SlideShare una empresa de Scribd logo
1 de 2
Descargar para leer sin conexión
 

  Business Identity Theft Fact Sheet

 
 

 

What is Business Identity Theft? 
Business  identity  theft  is  a  relatively  new  type  of  crime  that  is  on  the  rise  and 
spreading quickly throughout the U.S.  According to Dun & Bradstreet, a leading 
provider of business credit information in the U.S., business identity theft cases 
have been reported in at least 22 states. 

Business Identity Theft  


New and rapidly spreading type of ID theft  



Criminals hijack a legit business identity 



Criminals open accounts/steal using the legit 
business ID, often going unnoticed  



The victimized business is left holding the 
debts and credit damages from the crime 

Instead of targeting individuals for identity theft, criminals look for ways to steal 
a  legitimate  business  identity  by  gaining  access  to  its  bank  accounts  and  credit 
cards, as well as other sensitive company information.  Thieves then secure lines 
of credit with banks and retailers at the expense of the victim entity.  Once the 
scheme is uncovered, businesses may need to spend valuable time and resources 
to repair the damage to their credit and reputation, and banks and retailers may 
be left with significant financial losses.    

How Do Criminals Steal Business Identities?  
Examples  of  business  identity  theft  include  a  variety  of  schemes  involving 
fraudulent use of a company’s information, including:  


 

Use of Business Records 




Criminals looking to gain access to online 
business records 





Attempting to exploit state business 



registration websites  


Thieves altering data to open accounts 

 

Impact of Business Identity Theft  


Tarnished business credit history 



Costly and time consuming to fix 

Clever  criminals  are  using  the  economic  downturn  to  their  advantage  by 
targeting inactive companies, or companies that can be re‐instated for business.  

Difficulty obtaining future credit  



Establishing  temporary  office  space  and/or  merchant  accounts  in  your 
company’s name 
Ordering merchandise or services with stolen credit card information, or 
with bogus account details in the name of your company 
Scams  and  phishing  attacks  designed  to  get  access  to  your  company’s 
banking or credit information, including rummaging through your trash 
Filing  bogus  reports  with  state  business  filing  offices,  or  manipulating 
online  business  records,  in  order  to  change  your  registered  address  or 
appoint new officers/change your registered agent information (to then 
establish lines of credit with banks and retailers) 

 

State and National Efforts 


Outreach to the business community, 
particularly small and medium‐sized entities 



Information‐sharing between the States 



How Can Businesses Prevent Business Identity Theft? 
One of the most effective ways to protect your business from identity theft is by 
regularly checking your records with the Secretary of State’s office (or the state 
agency responsible for housing such information).  These offices provide online 
search features that make it easy to check and verify that business registration 
information  is  accurate.    Businesses  should  notify  the  Secretary  of  State of  any 
unauthorized changes.  Other prevention steps include:  

Establishment of National Association of 
Secretaries of State Identity Theft Task Force 

 



Sign up for email notification of business record changes, if available 



Monitor credit reports and sign up for a credit monitoring service 

 
National Association of Secretaries of State   

                                                                                          June 2011 
 
 

(Continued)  How Can Businesses Prevent Business 
Identity Theft? 


Monitor  business  accounts,  bills,  credit  card  statements,  etcetera,  and 
reconcile your statements on a regular basis 



Sign  up  for  email  notifications  from  banks  and  other  creditors,  if 
available 



File  all  reports  and  renewals  with  state  filing  offices  in  a  timely  and 
thorough  manner,  and  remain  aware  of  who  has  access  to  this 
information within your company 

Tips to Shield Yourself from Business 



Identity Theft 



Continue checking business records, even if your business is dissolved or 
inactive 
Safeguard your company’s sensitive information, including account 
numbers and passwords, being sure to shred any trash that contains this 
information 
Ensure that your computers are secure, and train employees to avoid 
phishing scams and emails that may contain malicious viruses  



Prevent:  Check business records regularly 



Protect:  Sign up for email alerts available & 



monitor credit reports on a regular basis 


Preserve:  Report any irregularities or 
problems immediately  

 

If You Suspect a Problem 


Contact law enforcement  and credit agencies 



Contact the Secretary of State’s office 



If you suspect that your company has become a victim of business identity theft, 
it is important to take quick action to minimize the potential damage.  Steps you 
should take in this situation include: 

Notify banks and creditors right away 



What to Do if Business Identity Theft Occurs? 

