วันศุกร์ที่ 7 มีนาคม พ.ศ. 2551

How to Protect Yourself from Identity Theft

Author : Rafael Velez
Do you use email? Online bill payment? Look at your brokerage account online? Utilize a wireless network at home, work or while traveling? In an effort to protect your personal and financial information, consider the following items.Get Up-to-Date Anti-Virus Software: Up-to-date anti-virus software protects your computer against current virus threats. Most commercially available virus protection programs offer automatic weekly and emergency downloads of the latest updates. Scan all your files for viruses at least once per month. For the best protection, however, set up your anti-virus software to scan every file you open.Get Up-to-Date Anti-Spyware Software: Spyware runs on your computer and can gather private information such as passwords and credit card numbers, deliver unwanted advertising, and monitor your browsing patterns. Spyware is typically hidden in an otherwise harmless program, often in freeware or shareware you download. Before downloading any free software, make sure you know and trust the provider. Some Internet Service Providers ("ISP's") offer assistance in finding and removing spyware. The maker of your anti-virus software may also offer anti-spyware protection. Make sure you are protected against this growing threat.Use a Personal Firewall: Firewalls serve as protective barriers between your computer and the Internet, preventing unauthorized access to your computer when you're online. Be sure to set up a firewall around your computer. Some ISP's offer firewall software to their customers and you can buy firewall software or hardware at your local computer store.Install Security Updates Regularly: Most major software companies regularly release updates or patches to their operating systems to repair security problems. Some websites, such as Microsoft and Apple, offer the ability to scan your computer for missing updates. Check your computer for missing updates at least monthly. For the best protection, set up your computer to receive updates automatically whenever possible.Protect Your Wireless Home Network: The default configuration of most wireless home networks is not secure. Contact your wireless software vendor for specific information about enabling encryption and strengthening the overall security of your wireless home network.Exercise Caution with Wireless Hotspots: Taking a few simple precautions when using wireless hotspots can help protect your computer. Wireless technologies are continuously changing. Consult the manufacturer of your network hardware to ensure you have the most up-to-date security technology…then, install a firewall on all network computers, disable wireless connectivity when not in use, use reputable encryption software and disable the wireless ad hoc mode. This will allow only wireless networks that you created to use your wireless software. If you are unsure of the security of a wireless hotspot, don't use it for conducting confidential business, such as accessing your work e-mail or financial information.Protect Your Passwords: Make your passwords as obscure or abstract as possible. Avoid obvious numbers and words, such as a maiden name, birth date, or an anniversary, which would be easy to guess. Never divulge your passwords to anyone, including family or friends. Protect Yourself from Phishing Scams: "Phishing" is the mass e-mailing of messages that falsely claim to come from a legitimate business. These messages often provide links to phony web sites, where you are asked to supply personal information such as passwords, credit card, social security number or bank account numbers. Never enter personal information unless you are sure the website is legitimate. You should also be certain the site is encrypted. Look for the letter "s" at the end of "https" at the beginning of the URL address. This ensures that the site is running in secure mode.How to Recognize Phishing E-Mail: Phishing messages have evolved drastically over the last year, and they are often difficult to recognize. The creators now incorporate realistic company logos and graphics, provide links to the real company's privacy policies, and even include "legal disclaimer language" at the bottom. To help determine if an e-mail is part of a phishing scam, ask yourself the following:Do I have a relationship with this company?Would I expect this company to contact me this way?Would I expect this company to use this tone or make this request?(If you are at all unsure, contact the company by phone.)Don't Open Unexpected E-Mail: Be cautious of e-mail and attachments — even if they look like they're from a friend — unless you are expecting them or know what they contain.Don't E-Mail Personal or Financial Data: Most e-mail is not secure or encrypted and should not be trusted to send personal or financial information. Protect Your Personal Information: A few simple steps make a tremendous difference. For example, shred sensitive documents instead of simply throwing them away. Also, be absolutely sure you know who you're dealing with before giving any personal or financial information. OnGuard Online, a site created by the U.S. Federal Trade Commission (FTC), offers additional information on preventing identity theft.Avoid Using Your Social Security Number: Ask companies and government agencies you do business with if you can create an alternate customer identifier.Monitor Your Financial Statements: Promptly read any account or credit card statements or correspondence when they arrive. Make sure there are no changes or transactions you did not initiate. If a bill arrives unusually late or not all, call the company. Also, be sure to monitor your credit for inaccuracies. As of September 1, 2005, all US residents are entitled to receive one free credit report every 12 months from each of the three nationwide consumer credit reporting agencies: Equifax, Experian and TransUnion. You can request your report at AnnualCreditReport.com. Identity theft warning signs include:Seeing unauthorized charges or withdrawals, not receiving renewed credit cards, bills, or other mail, receiving credit cards for which you did not apply, notices for changes you did not initiate and denials of credit for no apparent reason. Although it could be a simple error, never assume a mistake has been made that will automatically be corrected. Follow up with the business or institution. If you suspect that your personal information has been used wrongfully, immediately:Review your credit reportsPlace a fraud alert on your accountsClose any accounts opened or used fraudulentlyFile a report with the police File a complaint with the Federal Trade CommissionCopyright 2006 Rafael VelezRafael O. Velez III is the Managing Director and Registered Principal of Summit Financial Advisors, LLC, based in San Mateo, California. Additional resources and ideas are offered on their Web site, http://www.summit-advisors.com. Please e-mail comments about this article to rafael@summit-advisors.com.
Keyword : credit, identity, theft, phish, security, data, scam, wireless, hotspot,

ไม่มีความคิดเห็น: