Dramatic Spike in Unemployment Fraud: What You Need to Know

We have seen a dramatic spike in unemployment fraud, PPP fraud and SBA loan fraud.

 

Some of you may have received or will be receiving unemployment benefits. Or, maybe you are an employer and have received notice that an employee of yours applied for unemployment benefits. The thieves simply apply for benefits or loans using your PII or confidential business information.

 

Your state’s Department of Jobs & Services is aware that many of these applications are fraudulent. Several states, such as Ohio, are in process of launching an online option for employers to report potential fraud on behalf of multiple current or former employees. For information about Ohio, please click HERE.

 

Be vigilant. Be strong. If you are concerned that you or an employee has been a victim of unemployment fraud, please reach out to Member Services. We are available for you 24/7/365 at 888.966.GUARD (4827).

Turning Your IT Boneyard into a Profit Center

Turning Your IT Boneyard into a Profit Center

Like most families and organizations in America, you probably have a pile, or maybe even a storage room or two, full of IT assets that are not being used. They’re at the end of their life. They are holding extremely sensitive data. They’re also depreciating quickly.

 

In ongoing efforts to analyze employer risks, and find effective solutions to mitigate them, Guard Well Identity Theft Solutions has developed a Data Risk Mitigation service. “We have partnered with highly experienced software engineers who have perfected the end-of-life process for data center/IT hardware for over twenty years,” remarked E. Allan Hilsinger, Founder and CEO. What does this mean for you? “You have gear … we have cash! It’s really that simple.” He continued to explain, “We buy a customer’s IT boneyard essentially turning their headache, risk, and expense into a profit center. We ensure total data destruction by using the U.S. Department of Defense endorsed three swipe data eradication process, which can occur on or off-site.”

 

How does this process work? The customer’s IT inventory list is reviewed (and created if needed). Then an estimate to purchase if provided. If the estimate is agreed upon, the proper change of custody paperwork will be executed, gear will be accepted and the company gets to work. After the three swipe data eradication process is complete for each piece of equipment, certificates of complete data eradication for each hard drive are provided. Once wiped, the gear is repurposed and the customer will receive the revenue share previously agreed upon.

 

As with all Guard Well programs, our team continuously strives to keep the process simple, safe, and hassle-free and with minimal effort required by your IT team. We are experts on keeping your asset value at a maximum and while completely eliminating data risk.

 

Interested in learning more? Schedule an appointment with us via the ‘contact us’ form on our website or call us today at 888.966.4827 (GUARD).

 

Photo by Tisteo on Unsplash.com

 

And More Coronavirus Scams …

And More Coronavirus Scams …

We are monitoring updates surrounding the coronavirus (COVID-19) pandemic around the clock. This environment is a breeding ground for scams to take advantage of you and your identity. Rest assured that we are here to help and will communicate with you every step of the way.

 

The following is the latest information that we know of regarding coronavirus scams:

 

– The Federal Trade Commission (FTC) sent warning letters to seven sellers of scam coronavirus treatments. The FTC reported that “So far all of the companies have made big changes to their advertising to remove unsupported claims.” That is good news. But, scammers never take a break.

 

– Anyone can set up an e-commerce site and claim they have in-demand products. Be on the lookout for online ads that tout cleaning, household and health/medical supplies. Just because they have a website and you pay money doesn’t mean that you will receive any goods in return. The FTC suggests that you check out any seller by searching online for the person or company name, phone number and email address along with keywords such as “review,” “complaint” or “scam.”

 

– Anyone can also set up a fake charity to take advantage of a major health crisis. These scammers take advantage of your generosity and have names that are extremely close to the names of real charities. The FTC remarked that “Money lost to bogus charities means less donations to help those in need.” We suggest that you visit http://www.ftc.gov/charity to help you research charities. Also, if/when you do give, pay safely by credit card and never by gift card or wire transfer.

 

– As well, anyone can pretend to be someone you know. “Scammers use fake emails or texts to get you to share valuable personal information – like account numbers, Social Security numbers, or your login IDs and passwords.” If you accidentally click on a link, they can get access to your computer, network and/or install ransomware and other programs on your equipment that can lock you out. Please protect your smart phone and computer by keeping your software up to date and using multi-factor authentication. Backing up your data on a regular basis is also recommended.

 

– Surprisingly robocalls “pitching everything from scam coronavirus treatments to work-at-home schemes” are still in full force. Do not answer unless the call shows up as a contact in your phone. Let voicemail filter your messages. For more information on robocalls, visit https://www.consumer.ftc.gov/articles/0259-robocalls.

