ID Theft Risks That Lurk in Your Child’s Backpack

Girl walking away from School Bus while texting on her phoneWhile you’re out searching for the perfect back-to-school backpack for your child, the more important consideration other than style, size, and color should be — what can happen if a dishonest person gets a hold of it? The things your child carries in his or her backpack can become a huge financial headache if they fall into the wrong hands.

With identity-related crimes at historic levels, the odds are better than ever that a dishonest person will know the basics of taking advantage of the kinds of personally identifiable information, sensitive data (like passwords and credit card numbers), and the many other keys to your household economy that can lurk in your child’s backpack.

Here’s a short list of what a relatively creative thief might find in your child’s backpack, and what you can do to prevent the worst from happening.

1. A Smartphone

While obvious to you (hopefully), does your child understand the serious potential for disaster that a walk-about smartphone can bring to your doorstep?

It can be as simple as a scammer dialing 611 and ordering new services. Chances are good that there’s enough information in your child’s backpack for a motivated thief to get your name and thus the keys to your telephonic kingdom.

But there are other identity indignities that can be done. Many people store user name and password information on the Notes app of their phones. The Notes may contain other informational cracks and crevices as well and open up unsuspecting third parties — relatives and friends — to scams. Email scams, grandparent scams, an iTunes or apps shopping spree, malware installation — so many tidbits to exploit.

What to do: Talk to your kids about the dangers of an unsecured phone and discuss basic data storage details with them — like what information shouldn’t be on their phones. Is the phone locked with a passcode? It should be! Also have them set strong (think creatively alpha-numeric) passwords, and a Find Me app to erase the contents should the device fall into the wrong hands.

2. Their Laptop

You don’t need to be a movie buff to know that a computer is a dangerous thing in the wrong hands. Most issues associated with a lost phone come to bear here as well. Emails can be sent to relatives or strangers in the service of stealing money or wreaking havoc.

Beyond the irresistible cornucopia of files that may well be saved on the device, email is a treasure trove of personally identifiable information — everything from credit card numbers to more data like name, address, email addresses and birthdays — pieces of a puzzle that can be assembled to present a believable story to a customer service representative and then steal valuable goods and services, or used as a fly trap to accumulate even more personally identifiable information.

Does your child have access to your Netflix account? How about Amazon or iTunes? Where else have they gone in cyberspace that might have their information — or yours? Open social media sites that are set to login automatically afford a wide vista of scamming opportunities too.

What to do: Make sure your child gets into the habit of logging out of all their online accounts, and that they don’t store sensitive information on their laptops. Talk to them about the wisdom of not saving user ID and password information, and how to make a good one. Finally, have your child set a password — shared with you — to protect their device against the wrong person accessing it.

3. Keys and Name Tags

So, this is pretty straightforward: If your child uses a karabiner to attach his or her keys to their backpack, you’ve got a potential robbery waiting to happen.

Additionally, there are apps that can allow a fraudster (as well as a person who might want to use the app to avoid unnecessary inconvenience) to make a copy of a key that a locksmith can duplicate.

What to do: Tell your child to keep the keys to your home in their pocket rather than on their back.

4. Gaming Device

Playstation Vita is a popular gaming device — and not the only device that could cause you a world of woe should it fall into the wrong hands — but we’ll single it out for the sake of illustration.

The good news: Your personally identifiable information is safe even if someone grabs the device, because it’s password-protected and associated with your gamer’s access to the network.

That doesn’t mean that a bad player can’t do some damage. First, they can play games and wreck your child’s sterling reputation in the community. Worse: Whoever has that device can buy games and run up a hefty bill. One-click purchased games are something any malicious third party can rack up in the way of a very expensive just-because crime.

What to do: Have your child set a passcode for access to the device and make sure they share it with you.

When it comes to data security, best practices are universal. It’s your job to pass on what your kids need to know to stay safe and keep your family out of the crosshairs of ID theft.

To cover all your financial bases, enroll in one of our First Financial’s ID Theft Protection product plans – with our Fully Managed Identity Recovery services, you don’t need to worry. A professional Recovery Advocate will do the work on your behalf, based on a plan that you approve. Should you experience an Identity Theft incident, your Recovery Advocate will stick with you all along the way – and will be there for you until your good name is restored.

