{"id":4803,"date":"2014-10-16T15:00:36","date_gmt":"2014-10-16T15:00:36","guid":{"rendered":"https:\/\/evssolutions.com\/the-basics-of-preventing-identity-theft\/"},"modified":"2014-10-16T15:00:36","modified_gmt":"2014-10-16T15:00:36","slug":"the-basics-of-preventing-identity-theft","status":"publish","type":"post","link":"https:\/\/evssolutions.com\/insights\/the-basics-of-preventing-identity-theft\/","title":{"rendered":"The Basics of Preventing Identity Theft"},"content":{"rendered":"

As a fraud prevention partner, we feel it’s important for you to know just how identities are stolen. If you have an idea of how criminals do it before it ever happens you can implement the best fraud prevention solutions to ensure your system and data isn’t compromised. It won’t do you any good if you don’t know until after the matter. We are going to explore how fraudsters steal identities and conduct acts of fraud against businesses. There are several easy ways used to steal identities. It can be done over a fraudulent Wi-Fi network, social media impersonation, fraud forums and more. <\/span><\/p>\n

“If you know the enemy and know yourself you need not fear the results of a hundred battles.”-Sun Tzu<\/em><\/p>\n

A fraudster can create a fraudulent open WiFi network at a public location, name it the same or similar as the location’s WiFi network and get to work. If you accidently get on their network instead of the official WiFi network they can use malware to access your machine and start compromising all of your online accounts and personal information. In this instance, make sure you are always connected to the official location WiFi network.<\/p>\n

A less detectable tactic is to use social media to learn more about victims. Fraudsters commonly befriend people on social networks and target them and friends depending on how much information is shared on their profiles. A fraudster can create a profile similar to yours and reach out to your connections manipulating them into giving more info. There are a lot of different ways to use social media for identity theft. Be careful what you share about yourself and your business to ensure the safety of your company.  <\/p>\n

And, of course, there are the black market communities on the web where fraudsters trade stolen card information and bank account details. These communities stay alive and refreshed through data coming from breaches of online retailers and payment processors. Unfortunately there is no simple way of stopping this underground community. Customer emails, usernames, passwords, and billing and delivery addresses are of immense value to fraudsters. This is why we need to keep this information safe. At the very least, your fraud prevention solution<\/a> needs to make life difficult for the fraudsters. We always recommend changing passwords on a regular basis, especially if an account has been compromised. You can never be too safe when it comes to online activity and protection.<\/p>\n

Verifying Card Not Present situations is crucial to maintaining secure transactions. Identity verification and authentication can assist with flagging and preventing fraudulent activity. When it comes to your business and customer’s data, fraud prevention should be of utmost importance.   <\/p>\n

[Contributed by EVS Marketing]<\/p>\n","protected":false},"excerpt":{"rendered":"

As a fraud prevention partner, we feel it\u2019s important for you to know just how identities are stolen. If you have an idea of how criminals do it before it ever happens you can implement the best fraud prevention solutions to ensure your system and data isn\u2019t compromised. It won\u2019t do you any good if you don\u2019t know until after the matter. We are going to explore how fraudsters steal identities and conduct acts of fraud against businesses. There are several easy ways used to steal identities…<\/p>\n","protected":false},"author":40,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[34],"tags":[],"class_list":["post-4803","post","type-post","status-publish","format-standard","hentry","category-fraud-prevention"],"acf":[],"_links":{"self":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/posts\/4803","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/comments?post=4803"}],"version-history":[{"count":0,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/posts\/4803\/revisions"}],"wp:attachment":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/media?parent=4803"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/categories?post=4803"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/tags?post=4803"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}