You may not be able to stop all identity theft methods, but you can take common-sense steps to protect your information and limit the likelihood of damage.
Find below 15 preventative actions that you should take.
Check Your Accounts Regularly – Frequently review all credit and debit card accounts for unknown purchases that could indicate fraudulent use. Generally, account information should be updated daily and be available for review online.
Consider a Monitoring/Prevention Service – If you’re too busy to monitor your own accounts, companies such as Moneytips, Experian, Equifax stc. can monitor your credit report for suspicious behavior and make it difficult for thieves to open false accounts in your name.
Use Strong Passwords – Find passwords that have meaning to you but are difficult to hack. Consider the trick of incorporating characters at regular intervals, such as “P@A#S$S%W@O#R$D%”. See your keyboard for the pattern (and don’t use “password” as the text).
Protect Your Passwords – Don’t save your passwords on your computer or let your computer remember passwords – that’s the equivalent of hiding your door keys under the “Welcome” mat.
Avoid Password Duplication – Use unique passwords for each account. It may be easier to remember one password instead of twenty, but why give thieves access to multiple accounts?
Keep Devices Protected – Make sure that your computer, smartphone, and other devices that are connected to the Internet have the latest protections. Update protection software regularly and check the news for any new threats that require immediate updates. Use file encryption whenever possible to protect individual files in case your system is breached.
Use Secure Wi-Fi – Unsecured wireless Internet connections can thwart all of your other protections. Use them at your own risk.
Use Multi-Factor Authentication – Take advantage of multi-factor authentication when it’s available. Typically, this involves a secondary temporary security code that is sent via e-mail or text message. The code must be entered before a transaction is completed.
Dispute Errors – Immediately address any mistakes or false charges on credit cards or debit cards, no matter how small. They could be the first sign of a breach.
Cancel Compromised Accounts – Cancel any compromised debit or credit accounts and replace them with new cards as soon as possible – but make sure banks and credit card issuers are aware of the situation to avoid missed payments and penalties during the transition. When cancelling a card, don’t forget to reassign recurring charges that you’ve allocated to it.
Set Up Alerts – Many cards have fraud protections and alerts to notify you of questionable charges, odd purchasing patterns, or unusually large purchases. Take advantage of any program that is offered, and consider switching to a different card if your current one does not offer protections.
Shred Old Documents – Some identity theft is still old-school rummaging through your trash and discarded mail. Shred any documents, even junk mail, that contains information useful to thieves – and consider a locking mailbox to avoid mail theft.
Review Medical Statements – Medical claims are confusing and take a long time to process – making them ripe targets for identity thieves. A fraudulent medical claim in your name could reach collections before you even know it exists. Look for Explanations of Benefits (EOBs) for unfamiliar groups or procedures.
Stick with Trusted Sites – Stay with familiar websites and be suspicious of any external links. Look for “https” in your browser window, as the “s” indicates a secure site – but even this system is not foolproof.
Stay Familiar with Scams – Phishing e-mails and fake websites are becoming more elaborate and difficult to discern. Note any new scams that are reported, and trust your instincts if you find a new e-mail or text message that looks suspicious.
While these steps don’t guarantee success against identity theft, you increase the odds by making yourself a relatively difficult target. Most identity thieves will move on to greener pastures – and, based on recent breaches, there are plenty of greener pastures for thieves to explore.
A firm of Solicitors have relocated their business to larger premises. They have a quantity of old no-longer needed documentation stored in boxes, cupboards and filing cabinets. They require this old documentation to be shredded and certified for the protection of their clients, their business reputation and GPDR compliance.
Ideal for this application, we provided Security Sacks with zip ties. The light weight portable sacks have a capacity of up to 15kgs and are great when used for emptying filing cabinets and drawers.
At a time and date arranged by our client, we arrived collected and shredded the confidential waste.
On collection a uniquely numbered Waste Transfer Note was issued detailing such information as:
date of collection
material type collected
Post destruction a Certificate of Destruction was issued demonstrating completion of the audit trail and satisfying GDPR compliance. All the shredded paper was then baled and recycled becoming new paper in a matter of days.
If you are moving, or you just need to make space in your archive call us on 01704 512380.
You may think that by using iData Destruction secure shredding services you are protecting your clients, employees and business reputation from malicious threats – and you’d be right.
Well there is another benefit, you may be unaware of.
iData Destruction is not only an accredited shredding business but a committed recycler of paper.
Post destruction 100% of your paper is recycled becoming new paper products within days.
We collect, shred, certify and recycle 25,000 kgs of paper every single week.
What are the statistics..
Each week, and on your behalf, iData Destruction recycles paper saving the environment:
650 cu. m. of Water
57.5 cu. m. of Landfill Space
8000 Ltrs of Oil
102,500 Kwh of Electricity
Show your employees and customers you take recycling seriously
All our clients have the free of charge option to receive a statement detailing the annual sum of their recycling activities. By displaying it, you can demonstrate your organisations commitment to waste minimisation and environmental responsibility.
iData Destruction again achieves the ISO 9001:2015 certification from the British Assessment Bureau.
iData Destruction based in Southport Merseyside has again achieved the ISO9001 9001 certification to the internationally recognised standard, establishing it as one of the leaders in the Security Shredding Sector.
This achievement reflects all the Operational and Support Teams hard work, dedication and attention to detail.
George Eland, Managing Director
This independent assessment was conducted by the British Assessment Bureau, a leading Certification Body, and demonstrates ’s commitment to has now earned the right to display the coveted British Assessment Bureau quality shield and logo to demonstrate its conformance to the standard.
ISO 9001 was first introduced in 1987 and requires organisations to demonstrate that they do what they say they do, and that they have a Quality Management System in place to ensure consistency and improvement; leading to high levels of performance and customer satisfaction. Certified organisations are committed to continuous improvement and are assessed to ensure progress is being maintained.
An existing Client, a Recruitment Consultancy, has opened a new branch in Aintree.
As part of daily activities, confidential waste paper is produced in regular quantities.
By using our Regular Shredding Service, locked consoles are placed within the office for all the staff to use. Ops, Accounts and Management can all use the same container as once unwanted confidential papers are posted through the slot on the console, no else can view the document.
On a scheduled 4 weekly we arrive, shred and provide a Certificate of Destruction assisting in GDPR compliance.
Post destruction all the shredded paper is recycled, becoming new paper products in a matter of days.
Client commencing annual archive purge requires confidential documents stored in archive boxes and filing cabinets to be destroyed.
Using iData Destructions One-Time Shredding Service our client is issued with security sacks for the loose confidential material. They emptied filing cabinets and filled security sacks (12-15kg capacity) and arrange a convenient collection time were both archive boxes and security sacks are collected simultaneously.
On arrival at the client, the operative collects the confidential material and details the date and amount collected leaving a signed copy with the client.
Administration and certification are forwarded in electronic and hard copy to a single point. A dedicated Account Manager deals with all aspects from collection request, invoicing, certification and mass recording.