Guide 2 Identity Theft - How To Protect Yourself

   
Guide 2 Identity Theft

Books

Shredders

Basic Information
 What is Identity Theft
 How It Happens
 Types of Identity Theft
 Warning Signs

Commercial Identity Theft
 Access Codes

Watch Out For
 Credit Card Risks
 Public Records
 Debit & ATM Cards
 Passports
 Spoofs & Phishing
 Stolen Checks
 Unsolicited Card Offers

Security Tips
 Credit Reporting Agencies
 If Your Identity Is Stolen
 Secure Passwords

Links
 
 














































 
Guide 2 Identity Theft   >   Commercial

Commercial Identity Theft


Just like individuals, businesses are at risk from identity theft. However, in the case of businesses, the potential losses can be much larger, so this can make them a particularly attractive target to criminals.

The identity thief and the confidence trickster have many similarities. It is very easy for a confidence trickster to say: "I work for XYZ Corporation, just charge it to our account". Every businesses wants to make sales, and in the rush to respond to what appears to be a legitimate customer, it can be tempting for businesses to simply accept these instructions, especially if the person appears to be credible and to know all the usual procedures.

If the thief that is equipped with a little inside information, like an order number or order form in the correct format, a business card, or some more official-looking identity document, and if there is nothing inherently unusual or suspicious about the transaction, the chances are high that the thief will simply be believed. Sales and customer service people keen for business are much less likely to turn down what seems to be a credible deal than would a suspicious accountant from the back room.

Smaller transactions are especially susceptible: a taxi fare, a routine stationery purchase. As these types of purchases are not usually closely scrutinized, they are also much less likely to be detected by a larger company through their internal auditing processes. Some identity thieves are much more ambitious: orders for goods, or sales of services (such as advertising that will never be published), are particularly fertile areas for identity thieves.

Nowadays, we tend to think the world has become too sophisticated for a confidence trickster to get away with scams like the legendary "sale of the Brooklyn Bridge". However, the longevity and huge ongoing scale of the famous Nigerian letter or email (requesting an advance money transfer) scam tells us that people and businesses today are as gullible and greedy as ever. A recent BBC report estimated this scam costs the British economy 150 million pounds each year, and that is the cost to just one of the many countries affected by this quarter century old scam.

The best defense against commercial identity theft is to have routine verification and documentation procedures in place:
  • All transactions should be reviewed, but the larger the transaction size, the more important these procedures become

  • Having a supervisor approve transactions over a certain amount, creates an additional opportunity to detect identity theft

  • Credit authorization procedures should require at least some investigation before the transaction is completed

  • Implementing procedures to verify unusual delivery instructions will make identity theft more difficult

  • Many companies refuse to pay an invoice that does not have a matching company order number

  • One of the best defenses is simply good customer service: if staff know a customer well it will soon become clear if an impersonator is not part of the customer's usual team or is not doing business in the customer's usual way.

  • If necessary, more sophisticated transaction approval procedures can be used to assess risks according to past experience, and flag potential problems for closer attention
Of course, what businesses do not want to do, is put so many procedures in place that it deters legitimate customers from ordering. Finding the right balance between growing their sales and fraud prevention is an ongoing challenge for companies, but it is nevertheless one that they must face.

The use of information systems for fast data access and communication improve the odds of early detection and prevention of commercial identity theft. Information systems can also help streamline and facilitate the security procedures needed to prevent fraud.


 
       
Links
 Anti Spam Downloads
 Anti Spam Software
 Anti Spyware eBooks
 Anti Spyware Guide
 Anti Spyware Software
 Anti Virus Software
 Anti Virus eBooks
 Backup Downloads
 Backup Software
 Crime Prevention eBooks
 Privacy Protection Downloads
 Security Downloads
 Security eBooks


 
 
 
 

 
 
The information on this site is designed to help you understand the issues and improve your protection. No method of protection can be absolute. We recommend that you keep abreast of the ever-changing issues and do your own research to keep informed.

Copyright © 2006-2024, Answers 2000 Limited

CERTAIN CONTENT THAT APPEARS ON THIS SITE COMES FROM AMAZON SERVICES LLC. THIS CONTENT IS PROVIDED 'AS IS' AND IS SUBJECT TO CHANGE OR REMOVAL AT ANY TIME.
CERTAIN CONTENT THAT APPEARS ON THIS SITE,COMES FROM AMAZON EU S.à r.l. THIS CONTENT IS PROVIDED 'AS IS' AND IS SUBJECT TO CHANGE OR REMOVAL AT ANY TIME.

Disclosure: Our company's websites' content (including this website's content) includes advertisements for our own company's websites, products, and services, and for other organization's websites, products, and services. In the case of links to other organization's websites, our company may receive a payment, (1) if you purchase products or services, or (2) if you sign-up for third party offers, after following links from this website. Unless specifically otherwise stated, information about other organization's products and services, is based on information provided by that organization, the product/service vendor, and/or publicly available information - and should not be taken to mean that we have used the product/service in question. Additionally, our company's websites contain some adverts which we are paid to display, but whose content is not selected by us, such as Google AdSense ads. For more detailed information, please see Advertising/Endorsements Disclosures

Our sites use cookies, some of which may already be set on your computer. Use of our site constitutes consent for this. For details, please see Privacy.

Click privacy for information about our company's privacy, data collection and data retention policies, and your rights.

Contact Us   Privacy   Terms of Use   Advertising/Endorsements Disclosures

In Association With Amazon.com
Answers 2000 Limited is a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for sites to earn advertising fees by advertising and linking to Amazon.com.
In Association With Amazon.co.uk
Answers 2000 Limited is a participant in the Amazon EU Associates Programme, an affiliate advertising programme designed to provide a means for sites to earn advertising fees by advertising and linking to Amazon.co.uk.
As an Amazon Associate, our company earns from qualifying purchases. Amazon, the Amazon logo, Endless, and the Endless logo are trademarks of Amazon.com, Inc. or its affiliates.


All trademarks are property of their respective owners.
All third party content and adverts are copyright of their respective owners.