Our ID Theft Protection options may include some of the following services, based on the package you choose to enroll in: Lost Document Replacement, Credit Bureau Monitoring, Score Tracker, and Three-Generation Family Benefit.* To learn more about our ID Theft Protection products, click here and find out how you can enroll today – as well as get started with your first 90 days free!**

*Identity Theft insurance underwritten by subsidiaries or affiliates of Chartis Inc. The description herein is a summary and intended for informational purposes only and does not include all terms, conditions and exclusions of the policies described. Please refer to the actual policies for terms, conditions, and exclusions of coverage. Coverage may not be available in all jurisdictions.

**Available for new enrollments only. After the free trial of 90 days, the member must contact the Credit Union to opt-out of ID Theft Protection or the monthly fee of $4.95 will automatically be deducted out of the base savings account or $8.95 will be deducted out of the First Protection Checking account (depending upon the coverage option selected), on a monthly basis or until the member opts out of the program.

Article Source: Adam Levin for Credit.com, http://www.today.com/parents/identity-theft-risks-lurk-your-kids-backpack-1D80042370

What’s New? EMV Chip Card Technology FAQs

emv_chip_2The days of the credit card’s magnetic stripe appear numbered, with special-chip, or EMV, credit cards poised to immigrate onto America’s payments landscape. EMV-enabled cards, named for developers Europay, MasterCard and Visa, have an embedded microprocessor chip that encrypts transaction data differently for each purchase. Some chip cards require a personal identification number to complete a transaction, while others only require a signature. EMV is widely used in Europe and Asia and is steadily being adopted as the standard type of credit card worldwide. Everywhere, that is, except the U.S. – but maybe not for long.

What is EMV?
EMV chip technology is becoming the global standard for credit card and debit card payments. Named after its original developers (Europay, MasterCard® and Visa®), this smart chip technology features payment instruments (cards, mobile phones, etc.) with embedded microprocessor chips that store and protect cardholder data. This standard has many names worldwide and may also be referred to as: “chip and PIN” or “chip and signature.”

What is chip technology?
Chip technology is an evolution in our payment system that will help increase security, reduce identity theft and fraud and enable the use of future value-added applications. Chip cards are standard bank cards that are embedded with a micro computer chip. Some may require a PIN instead of a signature to complete the transaction process.

How does EMV chip technology work?
The EMV-enabled device will communicate with the chip inside the smart card to determine whether or not the card is authentic. Generally, the terminal will prompt the cardholder to sign or enter a PIN to validate their identity. This process enhances the authentication of both the card and cardholder, effectively reducing the possibility that a business will accept a counterfeit card or be held liable for a fraud-related chargeback.

What makes EMV different than the traditional magnetic stripe card payment?Simply put, EMV (also referred to as chip-and-PIN, chip-and-signature, chip-and-choice, or generally as chip technology) is the most recent advancement in a global initiative to combat fraud and protect sensitive payment data in the card-present environment. A cardholder’s confidential data is more secure on a chip-enabled payment card than on a magnetic stripe (magstripe) card, as the former supports dynamic authentication, while the latter does not (the data is static). Consequently, data from a traditional magstripe card can be copied (skimmed) with a simple and inexpensive card reading device – enabling criminals to reproduce counterfeit cards for use in both the retail and the CNP environment. Chip (EMV) technology is effective in combating counterfeit fraud with its dynamic authentication capabilities (dynamic values existing within the chip itself that, when verified by the point-of-sale device, ensure the authenticity of the card).

What other incentives are there to accept chip cards?
In addition to the reduction of fraud and related chargebacks, there are other cost savings associated with EMV acceptance. The payment brands are doing their part to ensure that chip-bearing customers can pay at chip-enabled businesses. For example, Visa and MasterCard have issued upcoming rules and guidelines for processors and merchants to support EMV chip technology. Another Visa and MasterCard ruling is the liability shift. Once this goes into effect, merchants who have not made the investment in chip-enabled technology may be held financially liable for card-present fraud that could have been prevented with the use of a chip-enabled POS system.

Is this technology unique to the United States?
No. The chip technology standard for payment was first used in France in 1992. Today, there are more than 1 billion chip cards used around the world. The U.S. is one of the few industrialized nations that have not fully transitioned to this technology standard.

