<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=2119418688374700&amp;ev=PageView&amp;noscript=1">

Six Tips to Prevent Identity Theft

October 18th, 2016

2 min. read

By Jeff Miles, Strategic Risk Advisor

Identity-theft-credit-cards-lock-feature-image

by AJ Weisheipl

Identity theft is a scary subject. It seems like each day there is a news story about some new way people are trying to steal your information, or there is another story of somebody whose life was ruined by an identity thief. However there are things you can do to prevent yourself from becoming a news story, and it all starts with knowing some of the more common ways people can steal your information.

The first way thieves can steal your info is by use of a skimming device. A skimmer is something that a thief can attach to an ATM or a checkout card reader and it allows them to copy the data on the magnetic strip of your credit card. Then they copy the data onto a fake or spare card which they can then use like one would normally use a credit card. The new EMV chip cards that everyone has are supposed to prevent this because they create a new code for every transaction so if a hacker obtains the code from that transaction it can’t be used again, thus keeping your money safe.

Another way thieves can steal your information is via phishing. What is phishing you ask? Well it’s a lot like fishing, the thief is essentially casting thousands of rods hoping that something bites. When phishing the thief poses as a company or a Nigerian prince or various other things, and they ask for your personal information. An example:

Subject: YOU WON!!man standing veiled by binary codes in green and black

Body: Remember that contest you totally entered and we aren’t making up? No? Well me either! Just fill out the below information so we can get you your prize!

Social Security Number:_____________   Birthdate:_____________

Address:______________       Credit Card Information:_____________

Deed to your house:_________  Etc:______________

Okay, so maybe the e-mail won’t be that silly, but you get the idea (also if you get an email like that you shouldn’t even open it).

Not all ID thieves use technology to steal your information. Some people simply look over your shoulder as you input your pin into an ATM or credit card checkout, or other personal information. Always try to cover the keypad when entering sensitive information. Some thieves like to get down and dirty by digging through your garbage looking for sensitive documents/mail, such as a pre-approved credit card, which the thief might try to activate. In order to prevent this type of thing you should shred any sensitive documents, or use them as kindling in your fireplace.

These are just some of the ways that thieves can steal your information, it would take way too long to go over everything, but I will leave you with some general tips that should help you reduce your chances of becoming the victim of an identity thief.

  • Be on the lookout for bulky card readers (should be flush with the machine), and possible keypad covers on ATM’s. If it looks fishy, avoid it.
  • Frequently check your bank statements and credit reports
  • As mentioned above, avoid sketchy emails, but also avoid sketchy websites
  • As mentioned above, destroy documents with important information on them, including pre-approved credit cards
  • As mentioned above, cover any keypads when typing in your PIN
  • Use complex passwords to keep thieves guessing, change it once in a while just in case

Identity theft is a scary thing, but by implementing some of the measures above, as well as some common sense you should greatly reduce your chance of becoming your local news’ latest sob story.

Resources:

Buck, Kristen. "10 Ways Thieves Steal Your Id." Top Ten Reviews. Top Ten Reviews, 05 Aug. 2015. Web. 05 July 2016.

"Identity Theft." U.S. Department of Justice. N.p., n.d. Web. 5 July 2016.

"Identity Theft." U.S. Government's Official Web Portal. N.p., n.d. Web. 07 July 2016.

Woolsey, Ben, and Emily Starbuck Gerson. "Credit Card Skimming Information and Prevention." CreditCardscom News. Credicards.com, 06 Jan. 2011. Web. 05 July 2016.

 

Jeff Miles, Strategic Risk Advisor

Jeff Miles is a strategic risk advisor at McClone. He joined the company in December 2014 and is responsible for assisting individuals and businesses in protecting their financial futures. Through education and comprehensive planning, he works with clients to ensure their legacies and businesses continue as intended. Jeff came to McClone with over 20 years of experience in the financial services industry and specializes in life insurance and long-term care. He utilizes a variety of insurance products and strategies in developing and implementing financial risk management plans to protect his clients. Miles received his Bachelor of Business Administration from University of Wisconsin- Madison. Jeff and his wife currently reside in Appleton and are actively involved in the community and their church.

What is a Waiver of Subrogation for Work Comp? Are there Risks?

May 20th, 2025|4 min. read

Your Experience MOD Factor Explained

April 28th, 2025|5 min. read
Closed sign

Does your cyber insurance cover contingent business interruption?

October 25th, 2023|2 min. read

Making Workplace Safety Tech Work for You

June 14th, 2023|2 min. read

Data Breaches vs. Cyber Liability – Are you protected?

June 1st, 2022|2 min. read

5 Ways Companies Can Improve Mobile Device Security

April 20th, 2022|3 min. read
two men in hard hats training

10 Reasons Workplace Safety Training Is a Sound Investment

January 27th, 2021|2 min. read
data comparison points on graph

Metrics Help You Maintain, Improve Your Safety Program

January 20th, 2021|2 min. read
Hardening Market Insurance Premium Increase Chart

Insurance Insights: How a Hardening Market Impacts You

January 6th, 2021|2 min. read
man using smart watch and tablet

Making Workplace Safety Technology Work for You

August 5th, 2020|3 min. read

Learning from a Crisis: 5 Steps to Boost Business Success

June 24th, 2020|2 min. read
Construction site with crane and building-1

Most Common OSHA Violations in Construction (And How to Prevent Them)

June 3rd, 2020|3 min. read
work from home woman with laptop in kitchen

This is Not a Drill: Remote Work Reality Check & Tips for Success

March 27th, 2020|3 min. read

Marijuana in Workplace Part Two: Assessing Your Risk & Business Needs

February 26th, 2020|4 min. read
Circuit board with security lock

Cybersecurity is a Team Effort and Everyone Plays Defense

January 15th, 2020|4 min. read
crisis

Developing a Crisis Communication Plan for Construction

November 27th, 2019|4 min. read
signing the agreement

6 Important Construction Contract Terms You Shouldn’t Overlook

October 30th, 2019|5 min. read
Close up of businessman hand drawing sketches of buildings

Best Practices to Avoid Construction Cost Overruns

October 9th, 2019|3 min. read
Top 4 Technology Challenges in the Construction Industry

Top 4 Technology Challenges in the Construction Industry

September 25th, 2019|3 min. read
Solar panel on roof top

Green Building and its Impact on the Construction Industry

August 21st, 2019|3 min. read
Construction of a modern building and a skyscraper

Today’s Top 5 Construction Industry Risks

July 24th, 2019|3 min. read
iStock-512122746

What You Need to Know About OSHA Inspections

June 5th, 2019|3 min. read
business people group on meeting and presentation  in bright modern office with construction engineer architect and worker looking building model and blueprint  plans

Developing a Business Continuity Plan for Construction Companies

May 15th, 2019|4 min. read
Top View of Boot on the trail with the text Safety First2

Safety Program: Internal Audits and Self-Inspections

May 8th, 2019|3 min. read
Industrial worker working on machine in factory

What Manufacturers Need to Know About OSHA Rules in 2019

April 10th, 2019|3 min. read