Kevin Bost
- Privacy: Refers to how your information is used and controlled. It is often related to security but just because something is not private does not mean it is not secure.
- Security: Refers to how refers to your information is protected. It is important to keep sensitive information secure.
- Information that should be private
- Financial information (Credit card number, account numbers, bank names, financial status)
- Personal information (Social security number, family member names, driver’s license number, birth place)
- Insurance information
- Subscriptions, services, utilities
Review steps on https://www.identitytheft.gov/Steps
- Contact the companies where the fraud occurred. Ask for a fraud department and explain that someone stole your identity.
- Ask to have accounts closed, or frozen.
- Change all access information (passwords, pin numbers, etc)
- Put a fraud alert with the credit bureaus
- Experian
- https://www.experian.com/help
- 1-888-EXPERIAN (888-397-3742)
- TransUnion
- https://www.transunion.com/credit-help
- 1-888-909-8872
- Equifax
- https://www.equifax.com/personal/credit-report-services
- 1-800-685-1111
- Experian
- Monitor your credit report (you can do it weekly)
- https://www.annualcreditreport.com
- 1-877-322-8228
- Report the theft to the FTC
- https://www.identitytheft.gov/assistant
- 1-877-438-4338
- If you choose to not create an account, you will need to print your Identity Theft Report
- Optionally: File with local police department
- The person who initiated the call must prove who they are to the person that they called.
- Do not trust caller ID as proof of identity
- Politely ask to call them back and return the call to a number that you verify, not one they provide
- Government agencies will rarely call or text
- Banks/Financial institution will never call you and ask for personal information. When you call them, they may ask you to provide them information.
- Microsoft and Apple will never proactively reach out to you to provide unsolicited technical support
- Never provide private information to any recipient you cannot verify
- Never forward information to any recipient you cannot verify
- Never allow anyone you do not trust to access your devices.
- Be very wary of anyone trying to get you to install AnyDesk, TeamViewer, RemotePC, Zoho Assist
- Never call a number you see in a popup message
- Look for https, and the lock symbol in the website address. Verify the connection is trustworthy.
- Identify the domain of the URL.
- Be skeptical of attachments, images, and links; when in doubt either confirm with the sender, or delete it.
- Instead of clicking on links, access the site directly through saved bookmarks to validate information.
- For legitimate businesses, use the unsubscribe link if you no longer wish to hear from them.
- Mark emails as spam. Be extra cautious about things that were already flagged as spam.
- Identify the domain of the sender.
- Always install updates as soon as possible
- Anti-virus
- Windows Defender - built into Windows
- Norton/McAfee – Fine but overpriced and often slow down your system
- Comparisons between anti-virus options. https://www.av-comparatives.org/latest-tests/
- BitDefender (recommended option) https://www.bitdefender.com/solutions/free.html (Windows, Android, macOS)
- Malware Bytes https://www.malwarebytes.com/mwb-download
- Wi-fi
- Avoid using any wireless networks that do not require a password
- When using a network with a password, consider who else might be using that same network.
- Turn on two-factor (2FA) wherever possible. Two factor means to login you will need something you know (typically a password), and something you have (typically an authenticator app or phone number that can receive texts)
- Set a pin number or password on your mobile device. Consider using biometrics (fingerprint or face identification) as a simpler way to login.
- Use a password manager with a secure password
- Bitwarden (recommended free option): https://bitwarden.com/products/personal/
- Password1 (recommended paid option): https://1password.com/pricing
- Check for stollen passwords with https://haveibeenpwned.com/
- Remove un-used software
- Remove un-needed browser extensions
- Chrome: https://support.google.com/chrome_webstore/answer/2664769
- Firefox: https://support.mozilla.org/kb/disable-or-remove-add-ons
- Microsoft Edge: https://support.microsoft.com/microsoft-edge/add-turn-off-or-remove-extensions-in-microsoft-edge-9c0ec68c-2fbc-2f2c-9ff0-bdc76f46b026
- Safari: https://support.apple.com/102343
- Be skeptical of any communication that you did not initiate
- Do not give out sensitive information to anyone without confirming who they are
- Practice good password hygiene
- Keep your devices secured
- Do not use the same password for multiple things
- Do not use common password (abc123, Admin, password, etc)
- Longer is better than more complex; consider using a sentence or phrase.
- Consider using a password manager
- Use Single Sign-On when possible
- Avoid recovery question that can be easily guessed or discovered
- Check your password at https://haveibeenpwned.com/Passwords to make sure it has not been compromised.