Why invest in chip card acceptance now?
Preventing the growth of fraudulent activity is one of the main reasons the industry is moving toward EMV technology. Chip cards make it difficult for fraud organizations to target cardholders and businesses alike. As a result, more and more chip cards are being introduced by U.S. financial institutions in order to support and switch over to this technology.

To cover all your financial bases, enroll in one of our First Financial’s ID Theft Protection product plans – with our Fully Managed Identity Recovery services, you don’t need to worry. A professional Recovery Advocate will do the work on your behalf, based on a plan that you approve. Should you experience an Identity Theft incident, your Recovery Advocate will stick with you all along the way – and will be there for you until your good name is restored.

Our ID Theft Protection options may include some of the following services, based on the package you choose to enroll in: Lost Document Replacement, Credit Bureau Monitoring, Score Tracker, and Three-Generation Family Benefit.* To learn more about our ID Theft Protection products, click here and find out how you can enroll today – as well as get started with your first 90 days free!**

*Identity Theft insurance underwritten by subsidiaries or affiliates of Chartis Inc. The description herein is a summary and intended for informational purposes only and does not include all terms, conditions and exclusions of the policies described. Please refer to the actual policies for terms, conditions, and exclusions of coverage. Coverage may not be available in all jurisdictions.

**Available for new enrollments only. After the free trial of 90 days, the member must contact the Credit Union to opt-out of ID Theft Protection or the monthly fee of $4.95 will automatically be deducted out of the base savings account or $8.95 will be deducted out of the First Protection Checking account (depending upon the coverage option selected), on a monthly basis or until the member opts out of the program.

*Click here view the original article sources by Chase Paymentech and Bankrate.

3 Ways Consumers Can Fall Victim to Identity Theft

Identity-Theft-CreditThere’s really only one way to protect yourself from identity theft. Stop spending money and trust no one. It’s pretty easy.

OK, it isn’t easy. Talk to enough victims of identity theft, and you start to realize that it really can happen to anyone – and sometimes, no matter how careful you are, it can happen to you. That’s why it helps to study how people’s identities were stolen and learn from it. Here a few ways identity theft happens along with strategies to prevent it.

1. Information is out there for anyone to see. Of course you don’t want to leave credit card statements lying around in public places, and when you discard your financial paperwork, it’s smart to run it through a shredder. But sometimes when you’re out in the world, your information can’t help but become a little exposed. You type a PIN number onto a pad and realize someone might have been looking over your shoulder. You hand your credit card to a waiter, who disappears for a while with it. Or you’re in a crowded store, practically rubbing elbows with an identity thief.

Sarah Dugo, co-founder of College Savings Dolls, got an unwanted education on identity theft a few years ago. She was at a crowded Best Buy and bought a big-screen TV for the Super Bowl.

“The cashier took my credit card and delivery information, but they left it all on the computer screen and walked away from the check-out area. I was at one of the checkouts in the smaller section of the store, not the main front exit,” Dugo says.

It turns out that the thief used Dugo’s credit card information to order the same big-screen TV – and had it sent to his address. “That’s how they caught him,” Dugo says. Still, the crook did enough damage to her credit report and credit score that it took two years for her to straighten it all out.

She was in one of those situations where the employee ringing her up was interrupted by a customer before finishing her transaction. Dugo isn’t positive, but she thinks that’s how someone was able to see her information and either jot everything down or snap a photo of the computer screen.

Dugo isn’t sure what she could have done differently, but she figures that if she is ever shopping on another crowded weekend, she may make her purchase at the main entrance, where department sales clerks aren’t likely to be pulled away from the register.

2. You put your wallet or handbag in a vulnerable position. “Several years ago, I was shopping at a Safeway near my house. I was in the shampoo aisle and a well-dressed man asked me to help him find a product his wife asked him to get,” says Caren Kagan Evans, CEO of ECI Communications. While Evans pointed to the top shelf to show him where the product was, another man took Evans’ wallet out of her handbag, which was in the top part of her cart.

“I didn’t realize my wallet had been stolen until I went to check out,” Evans says. “I ran home, contacted the credit agencies, contacted my bank and of course contacted my credit card companies.”

Unfortunately, her Social Security number was printed on her health insurance card, so the thief now had that information as well.

