Category Archives for "Identity Theft and Fraud"

Are you leaving the “keys in the car”?

Would leave keys in a running car? Would you leave the front door to your house unlocked?
Our guess is the answer to both is “no.” So, why then would you leave your business open to cyber-criminals?

Businesses are constantly under attack. In its first month in business, Axiom Cyber Solutions offices were hit over 300,000 times with scans, intrusion attempts and network mappers. Not one of those actually got through because they were smart to have installed their own firewall that actively prevents these threats and notifies the command center it is under attack.

Their engineers immediately review traffic to ensure that firewall services are doing everything necessary to handle the threat. With today’s ever-increased bandwidth and shifting threat landscape, any business can benefit from installing an Axiom SecureAmerica® managed firewall that is constantly updated to stay ahead of the latest threats including ransomeware, Ddos threats, botnets and more.

Axiom’s patent pending algorithm identifies ransomware as soon as it is activated and actively prevents it from encrypting your company’s data, Axiom engineers have identified key markers for ransomware communication.

Denial of Service is a real threat to American businesses. Attackers are constantly launching these attacks for a variety of reasons. From “hacktavism” to data theft, the attacker’s intentions vary widely. In the past, denial of service was simply meant to knock your website offline. Today, attackers are making these attacks very sophisticated and are generally trying to overload your systems so that they can find vulnerabilities that they can come back and exploit. A large percentage of denial of service attacks lead to a later data breach.

Again, DoS stands for “denial of service” and refers to an attack that overwhelms a system with data. In a DDoS attack, the first “D” stands for distributed and that simply means that many computer across the internet are engaged, sometimes hundreds or thousands at a time.

More often than not, the computers being used in attacks are not knowingly participating but rather are compromised systems from home computers, routers, and even CCTV cameras plugged into the network. This remote control by hackers is called a “botnet,” a combination of the words robot and network. Any device can be turned into a “bot” through malware on infected websites, through spam file attachments, and sometimes just through known vulnerabilities in operating systems or devices, all without their owners’ knowledge.

Axiom Cyber Solutions strives to be the leading cyber-security technology partner by providing world-class solutions that are intelligent, adaptive, innovative, and automated. Through it’s technology solutions, customers are able to remain focused on what they do best with the peace-of-mind that unwanted intrusions are dealt with properly.

Axiom has assembled an industry leading team of infrastructure specialists, developers, database and business intelligence experts, and project managers holding several industry leading certifications like Certified Information Systems Security Professional (CISSP) and Information Technology Infrastructure Library (ITIL) in addition to degrees in Analytics, Computer Engineering, and Information Systems Management.

The Identity Defenders is proud to have partnered with Axiom that specifically addresses the cyber-security needs of small-to-medium businesses and provides cutting edge technology solutions that are complimentary to the other solutions we offer.

Take Control. Get Found. Essentials of Local SEO

Inconsistent business location information across online maps, apps, directories, GPS devices, social networks, and search engines costs you real sales.

ListingDefenders™ lets you control your listings across 60+ partner sites, including Google, Bing, Facebook, Foursquare, Yahoo, and Yelp.

Get on Google

Today’s world of smartphones, mobile moments, and self-driving cars demands accurate location data more than ever. And no single search, maps, and apps provider is more important to your location marketing strategy than Google.

Sync and manage your Google My Business account and:

  • Update your customers rapidly about timely changes to key location data like hours or unforeseen closings
  • Control the data Google receives about your locations and ensure it’s always consistent, authoritative, and up-to-date
  • Save time and streamline your data management process by managing information on Google My Business and across the web with a single click from the ListingDefenders™ Location Management Platform

Publish Everywhere and on Every Device

We partner with the most establishes and popular search engines, maps, apps and directories across the globe. Leverage our direct connections to the publishers in the ListingDefenders™ Network to get found.

Enhance and Drive Revenue From Your Listings

Help customers choose you by creating the most complete, rich, and accurate presence on all the search engines, maps, apps, and local directories where they search for local businesses.

