SlideShare una empresa de Scribd logo
1 de 9
SAFEGUARDING YOURSELF
FROM IDENTITY THEFT
By: Sentinel Background Checks
IDENTITY
THEFT
• It can be a nightmare in its simplest form and
can even ruin a life in extreme circumstances.
• Identity theft is something that should be
monitored all year long, especially when tax
season arrives.
TAX FRAUD THROUGH
IDENTITY THEFT
• Every year more and more people take advantage of filing their tax
return online. Unfortunately, this can increase the chances of identity
theft.
• Tax fraud through identity theft has become an increasing concern for
the Internal Revenue Service (IRS).
• “As of March 5, 2016…the IRS had identified 42,148 tax returns with
$227 million claimed in fraudulent refunds.”-Robert W. Wood, FORBES
• By following this four-point-guide, you will not only understand how
simple it is for a thief to steal your information, but also learn how to
protect yourself from falling victim.
FOUR-POINT-POINT GUIDE TO
PROTECTING YOUR IDENTITY
1.Know when to Share Social
Security Number.
2.Don’t Overshare on Social
Media.
3.Shred, Shred, Shred.
4.Avoid Unsecured Wi-Fi.
KNOW WHEN TO
SHARE SOCIAL
SECURITY NUMBER.
• You should only share your
SSN when you know the entity
you’re dealing with (I.E. bank,
work, etc.)
• If you ever receive a random
request for your SSN over the
phone or via an email, be
assured it is a scam
• Report it to the police
immediately.
DON’T OVERSHARE ON SOCIAL
MEDIA
• Many people are overly open on their social media
pages and don’t elect to set any privacy controls.
• Sharing too much information makes it easy for
identity thieves to piece together information about
your life so they can easily steal your identity.
• Protect your information by strengthening your privacy
settings.
SHRED, SHRED, SHRED
• many people make the mistake of
disposing of sensitive information in a
trash can instead of shredding.
• Bank statements, pay stubs, insurance
papers and tax forms all contain private
information that will help identity thieves
target you.
• A simple shredder costs less than $20
these days and can save you a lot of
trouble and a lot of expense.
AVOID UNSECURED
WI-FI
• Wi-Fi hotspots can be set up by
virtually anyone anywhere.
• Tapping into an unsecured hotspots
can allow a thief to steal your data
as if you handed them your phone
or computer with your passwords.
• Try to only use private and secured
connections. Especially when using
personal information.
IN HIS BOOK, THE BUSINESS IMMUNITY SYSTEM, SENTINEL
BACKGROUND CHECKS CEO RACHID ZAHIDI ALSO TACKLES
THE COMPLEXITIES OF HOW IDENTITY THEFT HAPPENS.
ZAHIDI COVERS MANY OF THE SAME PREVENTATIVE
MEASURES MENTIONED ABOVE BUT HE ALSO DELVES A BIT
DEEPER, EXPLAINING THAT THIEVES CAN EASILY STEAL W-2’S
FROM MAILBOXES.
Rachid Zahidi is president and CEO of Sentinel Background Checks and has
enjoyed a long career spanning multiple industries, including international
business, risk management, background checks, and anti-money laundering
investigations. For more information on the services offered by SB Checks, please
call (888) 725-2535 or visit sbchecks.com.

Más contenido relacionado

Similar a Safeguarding Yourself from Identity Theft

Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogQuicken Loans Zing Blog
 
Common Consumer Frauds and How to Avoid Them-03-14
Common Consumer Frauds and How to Avoid Them-03-14Common Consumer Frauds and How to Avoid Them-03-14
Common Consumer Frauds and How to Avoid Them-03-14Barbara O'Neill
 
How to Minimize the Damage of Identity Theft
How to Minimize the Damage of Identity TheftHow to Minimize the Damage of Identity Theft
How to Minimize the Damage of Identity TheftCost U Less Direct
 
Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Maven Logix
 
Significance of Cyber Security on Identity Theft v.3 [Final].pptx
Significance of Cyber Security on Identity Theft v.3 [Final].pptxSignificance of Cyber Security on Identity Theft v.3 [Final].pptx
Significance of Cyber Security on Identity Theft v.3 [Final].pptxGerardoCasio1
 
