the importance of this key, it’s generally protected by a hardware security module.
  • Master keys: A master key can be used to encrypt multiple other keys. This means that they need to be extremely secure with a hardware security module, and they should last for a long time, if not forever.
  • Key encryption keys: These keys can transport other encryption keys. They should be long-lasting and unchanging.

Does your organization want to take full advantage of encryption? To get started, reach out to us at PHONENUMBER.

Categories
Casserly Consulting Blog

Monitoring and Automation Make for a More Secure System

network_security_automation_400.jpg

Information technology, in many ways, is a necessary evil. Sure, modern businesses more or less require it to remain competitive, but it also opens up your business to a multitude of threats. Maintaining your security is made much easier with automated monitoring tools. Today, we’ll discuss how to use these tools to protect your business.

The Situation at Hand
Let’s face it, there is a mammoth amount of cyberthreats out there that could potentially infiltrate your business during your daily goings-on. What’s worse, it only takes one to find a weak point in your security and cause you and your business no small amount of trouble – and as though that wasn’t enough, this mammoth amount of cyberthreats is always growing and adapting to be more effective.

Frankly, unless your entire staff is devoted to maintaining the business’ security, it is highly unlikely that your business can keep up with the threats to it.

Unless…
There are a few solutions to this quandary – the first of which being the monitoring services that a trusted MSP like COMPANYNAME can provide. With the assistance of top-of-the-line automated tools to help detect and identify threats to your security, our team can ensure that your business remains safe.

Why Automation Helps
One of the reasons that our automated tools are so effective is that the slim chance of human error on our end is effectively mitigated. Rather than having our eyes trying to detect the minute warning signs of impending issues or threats, we have systems and software that utilize artificial intelligence and machine learning to catch threats before they darken your door, so to speak.

As a result, you can devote less of your valuable time, energy, and focus on keeping threats out, and more time on innovating and optimizing other, income-generating parts of your business.

If you would like assistance in setting up an automated system or would like to discuss our monitoring solutions a little further, please give us a call at PHONENUMBER.

Categories
Casserly Consulting Blog

Three Give-Aways that Your Security Approach Needs a Change

security_three_steps_400.jpg

It only makes sense that you would want only the best security for your organization. It’s natural to want to eliminate risk entirely. However, this simply is not a realistic viewpoint to take where your security is concerned, and it can even contribute to greater security issues as a company holds out for the best solution.

This is no way to do business, but it can be hard to identify if you, yourself, are actually trying to bite off more than you can chew. To help, here are three signs that you are actually hurting your company and its security by trying too much and focusing on the wrong things.

1. Setting Standards Too High
Of course there needs to be organizational standards where security is concerned. However, it is important to recognize that ‘perfection’ simply isn’t going to be attainable. Many companies will be committed to their ideal vision of a solution to the point that, until that golden standard is found in reality, they won’t implement what is seen as an inferior option, leaving themselves completely vulnerable. What’s worse, some of these companies will actively find issues with an entirely workable solution, prolonging the process.

This can have the added ill effect of creating organizational paralysis among the workforce. Operational paralysis is simply the lack of movement toward change, improvement, and advancement in a business, due to an impression among the staff that any action will ultimately fail. This makes it particularly difficult to enact any change, whether it’s to your security or otherwise, as your staff will not be motivated to stick to it.

2. Waiting For The Perfect Storm
Many business owners have the tendency to find any reason to wait before starting a project of any kind, including a security initiative. They might want more data to support their proposed strategy, or want another project to be wrapped and put to bed, or want more money or time to commit to it. Any of these reasons may keep them from acting, or from even entertaining an idea.

The thing is, there will never be the perfect time to start a project, and something or other will always be there to get in the way and create friction. However, when it concerns something as important as security, you need to get something workable in place before the worst happens. After all, you can always continue to improve upon things.

3. Lack of Priorities
Again, it is only natural to want to be prepared for everything, but this too often translates into a company spreading themselves thin and not really being prepared for anything. Furthermore, there may just not be the resources available to reinforce a company against all threats at once. In cases like these, it is only too easy to overestimate the risk of some events. To counter this, there needs to be a frank and pragmatic look at your particular situation.

For example, a business located in a dry, arid area is far more likely to experience a fire than they are a flood. Therefore, it statistically makes more sense to prepare for a fire first, and wait until a little later to make the preparations for the flood. Weighing your security risks should follow the same process, which requires a resistance to the knee-jerk reaction to fix everything immediately.

While maintaining your IT security is obviously an important task, it is equally important to strategize your approach to this maintenance. COMPANYNAME can help you handle it. Call PHONENUMBER for more information today.

Categories
Casserly Consulting Blog

Encryption Helps Keep your Smartphone Secure

mobile_safe_encrypt_smart_phone_400.jpg

These days everyone has a smartphone; and, they can do some pretty incredible things. One place that the average smartphone may seem to be a little loose is in the arena of data security. Today’s smartphones do, in fact, come with encryption by default, so there is some semblance of device security on every device. What does this mean? We’ll break it down.