Enhanced Content Syndication: Leverage your listings across the web to differentiate your business from the competition and drive measurable business results.

  • Showcase photos, videos, business descriptions, hours and holiday hours, menus, staff bios, product & service lists, and more than a dozen other fields alongside basic NAP. Listings complete with enhanced content receive 416% more views than those without.
  • Turn your listings into measurable marketing opportunities with the exclusive Featured Message. Highlight special offers, drive reservations or form fills, and more with this exclusive 50-character field.

Website Widgets: Embeddable widgets drive consistency across your digital presence. Sync information like social posts, staff bios, menus, calendars, and product or service lists from the Location Management Platform to your own website. Updates flow immediately to your site, reducing hassle and complexity.

Measure With Exclusive Analytics

Analytics are crucial to your success. Our publisher relationships provide exclusive analytics on your presence across the ListingDefenders™ Network to help you measure what’s working and how customers are engaging.

Listing Visitor Reporting: See how often a listing appears in local search results, the views its detail page receives, and the number of times customers click on a Featured Message – which helps you tie revenue back to your digital presence.

Search Term Reporting: Monitor the search queries for which your listings show up most often in local search results. Use this information to optimize your listings and your own website for the keywords you want and discover hidden opportunities to get found more often.

Listen To Your Customers

Most brand experiences happen at the local level, and your customers record and amplify those experiences through reviews, photos, videos, and posts across the web. Monitor the feedback and content customers generate about your locations to ensure you deliver the best experience possible, everywhere.

Review Monitoring: Monitor and search customer reviews by location across every site that supports them, including Yelp, Facebook, Google+, and Citysearch, in real time. Get custom notifications for new reviews, search reviews by location, and analyze how customer feedback varies over time and across locations.

Social Location Page Posting: Get the word out quickly and easily by posting on your Google+, Facebook, and Foursquare accounts directly from the dashboard. Post content immediately, or schedule posts to publish at a future date and time.

Local Listening: Keep tabs on the Google+, Facebook, and Foursquare content that customers generate from your locations and respond directly from the dashboard.

Control Your Presence

Even after setting up accurate and rich listings for all your locations, you may have errant listings or rogue profiles. Whether you have 1 location or 10,000, we keep you in control of what appears and what doesn’t.

Duplicate Suppression: Duplicate records of your business information appear across the search ecosystem — and they cost you time, money, and SEO benefits. Our technology finds and suppresses duplicate listings so consumers never see incorrect or incomplete address or contact information. Since search engines value consistency, Duplicate Suppression offers huge SEO benefits.

Social Page Location Data Sync: Sync the location data in the platform to your place pages on Facebook and Foursquare. If social pages don’t exist for your locations already or are managed by someone else, we can create or claim them for you.

The 6 Essential Pillars of the Identity Lifecycle

What is the definition of the Identity Lifecycle?

Up until now, identity lifecycle management was relegated to the IT department for a company, and it solely referred to the user rights and access privileges associated with managing employee access on a corporate computer network.

charts

When the U.S. Supreme Court determined in 2010 that a business had the same rights as a person when it came to dealing with the regulation of campaign spending by organizations, the opportunity to enhance and expand the definition to an Identity Lifecycle came about. It has a striking resemblance to consumer behavior models such as the “Diffusion of Innovation” and the “Product Lifecycle.”

When it comes to the Identity Lifecycle, there are six essential pillars (or stages) that must be addressed whether it’s for a person or an organization.

