SYS-CON MEDIA Authors: Jnan Dash, Elizabeth White, Yeshim Deniz, Pat Romanski, Nikita Ivanov

News Feed Item

Consumers: A Click Away From the Heartbleed Bug Ruining Credit

Community Choice Financial Offers Tips to Protect Against Identity Theft

COLUMBUS, OH--(Marketwired - April 18, 2014) - Every year approximately 10 million Americans become victims of identity theft. Just last week a new online virus, the Heartbleed Bug, was discovered that can compromise the usernames and passwords of websites that people use every day to shop, email and bank.

CNNMoney.com reported that more than 80 percent of sites run on Web server programs that are vulnerable to the Heartbleed Bug.

"Americans work hard to build their credit and provide financial security for themselves and their families," said John Rowe, a senior vice president at Community Choice Financial. "With the click of a mouse, those Americans could make themselves vulnerable to identity theft. The good news is that there are a variety of ways that you can minimize the damage caused by thieves as well as your chances of scammers taking advantage of you in the first place."

Community Choice Financial, a leading retailer of financial services to unbanked and underbanked consumers through a network of over 500 retail storefronts across 15 states and across more than 20 states via the Internet, outlined nine ways individuals can protect themselves from identity theft.

The following are some steps you can take to protect yourself and your finances from identity thieves:

  • Be sure to shred financial documents. Do not just throw out paperwork with financial and personal information.
  • Protect Social Security numbers. It is important to leave Social Security cards at home. Do not carry the cards in wallets or write the numbers on checks. Only provide Social Security numbers when absolutely necessary.
  • Avoid disclosing personal information by phone. Do not give out any personal information to unknown individuals or organizations over the phone, online or by mail. Legitimate business people will understand and won't apply pressure to do otherwise.
  • Establish a secure password. It's not a good idea to use obvious passwords such as a birthday or the last few digits of a Social Security number. These can be easily hacked, leaving important accounts vulnerable to thieves.
  • Check credit reports regularly. These reports contain important information that should be monitored regularly, such as bill payment history and active accounts. Regular reviews can provide an early warning of potential identity theft.
  • Review all financial statements. In addition to reviewing credit reports, it is critical to review all financial statements to check for any unauthorized transactions.
  • Close accounts that have been opened fraudulently or that have been misused by scammers. If one becomes the victim of identity theft, it is important to contact the security and fraud departments of financial companies and obtain any supporting documents in writing.
  • Report identity theft to your local authorities. Some creditors may want proof of the crime, so reporting it to local law enforcement and the Federal Trade Commission is beneficial. This will assist law enforcement nationwide with any investigations.
  • Keep Calm. Federal law limits liability for unauthorized charges on credit or debit cards. An individual's liability will depend on the type of card and the timeliness in reporting the theft.

"While there are certainly consumer protections in place to reduce the damage to individuals who are victims of identity theft, sometimes those protections are not enough," Rowe said. "It's important to remain vigilant and use opportunities, such as the Heartbleed Bug, to access your risks and strengthen your defenses against identity theft."

About Community Choice Financial

Community Choice Financial Inc.™ (CCFI) is a leading retailer of financial services to unbanked and underbanked consumers through a network of over 500 retail storefronts across 15 states and across more than 20 states via the Internet. CCFI focuses on providing consumers with a wide range of convenient consumer financial products and services to help them manage their day-to-day financial needs including short-term consumer loans, installment loans, check cashing, prepaid debit cards, money transfers, bill payments and money orders. For more information, visit www.ccfi.com.

The following files are available for download:

