opinion

Trying to Stop Web Fraud Before It Happens

Trying to Stop Web Fraud Before It Happens

You may have read or heard by now that one of the nation’s three major credit reporting agencies was the target of a malicious and illegal breach of security earlier this year.

Equifax has stated that the breach lasted from mid-May through July and the scope of information accessed includes Social Security numbers, birth dates, addresses, credit card numbers, and driver’s license numbers. It has been reported that individuals in Canada and the U.K. have also been affected by this breach.

The best advice we can offer when confronted with a spear-phishing scam is to assume the communication being received is suspect.

Equifax has created a website to help consumers protect their identity, but there’s a wait and the timeframe allotted to enroll is limited. Visit EquifaxSecurity2017.com to check if your personal information may be affected by the breach and be sure to visit soon because the enrollment period ends on Tuesday, Nov. 21.

In addition to placing a freeze and fraud alert on your credit report, there are a few other things you can do to be proactive in protecting your identity.

Placing a fraud alert and credit freeze on your credit profiles will make it more difficult, but not impossible, for someone to establish a credit account in your name without your knowledge or permission. Please note, you’ll need to repeat the process with each credit bureau as not all creditors and lenders use the same reporting agencies.

Check with the other major credit bureaus, Experian and TransUnion and monitor your credit report closely for unauthorized and unrecognized entries. You can check your credit reports at each reporting agency for free once per year at AnnualCreditReport.com. If you find accounts or activity you don’t recognize, visit IdentityTheft.com to take appropriate steps to report and rectify your situation.

Another tip is to file your taxes early, as soon as you have all the documents you need. A common practice of identity thieves is to use stolen Social Security numbers to gain employment, file tax returns fraudulently, and collect the refund owing to you from the federal government.

In the aftermath of the breach, several new trends have emerged within the criminal element, taking advantage of the breach. As if the breach itself isn’t bad enough on its own, this new practice dubbed, “spear-phishing,” is on the rise.

Most are familiar with the practice of phishing, when the intended victim is the recipient of an email from a well-established brand or bank claiming that access credentials have been compromised and a simple password reset will prevent any unauthorized access; all that needs to be done is click the link in the email and the recipient is directed to the password reset page.

Typically, the password reset page is a remarkably good facsimile of the legitimate business, bank, or brokerage and the user is prompted to enter their existing user name and password in order to confirm the new password — except what the user is likely unaware of is that they’ve just sent their perfectly valid and secure credentials to a criminal.

These types of phishing scams are easy to identify, usually due to poor grammar and poor formatting of the email but the new wave of spear-phishing is a little more sophisticated because it includes real and personal details illicitly acquired as a result of the most recent breach. Information such as your Social Security number may be included in the body of an email that has an attachment claiming to be from your bank or broker.

The email may prompt the recipient to click a link or download an attachment to confirm a transaction however, once that action is taken, the recipient of the email may be unknowingly downloading malicious software onto their computer, compromising the operating system, making it vulnerable to hijacking or recording keystrokes and sending them to unintended recipients.

“When you have a sophisticated criminal that has real information about you, it’s far more difficult to spot the fraud,” said Martin Walsh, a financial adviser with the Denver planning firm of Brown & Tedstrom.

The best advice we can offer when confronted with a spear-phishing scam is to assume the communication being received is suspect.

If an email is received from your bank, credit card issuer, or broker and you believe it to be legitimate, visit the company’s website directly or call the toll-free customer service number. Do not, under any circumstance, click the link or download the attachment.

Another, less-original practice of imposter scams, is seeing a resurgence owing to the Equifax data breach. The Federal Trade Commission has warned the public that it expects an increase of imposter scams, with individuals posing as representatives of Equifax “calling to verify your account information.”

Equifax is providing free credit monitoring and credit freezes as a result of the breach so the call may sound legitimate, but don’t ever provide confidential and private information over the phone to an inbound caller.

The purpose of this method is to get the recipient of the phone call, or sometimes e-mail, to disclose additional personal information to the imposter which they can either sell or use to establish new lines of credit fraudulently.