An effective identity is unique, and every identity has a lifecycle that begins at birth and sometimes is able to transcend death. Whether it’s your personal identity or that of your business, it’s your responsibility to manage and protect what’s yours!

characteristics

  1. Create It! – A business is formed and registered with an applicable government body. A business owner creates a business and marketing plan based on the vision and values of the founder, and crafts a brand strategy.
  1. Claim It! – The business name, address & phone number (NAP) is registered or claimed on as many internet search engines and directories to make it easier to find in a local search.
  1. Promote It! – The business starts to promote itself using Search Engine Marketing, PPC (Pay-per-click) advertising and traditional media buys including print and broadcast media to help grow sales.
  1. Enhance It! – As the business begins to grow, the owner or marketing team enhances it’s brand by implementing authority and content marketing techniques to position the business as a market leader. It also deploys Reputation Management systems to customers to build positive “word-of-mouth” – one of the most successful marketing methods.
  1. Defend It! – As a person or company grows and become noticeable, it essentially creates a “target” for cyber-thieves. There are many steps a person or business can take to Defend It’s Identity, but it is impossible to be 100% safe from being a victim of Identity Theft.

    More often than not, business identity theft is an “inside job” caused by a current employee. With far fewer protections than what’s available to individuals, it’s necessary to track a business identity with business credit bureaus, secretaries of state, and see if the business EIN is being used anywhere for fraudulent activity.

    For individuals, fraudulent use or personal or confidential information (PII) can be significantly greater. Information can be purchased on the black market ranging from $1 per record to nearly $250 per record (in Medical ID Theft).

    There’s so much information exchanged in the internet, it becomes impossible to monitor all areas where PII is used so it becomes more important to implement a service that can monitor and report on all the possible databases.

  1. Protect It! – Identity Theft and Fraud has been a growing problem, and now small businesses are the primary target. Without a comprehensive protection plan for your business, a data breach can result in catastrophic financial consequences. There are many state/federal laws requiring a business to safeguard the confidential and personal identifiable information it collects. We are your partner in combating data, privacy and identity theft risks.

 
iDefend Offers Full Identity Theft Protection for the Entire Family
 

The Technical Safeguards & Services You May Not Know About

Internal Vulnerability Management
Quarterly scans and checkups to verify that your internal computer network devices (servers/wireless networks/LAN routers) and every computer (desktop/laptops) are all locked down and free of malware or other hidden security threats or vulnerabilities that a cyber-criminal can exploit to gain access to private customer or employee information. This is performed manually by certified INVISUS security technicians via remote Internet connection, working together with your current IT staff as needed.

External Vulnerability Management
Regular external IP address penetration tests to discover and report potential security weaknesses and vulnerabilities in your Internet connection(s) and your website(s) that put your organization at risk of a data breach from hackers and cyber-criminals. Where vulnerabilities are discovered, we assist you (working together with your current IT staff as needed) in locking down your Internet connection(s) and your website(s) to ensure you meet minimum regulatory requirements for technical safeguards and information security best practices.

Also Provided as Needed (no additional cost):

Secure Data Disposal Service
Prior to disposal of a computer or hard drive, our tech team will provide secure and permanent deletion of individual electronic records and files or completely wipe all hard drive information according to regulatory requirements and that meets or exceeds DoD/NSA secure destruction standards.

Computer Security Software
If needed, we provide you the necessary business grade security software (firewall/anti-virus/anti-spyware) for each computer in your organization – installed and optimized for you by our expert tech team.

File Encryption Software
If you don’t already encrypt sensitive data, we provide professional-grade file encryption technology that meets or exceeds FIPS/NIST standards for encryption of electronic data. Installed on your organization’s computers to protect both stored and transmitted files and records.

Emergency Computer Security Support
When you are alerted to virus or other malware infections on any of your organizations’ desktop or laptop computers, to prevent further spreading or infection to other computers, we provide immediate on-demand expert help via remote connection for virus, spyware, and other malware removals.

Online Employee Training Center

Because information security and privacy training for all employees is a regulatory requirement, InfoSafe provides you with your own full featured, fully hosted and managed online training center account to easily deliver and manage the required ongoing information security, privacy, and regulatory compliance training for all of your employees, new hires, and temporary workers.

The training center also includes a complete catalog of additional low cost, engaging, and interactive privacy, information security, and compliance training courses available 24/7 for your internal compliance administrator, managers, and employees.