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
The 4th International DevOps Summit, co-located with16th International Cloud Expo – being held June 9-11, 2015, at the Javits Center in New York City, NY – announces that its Call for Papers is now open. Born out of proven success in agile development, cloud computing, and process automation, DevOps is a macro trend you cannot afford to miss. From showcase success stories from early adopters and web-scale businesses, DevOps is expanding to organizations of all sizes, including the world's large...
The Internet of Things promises to transform businesses (and lives), but navigating the business and technical path to success can be difficult to understand. In his session at @ThingsExpo, Sean Lorenz, Technical Product Manager for Xively at LogMeIn, demonstrated how to approach creating broadly successful connected customer solutions using real world business transformation studies including New England BioLabs and more.
WebRTC defines no default signaling protocol, causing fragmentation between WebRTC silos. SIP and XMPP provide possibilities, but come with considerable complexity and are not designed for use in a web environment. In his session at @ThingsExpo, Matthew Hodgson, technical co-founder of the Matrix.org, discussed how Matrix is a new non-profit Open Source Project that defines both a new HTTP-based standard for VoIP & IM signaling and provides reference implementations.
DevOps Summit 2015 New York, co-located with the 16th International Cloud Expo - to be held June 9-11, 2015, at the Javits Center in New York City, NY - announces that it is now accepting Keynote Proposals. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long development cycles that produce software that is obsolete...
Explosive growth in connected devices. Enormous amounts of data for collection and analysis. Critical use of data for split-second decision making and actionable information. All three are factors in making the Internet of Things a reality. Yet, any one factor would have an IT organization pondering its infrastructure strategy. How should your organization enhance its IT framework to enable an Internet of Things implementation? In his session at Internet of @ThingsExpo, James Kirkland, Chief Ar...
"SAP had made a big transition into the cloud as we believe it has significant value for our customers, drives innovation and is easy to consume. When you look at the SAP portfolio, SAP HANA is the underlying platform and it powers all of our platforms and all of our analytics," explained Thorsten Leiduck, VP ISVs & Digital Commerce at SAP, in this SYS-CON.tv interview at 15th Cloud Expo, held Nov 4-6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
SAP is delivering break-through innovation combined with fantastic user experience powered by the market-leading in-memory technology, SAP HANA. In his General Session at 15th Cloud Expo, Thorsten Leiduck, VP ISVs & Digital Commerce, SAP, discussed how SAP and partners provide cloud and hybrid cloud solutions as well as real-time Big Data offerings that help companies of all sizes and industries run better. SAP launched an application challenge to award the most innovative SAP HANA and SAP HANA...
Connected devices and the Internet of Things are getting significant momentum in 2014. In his session at Internet of @ThingsExpo, Jim Hunter, Chief Scientist & Technology Evangelist at Greenwave Systems, examined three key elements that together will drive mass adoption of the IoT before the end of 2015. The first element is the recent advent of robust open source protocols (like AllJoyn and WebRTC) that facilitate M2M communication. The second is broad availability of flexible, cost-effective ...
Scott Jenson leads a project called The Physical Web within the Chrome team at Google. Project members are working to take the scalability and openness of the web and use it to talk to the exponentially exploding range of smart devices. Nearly every company today working on the IoT comes up with the same basic solution: use my server and you'll be fine. But if we really believe there will be trillions of these devices, that just can't scale. We need a system that is open a scalable and by using ...
The Internet of Things is tied together with a thin strand that is known as time. Coincidentally, at the core of nearly all data analytics is a timestamp. When working with time series data there are a few core principles that everyone should consider, especially across datasets where time is the common boundary. In his session at Internet of @ThingsExpo, Jim Scott, Director of Enterprise Strategy & Architecture at MapR Technologies, discussed single-value, geo-spatial, and log time series dat...
The 3rd International Internet of @ThingsExpo, co-located with the 16th International Cloud Expo - to be held June 9-11, 2015, at the Javits Center in New York City, NY - announces that its Call for Papers is now open. The Internet of Things (IoT) is the biggest idea since the creation of the Worldwide Web more than 20 years ago.
Fundamentally, SDN is still mostly about network plumbing. While plumbing may be useful to tinker with, what you can do with your plumbing is far more intriguing. A rigid interpretation of SDN confines it to Layers 2 and 3, and that's reasonable. But SDN opens opportunities for novel constructions in Layers 4 to 7 that solve real operational problems in data centers. "Data center," in fact, might become anachronistic - data is everywhere, constantly on the move, seemingly always overflowing. Net...
What do a firewall and a fortress have in common? They are no longer strong enough to protect the valuables housed inside. Like the walls of an old fortress, the cracks in the firewall are allowing the bad guys to slip in - unannounced and unnoticed. By the time these thieves get in, the damage is already done and the network is already compromised. Intellectual property is easily slipped out the back door leaving no trace of forced entry. If we want to reign in on these cybercriminals, it's hig...
SYS-CON Events announced today Isomorphic Software, the global leader in high-end, web-based business applications, will exhibit at SYS-CON's DevOps Summit 2015 New York, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. Isomorphic Software is the global leader in high-end, web-based business applications. We develop, market, and support the SmartClient & Smart GWT HTML5/Ajax platform, combining the productivity and performance of traditional desktop software ...
How do APIs and IoT relate? The answer is not as simple as merely adding an API on top of a dumb device, but rather about understanding the architectural patterns for implementing an IoT fabric. There are typically two or three trends: Exposing the device to a management framework Exposing that management framework to a business centric logic Exposing that business layer and data to end users. This last trend is the IoT stack, which involves a new shift in the separation of what stuff happe...