Correct any altered business records  




Place a fraud alert on business/merchant accounts 



Notify local and/or state law enforcement officials 



Request  copies  of  documentation  used  to  fraudulently  open  or  access 
accounts 



 

Report the issue to the credit reporting agencies (e.g. Dun & Bradstreet, 
Equifax, Experian, TransUnion) 


 

Contact  banks,  credit  card  providers,  and  other  relevant  creditors  to 
notify them of the fraud 

If  the  theft  involves  unauthorized  changes  to  business  information  on 
file with the state, correct the records and notify the Secretary of State’s 
Office (or the state agency responsible for housing such information)  

 
 
 
 
 

 

 

 

 

Additional State and National Resources 
 
State Website Page Here: www.ProtectYourBusiness.us  
 
The National Association of Secretaries of State: www.nass.org  
 
National Federation of Independent Small Business: www.nfib.org  
 
U.S. Secret Service Field Offices: www.secretservice.gov/field_offices.shtml 
 

 

National Association of Secretaries of State   

                                                                                          June 2011 

Más contenido relacionado

Más de - Mark - Fullbright

Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019- Mark - Fullbright
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019- Mark - Fullbright
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...- Mark - Fullbright
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)- Mark - Fullbright
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report- Mark - Fullbright
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 - Mark - Fullbright
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft- Mark - Fullbright
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017- Mark - Fullbright
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business- Mark - Fullbright
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business- Mark - Fullbright
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report- Mark - Fullbright
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016- Mark - Fullbright
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015- Mark - Fullbright
 
Identity Theft - Proactive / Reactive First Steps
Identity Theft - Proactive / Reactive First Steps Identity Theft - Proactive / Reactive First Steps
Identity Theft - Proactive / Reactive First Steps - Mark - Fullbright
 
Fifth Annual Study on Medical Identity Theft
Fifth Annual Study on Medical Identity TheftFifth Annual Study on Medical Identity Theft
Fifth Annual Study on Medical Identity Theft- Mark - Fullbright
 
Consumer Sentinel Network Report 2014
Consumer Sentinel Network Report 2014Consumer Sentinel Network Report 2014
Consumer Sentinel Network Report 2014- Mark - Fullbright
 
The Human Right to Privacy in the Digital Age
The Human Right to Privacy in the Digital Age The Human Right to Privacy in the Digital Age
The Human Right to Privacy in the Digital Age - Mark - Fullbright
 

Más de - Mark - Fullbright (20)

Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
 
2018 IC3 Report
2018 IC3 Report2018 IC3 Report
2018 IC3 Report
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018
 
Credit Score Explainer
Credit Score ExplainerCredit Score Explainer
Credit Score Explainer
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015
 
Identity Theft - Proactive / Reactive First Steps
Identity Theft - Proactive / Reactive First Steps Identity Theft - Proactive / Reactive First Steps
Identity Theft - Proactive / Reactive First Steps
 
DATA BREACH CHARTS
DATA BREACH CHARTSDATA BREACH CHARTS
DATA BREACH CHARTS
 
Fifth Annual Study on Medical Identity Theft
Fifth Annual Study on Medical Identity TheftFifth Annual Study on Medical Identity Theft
Fifth Annual Study on Medical Identity Theft
 
Consumer Sentinel Network Report 2014
Consumer Sentinel Network Report 2014Consumer Sentinel Network Report 2014
Consumer Sentinel Network Report 2014
 
The Human Right to Privacy in the Digital Age
The Human Right to Privacy in the Digital Age The Human Right to Privacy in the Digital Age
The Human Right to Privacy in the Digital Age
 

Último

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxdhanalakshmis0310
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxAmanpreet Kaur
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxAmita Gupta
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 

Último (20)