Program Features

With InfoSafe, you’ve got a personal team of experts to help guide and manage your compliance with federal, state and industry data security regulations for protecting your customer and employee personal information against identity theft and fraud.

InfoSafe Certification:
Being InfoSafe Certified gives you critical third party validation and certification that your business meets or exceeds the minimum recommended standards and best practices for protecting your customer and employee personal information against identity theft and information compromise.

InfoSafe Certification is a “seal of approval” to show your customers that your company/organization is a safe place to do business. It demonstrates your commitment to doing business the right way, with a genuine commitment to customer privacy, safety and trust.

Your business can become InfoSafe Certified by enrolling in the InfoSafe program and working with your InfoSafe team to implement and maintain the necessary administrative, physical and technical safeguards in accordance with the compliance requirements of virtually all major federal, state and industry regulations including HIPAA / HITECH, GLBA, Red Flags Rule, FACTA, PCI, state data breach protection laws, and more.

business Buttton

Security and Policy Information You Did Not Know You Needed

Compliance Administration
We help you designate a compliance administrator in your organization (or work with your current compliance administrator) and provide them with everything needed to properly manage your organization’s compliance with all applicable information security and privacy regulations. This includes complete administrator training, employee information security handbook including your employee security/privacy agreements, and ongoing regular compliance updates as applicable laws and best practices change.

Information Security Policy
A comprehensive Information Security Policy (including related employee, management, and vendor forms) fully customized and prepared for your business. Includes all the technical, administrative and physical security policies for your business to properly protect customer and employee information and establish compliance with state and federal laws and regulatory requirements.

Privacy Notice
A personalized information Privacy Notice to provide to your customers in print and online – detailing the types of information you collect, how you use it, and how you protect it.

Other Policies (as required)
Other more specific information security and privacy policies are also provided should your business be required to have them, including a Red Flags Rule policy, Address Discrepancies Rule policy, and other vertical market specific policies.

Policy Updates
As your business changes, and as information security and privacy regulations change, our compliance team makes sure your Information Security Policy and other policies are updated and kept current.

passwordButtton

 

Laws & Regulations You Should Follow

Businesses and organizations bear the biggest liability and the greatest monetary damage from identity theft and fraud. If you collect, use, transmit, or store information about your customers or members, you must comply with these laws and regulations.

While not every law or regulation is applicable to every business, every business must meet minimum standards of information security, or face steep fines, penalties and even civil action against them in the event customer, vendor or employee information is leaked, lost or stolen.

InfoSafe is the leading information security compliance and certification program, helping businesses to meet these requirements and best practices in a single overall, easy to implement, and affordable compliance program.

Becoming InfoSafe Certified means your business meets or exceeds the minimum recommended standards and requirements for protecting your customer’s and employee’s personal information against identity theft and fraud. It also shows your commitment to doing business the right way, with a genuine commitment to privacy, safety and trust.

Given that virtually all companies are subject to several law’s requirements and penalties, it is critical that you immediately move toward compliance. Those that choose not to implement the necessary technical and administrative safeguards are placing their customers, employees and themselves at significant risk.

InfoSafe Certification:
You become InfoSafe Certified by enrolling in the InfoSafe program and working with your InfoSafe team to implement and then maintain the necessary administrative, physical and technical safeguards required for compliance with virtually all major federal, state and industry regulations including:

  • Red Flags Rule
  • PCI Compliance
  • HIPAA / HITECH
  • Graham Leach Bliley Act (GLBA)
  • State data breach protection laws

InfoSafe Certification signifies a company’s genuine commitment to protecting their customer and employee private information against identity theft and fraud. Consumers can work, play and shop with confidence with businesses that rely on InfoSafe information privacy and security services.

Here is a brief overview of major laws and regulations every business owner must know.

Red Flag Rules
Under the Red Flags Rule, certain businesses and organizations are required to spot and heed the red flags that can often be telltale signs of identity theft. To comply with the new Red Flags Rule you must develop a written “red flags program” to prevent, detect, and minimize the damage from identity theft.

