Identity Theft Tips
  • Watch for shoulder-surfers. When entering a PIN number or a credit card number in an ATM machine, at a phone booth, or even on a computer at work, be aware of who is nearby and make sure nobody is peering over your shoulder to make a note of the keys you’re pressing.
  • Require photo ID verification. Rather than signing the backs of your credit cards, you can write “See Photo ID”. In many cases, store clerks don’t even look at the signature block on the credit card, and a thief could just as easily use your credit card to make online or telephone purchases which don’t require signature verification, but for those rare cases where they do actually verify the signature, you may get some added security by directing them to also make sure you match the picture on the photo ID.
  • Shred everything. One of the ways that would-be identity thieves acquire information is through dumpster diving, or trash-picking. If you are throwing out bills and credit card statements, old credit card or ATM receipts, medical statements or even junk-mail solicitations for credit cards and mortgages, you may be leaving too much information laying about. Buy a personal shredder and shred all papers with PII on them before disposing of them.
  • Destroy digital data. When you sell, trade, or otherwise dispose of a computer system, or a hard drive, or even a recordable CD, DVD, or backup tape, you need to take extra steps to ensure the data is completely, utterly, and irrevocably destroyed. Simply deleting the data or reformatting the hard drive is nowhere near enough. Anyone with a little tech skill can restore files or recover data from a formatted drive. Use a product like ShredXP to make sure that data on hard drives is completely destroyed. For CD, DVD, or tape media you should physically destroy it by breaking or shattering it before disposing of it. There are shredders designed specifically to shred CD / DVD media.
  • Be diligent about checking statements. This actually has two benefits. First, if you are diligent about checking your bank and credit statements each month, you will be aware if one of them doesn't arrive and that can alert you that perhaps someone stole it from your mailbox or while it was in transit. Second, you can ensure that the charges, purchases, or other entries on the statement are legitimate and match up with your records so that you can quickly identify and address any suspicious activity.
  • Pay your bills at the post office. Never leave your paid bills in your mailbox to be sent out. A thief who raids your mailbox would be able to acquire a slew of critical information in one envelope, including your name, address, credit account number, your bank information, including the routing number and account number from the bottom of the check, and a copy of your signature from your check for forgery purposes just for starters. Drop your bills at the post office or at least in an official U.S. Postal Service drop box to ensure that doesn't happen.
  • Limit the information on your checks. It may be convenient to have your drivers license number or social security number imprinted on your personal checks to save some time when you write one, but if it falls into the wrong hands it reveals too much information. In fact, some recommend that you only include your first initial in the name space of your check, such as “T. Bradley” rather than writing out “Tony Bradley” so that if someone did get one of your checks they would not know your full name.
  • Analyze your credit report annually. This has always been good advice, but it used to cost money, or you had to first be rejected from receiving credit so that you could get a free copy. Now it is possible to get a free look at your credit report once per year. The big three credit reporting agencies (Equifax, Experian, and TransUnion) joined forces to provide free credit reports to consumers. The website is currently available for the western and mid-western states, with the southern and eastern states being rolled out later this year. You should review it to make sure the information on it is accurate and also make sure that there aren't any accounts on there that you aren't aware of or any other suspicious entries or activity.
  • Protect your Social Security number. I don’t personally believe in Social Security or any attempts to repair or reform it. I have no illusions that it will actually be around to pay me when I retire. But, whether that comes to pass or not, the Social Security Number has become the one thing they had always promised it wouldn't, a sort of national identification number. It is often suggested that you do not carry your Social Security in your wallet with your drivers license and other identification. For one thing, although they expect it to last your whole life, the Social Security card is issued on very flimsy cardboard that doesn't hold up well to wear and tear. Aside from that though, knowing your full name, address, and full Social Security Number, or even the last four digits in many cases, can let a thief assume your identity. You should never use your Social Security Number as any part of a username or password that you establish and you should never divulge it to telephone solicitors or in response to spam or phishing scam emails either.
  • Caveat Emptor. Buyer beware, no offense to smaller businesses just building themselves up or getting established, but we recommend you not do business online with companies you don’t know anything about. You can feel relatively secure doing business online with or or any web site affiliated with well-known, national, or global merchants. But, if you are buying something online you need to have some level of trust that the company you are doing business with is legitimate and that they take the security of your personal information as seriously as you do. When you do make online purchases, read the companies online privacy policy first to ensure you agree with it and make sure you are on a secure or encrypted web site (symbolized by a small padlock at the bottom right of the screen in Internet Explorer).