“Smartphone encryption” describes the state in which the data on the device is scrambled so that people that don’t have the proper security clearance, won’t be able to see the device’s contents. While this is extraordinarily helpful for device security and personal privacy, it has nothing to do with protecting actual data transmission.

Without entering the credentials or biometric data that allows for a device to open, many of the features a device has are not able to be accessed. In fact, most modern smartphones won’t actually connect to a Wi-Fi network without the proper credentials. This is handled differently on the different mobile platforms.

Apple
The iPhone ships with 256 AES encryption. It is not stored on the phone (which could result in more successful hacks), a correct passcode combines with data stored on the Secure Enclave chip to generate a key that unlocks the device. This chip also holds biometric data (fingerprint and facial recognition) that can be used to open the device or use Apple Pay. Any Apple product that is repeatedly unsuccessfully opened will lock, stopping unwanted parties from getting into your iPhone.

Android
Since so many more people use the Android mobile OS, Google did not make device encryption standard until devices that run their Android 6.0 Marshmallow mobile OS. If your new Android device runs 6.0 Marshmallow or better, it now ships with encryption enabled. Since Google’s implementation of encryption depends on the manufacturer, some phones will use a key generation system similar to the iPhone’s, while others will use a more complex system called file-based encryption. File-based encryption allows for varying levels of decryption and provides unauthorized users access to a limited number of the features on the device.

In the News
Over time, there has been a push for mobile OS developers to build in “backdoors” to ensure that law enforcement can get into a device if/when they need to. Companies like Apple, Microsoft, and Google have had to field their fare share of criticism, but strongly defend their position. Apple CEO Tim Cook states the following, “In the physical world, it would be the equivalent of a master key, capable of opening hundreds of millions of locks – from restaurants and banks to store and homes. No reasonable person would find that acceptable.”

Encryption is for your benefit. If you would like more information about modern digital cryptography or any other mobile security, visit our blog.

Categories
Casserly Consulting Blog

Preventing Identity Theft Should be a Priority, But Do You Know How to Handle It?

identity_theft_Security_400.jpg

The more people use technology, the more they have to deal with the negative aspects of doing so. One of the most prevalent problems users experience today is cybercrime that leads to identity theft. What can you do to prevent this from happening to you?

How You Can Work with Identity Thief
There are numerous ways that a potential identity thief can gain access to the information they want. Since businesses often collect a lot of data, would-be identity thieves have both more data to steal, and typically more access points in which to get into the network. Additionally, a lot of companies may say that they have hackers as a top-of-mind threat, but since a comprehensive cybersecurity strategy requires that everyone within an organization buy into it, there are usually some holes left open though a lack of employee diligence; or, worse yet, blatant employee indifference. Since throwing employee regulations out there won’t stop someone who is hell-bent on getting the information, knowing how to protect your business becomes critical.

One-way hackers can get sensitive information is though the trash. You’ve seen it in movies and on television: organizations go through the mail and recreate shredded documents to get sensitive information. That’s why doing what you can to create a paperless office can go a long way toward protecting against the dumpster-diving thieves of the world.

Your Responsibilities if You Allow Your Clients’ Identities to Be Stolen
No matter how diligent you are about your data protection, there can be a time where your network is breached, and your clients’ sensitive information could be stolen. To help your clients out, you’ll want to provide them with the following information:

  • Notified Banks or Creditors – If it was financial information that was stolen it is their responsibility to notify their financial institution and see what services they can offer to help rectify the situation. Most banks have been proactive in the quest to limit identity theft and can walk your clients through what they need to know to ensure that any personal information hackers make off with will be of little consequence. If you do this promptly they can report this breach and ensure that they will be protected. Unauthorized charges within two days of any complaint limits individual liability to a mere $50; a huge savings in some identity theft cases.
  • Credit Reports – Any client that has his/her data potentially stolen has to monitor their credit reports. Setting fraud alerts will help automate this process, although they should still constantly check for warning signs of fraud. If reports come back conclusive for identity theft, considering a credit freeze until everything returns to normal may be a good option.
  • Theft Reports – In the U.S. the Federal Trade Commission (FTC) only has the resources to follow up on larger-scale fraud cases, but they will monitor identity theft cases to identify suspicious patterns that suggest the involvement of organizational wire fraud. The FTC’s website has a form that will file a complaint. Once that is done, it may be best to secure a police report to dot all the i’s and cross all the t’s. This report needs to be sent to all creditors and credit reporting agencies to ensure that you aren’t on the hook for malicious or unauthorized access.
  • Lock It Down – Immediately updating passwords is a great way to lock down your accounts after a potential breach. Furthermore, not only should you report any false use of your Social Security Number, you should also ensure that no additional accounts have been opened in your name.

Identity theft is serious business. COMPANYNAME’s IT experts can do their best to keep unwanted entities out of your network. For more information about cyber security and data theft, call us today at PHONENUMBER.