SlideShare ist ein Scribd-Unternehmen logo
1 von 23
Business Identity Theft
Protect Your Business Credit
Updated
 Credit reports are a staple of modern commerce and
credit decision making, and millions of businesses
rely on them every day. Consumers have credit
reports; and, because businesses regularly extend
credit to each other, businesses have credit reports
as well.
 However, while there are some similarities, there are
two critical differences between business credit
reports and consumer credit reports that business
identity thieves can use to their advantage.
Unlike consumer credit reports,
business credit reports are available
to virtually anyone
 Consumer credit reports contain a significant amount of
confidential and sensitive information about the subject of
the report that could be misused.
 Because of this, access to consumer credit reports is
restricted to businesses with a permissible business
need, companies with whom the consumer has applied
for credit, and companies to whom the consumer grants
permission.
 Business credit reports also contain a significant amount
of information about the business that can potentially be
misused.
 However, because business credit reports are intended
to promote and foster commerce and aid in risk
management decision processes between businesses, a
business credit report is readily available and can be
purchased by virtually anyone.
Unlike consumer credit reports, a
business credit report is self-
reported by the business
 Additional information may also be obtained and
incorporated into the report from public records and
third parties, such as other companies with which the
business has credit accounts.
 Depending upon the type and source of the report, a
business credit report may also contain owner and
principal information, financial statements, trade
information, public filings, operations and facility
information, SIC/SAIC codes, etc.
 All of this is valuable background information for
thieves seeking to target a company for business
identity theft
 Because a large amount of the information is self-
reported, there is a potential for criminals to gain
access to and manipulate the file, changing the
information of their target company in order to
deceive creditors or lenders as part of their business
identity theft scheme.
 Business registration information that is included in
the report is generally obtained and verified through
the appropriate Secretary of State.
 Therefore, in some cases a criminal's first step is to
attempt to fraudulently change the state business
registration records, and then manipulate the
business credit report.
Be aware
Fake Business Credit Applications
 Business credit applications are commonplace and
in many businesses would not raise a red
flag, particularly if they appear to originate from a
recognized source such as a credit card
company, major supplier, or lender.
 A new line of credit or extended payment terms can
be very appealing to a cash-strapped business.
False Business Financial Reports
 Business identity thieves can manipulate business
financial reports, or easily fabricate such reports
altogether, in order to deceive prospective creditors
and lenders by making the business appear better
off than it may be.
 When combined with other real or falsified business
credentials, or proof of right, false financial reports
are used to add to the appearance of legitimacy and
financial capacity as part of a business identity theft
scheme intended to fraudulently obtain loans or lines
of credit in the business' name.
Phishing Scams
 Phishing email scams are designed to trick you, or your
employees, into divulging confidential personal and
business account information (i.e. SSN, EIN, account
number, user name, password, etc.)
 The IRS, government agencies, and legitimate financial
institutions do not request you to provide or "verify" this
information through email communications.
 If you or your employees receive such an email, notify
your bank's fraud department.
 Do not respond to the email, and do not click on any links
or open any attachments in the email as doing so can
connect you to a fraudulent website and/or cause
spyware to be installed on your computer.
Popular in Business ID Theft
Schemes
 Fraudulent Business Filings
 Address Mirroring
 Virtual Services and Technology
 Shelf Corporations and Trade Rings
 Use of Owner / Officer Identity
 Manipulation of Business Records
 Cyber Crime
 Internet Black Market
 Other Schemes to Defraud
Advocate Tip #1
 Even a closed business can be reopened by paying
a nominal fee, without your consent.
 Your good business name can be used by crooks to
lure previous customers and trick new ones into
providing credit cards, products and services they
have no intention to repay.
 If you suspect someone may be using your
companies name, contact the Secretary of State and
check the status of that business.
 If you determine fraud has occurred, file a police
report
Advocate Tip #2
 A consumers good name and credit can also be
used by identity thieves to create business credit
files or take out loans in fake business names
 Checking their own credit files may show early signs
of fraud has occurred.
 Place fraud alerts, if suspicious
 Monitor public records, if suspicious
 If you see an unknown company or business looking at
your credit file. Contact them immediately!
 Inquiries usually drop off after 10-15 business days, work
fast to minimize exposure to identity theft.
Advocate Tip #3
 Most banks offer "zero-fraud liability" protection to
their consumer banking customers. Normally this
service is not available to businesses. Ask your bank
about coverage.
 Ask about insurance coverage for Data Breach,
Fraud and Identity Theft.
 Check with your bank regarding liability on
MasterCard / Visa credit and debit cards for small
businesses.
Business Credit Bureaus
 Dun & Bradstreet Toll free: 1-800-234-3867
 Equifax Toll free: 1-800-525-6285
 Experian Toll free: 1-888-397-3742
 TransUnion Toll free: 1-800-680-7289
Fact
Only 28% of small businesses provide training to
employees about Internet safety and security.
* Source: 2012 National Small Business Study, National Cyber Security Alliance, Symantec, & JZ
Analytics.
Train your employees (and yourself)
 Protecting your business and the sensitive
information of your business, your customers, and
employees is the responsibility of everyone in your
organization.
 Properly trained employees understand the risks and
know how to recognize and stop fraud and
information security risks before it impacts your
business.
Online and Public Presence
 Export and delete all information from web
applications associated with expiring domain names
 Use Google Alerts or a similar service to monitor the
Internet
 Whois Database and domain privacy services
 Be alert for impostors on the web and in the phone
book
Data Privacy for Small Businesses
 Part 1: Does Your Privacy Policy Need A Tune-Up?
 Part 2: Reviewing and Retooling Your Privacy
Practices
 Part 3: Keeping Privacy in Mind as You Grow Your
Business
Positive Pay
 Most U.S commercial banks offer Positive Pay
services which can significantly reduce business
check fraud losses.
 Using Positive Pay, when you write business checks,
you provide your bank with a list of check numbers
and dollar amounts.
 Your bank compares any checks received for
payment against your list. If a check doesn't match, it
is identified as an "exception" and is not paid.
Resources
 Dun & Bradstreet: Sample Credit Report
 NASS Business Identity Theft Task Force
 Tax Information For Businesses
 Secretary of State website
 Better Business Bureau®
 NAID
 BBB EU Safe Harbor Program
 Glossary by Kroll’s Fraud Solutions
Company names mentioned herein are the property of, and may be
trademarks of, their respective owners and are for educational purposes only.
Special Thanks to BusinessIDTheft.org, BBB
Compiled and designed by Mark Fullbright , Certified Identity
Theft Risk Management Specialist™ (CITRMS) as a free service
for businesses to protect themselves and reduce their exposure to
identity theft.
Stay Safe, Stay Secure

