{"id":4753,"date":"2020-06-22T14:03:50","date_gmt":"2020-06-22T14:03:50","guid":{"rendered":"http:\/\/dev.cynance.co\/?p=4753"},"modified":"2020-10-27T12:30:16","modified_gmt":"2020-10-27T12:30:16","slug":"identity-theft-how-the-hell-did-it-happen","status":"publish","type":"post","link":"https:\/\/outofsite.biz\/cynance\/identity-theft-how-the-hell-did-it-happen\/","title":{"rendered":"Identity theft. How the hell did it happen?"},"content":{"rendered":"

[vc_row][vc_column][vc_column_text css=”.vc_custom_1603801711343{padding-bottom: 50px !important;}”]<\/p>\n

\n

Gemma Combellack\u2019s story, as published in the BBC magazine<\/a> this weekend, is yet another example of the grave results of identity thefts. Gemma discovered she’d become a victim of an identity theft when she was refused a mortgage over a payday loan in her name that she knew nothing about. Apparently, Gemma’s is not alone.<\/p>\n

Malicious actors use various techniques in order to obtain information about unsuspecting individuals online\/ offline. One of these techniques could be simply asking the victim for it<\/a> (or his\/ her friends\/ relatives), using the right lingo or previous knowledge about the victim, which can be obtained online or otherwise. This many times involves the malicious actors pretending to be someone they are not or making an offer the victim can\u2019t refuse.<\/p>\n

Other means could be exploiting unsuspecting third party service providers, convincing them to provide the attacker with the victim’s personal information or even credentials to access accounts, passwords reset, etc. It may sound unlikely, but it actually is if you give it another thought; How would you react if you were a customer representative and hear a \u201cstressed\u2019\u2019 mom calling you with her baby crying in the background<\/a> asking for some apparently non-sensitive information of her husband? After all, she is the wife, and you could be helping someone in distress, so you may very easily not sense the risk and ignore the strict rules of privacy and company internal policies.<\/p>\n

Another good source for identity theft are massive data breaches<\/a>, of which we hear\/ read about on a weekly basis these days, and which result with leaks of data about individuals. Some of these pieces of data, even if at first sight seem insignificant, could be added to other details and together form enough information to serve an identity theft attempt.<\/p>\n

Completing the puzzle using data collected over the public domain<\/a> + data from customer support centers + data from past data breaches + data that the victim or his\/her friends\/ family provided the adversary with, could easily result with the story described in the article by BBC.<\/p>\n

What can you do to mitigate the risk of identity theft?<\/h3>\n

Awareness<\/strong> – It can happen to anyone. No one is immune. Therefore, educating yourself and your relatives about the potential risks of identity thefts and the countermeasures to apply is crucial to your ability to prevent its poor consequences.<\/p>\n

Prevention<\/strong> – An assessment<\/u><\/a> of one\u2019s digital posture, major consumed services and the crown jewel information that have to be protected may allow to detect potential security weak points to be treated and exposures to remediate.<\/p>\n

Reaction<\/strong> – If you would notice that your identity was stolen by a malicious party, what would you do? Good question ahh…?! Have a prepared recovery plan that is set as a \u2018cookbook\u2019, describing the steps to be made for fast and cost effective recovery.<\/p>\n

Stay safe.<\/p>\n<\/div>\n

[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"

Malicious actors use various techniques in order to obtain information from unsuspecting users, utilising successful identify theft attacks.<\/p>\n","protected":false},"author":4,"featured_media":6313,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[19],"tags":[],"_links":{"self":[{"href":"https:\/\/outofsite.biz\/cynance\/wp-json\/wp\/v2\/posts\/4753"}],"collection":[{"href":"https:\/\/outofsite.biz\/cynance\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/outofsite.biz\/cynance\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/outofsite.biz\/cynance\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/outofsite.biz\/cynance\/wp-json\/wp\/v2\/comments?post=4753"}],"version-history":[{"count":0,"href":"https:\/\/outofsite.biz\/cynance\/wp-json\/wp\/v2\/posts\/4753\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/outofsite.biz\/cynance\/wp-json\/wp\/v2\/media\/6313"}],"wp:attachment":[{"href":"https:\/\/outofsite.biz\/cynance\/wp-json\/wp\/v2\/media?parent=4753"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/outofsite.biz\/cynance\/wp-json\/wp\/v2\/categories?post=4753"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/outofsite.biz\/cynance\/wp-json\/wp\/v2\/tags?post=4753"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}