 

We understand that all of this is indeed nerve-wracking. One of the great things about our business is that we are always working in the moment … situations such as the coronavirus do not rattle our operations and team members. Not only do we have a team at a centralized location, but we have also always worked remotely. We will continue to be available for you 24 hours a day, 7 days a week, 365 days a year. We hope that this gives you some peace of mind knowing that we are on top of this crisis and will continue to communicate any dangerous scams related to the outbreak as soon as possible.

 

As always, please contact us immediately if you have any concerns at 888.966.GUARD (4827) or [email protected].

 

 

Tips to Lower Your Fraud Risk this Tax Season

Tips to Lower Your Fraud Risk this Tax Season

It’s tax season! For some, preparing and filing taxes is an hour or two-long process; for others, it’s a week or more. By year-end, the majority of us know if we will owe or if we are due to receive a refund … it’s just a matter of how much … and we are happy that everything is completed once tax season is over. Things don’t typically go awry, but tax-related fraud does happen. Knowing how to lower your risk and knowing what to do if it does occur to you, will help prevent the lasting damages to your wallet and credit score.

 

Let’s say for this example that you will be receiving a refund. Imagine looking forward to getting that money so you can pay off those holiday bills or plan that special vacation you’ve been day-dreaming of (or perhaps both if you’re lucky). After preparing your taxes, you happily press “send.” But then WHAM! … your return is rejected by the Internal Revenue Service (IRS) because they already received one for you. How could that happen and what do you do if it does?

 

Tax identity theft is when someone uses a stolen Social Security number (SSN) to file a tax return. You may be wondering, “Why would someone want to do this if I will actually owe taxes?” Even if you aren’t expecting a refund, you are still at risk. Thieves can enter fake income using your SSN in order to trick the IRS into giving a refund but, instead of that money going to you, it is actually wired to the criminal’s account. Even though the IRS has made significant efforts to help stop fraud cases in their tracks in recent years, it still happens.

 

Is tax fraud preventable? No. Are there steps you can take to help reduce your risk? Yes.

 

– Time is of the essence. Prepare and file your return as quickly as possible before someone else does it for you.

 

– Protect your personal identifying information (PII) by: 1) shredding documents that you do not need for tax preparation; 2) keeping your SSN card in a safe deposit box; 3) taking any outgoing mail to your local post office (do not put any mail with PII in your own mailbox – even though federal mail theft is a felony, it still happens); 4) getting your mail as soon as possible after it is delivered; 5) not responding to a phone call asking for or requesting that you confirm any PII (the IRS and legitimate companies will not initiate contact with you for this information unless you have reached out to them first); 6) not opening email attachments or clicking on any links that are not familiar to you; and 7) keeping your personal devices on lockdown unless you are using them (utilize firewalls and keep your anti-virus protection software up-to-date).

 

– If you think your PII has already been compromised, consider putting a free fraud alert on your credit file. There are two options: 1) an initial fraud alert, which is free and will last 90 days or 2) an extended fraud alert, which can be $10 or more but can last up to seven years.

 

– Be aware of the latest scams. Read our blogs on the topic: New Year Scam 2020 Style and Scams, Scams and More Darn Scams

 

– Actively monitor your accounts. You can access your tax account history (and see if someone has already filed for you) at https://www.irs.gov/.

 

– Get a trustworthy tax preparer. There are people who pose as tax preparers as well as online filing services that may promise you a bigger refund and/or may make questionable deductions for you in order to increase their fee. If you are seeking professional help, make sure it is from a certified tax professional or certified public accountant.

 

If your tax return is rejected due to being a ‘duplicate,’ an Identity Theft Affidavit (IRS Form 14039) should be filed as soon as possible to let the IRS know that someone else is using your identity. Contact Guard Well’s Member Services at 1.888.966.GUARD (4827) immediately if needed. A team member is always available 24/7/365. You can also email us at [email protected]. Happy filing!

 

 

Cybersecurity Trends in Store for 2020

Cybersecurity Trends in Store for 2020

Did you know that the first documented ransomware attack was more than 30 years ago in 1989? That was around the time when a mobile phone was called a bag phone because it sat in a big black bag in your passenger seat … and that curly cord was wound so tight it hardly let it extend to your ear. If you were lucky, you could store about 30 numbers in it. But back then, that was pretty amazing storage. Then flip phones started to make our lives easier in later years. It was pretty simple but the fact that it could actually fit in your pocket made it truly mobile. There was rarely a thought that anyone was listening in on your conversations or tracking your locations (which they probably were but the average person didn’t think doing so was devious). Boy, have times changed.