Applies to: Anyone who arranges for or extends credit or payment terms, or who provides products or services and bills or invoices the customer.

Penalties, Fines: Up to $3,500 per violation, plus attorneys fees. FTC can seek both monetary civil penalties and injunctive relief for violations. Allows consumers the right to recover actual damages.

PCI Compliance

The Payment Card Industry (PCI) Data Security Standards (DSS) is a set of comprehensive requirements for protecting card and cardholder information against theft and fraud.
PCI compliance is a multifaceted security standard that includes specific requirements for protection of cardholder data, implementation of a vulnerability management program, regular security testing, access control measures, and maintaining an information security policy.

Applies to: Anyone who accepts, processes, transmits or stores credit/debit card information, including retail, mail/telephone order, and e-Commerce.

Penalties, Fines: Up to $10,000 on first violation for not implementing required safeguards. Visa Fraud Control fines of up to $500,000 per incident for any merchant or service provider that is compromised and not compliant at the time of the incident. Fines and penalties vary depending on the acquiring bank and credit card companies you accept.

Graham Leach Bliley Act (GLBA)

The Graham Leach Bliley Act (aka The Financial Modernization Act of 1999), requires businesses and organizations to protect consumers’ personal financial related information. Provisions of this law require implementation of privacy policies and notices under the FTC’s Privacy Rule, plus formalized security plans and adequate information safeguards under the FTC’s Safeguard Rule. The law also includes provisions for criminal negligence. Since most personal financial information is computerized, proper data security is a major part of GLBA compliance.

GLBA gives authority to eight federal agencies and every state to enforce the privacy and safeguards rules outlined in this law.

Applies to: A broad list of “financial institutions”, loosely defined as anyone in financial services or products in any way, such as banks, insurance agents/firms, securities firms, lenders of any type, loan brokers or servicers, financial planners, accountants, tax preparers, real estate professionals, credit counselors, debt collectors, money transfer agents, and many more.

Penalties, Fines: Up to $100,000 for each violation. Owners and officers personally liable up to $10,000 per violation. Severe civil and criminal penalties for fraud and negligence, including fines and even imprisonment.

Health Insurance Portability and Accountability Act (HIPAA)

Under HIPAA, all organizations that record, maintain, or transmit personal health information are required to ensure that all patient information is kept confidential, secure, and readily available. HIPAA requires patient medical records and other protected health information be kept private and confidential.

Applies to: All types of healthcare related organizations such as doctors, clinics, dentists, psychologists, chiropractors, nursing homes, pharmacies, and more. Also includes health insurance companies and businesses that support healthcare organizations – such as online backup providers, billing agencies and organizations that support Internet based health services.

Penalties, Fines: The penalties for non-compliance range from a minimum of $100 per violation to a maximum of $1.5 million per year. Possible criminal negligence and fraud prosecution, up to 10 years in prison.

State Laws

Virtually every state has laws requiring businesses to implement proper technical and administrative safeguards to protect customer information against identity theft and fraud.

States are becoming increasingly aggressive at requiring specific practices and safeguards such as having a documented security plan, regular vulnerability risk assessments, updated and monitored computer security systems, data encryption, and most commonly, an incident response plan to notify customers of a breach and to remedy the situation.

Many state laws focus upon “insider threat” from employee misuse of personal information by requiring businesses to develop and implement data protection policies, employee awareness training, ongoing compliance monitoring, and disciplinary standards for willful privacy violations.

State laws are also interstate laws. Businesses with customers in other states must not only comply with their own state laws, they must also comply with state information security and security breach notification laws where any customers reside.

Applies to: Any business or organization, small or large, that gathers, licenses, transmits, or stores any form of personal information about their customers including name, social security number, credit card information, drivers license numbers, account numbers, birth dates, health information, financial information, and more.

