Protect your identity

November 2010 Access Control & Identity Management, Information Security

Identity fraud, according to Wikipedia is “a form of fraud in which someone pretends to be someone else by assuming that person’s identity, typically in order to access resources or obtain credit and other benefits in that person’s name. The victim of identity theft (here meaning the person whose identity has been assumed by the identity thief) can suffer adverse consequences if he or she is held accountable for the perpetrator’s actions.”

But how can an identity be ‘stolen’? In a time when almost anything can be done on a computer, phishing is a common process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication. Communication claiming to be from a popular social web site, for example, can be used to lure the unsuspecting public.

Usually in the form of an e-mail or instant message, phishing typically directs recipients to enter details at a fake website which has been designed to closely resemble a legitimate one. The fraudsters then have the information they need to pose as the person who supplied the details, and the information is used for activities such as opening accounts or purchasing items fraudulently.

The public is regularly warned of such threats, but what about those phone calls we may innocently answer…

Remember this call?

Your cellphone rings. The caller ID is hidden…

“Hello.”

“Good afternoon Mrs Jones, I am phoning you from VMC Mobile. Your number has been selected and you qualify for two free tickets to the fourth game of the world cup”

“Tell me more.”

“First I need you to confirm your ID number please.”

You wait for the caller to read out your ID number so that you can confirm it. Nothing is forthcoming.

“Your ID number please,” the caller continues.

If you unthinkingly rattle off your ID number, followed by your address and any other information you are asked to ‘confirm’, you are supplying the caller with enough information for them to effectively pose as you!

Are you a victim?

Jayson O’Reilly, regional manager Africa, McAfee describes identity theft as a serious crime that can cost victims a lot of time and money by destroying their credit and ruining their reputations.

“Identity thieves and hackers target home computers because they know families often do not maintain adequate security protection on their PCs. This makes these family users easy and lucrative targets. Many hackers access your personal information in order to steal your identity and your money. Others might want to use your home computer as a shield to mask their identity as they steal from others,” says O’Reilly. “Phishing is a particular type of identity theft: the online method of fraudulently obtaining personal information for identity theft, such as passwords, social security numbers, and credit card details, by sending spoofed


e-mails that look like they come from trusted sources, such as banks or legitimate companies.”

According to O’Reilly typically, phishing e-mails request that recipients click on the link in the e-mail to verify or update contact details or credit card information. Like spam, identity theft e-mails are sent to a large number of e-mail addresses with the expectation that some percentage of recipients will read the messages and disclose their personal information.

Wally Gast, regional profit centre manager at Chartis South Africa, Personal Lines, Africa Region, defines identity theft as “the unauthorised and illegal use of personal information to obtain a loan or open credit accounts that the victim did not authorise.”

According to Gast, identity theft is on the rise, not only because of the vast amount of personal information that can be accessed via the Internet, but also the ‘low tech’ ways that this crime can be committed.

“This can happen when people lose or have their ID books stolen, when criminals go through your garbage to find old accounts and statements or swipe your mail for the same purpose. People really need to take care with documents when they throw them away. Shredding documents before disposal is a very good idea,” says Gast.

“We also take note of notorious cases where the Department of Home Affairs has issued duplicate identification books using the identification number of an innocent person. There are also a lot of cases where people have discovered they are ‘married’ to someone only when they start getting massive bills in the post. It is worthwhile to have protection against this type of crime especially as it is so prevalent in South Africa. Getting your identity back can take weeks of personal time and could cost tens of thousands of Rands in legal fees,” he adds.

O’Reilly further points out that this form of cybercrime is a federal crime in the United States and the country’s Federal Trade Commission has named identity fraud as the most popular form of consumer fraud.

In South Africa the issue continues to plague general trade, with authorities continuing to receive more complaints than in the past. It is particularly prevalent within the world of finance and fraudsters have emerged far more tech-savvy than in the past. It occurs when a criminal uses personal information to produce false FICA documents, to steal financial resources,” he adds.

Get protected

“As with any threat, the more a person is empowered with knowledge, the better. An example of identity fraud is when someone steals personal information, opens a credit account in your name without permission, and charges merchandise to those accounts. Conversely, identity fraud does not occur when a credit card is simply stolen. Stealing one’s credit card may be consumer fraud, but is not identity fraud” he adds.

Aside from being informed and staying informed, the consumer and user of information, communication and digital lifestyle technology has various options available to ensure that they do not fall victim to this fraud. The problem cannot completely be eradicated, but there are a number of steps that can be taken to reduce risk.