 

Attacks involving ransomware, which were originally designed to target individuals, are occurring every 14 seconds now. Shocking isn’t it. After you read this sentence, focus on how long it takes you to breathe … inhale and exhale. Your full circle breathing process is likely anywhere from six to eight seconds, which is how long hackers are trying to increase the speed of ransomware attacks by this time next year.

 

Dave Wallen discussed some of the expected 2020 cybersecurity trends in a blog last week for Security Boulevard so we all can be “better prepared against the ever-evolving nature of cyber threats.” He wrote, “With today’s pervasive use of the internet, a modern surge in cyberattacks and the benefit of hindsight, it’s easy to see how ignoring security decades ago was a massive flaw.” It’s not just the speed of the attacks that is alarming, it is the variety of them that are going to keep things interesting for 2020.

 

So what are some of the trends we will be seeing in 2020?

 

Fear will drive spending. Gartner forecasts that worldwide spending on cybersecurity is going to reach $133.7 billion in 2022. The General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA) have pushed businesses and government agencies to a more sophisticated cybersecurity infrastructure than ever. Wallen noted that 76% of organizations plan to increase their cybersecurity budgets this year.

 

The cybersecurity labor market will continue to experience labor shortages. There are many reasons for this skills gap. Not only are there more cybercriminals, but there are also more places for scammers to hide with our ever-expanding reliance on technology. Also, there still needs to be a balance of expanding skills in a very specific area with teaching broad skills that can be useful across many sectors. Think of those with titles such as chief information officer (CIO) and chief information security officer (CISO) – they are currently undervalued.

 

Cloud security will require a more pragmatic approach. The assumption that our data is secure on ‘the cloud’ in applications such as Microsoft and Google will be a thing of the past. In 2019, we saw massive attacks against Office 365 and G Suite that can bypass two-factor authentification making shared accounts exceptionally vulnerable.

 

Mobile devices will become even a greater target. As the number of mobile users increases, so will the amount of business data stored in them. Wallen wrote, “It’s a compelling reason why mobiles are seen as the primary cyberattack vector in 2020.”

 

Election security will be off the charts. With over 70 elections globally planned in 2020, there will be an intense focus on the spreading of disinformation.

 

5G, the fifth-generation wireless technology, will cause an increase in loT-based (Internet of Things) attacks. There will need to be a higher level of security which many current vendors are not able to provide yet. Hackers will take advantage of this gap to “sneak in malware and steal large volumes of your SaaS data at breakneck speed.”

 

AI (Artificial Intelligence) will become even more two-faced. While the benefits of AI are countless and help to protect our security, defakes (fake videos) that can spread misinformation will become more prominent and new types of cyberattacks will result because of them.

 

Organizations will continue to see their biggest asset, their employees, become their biggest threat. As reported in Governing.com, “The problem is that now our most important information, whether it’s sales prospects or customer lists or source code … is spread across the organization and is highly portable on a thumb drive or e-mail … information is less ‘siloed.'” Their study shows that “63 percent of people admit that they took data from their last job and brought it to their current job.”

 

We will also continue to see more fake apps and shopping cart viruses, new account fraud, apps that share our data along with phishing scams (and whaling scams if you’re a high-ranking executive or banker). Identity theft will also be rampant through social media. Lastly, child identity theft will continue to rise. It is suggested that every child have a credit freeze on their file. If you would like more information about how to do so, please reach out to our Member Services team at [email protected] or call 1.888.966.4827. We are here to help 24/7/365.

Scams, Scams and More Darn Scams

Scams, Scams and More Darn Scams

Did you know that there are at least 48 different types of identity theft and the number of scams involved in each is growing daily? Romance scams, residence scams, utility scams, employment scams, telephone scams, email scams, charity scams, Apple care scams, AirBNB scams, PayPal scams, census scams, ticket scams, government scams, medical scams, insurance scams, real estate scams, investment scams, lottery and sweepstakes scams … there really isn’t one facet of our lives that isn’t ‘scam-able.’ As the weather turns colder, it kind of makes you want to curl up under an electric blanket and hibernate for a bit doesn’t it!

 

Although everyone with a social security number is at risk for identity theft, there are two groups that are targeted more often: children and seniors. The U.S. Department of Health & Human Services has studied why. They explain, “Children are targeted to establish a ‘clean slate.’ Seniors are targeted over the telephone and through phishing scams. Some studies suggest that people become more trusting as they age, which helps to explain why it’s more difficult for older adults to detect fraudsters.”

