{"id":4634,"date":"2013-03-27T21:20:00","date_gmt":"2013-03-27T21:20:00","guid":{"rendered":"https:\/\/evssolutions.com\/the-range-of-identity-theft\/"},"modified":"2013-03-27T21:20:00","modified_gmt":"2013-03-27T21:20:00","slug":"the-range-of-identity-theft","status":"publish","type":"post","link":"https:\/\/evssolutions.com\/insights\/the-range-of-identity-theft\/","title":{"rendered":"The Range of Identity Theft"},"content":{"rendered":"

Consumers and businesses have digital footprints just as
\ndeep (if not deeper) as any other trail they leave behind. Companies and
\ncustomers alike have some sort of online presence whether its a fully
\nfunctioning business website or a simple Facebook account. Online properties
\ncome in all shapes and forms and depending on which ones you invest in, will
\ndictate how much of your information is at risk. A hacker getting ahold of your
\nFacebook password is bit different than a hacker gaining access to payment
\ninformation or a social security number. Businesses need to be mindful about
\ntheir digital assets and the information that is tied to each. This also applies to consumers. People that
\nshare their information on sites that do not implement identity
\nverification<\/a> and\/or authentication could be putting their personal
\ninformation at risk. In a recent case, a woman in Kansas was a victim of total
\nidentity theft. This type of identity theft is far beyond a fraudulent
\ncharge on a credit card or a spammy email.
\nThe identity thief used the information to get a job, drivers license,
\nmortgage, and medical care for her children. Perhaps the most shocking piece of
\ninformation is that it got that far before someone caught the fraud.
<\/p>\n

<\/p>\n

Online
\nfraud<\/a> can range from an inconvenience to an all out life-ruining event. In
\nsome states,
smaller
\nonline fraud<\/a> such as a Facebook account hacking is not considered illegal.
\nMany may see this type of activity as small problem that does not require any
\ntype of fraud prevention or attention. But, its these small fraudulent
\nactivities that can lead to a full-blown identity theft case. If companies and enforcement start turning
\ntheir cheeks to these small hackings, it will enforce the idea that stealing
\nsomeones identity in certain circumstances is acceptable. If companies and
\nconsumers dont take online identity theft (of all sizes) seriously, it will
\nonly open the door for more and easier total identity losses. Someone having
\naccess to any of your online identify is fraud big or small, company or
\npersonal.
Fraud
\nprevention measures<\/a> must be implemented to help prevent instances such as
\nthis. If your company or the companies you conduct business with does not have
\na fraud prevention solution, they could be putting personal information at
\nrisk. As cyber security is finally getting federal attention, having a strong
\nfraud prevention plan in place will become increasingly important. Be sure to
\nknow your options and risk, start the conversation for safer online use today.
<\/p>\n


<\/p>\n

[Contributed by EVS Marketing]
<\/p>\n


<\/p>\n

<\/p>\n","protected":false},"excerpt":{"rendered":"

Consumers and businesses have digital footprints just as deep (if not deeper) as any other trail they leave behind. Companies and customers alike have some sort of online presence whether its a fully functioning business website or a simple Facebook<\/p>\n","protected":false},"author":40,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[39,36],"tags":[],"acf":[],"_links":{"self":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/posts\/4634"}],"collection":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/comments?post=4634"}],"version-history":[{"count":0,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/posts\/4634\/revisions"}],"wp:attachment":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/media?parent=4634"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/categories?post=4634"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/tags?post=4634"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}