Weitere ähnliche Inhalte

Was ist angesagt?

George Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarGeorge Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarDon Grauel
 
Protecting Your Organization Against Check and ACH Fraud
Protecting Your Organization Against Check and ACH FraudProtecting Your Organization Against Check and ACH Fraud
Protecting Your Organization Against Check and ACH FraudFraudBusters
 
Economic offenses through Credit Card Frauds Dissected
Economic offenses through Credit Card Frauds DissectedEconomic offenses through Credit Card Frauds Dissected
Economic offenses through Credit Card Frauds Dissectedamiable_indian
 
PCI FAQs and Myths - BluePay
PCI FAQs and Myths - BluePayPCI FAQs and Myths - BluePay
PCI FAQs and Myths - BluePayBluePayProcessing
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft PresentationRandall Chesnutt
 
Identity theft and there types by pooja kalra
Identity theft and there types by pooja kalra Identity theft and there types by pooja kalra
Identity theft and there types by pooja kalra poojakalra10
 
Teen Identity Theft Presentation - Family Online Safety Institue
Teen Identity Theft Presentation - Family Online Safety InstitueTeen Identity Theft Presentation - Family Online Safety Institue
Teen Identity Theft Presentation - Family Online Safety InstitueMindMake - Parenting & Education
 
E commerce fraud
E commerce fraudE commerce fraud
E commerce fraudmiteshppt
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentationpaulgundersen9
 
Child Identity Theft LegalShield Business Solutions
Child Identity Theft LegalShield Business SolutionsChild Identity Theft LegalShield Business Solutions
Child Identity Theft LegalShield Business Solutionslegalshieldofficial
 
Identity Theft Consumer Seminar
Identity Theft Consumer SeminarIdentity Theft Consumer Seminar
Identity Theft Consumer Seminarronwolfinger
 
Identity theft seminar
Identity theft seminarIdentity theft seminar
Identity theft seminarmullarkea
 