Ict Phishing (Present)
Ict   Phishing (Present)Ict   Phishing (Present)
Ict Phishing (Present)aleeya91
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayanehaz
 
12002040701065 SEMINAR this is ppt in pd
12002040701065 SEMINAR this is ppt in pd12002040701065 SEMINAR this is ppt in pd
12002040701065 SEMINAR this is ppt in pdjeelsonani003567
 
Identity Theft Lake Placid 2012
Identity Theft Lake Placid 2012Identity Theft Lake Placid 2012
Identity Theft Lake Placid 2012Mark Kotzin
 
Identity theft in the internet
Identity theft in the internetIdentity theft in the internet
Identity theft in the internetmohmd-kutbi
 
Senior Protection Guide - Canada
Senior Protection Guide - CanadaSenior Protection Guide - Canada
Senior Protection Guide - Canada- Mark - Fullbright
 

Similar a Safeguarding Yourself from Identity Theft (20)

Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing Blog
 
Identity Theft ppt
Identity Theft pptIdentity Theft ppt
Identity Theft ppt
 
Youth Protection Guide - Canada
Youth Protection Guide - CanadaYouth Protection Guide - Canada
Youth Protection Guide - Canada
 
Idenity Theft
Idenity TheftIdenity Theft
Idenity Theft
 
Common Consumer Frauds and How to Avoid Them-03-14
Common Consumer Frauds and How to Avoid Them-03-14Common Consumer Frauds and How to Avoid Them-03-14
Common Consumer Frauds and How to Avoid Them-03-14
 
How to Minimize the Damage of Identity Theft
How to Minimize the Damage of Identity TheftHow to Minimize the Damage of Identity Theft
How to Minimize the Damage of Identity Theft
 
Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Identity Theft.pptx
Identity Theft.pptxIdentity Theft.pptx
Identity Theft.pptx
 
Protect Your Identity
Protect Your IdentityProtect Your Identity
Protect Your Identity
 
Significance of Cyber Security on Identity Theft v.3 [Final].pptx
Significance of Cyber Security on Identity Theft v.3 [Final].pptxSignificance of Cyber Security on Identity Theft v.3 [Final].pptx
Significance of Cyber Security on Identity Theft v.3 [Final].pptx
 
Ict Phishing (Present)
Ict   Phishing (Present)Ict   Phishing (Present)
Ict Phishing (Present)
 
Fight Back Against Identity Theft 98160
Fight Back Against Identity Theft  98160Fight Back Against Identity Theft  98160
Fight Back Against Identity Theft 98160
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Identity Theft Toolkit
Identity Theft ToolkitIdentity Theft Toolkit
Identity Theft Toolkit
 
12002040701065 SEMINAR this is ppt in pd
12002040701065 SEMINAR this is ppt in pd12002040701065 SEMINAR this is ppt in pd
12002040701065 SEMINAR this is ppt in pd
 
Identity Theft Lake Placid 2012
Identity Theft Lake Placid 2012Identity Theft Lake Placid 2012
Identity Theft Lake Placid 2012
 
Data Privacy
Data PrivacyData Privacy
Data Privacy
 
Identity theft in the internet
Identity theft in the internetIdentity theft in the internet
Identity theft in the internet
 
Senior Protection Guide - Canada
Senior Protection Guide - CanadaSenior Protection Guide - Canada
Senior Protection Guide - Canada
 

Más de Sentinel Background Checks (6)

Termination of employment
Termination of employmentTermination of employment
Termination of employment
 
How Bad Hires Can Lead to Lost Revenue
How Bad Hires Can Lead to Lost RevenueHow Bad Hires Can Lead to Lost Revenue
How Bad Hires Can Lead to Lost Revenue
 
Education Fraud
Education FraudEducation Fraud
Education Fraud
 
Anatomy of Boomerang Employees
Anatomy of Boomerang EmployeesAnatomy of Boomerang Employees
Anatomy of Boomerang Employees
 
Employee Drug Testing
Employee Drug TestingEmployee Drug Testing
Employee Drug Testing
 