So, what should you do now that this has happened? First, check to see if you were affected by visiting the Equifax website listed earlier in this article. Secondly, take advantage of the free credit monitoring.

When you check to see if you were affected, you’ll be assigned an enrollment date — it’s important to set a calendar reminder for that date because Equifax will not send you a reminder — and you won’t be able to enroll until after your assigned date. Thirdly, freeze your credit, at all three bureaus.

The free credit monitoring is helpful, but it will not prevent identity theft. A credit freeze locks your credit profile to new inquiries and establishing new credit accounts, which can at least slow down, if not prevent, the theft of your identity.

Jonathan Corona has more than a decade of experience in the electronic payments processing industry. As Mobius Payments Inc.’s vice president of compliance, Corona is primarily responsible for day-to-day operations as well as reviewing and advising merchants on a multitude of compliance standards set forth by the card associations. Mobius Payments specializes in high-risk merchant accounts in the U.S., E.U. and Asia.

Related:  

Copyright © 2024 Adnet Media. All Rights Reserved. XBIZ is a trademark of Adnet Media.
Reproduction in whole or in part in any form or medium without express written permission is prohibited.

More Articles

opinion

Unpacking the Payment Card Industry's Latest Data Security Standard

The Payment Card Industry Data Security Standard (PCI DSS) is a set of requirements and guidelines that apply to all businesses that accept credit card payments, and is designed to ensure the security of those transactions.

Jonathan Corona ·
opinion

Compliance With State Age Verification Laws

During the past year, website operators have faced a slew of new state age verification laws entailing a variety of inconsistent compliance obligations.

Lawrence Walters ·
opinion

Merchants in Spotlight With Visa's VIRP

By now, most merchants know about the Visa Integrity Risk Program (VIRP) rolled out in spring 2023. The program is designed to ensure that acquirers and their designated agents — payment facilitators, independent sales organizations and wallets — maintain proper controls and oversight to prevent illegal transactions from entering the Visa payment system.

Cathy Beardsley ·
opinion

How to Know When Hosting Upgrades Are Really Needed

I was reminded about an annoyingly common experience that often frustrates website owners: upgrades. Sometimes, an upgrade of physical system resources like CPU, RAM or storage really is required to solve a problem or improve performance… but how do you know you’re not just being upsold?

Brad Mitchell ·
profile

WIA Profile: Natasha Inamorata

Natasha Inamorata was just a kid when she first picked up a disposable camera. She quickly became enamored with it and continued to shoot with whatever equipment she could afford. In her teens, she saved enough money to purchase a digital Canon ELPH, began taking portraits of her friends, shot an entire wedding on a point-and-shoot camera and edited the photos with Picnik.

Women in Adult ·
trends

Collab Nation: Top Creators Share Best Practices for Fruitful Co-Shoots

One of the fastest ways for creators to gain new subscribers and buyers, not to mention monetize their existing fan base, is to collaborate with other creators. The extra star power can multiply potential earnings, broaden brand reach and boost a creator’s reputation in the community.

Alejandro Freixes ·
opinion

Bridging Generational Divides in Payment Preferences

While Baby Boomers and Gen Xers tend to be most comfortable with the traditional payment methods to which they are accustomed, like cash and credit cards, the younger cohorts — Millennials and Gen Z — have veered sharply toward digital-first payment solutions.

Jonathan Corona ·
opinion

Legal and Business Safety for Creators at Trade Shows

As I write this, I am preparing to attend XBIZ Miami, which reminds me of attending my first trade show 20 years ago. Since then, I have met thousands of people from all over the world who were doing business — or seeking to do business — in the adult industry.

Corey D. Silverstein ·
opinion

Adding AI to Your Company's Tech Toolbox

Artificial intelligence is all the rage. Not only is AI all over the headlines, it is also top of mind for many company leadership teams, who find themselves asking, “How can this new tool help our company?”

Cathy Beardsley ·
opinion

The Ins and Outs of IP Addresses: What Website Owners Should Know

Think about your home address, the place you live. It is unique. That’s important because when you decide to invite someone over, they will need directions to find you. It’s even more important if you want a lot of visitors.

Brad Mitchell ·
Show More