Penalties, Fines: $500 to $5,000 fines per customer record lost or stolen – depending on the state. Civil penalties up to $500,000 are applicable in most states for failures to safeguard personal data, properly dispose of such data, and to provide adequate privacy protections. Reckless or negligent disclosure of customer or employee personal information generally results in criminal penalties with severe fines and 1 to 3 years jail time.

business Buttton

Identity Theft vs. Cyber Crime: Can You Be a Victim?

While identity theft as a whole has been around for quite some time, new advances in technology has made it that much simpler for Cyber Criminals to get your information. It’s for that reason that we need to keep vigilant and protect ourselves and our loved ones from these anonymous criminals by following a few simple steps.

Good Ol’ Fashioned Identity Theft:

Some of you may feel that long gone are the days of Identity Theft as the use of snail mail has diminished. You could not be more wrong. Although the use of the internet has helped in the growth of Identity Theft and Cyber Crime, good old fashioned identity theft is here to stay. Take a minute and give our list “Top 8 Traditional Ways to Keep Safe from Identity Theft” a look and start giving yourself that extra protection you may need.

Family on Vacation - Protecting Family from Identity Theft and Cyber Crime

Top 8 Traditional Ways to Keep Safe from Identity Theft

1. Make sure to destroy Private Records or Statements: This is a no brainer having documents that may contain sensitive material lying around can attract some snoopers. Once these sensitive documents are not needed you may consider shredding them before throwing them out.

2. Secure your mail: Don’t make it easy for these thieves. Make sure to empty out your mailbox in a timely matter or better yet consider locking it up or purchasing a P.O. box address.

3. Protect your Social Security Number: This is one of the main gateways to Identity theft. Make sure to not carry around your social security card or any other Id card that may contain this number. Always keep your Social Security card in a safe and hidden place.

4. Don’t leave a paper trail: I myself have been guilty of this a few times in the past. Make sure to never leave your ATM, credit card or gas station receipts behind.

5. Keep an eye out for that credit card: This may be a difficult one. Take for example the Starbucks employee who stole a drive-thru customer’s credit card info just by saying they needed to run the card on a different computer all the while taking the information to spend at a trendy name-brand store. In just a matter of seconds your credit card info can be swiped so be alert when handing over that card.

6. Excuse me, Do I know you?: Always make sure you know who you are dealing with when dealing with sensitive information. If someone is contacting you about personal information the only thing you should do is obtain their information. If they are working for you bank or any other institution you deal with make sure to call the institution directly to ensure they are one of their employees.

7. Monitor your credit report: Make a habit of reviewing your credit report. There is no reason why you shouldn’t be doing this considering that many companies give out free yearly credit reports and others like iDefend will help you correct any errors on your credit report that you find. Monitoring your credit report will ensure that you will catch any harm in time.

8. Look over your credit card statements: One of the easiest things you can do is to look at your statements when you come in the mail every month, by doing so you can catch any thief in the act.

iDefend Offers Full Identity Theft Protection for the Entire Family

Stepping Into the 21st Century!

Now that you’re an expert at old school identity theft it’s time to get with the times and protect yourself against cyber crimes. Internet crime schemes can target victims by using various methods. The same way you can protect yourself against traditional Identity theft; you can take measures to protect yourself against online Identity Theft.

1. Up to Date Security Software is your best friend!: I cannot stress this enough, if you are willing to put money into the latest home security system why wouldn’t you for your computer or Smartphone. Nowadays most of us carry our most sensitive personal information in our pockets!

2. Learn to spot scams and spam from a mile away: I’m sure the majority of us knows someone who has fallen victim to phishing scams. Long gone are the days in which phishing scams include a Nigerian Prince and awarding you the mining rights and profits for an advanced fee to the government. Although this type of scam still exists, phishing has become much more sophisticated. The only way to steer clear of falling trap is to never click on a link sent to you. Instead do a search for the company on a search engine to ensure you land on the appropriate website and not someone posing as them.

3. Use a strong password: Your password is your first line of defense so make it count. Make sure to use different passwords for various sites and try to use more than 10 characters that contain all of the following, upper case, lower case, numbers and symbols. Stay clear of any passwords that may contain personal information such as your date of birth. Better yet, use a password generator for a difficult password that doesn’t include easily guessed combinations.

