Every dollar counts, now more than ever, as the government searches for ways to wisely spend our money. It’s dismaying to learn that an audit report from the Treasury Inspector General for Tax Administration (TIGTA) has found that the impact of identity theft on tax administration is significantly greater than the amount the IRS detects and prevents. Even worse, the “IRS uses little of the data from identity theft cases…to detect and prevent future tax refund fraud” according to Mike Godfrey, Tax-News.
The IRS is detecting far fewer fake tax returns than are actually falsely filed. 938,700 were detected in 2011. On the other hand, TIGTA identified 1.5M additional undetected tax returns in 2011 with potentially fraudulent tax refunds totaling in excess of $5.2B.
The study predicted that the IRS stands to lose $21B in revenue over the next 5 years with new fraud controls, or $26B without the new controls.
It’s time for young adults to head off to college or move away from home for the first time. This is by far the highest risk group for identity theft for several reasons. When these kids leave the nest, it’s the first time they are getting true financial independence, which they might never have been trained to handle. They have access to credit cards, new bank accounts, and they’re managing it themselves. That may be a huge red flag that there’s going to be trouble. Secondly, they’re going into an environment where their stuff is not particularly protected. They’re in a dorm room or apartment, they’ve got roommates that may need extra cash; they know they can take advantage of them. So it’s a high risk environment. The third reason is because they do so much online. There’s so much social media interaction and that’s where tons of information is stolen. Take the steps listed below and talk to your newly-independent kids about implementing them. It will help them out not just this year but will also help them build their financial future going forward. Your identity is pretty much everything in terms of your net worth. You’ve got to take care of it now.
You may think your deceased loved ones are safe from having their identities stolen. Not true! The Death Master File contains data about millions of deceased people including the full name, Social Security number and other personal information. Though you’d think this would be carefully guarded, the Social Security Administration provides the file to the Department of Commerce’s National Technical Information Service (NTIS). NTIS, in turn, distributes it to more than 450 entities including state and local governments, hospitals, universities, financial institutions, insurance companies and genealogy services. Even worse, anyone can access the information through the NTIS website. The cost? $10 for one person or an annual subscription with unlimited access to all of the files of deceased individuals costs $995.
Dropbox Has Been Hacked, And You Should Change Your Password Right Now
Dropbox has admitted that hackers have compromised some of its user accounts.
The company says that hackers got user names and passwords when they broke into other websites. They used them to sign into “a small number of Dropbox accounts.” Dropbox didn’t say how many accounts were affected. It has already contacted the users it knows were compromised.
In more bad news, a hacker also used a stolen password to break into a Dropbox employee’s account which contained a document with a list of Dropbox users’ email addresses. Lo and behold, those email addresses started getting spam. Users complained to Dropbox about it and that’s how the company discovered the security problem. Full Story.
A hacking group known as D33Ds Company leaked about 453,000 hacked email addresses and passwords of Yahoo Voices users in order to send a “wake up call” about poor data security practices at Yahoo. The information posted online was NOT restricted to YahooMail login credentials, but included Gmail, Hotmail, Aol and Yahoo user information. In the past few weeks, there have been similar breaches at LinkedIn, eHarmony, Formspring, Nvidia, and AndroidForum. Whazzzup?
Corporations are clearly ignoring warnings that are now commonplace from privacy and security experts: protect your customer data or lose stock value, subscribers and ultimately, your brand reputation.
The average business will NOT take responsibility for preventing a similar breach of their data until AFTER THEY GET HIT. Which is why 95% of companies will hit the snooze button on the wake-up call.
Fraud Expert John Sileo discusses why your child is 51X more likely to become a victim of ID Theft on Fox Business.
Why are our kids, the very people we most want to protect, so vulnerable to identity theft? Because they have unused, unblemished credit profiles. According to Carnegie Mellon University’s CyLab, 10.2% of the children in a recent report had someone else using their Social Security numbers. That figure is 51 times higher than the rate for adults of the same population.
Thieves steal a child’s identity early on, nurture it until they have a solid credit score, and then abuse and discard it. If it’s not discovered in time, fraudulent use of your child’s identity could mean the loss of educational and job opportunities and starting off adulthood at a serious disadvantage with someone else’s bad credit in her name.
SCAM ALERT! There is a Target texting scam going around. The text looks similar to the one in the picture to the left, and generally says you’ve won a $1,000 gift card if you simply click on the link and collect the money. When you click on the link, it takes you to a Target-looking site that a criminal has set up to collect your private information. The information is then used to steal your identity. In other cases, clicking on the link installs a small piece of malware that takes control of your phone and forwards your private information to the criminals.
Where do the criminals get my mobile phone number to text me in the first place?
They purchase it off of black-market sites on the internet
You give your mobile number away to enter contests, vote on reality shows, etc.
On this episode of Privacy Project, John confronts a coffee drinker about leaving their laptop totally alone as they talked outside on the phone at Starbucks.
America’s top Privacy & Identity Theft Speaker John Sileo has appeared on 60 Minutes, Anderson Cooper, Fox & in front of audiences including the Department of Defense, Pfizer, Homeland Security and hundreds of corporations and associations of all sizes. His high-content, humorous, audience-interactive style delivers all of the expertise with lots of entertainment. Come ready to laugh and learn about this mission-critical, bottom-line enhancing topic.
John Sileo is an award-winning author and keynote speaker on the dark art of deception (identity theft, fraud training, data privacy, social media manipulation) and its polar opposite, the powerful use of trust, to achieve success. He is CEO of The Sileo Group, which advises teams on how to multiply performance by building a culture of deep trust.
On the surface, social networking is like a worldwide cocktail party—full of new friends, fascinating places and tasty apps. Resisting the urge to drink from the endless fountain of information is nearly impossible because everyone else is doing it—connecting is often advantageous for professional reasons, it’s trendy and, unchecked, it can be dangerous.
Beneath the surface of the social networking cocktail party lives a painful data-exposure hangover for the average business. Sites like Facebook and Twitter are now the preferred tool for malware delivery, phishing, and “friends-in-distress” scams while more business oriented sites, like LinkedIn, allow for easy corporate espionage and the manipulation of your employees.
To avoid the cocktail party altogether is both impractical and naïve—the benefits of social networking outweigh the dangers—but applying discretion and wisdom to your social strategy makes for smart business. Follow these 7 Security Secrets of Social Networking to begin locking down your sensitive data.
Get monthly strategies and tips for protecting yourself and your business delivered right to your Inbox. Signup now and you'll immediately receive John's 7 Survival Strategies for Starving Data Spies!