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 

Business Identity Theft Fact Sheet

  • 1.     Business Identity Theft Fact Sheet       What is Business Identity Theft?  Business  identity  theft  is  a  relatively  new  type  of  crime  that  is  on  the  rise  and  spreading quickly throughout the U.S.  According to Dun & Bradstreet, a leading  provider of business credit information in the U.S., business identity theft cases  have been reported in at least 22 states.  Business Identity Theft    New and rapidly spreading type of ID theft    Criminals hijack a legit business identity   Criminals open accounts/steal using the legit  business ID, often going unnoticed    The victimized business is left holding the  debts and credit damages from the crime  Instead of targeting individuals for identity theft, criminals look for ways to steal  a  legitimate  business  identity  by  gaining  access  to  its  bank  accounts  and  credit  cards, as well as other sensitive company information.  Thieves then secure lines  of credit with banks and retailers at the expense of the victim entity.  Once the  scheme is uncovered, businesses may need to spend valuable time and resources  to repair the damage to their credit and reputation, and banks and retailers may  be left with significant financial losses.     How Do Criminals Steal Business Identities?   Examples  of  business  identity  theft  include  a  variety  of  schemes  involving  fraudulent use of a company’s information, including:      Use of Business Records    Criminals looking to gain access to online  business records    Attempting to exploit state business   registration websites    Thieves altering data to open accounts    Impact of Business Identity Theft    Tarnished business credit history   Costly and time consuming to fix  Clever  criminals  are  using  the  economic  downturn  to  their  advantage  by  targeting inactive companies, or companies that can be re‐instated for business.   Difficulty obtaining future credit    Establishing  temporary  office  space  and/or  merchant  accounts  in  your  company’s name  Ordering merchandise or services with stolen credit card information, or  with bogus account details in the name of your company  Scams  and  phishing  attacks  designed  to  get  access  to  your  company’s  banking or credit information, including rummaging through your trash  Filing  bogus  reports  with  state  business  filing  offices,  or  manipulating  online  business  records,  in  order  to  change  your  registered  address  or  appoint new officers/change your registered agent information (to then  establish lines of credit with banks and retailers)    State and National Efforts   Outreach to the business community,  particularly small and medium‐sized entities   Information‐sharing between the States   How Can Businesses Prevent Business Identity Theft?  One of the most effective ways to protect your business from identity theft is by  regularly checking your records with the Secretary of State’s office (or the state  agency responsible for housing such information).  These offices provide online  search features that make it easy to check and verify that business registration  information  is  accurate.    Businesses  should  notify  the  Secretary  of  State of  any  unauthorized changes.  Other prevention steps include:   Establishment of National Association of  Secretaries of State Identity Theft Task Force     Sign up for email notification of business record changes, if available   Monitor credit reports and sign up for a credit monitoring service    National Association of Secretaries of State                                                                                              June 2011 
  • 2.     (Continued)  How Can Businesses Prevent Business  Identity Theft?   Monitor  business  accounts,  bills,  credit  card  statements,  etcetera,  and  reconcile your statements on a regular basis   Sign  up  for  email  notifications  from  banks  and  other  creditors,  if  available   File  all  reports  and  renewals  with  state  filing  offices  in  a  timely  and  thorough  manner,  and  remain  aware  of  who  has  access  to  this  information within your company  Tips to Shield Yourself from Business   Identity Theft   Continue checking business records, even if your business is dissolved or  inactive  Safeguard your company’s sensitive information, including account  numbers and passwords, being sure to shred any trash that contains this  information  Ensure that your computers are secure, and train employees to avoid  phishing scams and emails that may contain malicious viruses    Prevent:  Check business records regularly   Protect:  Sign up for email alerts available &   monitor credit reports on a regular basis   Preserve:  Report any irregularities or  problems immediately     If You Suspect a Problem   Contact law enforcement  and credit agencies   Contact the Secretary of State’s office   If you suspect that your company has become a victim of business identity theft,  it is important to take quick action to minimize the potential damage.  Steps you  should take in this situation include:  Notify banks and creditors right away   What to Do if Business Identity Theft Occurs?  Correct any altered business records     Place a fraud alert on business/merchant accounts   Notify local and/or state law enforcement officials   Request  copies  of  documentation  used  to  fraudulently  open  or  access  accounts     Report the issue to the credit reporting agencies (e.g. Dun & Bradstreet,  Equifax, Experian, TransUnion)     Contact  banks,  credit  card  providers,  and  other  relevant  creditors  to  notify them of the fraud  If  the  theft  involves  unauthorized  changes  to  business  information  on  file with the state, correct the records and notify the Secretary of State’s  Office (or the state agency responsible for housing such information)                     Additional State and National Resources    State Website Page Here: www.ProtectYourBusiness.us     The National Association of Secretaries of State: www.nass.org     National Federation of Independent Small Business: www.nfib.org     U.S. Secret Service Field Offices: www.secretservice.gov/field_offices.shtml      National Association of Secretaries of State                                                                                              June 2011