 

The next high-risk group that follows children and seniors are the military mostly due to deployment, which impacts their ability to respond to a threat in a timely manner. According to the Federal Trade Commission, military consumers are most affected by credit card and bank fraud. Another high-risk group is identity theft repeat victims. As reported in Consumer Affairs, “people who have previously been affected by identity theft are at a greater risk for future identity theft and fraud.” According to the Center for Victim Research, “7-10% of the U.S. population are victims of identity fraud each year and 21% of those experience multiple incidents of identity theft.”

 

Lastly, the deceased are targeted. Stealing a dead person’s identity, commonly known as “ghosting,” will often go unnoticed by surviving family for months or years. A report dating from 2012 stated that 2.5 million deceased American identities are stolen each year. Of those 2.5 million stolen identities, 800,000 were used to open lines of credit or get a mobile phone plan.

 

Fraudsters oftentimes repeat their favorite most lucrative scams, which are driven by major financial life moments, such as taxes and holiday shopping. Yes, it’s getting to be that time of year, and, guess what … the world’s largest online retailer, Amazon, is seeing a huge increase in fake Amazon.com order cancellation scams. If you receive an email about an order cancellation from Amazon, there’s a good chance it’s a scam. Click on links in the email and you could unintentionally download malware onto your device. Or you might be sent to a site that aims to collect your Amazon account information, like your username and password. If you receive such an email and recently placed an order, go to Amazon.com directly to check your order status.

 

Most of our blogs offer tips to help protect yourself and your family from identity theft. There is one tip in this blog: Remain aware of scams and that they can touch every facet of your life. By staying in-the-know, you can help every month be National Cybersecurity Awareness month … not just October.

 

If you suspect that you or a loved one has suffered identity theft, please reach out to us as soon as possible. Our Guard Well member services team is available around the clock, every day of the year. Email [email protected] or call 888.966.GUARD (4827) for help.

How to Protect Yourself During the U.S. Government Shutdown

Tax season and scams usually go hand in hand. With the longest government shutdown in history occurring during the same timeframe (January through April), there are added concerns.

Today marks the 32nd day that over 800,000 federal workers are not receiving pay, with 380,000 of them having to still report to work. Additionally, millions of government contractors are impacted, such as IT, research and project management professionals, as well as lower-wage janitors, security guards and cafeteria servers. While some federal employees may receive back pay when the government gets back up and running, contractors will not be reimbursed for this time off. Many are already receiving notices that their health insurance coverage has expired or will in the next few weeks[1]. With lapses in health insurance, medical identity theft will undoubtedly be on the rise.

Government shutdown or not, scammers are always hard at work trying to get your identity and money. During this time period it is going to be even easier for them to do so especially with nine out of 15 critical federal agencies and departments being closed.

The Federal Trade Commisson (FTC) is the government agency where you would file a report if your identity is compromised. The website that you would use to file said complaint with the FTC is identitytheft.gov. If you visit the website today, you will see that it has temporarily disappeared. Instead, a notice appears saying that operations will resume when the government is funded. If you can’t contact the FTC, where do you go for help if you suspect identity fraud has occurred?

What You Can Do

There are some immediate steps to take if you think your identity has been compromised:

  • File your taxes early. The best way to avoid a tax scam is to file your taxes as early as possible. The Internal Revenue Service (IRS) will still be reviewing tax returns. Unfortunately, if you are due a refund, that money will not provided until the government is funded.
  • Partnering with a reputable identity resolution provider is critical. Make sure that the identity theft coverage includes monitoring and full resolution services. Advanced monitoring uses powerful technology to scour billions of identity records and non-credit sources to detect fraud in credit, non-credit and public records. Full resolution involves many steps required to replace government documents, such as your driver’s license and passport, as well as protect your credit score.
  • File a police report and request a copy of it. You will need to give copies of the report to creditors as well as the credit bureaus.
  • Contact your bank(s) and/or insurance institutions and dispute fraudulent activity on the accounts.
  • Consider a credit freeze or fraud alert. A credit freeze locks down your credit while a fraud alert allows creditors to receive a copy of your credit report. Fraud alerts can prevent someone from opening an account in your name but they will not stop your existing accounts from being compromised. For victims of identity theft, an extended fraud alert can protect your credit for seven years.

During this uncertain time when we as individuals have no control over the government shutdown, taking some proactive steps to help keep our family safe and identities secure is more important than ever.

[1] Nova, Annie. CNBC. https://www.cnbc.com/2019/01/23/health-insurance-becomes-collateral-damage-for-workers-in-shutdown.html. January 23, 2019