Offizielle Vorlage

Identity theft protection

A
von @Admin
Sicherheit & Notfallvorsorge

How do I protect myself from identity theft and what do I do if it happens?

Projekt-Plan

14 Aufgaben
1.

{{whyLabel}}: This is the single most effective way to prevent identity thieves from opening new accounts in your name.

{{howLabel}}:

  • Contact the three major credit bureaus (Equifax, Experian, and TransUnion) online.
  • Request a 'Security Freeze' for your profile.
  • Save the PINs or passwords provided in a secure location; you will need them to 'thaw' your credit later.

{{doneWhenLabel}}: You have received confirmation from all three bureaus that your credit is frozen.

2.

{{whyLabel}}: Reusing passwords is a primary cause of identity theft; a manager allows for unique, complex keys for every site.

{{howLabel}}:

  • Download a reputable open-source password manager like Bitwarden or KeePassXC.
  • Create one strong 'Master Password' that you do not use anywhere else.
  • Migrate your most important accounts (Email, Banking) to the manager first.

{{doneWhenLabel}}: The software is installed and your primary email account password is saved within it.

3.

{{whyLabel}}: MFA adds a second layer of security, making a stolen password useless on its own.

{{howLabel}}:

  • Go to security settings for your Email, Bank, and Mobile Provider.
  • Select 'Authenticator App' (TOTP) rather than SMS/Text messages, as SMS can be intercepted via SIM swapping.
  • Scan the QR codes using an app like Aegis (Android) or Raivo (iOS).

{{doneWhenLabel}}: Your email and primary bank account require a code from your app to log in.

4.

{{whyLabel}}: This prevents 'SIM Swapping,' where a thief transfers your phone number to their device to bypass SMS security codes.

{{howLabel}}:

  • Call your mobile service provider's customer service or log into your account portal.
  • Request to add a 'Port-Out PIN' or 'Transfer PIN'.
  • Ensure this PIN is different from your account password and stored in your password manager.

{{doneWhenLabel}}: Your mobile carrier confirms that no number transfers can occur without the specific PIN.

5.

{{whyLabel}}: Physical mail is a goldmine for identity thieves looking for pre-approved credit offers and account numbers.

{{howLabel}}:

  • Select a 'Cross-Cut' or 'Micro-Cut' shredder; avoid 'Strip-Cut' as they can be easily reconstructed.
  • Place it near where you sort your mail to ensure immediate destruction of sensitive documents.
  • Shred all documents containing names, addresses, or account details before recycling.

{{doneWhenLabel}}: A shredder is set up and all pending sensitive mail is destroyed.

6.

{{whyLabel}}: Reducing the amount of sensitive mail you receive lowers the risk of mail theft.

{{howLabel}}:

  • Visit the official industry website for credit offer opt-outs (e.g., OptOutPrescreen in the US).
  • Choose the 'Permanent Opt-Out' option to stop receiving firm offers of credit or insurance.
  • You may need to mail a signed form for the permanent version.

{{doneWhenLabel}}: You have completed the online opt-out process.

7.

{{whyLabel}}: Early detection allows you to stop a thief before they drain your accounts.

{{howLabel}}:

  • Log into your online banking and credit card portals.
  • Navigate to 'Alerts' or 'Notifications'.
  • Set alerts for: 'Transaction over $0.01', 'International Transaction', and 'Profile Change'.

{{doneWhenLabel}}: You receive a test notification or email for a small purchase.

8.

{{whyLabel}}: These services scan data breaches to see if your email or passwords have been leaked.

{{howLabel}}:

  • Use a reputable free tool like 'Have I Been Pwned' to check your current status.
  • Enable the notification feature to be alerted of future breaches.
  • Many password managers also include this feature natively; ensure it is toggled 'On'.

{{doneWhenLabel}}: You have checked your primary email and signed up for breach alerts.

9.

{{whyLabel}}: Thieves may use your identity to gain employment or claim benefits, which will show up on your earnings record.

{{howLabel}}:

  • Create or log into your account on your national social security website (e.g., 'my Social Security' in the US).
  • Review the 'Earnings Record' for any years or amounts that look unfamiliar.
  • Check for any active claims you did not initiate.

{{doneWhenLabel}}: You have verified that your reported earnings match your actual work history.

10.

{{whyLabel}}: In a crisis, you need all your documentation in one place to prove your case to banks and police.

{{howLabel}}:

  • Prepare a physical or encrypted digital folder.
  • Include copies of your ID, a list of all bank/credit accounts with customer service numbers, and contact info for credit bureaus.
  • Print out a blank 'Identity Theft Affidavit' (e.g., from IdentityTheft.gov) to have ready.

{{doneWhenLabel}}: The folder is organized and accessible in an emergency.

11.

{{whyLabel}}: Speed is critical to limit financial liability and damage to your reputation.

{{howLabel}}:

  • Step 1: Call the company where the fraud occurred and close the account.
  • Step 2: Place a 'Fraud Alert' on your credit reports (this is different from a freeze).
  • Step 3: Report the theft to your national authority (e.g., FTC in the US) to get an official recovery plan.
  • Step 4: File a local police report to provide a legal paper trail.

{{doneWhenLabel}}: You have read and understood these steps and kept a summary in your recovery folder.

12.

{{whyLabel}}: Even with a freeze, errors can occur or existing accounts can be compromised.

{{howLabel}}:

  • Set a recurring calendar invite for every 4 months.
  • Use 'AnnualCreditReport.com' (or your local equivalent) to get one free report from a different bureau each time.
  • Look for: Accounts you don't recognize, inquiries you didn't make, or incorrect addresses.

{{doneWhenLabel}}: A recurring calendar event is set and the first report has been reviewed.

13.

{{whyLabel}}: Thieves use 'oversharing' (birthdays, pet names, high schools) to guess security questions or craft phishing attacks.

{{howLabel}}:

  • Set all profiles to 'Private' or 'Friends Only'.
  • Remove your birth year, phone number, and home address from public view.
  • Delete 'Friends' or 'Followers' you do not know personally.

{{doneWhenLabel}}: Your profiles are restricted and sensitive personal data is hidden from the public.

14.

{{whyLabel}}: Outdated software often has security holes that allow malware to steal your credentials.

{{howLabel}}:

  • Enable 'Automatic Updates' on your smartphone, computer, and router.
  • Check for updates on your browser and its extensions.
  • Restart your devices at least once a week to ensure patches are applied.

{{doneWhenLabel}}: All primary devices are running the latest available security versions.

0
0

Diskussion

Melde dich an, um an der Diskussion teilzunehmen.

Lade Kommentare...