Identity Theft: Protecting & Restoring Your Good Name
Identity Theft: Protecting & Restoring Your Good NameIdentity Theft: Protecting & Restoring Your Good Name
Identity Theft: Protecting & Restoring Your Good NameSpringboard
 
You Have the Power to Stop Identity Theft
You Have the Power to Stop Identity TheftYou Have the Power to Stop Identity Theft
You Have the Power to Stop Identity Theft- Mark - Fullbright
 

Was ist angesagt? (18)

PCI FAQs and Myths
PCI FAQs and MythsPCI FAQs and Myths
PCI FAQs and Myths
 
George Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarGeorge Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler Seminar
 
Protecting Your Organization Against Check and ACH Fraud
Protecting Your Organization Against Check and ACH FraudProtecting Your Organization Against Check and ACH Fraud
Protecting Your Organization Against Check and ACH Fraud
 
Economic offenses through Credit Card Frauds Dissected
Economic offenses through Credit Card Frauds DissectedEconomic offenses through Credit Card Frauds Dissected
Economic offenses through Credit Card Frauds Dissected
 
PCI FAQs and Myths - BluePay
PCI FAQs and Myths - BluePayPCI FAQs and Myths - BluePay
PCI FAQs and Myths - BluePay
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
Identity theft and there types by pooja kalra
Identity theft and there types by pooja kalra Identity theft and there types by pooja kalra
Identity theft and there types by pooja kalra
 
Teen Identity Theft Presentation - Family Online Safety Institue
Teen Identity Theft Presentation - Family Online Safety InstitueTeen Identity Theft Presentation - Family Online Safety Institue
Teen Identity Theft Presentation - Family Online Safety Institue
 
Training For Bank Employees
Training For Bank EmployeesTraining For Bank Employees
Training For Bank Employees
 
E commerce fraud
E commerce fraudE commerce fraud
E commerce fraud
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
Child Identity Theft LegalShield Business Solutions
Child Identity Theft LegalShield Business SolutionsChild Identity Theft LegalShield Business Solutions
Child Identity Theft LegalShield Business Solutions
 
Identity Theft Information for Businesses
Identity Theft Information for BusinessesIdentity Theft Information for Businesses
Identity Theft Information for Businesses
 
Identity Theft Consumer Seminar
Identity Theft Consumer SeminarIdentity Theft Consumer Seminar
Identity Theft Consumer Seminar
 
Identity theft seminar
Identity theft seminarIdentity theft seminar
Identity theft seminar
 
Fintech - MSME lending score card template for flow based lending
Fintech - MSME lending score card template for flow based lendingFintech - MSME lending score card template for flow based lending
Fintech - MSME lending score card template for flow based lending
 
Identity Theft: Protecting & Restoring Your Good Name
Identity Theft: Protecting & Restoring Your Good NameIdentity Theft: Protecting & Restoring Your Good Name
Identity Theft: Protecting & Restoring Your Good Name
 
You Have the Power to Stop Identity Theft
You Have the Power to Stop Identity TheftYou Have the Power to Stop Identity Theft
You Have the Power to Stop Identity Theft
 

Ähnlich wie Business Identity Theft

How to Safeguard Your Business from Payment Fraud _ Regions Bank.pdf
How to Safeguard Your Business from Payment Fraud _ Regions Bank.pdfHow to Safeguard Your Business from Payment Fraud _ Regions Bank.pdf
How to Safeguard Your Business from Payment Fraud _ Regions Bank.pdfBhekumuzi Xaba
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft PreventionSpringboard
 
Fraud Awareness Guide for Businesses
Fraud Awareness Guide for BusinessesFraud Awareness Guide for Businesses
Fraud Awareness Guide for BusinessesShred Station
 
Information Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your BusinessInformation Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your Business- Mark - Fullbright
 
Doctor+buisness+credit+presentation 1
Doctor+buisness+credit+presentation 1Doctor+buisness+credit+presentation 1
Doctor+buisness+credit+presentation 1vampiire
 
3 Ways Fraudsters Compromise AP Security and Controls and How You Can Mitigat...
3 Ways Fraudsters Compromise AP Security and Controls and How You Can Mitigat...3 Ways Fraudsters Compromise AP Security and Controls and How You Can Mitigat...
3 Ways Fraudsters Compromise AP Security and Controls and How You Can Mitigat...Mahmoud Elmekawy
 
