Call Today

+1 440-322-ILER(4537)

}
Hours

Mon – Fri, 9am to 5pm

Tech Blog

your go-to resource for all things tech! Stay updated on the latest trends, industry insights, and expert tips to navigate the ever-evolving world of technology.

3 Ways You Are Unknowingly Rolling Out The Red Carpet For Identity Thieves

by | Jun 2, 2009

Warning! Even if you have anti-virus, spyware protection, and a firewall, you could still be an easy target for identity thieves, hackers and cyber criminals. Read on to find out how YOU are giving online criminals free access to your personal and financial information…

You’ve done all the right things. You’ve installed a good firewall, you keep your antivirus up to date, and you’re making sure you keep up with the latest security patches…so your computer network should be safe from identity thieves, right?

Wrong!

According to a recent study, 37% of electronic identity theft cases had one thing in common: they were caused by an action taken by the user. That’s right, more than a third of identity thefts were not thefts, but giveaways!

So how do you avoid this happening to you and your company?

No one is 100% safe, but the following 3 tips will stop you from accidentally giving online criminals access to your computer network and confidential information:

1. Never visit or download free music files, videos or programs from file-sharing sites such as Kazaa. Not only are you downloading stolen materials, but these sites are surefire ways to introduce worms and viruses to your computer. If you are a business owner, set up web filtering software to prevent employees from downloading any unauthorized programs or files.

2. Never respond to any e-mail from a bank, credit card company, PayPal or online store where items are purchased (such as eBay) asking you to verify your account information, no matter how credible or legitimate it looks. These are phishing scams set up to access your account information.

3. Ask for identification from anyone asking for physical access to electronic equipment, and instruct staff do so as well. Just to test a theory, I asked a friend to walk into an office, say they are from “the phone company” responding to a problem, and ask to see the network. Access was granted to a complete stranger 100% of the time.

Give Us A Call Or Visit Our Website To See How You Can Get A FREE Security Audit To Make Sure Your Company Is Protected!

Call:440-322-4537
Website: wwwiler.com/contacts 

3 Ways You Are Unknowingly Rolling Out The Red Carpet For Identity Thieves

Small Business Technology Trends 2026: What Actually Matters (And What You Can Ignore)

Small business technology trends 2026 don’t have to be confusing. Learn which tech trends will actually improve efficiency, security, and profitability—and which ones you can safely ignore.

3 Ways You Are Unknowingly Rolling Out The Red Carpet For Identity Thieves

Holiday Travel Cybersecurity for Business Owners: How to Protect Your Data on the Road

Holiday travel cybersecurity for business owners is critical when mixing work, family, and unfamiliar networks. Learn how to prevent data breaches while traveling this season.

3 Ways You Are Unknowingly Rolling Out The Red Carpet For Identity Thieves

Business Tech Gifts That Don’t End Up in a Drawer: Smart Picks Your Team Will Actually Use

Looking for business tech gifts your employees and clients will actually use? Discover practical, high-value tech gifts for remote workers, travelers, and teams—plus expert guidance on choosing the right tools for your business.

3 Ways You Are Unknowingly Rolling Out The Red Carpet For Identity Thieves

Holiday IT Best Practices for Small Businesses: Your Guide to Smooth, Stress-Free Tech During the Busy Season

Discover the top holiday IT best practices for small businesses to avoid tech headaches, protect productivity, and keep customers happy during the busiest time of year. Learn simple etiquette tips that prevent downtime, communication errors, and security risks.

The Hidden Dangers of Shared Logins on the Shop Floor

The Hidden Dangers of Shared Logins on the Shop Floor

They’re everywhere: shared logins like “Operator1” or “PressLine” or just plain “ShopFloor.” Nobody thinks twice. It’s faster. Easier. And in a busy plant, who wants to wait for individual logins or reset passwords all the time? But here’s the truth—shared logins...