Feb 12 - Day 18 Do your employees understand the severity of identity theft?
- janelehman
- Feb 12, 2021
- 2 min read
Do you trust the people who have access to sensitive data on your computers? Trust is not enough.
Do they understand why they need to be diligent regarding the security of all online activity on company computers?
IDENTITY THEFT DOES NOT DISCRIMINATE!
Here are 2 examples, both true.
A woman once told me that her 2-year bought a BMW in New York. She lives in another state, but someone got her son's social security number and used it to secure a loan for the purchase of a car, more than likely because they didn't have credit of their own to secure a loan. She found out when she went to open a savings account for her son. The background check showed a line of credit.
A friend of mine lost her husband to cancer. 3 years after he died, she started getting credit card bills in his name for things he was supposedly buying. Can you eve
n imagine the devastating feeling that could cause someone?
From the moment a baby has a social security number until after a person dies, identity theft is debilitating and can cost your business and employees many hours and dollar to handle.
Consider that almost 25% of data breaches are caused by human error. Whether it's weak passwords, employees working on personal devices, lack of understanding about cyber risks, or some other reason, human error is a big factor in the security of your business.
Comprehensive identity theft protection for employees, not just monitoring services, is highly recommended, but educating your entire staff is also vital, especially with the incidence of cyber attacks and data breaches becoming more common all the time.
Identity theft, like cyber crime issues, can cripple your business.
Do you believe your current security is enough to protect your employees and business from identity theft?
Before answering that question, consider that the US government, Airforce, large insurance companies and credit bureaus have all been hacked. Now, consider that question again.






Comments