“This was a large group of people that were doing this kind of thing up and down the East Coast,” she says. “In a matter of just an hour, the team had used my cards at gas stations, Target, and other locations. They also were able to get checks printed since they had my social, and thousands of dollars disappeared from my checking account.”

Evans says she was lucky because she got her money back and was able to fix everything relatively quickly. “I have heard stories of people who had their identities stolen where the perpetrator took out mortgages on properties, and stories of people who literally spent years getting everything straightened out,” she says.

As for where Evans went wrong, she says it is easy to look at the situation now and realize her handbag was vulnerable. It was in the top part of the cart, and she was never planning on leaving it out of her sight. So you could take away from this story that you should never trust a stranger, even one who simply wants some help finding shampoo – or, better yet, remember to keep your eye on your purse or wallet since somebody else otherwise will.

Evans also says she no longer signs her credit card receipts, reasoning that a thief can study the receipt and later fake her signature. Sales clerks don’t push her to sign for merchandise, she says – they’ll just ask to see her identification. “And when they do, I thank them,” Evans says. “I appreciate it.”

burglar-for-identity-theft-small3. You trusted someone a little too much. Everyone knows the importance of vetting people who work for you, and yet you can never say it enough.

Arthur Gregory is a serial entrepreneur. He’s a partner in two restaurants and owns EatUsa.net. Back in 2003, the printer who made his menus overheard Gregory tell a colleague that he was looking for a bookkeeper.

“I do that,” the printer said. And Gregory, who liked how his menus were made, figured he’d give him the job.

As it turns out, the man was trustworthy when it came to menus, but not when it came to bookkeeping. “He stole my identity,” Gregory says.

And he didn’t just go out to a department store and buy things in Gregory’s name. He took out corporate credit cards in Gregory’s name and tried to take over his business, contacting vendors in Gregory’s name and doing a ton of damage. Gregory is still working on getting misinformation off of his credit report. Now he keeps all of his personal information in a lock box, so not even his current bookkeeper can see it.

Gregory, unfortunately, is also a case study in why it’s impossible to prevent identity theft. Even if you were willing to live out the rest of your life on a deserted island or in a cave to wall yourself off from problems, you could still discover you’re already a victim of identity theft.

As you can see, identity theft is an immense problem throughout the world and creeping its way up to becoming more and more frequent. As previously stated, there is no way to completely prevent identity theft, but there are certainly ways to minimize your risk and protect your finances. Enrolling in First Financial’s Identity Theft Protection products – with our Fully Managed Identity Recovery services, you don’t need to worry. A professional Recovery Advocate will do the work on your behalf, based on a plan that you approve. Should you experience an Identity Theft incident, your Recovery Advocate will stick with you all along the way – and will be there for you until your good name is restored and you can try it FREE for 90 days!*

Our ID Theft Protection options may include some of the following services, based on the package you choose to enroll in: Lost Document Replacement, Credit Bureau Monitoring, Score Tracker, and Three-Generation Family Benefit. To learn more about our ID Theft Protection products, click here and enroll today!**

*Available for new enrollments only. After the free trial of 90 days, the member must contact the Credit Union to opt-out of ID Theft Protection or the monthly fee of $4.95 will automatically be deducted out of the base savings account or $8.95 will be deducted out of the First Protection Checking account (depending upon the coverage option selected), on a monthly basis or until the member opts out of the program. **Identity Theft insurance underwritten by subsidiaries or affiliates of Chartis Inc. The description herein is a summary and intended for informational purposes only and does not include all terms, conditions and exclusions of the policies described. Please refer to the actual policies for terms, conditions, and exclusions of coverage. Coverage may not be available in all jurisdictions.

Article source courtesy of Geoff Williams of US News.

Summer Vacation Scams: Possible Hazards of Hoteling

Customers paying at the hotelBooking a hotel stay for a summer vacation? Before you check in, check out how scammers can try to take advantage of travelers.  Always be aware and on the lookout for possible scams!

The late night call from the front desk.

You think you’re getting a late night call from the front desk telling you there’s a problem with your credit card and they need to verify the number, so you read it to them over the phone. But it’s really a scammer on the line. If a hotel really had an issue with your card, they would ask you to come to the front desk.

The pizza delivery deal.