How to identify potential customers for bad debts?
How to identify potential customers for bad debts?How to identify potential customers for bad debts?
How to identify potential customers for bad debts?Debt Nirvana
 
Adrs Flip Chart With Red Flags Rev4
Adrs Flip Chart With Red Flags Rev4Adrs Flip Chart With Red Flags Rev4
Adrs Flip Chart With Red Flags Rev4danc752
 
fraudservicecenter@safra.com-
fraudservicecenter@safra.com-fraudservicecenter@safra.com-
fraudservicecenter@safra.com-Aurorasa Coaching
 
How to Minimize Chargebacks: What can you do to reduce credit card chargebacks?
How to Minimize Chargebacks: What can you do to reduce credit card chargebacks?How to Minimize Chargebacks: What can you do to reduce credit card chargebacks?
How to Minimize Chargebacks: What can you do to reduce credit card chargebacks?Merchantech - Payment Processing Services
 
Study: Identifying Fraud and Credit Risk in the Smallest of Small Businesses
Study: Identifying Fraud and Credit Risk in the Smallest of Small BusinessesStudy: Identifying Fraud and Credit Risk in the Smallest of Small Businesses
Study: Identifying Fraud and Credit Risk in the Smallest of Small Businessesclaytonroot
 
Identity theft 10 mar15
Identity theft 10 mar15Identity theft 10 mar15
Identity theft 10 mar15Naval OPSEC
 
Powerpoint mack jackson
Powerpoint   mack jacksonPowerpoint   mack jackson
Powerpoint mack jacksonaiimnevada
 
Businesses May Recieve Stiff Penalties And Fines
Businesses May Recieve Stiff Penalties And FinesBusinesses May Recieve Stiff Penalties And Fines
Businesses May Recieve Stiff Penalties And Finesmasive213
 
Taking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is StolenTaking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is Stolen- Mark - Fullbright
 
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptx
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptx10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptx
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptxdarrengracia
 

Ähnlich wie Business Identity Theft (20)

How to Safeguard Your Business from Payment Fraud _ Regions Bank.pdf
How to Safeguard Your Business from Payment Fraud _ Regions Bank.pdfHow to Safeguard Your Business from Payment Fraud _ Regions Bank.pdf
How to Safeguard Your Business from Payment Fraud _ Regions Bank.pdf
 
BBB October 2018 Market Monitor
BBB October 2018 Market Monitor BBB October 2018 Market Monitor
BBB October 2018 Market Monitor
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
 
Fraud Awareness Guide for Businesses
Fraud Awareness Guide for BusinessesFraud Awareness Guide for Businesses
Fraud Awareness Guide for Businesses
 
Information Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your BusinessInformation Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your Business
 
Doctor+buisness+credit+presentation 1
Doctor+buisness+credit+presentation 1Doctor+buisness+credit+presentation 1
Doctor+buisness+credit+presentation 1
 
3 Ways Fraudsters Compromise AP Security and Controls and How You Can Mitigat...
3 Ways Fraudsters Compromise AP Security and Controls and How You Can Mitigat...3 Ways Fraudsters Compromise AP Security and Controls and How You Can Mitigat...
3 Ways Fraudsters Compromise AP Security and Controls and How You Can Mitigat...
 
How to identify potential customers for bad debts?
How to identify potential customers for bad debts?How to identify potential customers for bad debts?
How to identify potential customers for bad debts?
 
Dealing With ID Theft
Dealing With ID TheftDealing With ID Theft
Dealing With ID Theft
 
Adrs Flip Chart With Red Flags Rev4
Adrs Flip Chart With Red Flags Rev4Adrs Flip Chart With Red Flags Rev4
Adrs Flip Chart With Red Flags Rev4
 
IDT 2015
IDT 2015IDT 2015
IDT 2015
 
Check Your Credit Report
Check Your Credit ReportCheck Your Credit Report
Check Your Credit Report
 
fraudservicecenter@safra.com-
fraudservicecenter@safra.com-fraudservicecenter@safra.com-
fraudservicecenter@safra.com-
 
How to Minimize Chargebacks: What can you do to reduce credit card chargebacks?
How to Minimize Chargebacks: What can you do to reduce credit card chargebacks?How to Minimize Chargebacks: What can you do to reduce credit card chargebacks?
How to Minimize Chargebacks: What can you do to reduce credit card chargebacks?
 