Background checks for Rental Properties
Background checks for Rental PropertiesBackground checks for Rental Properties
Background checks for Rental Properties
 

Último

Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operationalssuser3e220a
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdfMr Bounab Samir
 
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxMan or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxDhatriParmar
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
Mental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young mindsMental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young mindsPooky Knightsmith
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDhatriParmar
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1GloryAnnCastre1
 
Multi Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleMulti Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleCeline George
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQuiz Club NITW
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfPrerana Jadhav
 
How to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseHow to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseCeline George
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...Nguyen Thanh Tu Collection
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxSayali Powar
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataBabyAnnMotar
 

Último (20)

Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operational
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdf
 
Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"
 
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxMan or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
Mental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young mindsMental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young minds
 
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of EngineeringFaculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1
 
Multi Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleMulti Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP Module
 
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptxINCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdf
 
How to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseHow to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 Database
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
 
Paradigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTAParadigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTA
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped data
 

Safeguarding Yourself from Identity Theft

  • 1. SAFEGUARDING YOURSELF FROM IDENTITY THEFT By: Sentinel Background Checks
  • 2. IDENTITY THEFT • It can be a nightmare in its simplest form and can even ruin a life in extreme circumstances. • Identity theft is something that should be monitored all year long, especially when tax season arrives.
  • 3. TAX FRAUD THROUGH IDENTITY THEFT • Every year more and more people take advantage of filing their tax return online. Unfortunately, this can increase the chances of identity theft. • Tax fraud through identity theft has become an increasing concern for the Internal Revenue Service (IRS). • “As of March 5, 2016…the IRS had identified 42,148 tax returns with $227 million claimed in fraudulent refunds.”-Robert W. Wood, FORBES • By following this four-point-guide, you will not only understand how simple it is for a thief to steal your information, but also learn how to protect yourself from falling victim.
  • 4. FOUR-POINT-POINT GUIDE TO PROTECTING YOUR IDENTITY 1.Know when to Share Social Security Number. 2.Don’t Overshare on Social Media. 3.Shred, Shred, Shred. 4.Avoid Unsecured Wi-Fi.
  • 5. KNOW WHEN TO SHARE SOCIAL SECURITY NUMBER. • You should only share your SSN when you know the entity you’re dealing with (I.E. bank, work, etc.) • If you ever receive a random request for your SSN over the phone or via an email, be assured it is a scam • Report it to the police immediately.
  • 6. DON’T OVERSHARE ON SOCIAL MEDIA • Many people are overly open on their social media pages and don’t elect to set any privacy controls. • Sharing too much information makes it easy for identity thieves to piece together information about your life so they can easily steal your identity. • Protect your information by strengthening your privacy settings.
  • 7. SHRED, SHRED, SHRED • many people make the mistake of disposing of sensitive information in a trash can instead of shredding. • Bank statements, pay stubs, insurance papers and tax forms all contain private information that will help identity thieves target you. • A simple shredder costs less than $20 these days and can save you a lot of trouble and a lot of expense.
  • 8. AVOID UNSECURED WI-FI • Wi-Fi hotspots can be set up by virtually anyone anywhere. • Tapping into an unsecured hotspots can allow a thief to steal your data as if you handed them your phone or computer with your passwords. • Try to only use private and secured connections. Especially when using personal information.
  • 9. IN HIS BOOK, THE BUSINESS IMMUNITY SYSTEM, SENTINEL BACKGROUND CHECKS CEO RACHID ZAHIDI ALSO TACKLES THE COMPLEXITIES OF HOW IDENTITY THEFT HAPPENS. ZAHIDI COVERS MANY OF THE SAME PREVENTATIVE MEASURES MENTIONED ABOVE BUT HE ALSO DELVES A BIT DEEPER, EXPLAINING THAT THIEVES CAN EASILY STEAL W-2’S FROM MAILBOXES. Rachid Zahidi is president and CEO of Sentinel Background Checks and has enjoyed a long career spanning multiple industries, including international business, risk management, background checks, and anti-money laundering investigations. For more information on the services offered by SB Checks, please call (888) 725-2535 or visit sbchecks.com.