In another scam, you find a pizza delivery flyer slipped under your hotel door. You call to order, and they take your credit card number over the phone. But the flyer is a fake, and a scammer now has your info. Before you order, make sure you check out the business (ensure it’s a franchise or reputable), or get food recommendations from the front desk. 

The fake Wi-Fi network.

You search for Wi-Fi networks and find one with the hotel’s name. But it turns out it’s only a sound-alike and has nothing to do with the hotel. By using it, you could give a scammer access to your information. Check with the hotel to make sure you’re using the authorized network before you connect. Read more tips on using public Wi-Fi networks.

Other things to be cautious of when staying at or booking a hotel stay:

  • Always lock your car, and don’t leave anything valuable in your vehicle and/or visible.
  • Try to park your car as close to the front office of the hotel as possible.
  • Don’t leave anything valuable in your room unless there is a secure way to do it (like an in-room safe).
  • Check your credit card statement after your stay to make sure it’s accurate.
  • Be weary of hotel booking websites – there have been instances of advertisements claiming that for booking a hotel room you can receive a complimentary gift card from a known retailer. When clicked on, the scammers will oftentimes ask for a credit card number and more personal info.

Haven’t booked your trip yet? If you’re thinking of getting a vacation rental, take a moment to read up about rental listing scams. And check out these other travel tips, including tell-tale signs that a travel offer or prize might be a scam.

Don’t wait until it’s too late! Check out First Financial’s ID Theft Protection products – with our Fully Managed Identity Recovery services, you don’t need to worry. A professional Recovery Advocate will do the work on your behalf, based on a plan that you approve. Should you experience an Identity Theft incident, your Recovery Advocate will stick with you all along the way – and will be there for you until your good name is restored.

Our ID Theft Protection options may include some of the following services, based on the package you choose to enroll in: Lost Document Replacement, Credit Bureau Monitoring, Score Tracker, and Three-Generation Family Benefit.* To learn more about our ID Theft Protection products, click here and find out how you can enroll today – as well as get started with your first 90 days free!**

*Identity Theft insurance underwritten by subsidiaries or affiliates of Chartis Inc. The description herein is a summary and intended for informational purposes only and does not include all terms, conditions and exclusions of the policies described. Please refer to the actual policies for terms, conditions, and exclusions of coverage. Coverage may not be available in all jurisdictions.

**Available for new enrollments only. After the free trial of 90 days, the member must contact the Credit Union to opt-out of ID Theft Protection or the monthly fee of $4.95 will automatically be deducted out of the base savings account or $8.95 will be deducted out of the First Protection Checking account (depending upon the coverage option selected), on a monthly basis or until the member opts out of the program.

Article Source: Amy Herbert – Consumer Education Specialist for the FTC, http://www.consumer.ftc.gov/blog/hazards-hoteling.

Turn the Lights Out on Fake Utility Bill Collectors

Phone scamThe caller sounds convincing: If you don’t pay your utility bills immediately, your gas, electricity or water will be shut off, and then they ask you to pay using a specific and unusual method.

Be warned: The call probably is a scam.

The Federal Trade Commission, state and local consumer protection agencies, and utility companies have gotten a slew of complaints from consumers about utility bill scams.

 

Here are a few signs you may be dealing with a scammer:

  • You get a call or an email claiming your services will be cut off unless you call a number or click on a link and give your account information. Most utility companies don’t ask you to send your account information by email.
  • Someone calls demanding you wire the money or use a prepaid or reloadable debit or gift card to pay your bill. Legitimate companies don’t demand you use those methods to pay.  
  • The caller tells you to call a phone number and give your credit, debit, or prepaid card number. If you do that, the scammer can access the money from your credit, debit, or prepaid card, and you can’t trace where your money went. Once it’s gone, it’s gone.

If you get a call from someone threatening to shut off your utility service:

  • Make sure you’re dealing with your utility company before you pay any amount. Call the company using a number you’ve looked up. Or go to their website to determine the status of your account. Confirm where and how to pay your bill. Don’t give out your account information on the phone unless you place or expect the call.
  • Never wire money to someone you don’t know, regardless of the situation. Once you wire money, you cannot get it back.
  • Do not click links or call numbers that appear in unexpected emails or texts, especially those asking for your account information. If you click on a link, your computer could become infected with malware, including viruses that can steal your information and ruin your computer.
  • If you are falling behind on your utility bill, contact the utility company and see if they can work with you to come up with a payment plan and a way to keep your service on

If you think a fake utility bill collector or any other scammer has contacted you, file a complaint with the FTC and your state consumer protection agency.