“Criminals can commit identity theft relatively easily because of lax credit industry practices, careless information-handling practices in the workplace, and the ease of obtaining personal information. But you can reduce your risk of fraud by following a few very practical tips. The most important advice we can give you is to check your credit report at least once a year. If you are a victim of identity theft, you will catch it early by checking your credit report regularly,” Gast concludes.

Buyer beware

* When using your credit and debit cards at restaurants and stores, pay close attention to how the magnetic stripe information is swiped by the waiter or clerk. Dishonest employees have been known to use small handheld devices called skimmers to commit fraud.

* When creating passwords and PINs (personal identification numbers), avoid using common information or combinations that would easily be linked to your details.

* Install a firewall on your home computer to prevent hackers from obtaining personal identifying and financial data from your hard drive. This is especially important if you connect to the Internet by DSL or cable modem.

* Install and update virus protection software to prevent a worm or virus from causing your computer to send out files or other stored information.

* Subscribe to an Identity Protection Services that offers insurance against identity theft.

Proactive steps for victims of ID theft

* Report the theft to local law enforcement representatives.

* File a complaint and complete the ID theft affidavit.

* Inform all relevant institutions of the fraudulent activity – both telephonically and in writing.

* Send follow-up letters to the credit bureaus detailing the status of resolution with institutions and creditors.

Telephone tactics

* When a caller asks you to ‘confirm’ any information, they need to supply that information first and you either confirm it as correct or not.

* Private information, eg, your full name, phone numbers, e-mail address, credit card numbers, postal address and e-mail address, could be used for identity theft. Do not give these out over the phone unless you have made the call and you are certain of whom you are talking to.

* Ask the caller to identify themselves by name and company. If you have any suspicion, ask to be transferred to their superior, and ask for a reference number for the call.

For more information contact:, Ideco, +27 (0)11 745 5600, www.ideco.co.za



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

There is a SaaS for everything, but at what cost, especially to SMEs?
Editor's Choice Information Security Security Services & Risk Management
Relying on SaaS platforms presents significant cybersecurity risks as the number of providers in your landscape increases, expanding your attack surface. It is important to assess the strength of the SaaS providers in your chain.

Read more...
New State of Physical Access Control Report from HID
HID Global Editor's Choice Access Control & Identity Management News & Events
HID released the 2024 State of Physical Access Control Report, identifying five key trends shaping access control's future and painting a picture of an industry that has been undergoing considerable transformation.

Read more...
Addressing today’s mining challenges: cyber risks beyond IT
Editor's Choice Information Security Mining (Industry)
Despite the mining industry’s operational technology systems being vulnerable to cyberattacks, many decision-makers still see these threats as purely an IT issue, even though a breach could potentially disrupt mining operations.

Read more...
Smart intercoms are transforming access control
Access Control & Identity Management Products & Solutions
Smart intercoms have emerged as a pivotal tool in modern access control. They provide a seamless and secure way to manage entry points without the need for traditional security guards to validate visitors before granting them access.

Read more...
How to effectively share household devices
Smart Home Automation Information Security
Sharing electronic devices within a household is unavoidable. South African teens spend over eight hours per day online, making device sharing among family members commonplace. Fortunately, there are methods to guarantee safe usage for everyone.

Read more...
Fortinet establishes new point-of-presence in South Africa
News & Events Information Security
Fortinet has announced the launch of a new dedicated point-of-presence (POP) in Isando, Johannesburg, to expand the reach and availability of Fortinet Unified SASE for customers across South Africa and southern African countries.

Read more...
New tools for investigation and robust infrastructure security
News & Events Information Security
Cybereason continues to enhance its security platform, with recent updates introducing improvements in file search operations, investigation query results, and cloud workload protection, providing more granular data and faster key artefact identification.

Read more...
Easy, secure access for student apartments
Paxton Access Control & Identity Management Surveillance
Enhancing Security and Convenience at Beau Vie II Student Accommodation, a student apartment block located at Banghoek Road, Stellenbosch, with Paxton's access control and video management solution

Read more...
Invixium acquires Triax Technologies
News & Events Access Control & Identity Management
Invixium has announced it has acquired Triax Technologies to expand its biometric solutions with AI-based RTLS (Real-Time Location Systems) offering for improved safety and productivity at industrial sites and critical infrastructure.

Read more...
ControliD's iDFace receives ICASA certification
Impro Technologies News & Events Access Control & Identity Management
The introduction of Control iD's iDFace facial biometric reader, backed by mandatory ICASA certification, underscores the commitment to quality, compliance, and innovation.

Read more...