4. Freeze your credit: Thwart a criminal’s effort at opening a new line of credit by freezing it. In order to start a new credit line, thieves would have to provide additional information and pass certain controls set up by you.

5. Reputable Websites are a must: When purchasing online only go to the big boys in the room. If you do not know the history or reputation behind a company you want to purchase from then do you homework. Easiest ways to find out about a website is to look at reviews, ratings on Better Business Bureau and checking to see if they have a secure and encrypted connection for personal and financial information.

So there you have it. If you follow these simple rules you will greatly improve your chances of not getting your identity stolen. For more information on how to protect you and your loved ones you may consider contacting us at The Identity Defenders.

family Buttton

Who Must Comply and The Risks

Do you have customers, vendors or employees?

If you do, not only do you have an extra responsibility to do what you can to fight identity theft and consumer fraud, you have no choice because it’s the law.

Becoming InfoSafe Certified means your business meets or exceeds the minimum recommended standards and requirements for protecting your customer’s and employee’s personal information against identity theft and fraud. It also shows your commitment to doing business the right way, with a genuine commitment to privacy, safety and trust.

The following 8 questions will help you determine whether you must comply with one or more of the information security regulations. Does your business:Continue reading

What is Identity Theft?

What is Identity Theft? Identity theft happens when a thief, or even someone close to you, obtains and uses your personal or business information (such as your Social Security number, EIN number, date of birth, address, driver’s license, credit card numbers, etc.) to commit fraud or crime in your name.

Finding out that someone has access to all of your personal information is overwhelming. Having to personally deal with all of the damage they have done and could possibly do is enough to send someone over the edge. Without iDefend my ordeal would have been a lot more stressful and time consuming. I would like to personally thank iDefend for taking care of my every concern and made my entire situation a lot easier to deal with
Lisa K , Atlanta, GA

Business identity theft is essentially the crime of hijacking a business’ identity and then using that identity information to establish lines of credit with banks or retailers, purchase products and services and get other benefits in the business’ name, and leaving the real business responsible for the bill.

If you own a business – even a part-time home-based business, you should also know about the business identity theft threat – and what it means to you as a business owner.

Reality Check: It’s not “IF”… but “WHEN”

It’s not if… but WHEN you or someone in your family will have their personal information stolen by an identity thief or exposed in a data breach at a business, school or government organization. Look at some of these shocking numbers:

  • More than 13 million people had their identities stolen in 2015. (1)
  • Americans lost almost $30 billion due to identity fraud in 2012. (1)
  • More than 200 million records were compromised by computer hackers in 2015. (2)
  • 36 million people were notified of a data breach in 2011 involving their personal information. (1)
  • Children are 52 times more likely to have their identity stolen than adults. (3)
  • 10.2% of children’s Social Security numbers are already being used by someone else. (3)
  • Over 600 million customer or employee records have been lost or stolen from businesses, schools, and government organizations since 2005. (4)

The Identity Defenders provides services to give you real peace of mind with the industry’s only identity theft protection programs for individuals that cover the 7 essentials of protection – including cyber-crime prevention, protection and membership in the Cyberhood Watch program.

I’ve known I needed some kind of identity protection. Until I came across iDefend I wasn’t sure I’d ever be fully protected. Now I can sleep well at nights knowing I have “Whole Identity Protection” with iDefend and not Partial Protection from all the other guys.
Chris , Seattle, WA

We also provide the only comprehensive, proactive identity theft protection to businesses. Unlike personal identity theft protection and credit monitoring programs that exclude business coverage, iDefend Business was developed specifically to provide much needed protection for businesses and their owners against the potentially crippling damages from business identity fraud.

1 – Javelin Strategy & Research 2015
2 – Verizon 2015 Data Breach Report
3 – Carnegie Mellon / Cylab Report 2010
4 – Privacy Rights Clearinghouse