Don’t wait until it’s too late! Check out First Financial’s ID Theft Protection products – with our Fully Managed Identity Recovery services, you don’t need to worry. A professional Recovery Advocate will do the work on your behalf, based on a plan that you approve. Should you experience an Identity Theft incident, your Recovery Advocate will stick with you all along the way – and will be there for you until your good name is restored.

Our ID Theft Protection options may include some of the following services, based on the package you choose to enroll in: Lost Document Replacement, Credit Bureau Monitoring, Score Tracker, and Three-Generation Family Benefit.* To learn more about our ID Theft Protection products, click here and find out how you can enroll today – as well as get started with your first 90 days free!**

*Identity Theft insurance underwritten by subsidiaries or affiliates of Chartis Inc. The description herein is a summary and intended for informational purposes only and does not include all terms, conditions and exclusions of the policies described. Please refer to the actual policies for terms, conditions, and exclusions of coverage. Coverage may not be available in all jurisdictions.

**Available for new enrollments only. After the free trial of 90 days, the member must contact the Credit Union to opt-out of ID Theft Protection or the monthly fee of $4.95 will automatically be deducted out of the base savings account or $8.95 will be deducted out of the First Protection Checking account (depending upon the coverage option selected), on a monthly basis or until the member opts out of the program.

Article Source: Lisa Lake – Consumer Education Specialist for the FTC, http://www.consumer.ftc.gov/blog/lights-out-fake-utility-bill-collectors

eBay Asks 145 Million Users to Change Passwords After Data Breach

alert-resized-600Online commerce giant, eBay, recently asked users to change their passwords after hackers stole encrypted passwords and other personal information, including names, e-mail addresses, physical addresses, phone numbers and dates of birth.

The data breach occurred between late February and early March 2014, according to a press statement posted on the company’s website.

The company stated that Cyberattackers compromised a small number of employee log-in credentials, allowing unauthorized access to eBay’s corporate network. The company is currently working with law enforcement and security experts to investigate the breach and has not noticed any fraudulent activity related to the incident. eBay discovered the breach in early May, meaning it went unnoticed for about a month. The company spent a few weeks investigating the incident before disclosing it to the public.

Here’s what you need to know:

  • The company is asking all of its 145 million active users to change their passwords as a “precautionary measure,” but is not sure how many accounts were compromised in the breach.
  • No financial information, including credit card numbers, were stolen.
  • Paypal information was also safe because it was encrypted and stored on a different network.
  • Users that use their eBay password elsewhere should immediately go change that password on other sites – especially their e-mail.

It is important that users heed eBay’s request to change their passwords because the hackers may eventually be able to break the encryption that secures them.

Don’t wait until it’s too late! Check out First Financial’s ID Theft Protection products – with our Fully Managed Identity Recovery services, you don’t need to worry. A professional Recovery Advocate will do the work on your behalf, based on a plan that you approve. Should you experience an Identity Theft incident, your Recovery Advocate will stick with you all along the way – and will be there for you until your good name is restored and you can try it FREE for 90 days!*

Our ID Theft Protection options may include some of the following services, based on the package you choose to enroll in: Lost Document Replacement, Credit Bureau Monitoring, Score Tracker, and Three-Generation Family Benefit. To learn more about our ID Theft Protection products, click here and enroll today!**

*Available for new enrollments only. After the free trial of 90 days, the member must contact the Credit Union to opt-out of ID Theft Protection or the monthly fee of $4.95 will automatically be deducted out of the base savings account or $8.95 will be deducted out of the First Protection Checking account (depending upon the coverage option selected), on a monthly basis or until the member opts out of the program. **Identity Theft insurance underwritten by subsidiaries or affiliates of Chartis Inc. The description herein is a summary and intended for informational purposes only and does not include all terms, conditions and exclusions of the policies described. Please refer to the actual policies for terms, conditions, and exclusions of coverage. Coverage may not be available in all jurisdictions.

Article source courtesy of Andrea Peterson of the Washington Post.