Website for identity theft from the ABA Education Foundation
Identity theft is one of the fastest-growing types of financial fraud. Without stealing your wallet, a crook can steal your financial identity with as little information as your social security number. It is also called “account-takeover fraud” or “true-name fraud,” and it involves crooks’ assuming your identity by applying for credit, running up huge bills and stiffing creditors – all in your name.
Take these steps to protect yourself:
To order credit bureau reports, call:
TransUnion Credit Services 800-888-4213
Equifax Credit Services 800-685-1111
Experian Credit Services 888-397-3742
Visit AnnualCreditReport.com
Take action if you are a victim:
TransUnion Fraud Assistance Department 800-680-7289
Equifax Fraud Assistance Department 800-525-6285
Experian Fraud Assistance Department 888-397-3742
Don’t Get Lured into a Phishing Scam
from the ABA Education Foundation
Con artists now use email to try to hijack your personal financial information. In a scam known as “phishing,” swindlers claim to be from a reputable company and send out thousands of fake emails in hopes that consumers will respond with the bank account information, credit card numbers, passwords or other sensitive information.
These emails can look quite convincing, with company logos and banners copied from actual Web sites. Often, they will tell you that their security procedure has changed or that they need to update (or validate) your information, and then direct you to a look-alike Web site. If you respond, the thieves use your information to order goods and services or obtain credit.
Consumer Tips
To avoid becoming a victim of a phishing scam, the American Bankers Association offers these tips:
Never give out your personal financial information in response to an unsolicited phone call, fax or email, no matter how official it may seem.
Do not respond to email that may warn of dire consequences unless you validate your information immediately. Contact the company to confirm the email’s validity using a telephone number or Web address you know to be genuine.
Check your credit card and bank account statements regularly and look for unauthorized transactions, even small ones. Some thieves hope small transactions will go unnoticed. Report discrepancies immediately.
When submitting financial information to a Web site, look for the padlock or key icon at the bottom of your browser, and make sure the Internet address begins with “https.” This signals that your information is secure during transmission.
Report suspicious activity to the Internet Crime Complaint Center, a partnership between the FBI and the National White Collar Crime Center.
If you have responded to an email, contact your bank immediately so they can protect your account and your identity.
For more information on phishing, visit the Federal Deposit Insurance Corporation, FTC on Phishing, or the IRS.
Is somebody watching me?
Just when you thought you were Web savvy, one more privacy, security, and functionality issue crops up – spyware. Installed on your computer without your consent, spyware software monitors or controls your computer use. It may be used to send you pop-up ads, redirect your computer to websites, monitor your Internet surfing, or record your keystrokes, which, in turn, could lead to identity theft.
Many experienced Web users have learned how to recognize spyware, avoid it, and delete it. According to officials at the Federal Trade Commission (FTC), the nation’s consumer protection agency, all computer users should get wise to the signs that spyware has been installed on their machines, and then take the appropriate steps to delete it.
The clues that spyware is on a computer include:
The good news is that consumers can prevent spyware installation. Indeed, experts at the FTC and across the technology industry suggest that you:
Update your operating system and Web browser software. Your operating system (like Windows or Linux) may offer free software “patches” to close holes in the system that spyware could exploit.
Download free software only from sites you know and trust. It can be appealing to download free software like games, peer-to-peer file-sharing programs, customized toolbars, or other programs that may change or customize the functioning of your computer. Be aware, however, that some of these free software applications bundle other software, including spyware.
Don’t install any software without knowing exactly what it is. Take the time to read the end-user license agreement (EULA) before downloading any software. If the EULA is hard to find – or difficult to understand – think twice about installing the software.
Minimize “drive-by” downloads. Make sure your browser security setting is high enough to detect unauthorized downloads, for example, at least the “Medium” setting for Internet Explorer. Keep your browser updated.
Don’t click on any links within pop-up windows. If you do, you may install spyware on your computer. Instead, close pop-up windows by clicking on the “X” icon in the title bar.
Don’t click on links in spam that claim to offer anti-spyware software. Some software offered in spam actually installs spyware.
Install a personal firewall to stop uninvited users from accessing your computer. A firewall blocks unauthorized access to your computer and will alert you if spyware already on your computer is sending information out.
If you think your computer might have spyware on it, experts advise that you take three steps: Get an anti-spyware program from a vendor you know and trust. Set it to scan on a regular basis – at least once a week – and every time you start your computer, if possible. And, delete any software programs the anti-spyware program detects that you don’t want on your computer.
For more information about protecting your computer and your personal information online, visit www.ftc.gov/infosecurity
The FTC works for the consumer to prevent fraudulent, deceptive and unfair business practices in the marketplace and to provide information to help consumers spot, stop, and avoid them. To file a complaint or to get free information on consumer issues, visit www.ftc.gov or call toll-free, 1-877-FTC-HELP (1-877-382-4357); TTY: 1-866-653-4261. The FTC enters Internet, telemarketing, identity theft, and other fraud-related complaints into Consumer Sentinel, a secure, online database available to hundreds of civil and criminal law enforcement agencies in the U.S. and abroad.
Even if you’re not an AT&T customer, records of calls placed and text messages sent to you could now be at risk of falling into the hands of criminals, according to recent breach disclosure reporting.
While stolen call and text logs may not seem as damaging as the exposure of your PII (personally identifiable information), breaches of telecommunications data pose an increasing risk of targeted attacks and scams, thanks to increasing access to spoofing technology and other tools.
If threat actors know who you communicate with, they know who to pretend to be in order to increase their chances of tricking you – whether that’s a phishing email, a scam call or text, or even on social media.
Below are the top recommendations from IT Security expert Blaine Kahle, CTO of Five Nines, to apply across your personal and work communication behaviors.
Beneficial Ownership Information Reporting directly to FinCEN, becomes compulsory January 1, 2024
The Corporate Transparency Act (CTA) establishes uniform beneficial ownership information reporting requirements for most companies, corporations, limited liability companies (LLC), and other similar entities, created in or registered in the United States. The CTA authorizes FinCEN to collect that information and disclose it under certain conditions. The goal of the CTA is to prevent the hiding of illicit actors and activities behind company structures.
Beneficial Ownership Information Reporting FAQs
Beneficial Ownership Information Report Filing Dates
Beneficial Ownership Reporting – Key Questions
Introductory video to Beneficial Ownership Information Reporting Requirements
FinCEN Issues Initial Beneficial Ownership Information Reporting Guidance