The average person will not discover that their identity has been stolen until 14 months after the crime. - TBG Solutions
ETCOG recently teamed up with TBG Solutions of Tyler to offer the new Cybersecurity Awareness training now required through HB 3834. Mark Seguin facilitated the training for ETCOG board/committee members and staff on January 30th. Mark educated attendees on phishing, data protection, social media safety, and other cybersecurity-related topics. Here are some noteworthy tips we wanted to share with our partners on common identity theft tactics:
Phishing/Vishing/Smishing
Phishing is data collection via email. Vishing is done over the phone. Smishing is through text message. If you ever receive a message or phone call asking for information or that just seems fishy do NOT click on links or give information out. Verify with the sender or call back the number the visher is claiming to be calling from.
Data Protection
Physical documents that contain credit card numbers, social security numbers, emails, addresses, dates of birth, or other sensitive data need to be shredded. To prevent mail theft, use a PO Box to send and receive mail. Keep all sensitive data stored in a locked safe, ideally.
Plausible Deniability
If you do not have a social media account, you leave the door open for identity thieves to create one for you and smear your reputation. In order to defend against these scandals, you need to have a social media account with at least a picture, your name and email address.
Debit and Credit Cards
Credit cards are safer than debit cards, since you don’t have to use your PIN number in the transaction. You should also check your credit and debit statements to make sure you recognize all charges.
ID Theft Protection
The question is no longer whether or not you need ID Theft protection; it is which ID Theft protection plan you have. Your plan should meet several criteria: black market chatroom monitoring, full restoration service (done for you, not just advice telling you how to do it), coverage for the entire family (child ID Theft is a major issue), as well as credit, document, and data monitoring.
Sound interesting? Stay tuned for future cyber security training opportunities at ETCOG!
If your organization or business has concerns with network security or other technology needs, contact our Regional Technology Solutions team. Through
Regional Technology Solutions, ETCOG can customize our services to meet your IT, GIS, aerial imagery, app building, photography, and multimedia printing needs. Schedule a consultation to see how we can build a customized plan to meet your needs.