Call Today

+1 440-322-ILER(4537)

}
Hours

Mon – Fri, 9am to 5pm

Tech Blog

your go-to resource for all things tech! Stay updated on the latest trends, industry insights, and expert tips to navigate the ever-evolving world of technology.

Identity Theft Tips

by | Aug 28, 2020

3 Ways You Are “Giving” Your Information to Identity Thieves

WARNING! Even with anti-spyware, anti-virus, and a firewall installed on your computer and network, you could still be a target for identity thieves, hackers, and cyber criminals.

You have done everything right! You have installed a good firewall, you keep your anti-virus up to date, and you are making sure to keep up with the latest security patches.  You feel confident that your computer network should be safe from identity thieves, right?

WRONG!

According to studies done recently, 40% of electronic identity theft cases had one similarity: The identity theft was caused by an action taken by the user. That is right, more than a third of thefts were not thefts, but giveaways!

So how can you avoid this from happening to you or your company?

No one is 100% safe. Try following these three tips and they will stop you from accidentally giving online criminals access to your computer network and confidential information:

  1. Never download free music files, videos, or programs from file-sharing sites such as Kazaa. These sites are giving stolen materials, and they are a surefire way to introduce worms and viruses to your computer. If you are a business owner, set up web filtering software to prevent employees from downloading any unauthorized programs or files.
  2. Never respond to any email from a bank, credit card company, PayPal, or online store where items are purchased (such as eBay) asking you to verify your account information, no matter how credible or legitimate it looks. These types of scams are called phishing scams set up to gain access to your online account information.
  3. Ask for personal identification from any person asking for physical access to your electronic equipment and instruct your staff to do so as well. Just to test a theory, I asked a friend to walk into an office, say they are from “the phone company” responding to a problem, and ask to see the network. Access was granted to a stranger 100% of the time.

Give us a call or visit the rest of our web site to see how you can get a Free security audit to make sure your company is protected.

Call: 440-322-4537

Visit: www.iler.com/contacts

Data Privacy Day: Safeguarding Your Business From Costly Data Breaches

January 28 is Data Privacy Day—a crucial reminder of the importance of keeping sensitive information secure. For small and midsized business (SMB) owners like you, data privacy isn’t just a buzzword. It’s a vital part of protecting your clients, your reputation, and...

New Year, New Tech: Top IT Upgrades To Supercharge Your Business In 2025

January isn’t just about resolutions—it’s the perfect time to assess your business’s technology. In 2025, staying competitive means embracing IT solutions that increase efficiency, improve security, and prepare your business for an AI-driven digital world. Outdated or...

Is Your Social Security Number Leaked? Here’s How To Find Out And What To Do Next

By now, most Social Security numbers (SSNs) — one of the most critical pieces of personal information in the U.S. — have found their way onto the dark web. Massive breaches at major companies, government sites, and even healthcare providers have exposed millions of...

Maximizing Workplace Productivity with a Year-End Tech Refresh

As the year draws to a close, it’s a great time to reflect on how your business has grown and evaluate how your technology is supporting—or hindering—your team’s productivity. In today’s fast-paced, tech-driven environment, keeping your technology updated and...

2025 Cybersecurity Predictions: What Every Small and Medium-Sized Business Needs to Know

Cybersecurity threats are evolving faster than ever. What once seemed like science fiction—AI-driven cyberattacks and quantum computing—are now tangible risks. For small and medium-sized businesses, this isn’t just an IT issue; it’s a business-critical challenge....