Study: Identifying Fraud and Credit Risk in the Smallest of Small Businesses
Study: Identifying Fraud and Credit Risk in the Smallest of Small BusinessesStudy: Identifying Fraud and Credit Risk in the Smallest of Small Businesses
Study: Identifying Fraud and Credit Risk in the Smallest of Small Businesses
 
Identity theft 10 mar15
Identity theft 10 mar15Identity theft 10 mar15
Identity theft 10 mar15
 
Powerpoint mack jackson
Powerpoint   mack jacksonPowerpoint   mack jackson
Powerpoint mack jackson
 
Businesses May Recieve Stiff Penalties And Fines
Businesses May Recieve Stiff Penalties And FinesBusinesses May Recieve Stiff Penalties And Fines
Businesses May Recieve Stiff Penalties And Fines
 
Taking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is StolenTaking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is Stolen
 
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptx
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptx10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptx
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptx
 

Mehr von - Mark - Fullbright

ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019- Mark - Fullbright
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)- Mark - Fullbright
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019- Mark - Fullbright
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019- Mark - Fullbright
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...- Mark - Fullbright
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)- Mark - Fullbright
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report- Mark - Fullbright
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 - Mark - Fullbright
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft- Mark - Fullbright
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017- Mark - Fullbright
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business- Mark - Fullbright
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business- Mark - Fullbright
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report- Mark - Fullbright
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016- Mark - Fullbright
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015- Mark - Fullbright
 

Mehr von - Mark - Fullbright (20)

ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019
 
IC3 2019 Internet Crime Report
IC3 2019 Internet Crime ReportIC3 2019 Internet Crime Report
IC3 2019 Internet Crime Report
 
Police, Protesters, Press, 2020
Police, Protesters, Press, 2020Police, Protesters, Press, 2020
Police, Protesters, Press, 2020
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)
 
FCPA Guidance 2020
FCPA Guidance 2020FCPA Guidance 2020
FCPA Guidance 2020
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
 
2018 IC3 Report
2018 IC3 Report2018 IC3 Report
2018 IC3 Report
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018
 
Credit Score Explainer
Credit Score ExplainerCredit Score Explainer
Credit Score Explainer
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015
 

Kürzlich hochgeladen

Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 

Kürzlich hochgeladen (20)

Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 

Business Identity Theft

  • 1. Business Identity Theft Protect Your Business Credit Updated
  • 2.  Credit reports are a staple of modern commerce and credit decision making, and millions of businesses rely on them every day. Consumers have credit reports; and, because businesses regularly extend credit to each other, businesses have credit reports as well.  However, while there are some similarities, there are two critical differences between business credit reports and consumer credit reports that business identity thieves can use to their advantage.
  • 3. Unlike consumer credit reports, business credit reports are available to virtually anyone
  • 4.  Consumer credit reports contain a significant amount of confidential and sensitive information about the subject of the report that could be misused.  Because of this, access to consumer credit reports is restricted to businesses with a permissible business need, companies with whom the consumer has applied for credit, and companies to whom the consumer grants permission.  Business credit reports also contain a significant amount of information about the business that can potentially be misused.  However, because business credit reports are intended to promote and foster commerce and aid in risk management decision processes between businesses, a business credit report is readily available and can be purchased by virtually anyone.
  • 5. Unlike consumer credit reports, a business credit report is self- reported by the business
  • 6.  Additional information may also be obtained and incorporated into the report from public records and third parties, such as other companies with which the business has credit accounts.  Depending upon the type and source of the report, a business credit report may also contain owner and principal information, financial statements, trade information, public filings, operations and facility information, SIC/SAIC codes, etc.  All of this is valuable background information for thieves seeking to target a company for business identity theft
  • 7.  Because a large amount of the information is self- reported, there is a potential for criminals to gain access to and manipulate the file, changing the information of their target company in order to deceive creditors or lenders as part of their business identity theft scheme.  Business registration information that is included in the report is generally obtained and verified through the appropriate Secretary of State.  Therefore, in some cases a criminal's first step is to attempt to fraudulently change the state business registration records, and then manipulate the business credit report.
  • 9. Fake Business Credit Applications  Business credit applications are commonplace and in many businesses would not raise a red flag, particularly if they appear to originate from a recognized source such as a credit card company, major supplier, or lender.  A new line of credit or extended payment terms can be very appealing to a cash-strapped business.
  • 10. False Business Financial Reports  Business identity thieves can manipulate business financial reports, or easily fabricate such reports altogether, in order to deceive prospective creditors and lenders by making the business appear better off than it may be.  When combined with other real or falsified business credentials, or proof of right, false financial reports are used to add to the appearance of legitimacy and financial capacity as part of a business identity theft scheme intended to fraudulently obtain loans or lines of credit in the business' name.
  • 11. Phishing Scams  Phishing email scams are designed to trick you, or your employees, into divulging confidential personal and business account information (i.e. SSN, EIN, account number, user name, password, etc.)  The IRS, government agencies, and legitimate financial institutions do not request you to provide or "verify" this information through email communications.  If you or your employees receive such an email, notify your bank's fraud department.  Do not respond to the email, and do not click on any links or open any attachments in the email as doing so can connect you to a fraudulent website and/or cause spyware to be installed on your computer.
  • 12. Popular in Business ID Theft Schemes  Fraudulent Business Filings  Address Mirroring  Virtual Services and Technology  Shelf Corporations and Trade Rings  Use of Owner / Officer Identity  Manipulation of Business Records  Cyber Crime  Internet Black Market  Other Schemes to Defraud
  • 13. Advocate Tip #1  Even a closed business can be reopened by paying a nominal fee, without your consent.  Your good business name can be used by crooks to lure previous customers and trick new ones into providing credit cards, products and services they have no intention to repay.  If you suspect someone may be using your companies name, contact the Secretary of State and check the status of that business.  If you determine fraud has occurred, file a police report
  • 14. Advocate Tip #2  A consumers good name and credit can also be used by identity thieves to create business credit files or take out loans in fake business names  Checking their own credit files may show early signs of fraud has occurred.  Place fraud alerts, if suspicious  Monitor public records, if suspicious  If you see an unknown company or business looking at your credit file. Contact them immediately!  Inquiries usually drop off after 10-15 business days, work fast to minimize exposure to identity theft.
  • 15. Advocate Tip #3  Most banks offer "zero-fraud liability" protection to their consumer banking customers. Normally this service is not available to businesses. Ask your bank about coverage.  Ask about insurance coverage for Data Breach, Fraud and Identity Theft.  Check with your bank regarding liability on MasterCard / Visa credit and debit cards for small businesses.
  • 16. Business Credit Bureaus  Dun & Bradstreet Toll free: 1-800-234-3867  Equifax Toll free: 1-800-525-6285  Experian Toll free: 1-888-397-3742  TransUnion Toll free: 1-800-680-7289
  • 17. Fact Only 28% of small businesses provide training to employees about Internet safety and security. * Source: 2012 National Small Business Study, National Cyber Security Alliance, Symantec, & JZ Analytics.
  • 18. Train your employees (and yourself)  Protecting your business and the sensitive information of your business, your customers, and employees is the responsibility of everyone in your organization.  Properly trained employees understand the risks and know how to recognize and stop fraud and information security risks before it impacts your business.
  • 19. Online and Public Presence  Export and delete all information from web applications associated with expiring domain names  Use Google Alerts or a similar service to monitor the Internet  Whois Database and domain privacy services  Be alert for impostors on the web and in the phone book
  • 20. Data Privacy for Small Businesses  Part 1: Does Your Privacy Policy Need A Tune-Up?  Part 2: Reviewing and Retooling Your Privacy Practices  Part 3: Keeping Privacy in Mind as You Grow Your Business
  • 21. Positive Pay  Most U.S commercial banks offer Positive Pay services which can significantly reduce business check fraud losses.  Using Positive Pay, when you write business checks, you provide your bank with a list of check numbers and dollar amounts.  Your bank compares any checks received for payment against your list. If a check doesn't match, it is identified as an "exception" and is not paid.
  • 22. Resources  Dun & Bradstreet: Sample Credit Report  NASS Business Identity Theft Task Force  Tax Information For Businesses  Secretary of State website  Better Business Bureau®  NAID  BBB EU Safe Harbor Program  Glossary by Kroll’s Fraud Solutions
  • 23. Company names mentioned herein are the property of, and may be trademarks of, their respective owners and are for educational purposes only. Special Thanks to BusinessIDTheft.org, BBB Compiled and designed by Mark Fullbright , Certified Identity Theft Risk Management Specialist™ (CITRMS) as a free service for businesses to protect themselves and reduce their exposure to identity theft. Stay Safe, Stay Secure