Data Destruction St Louis | Secure Document Destruction of St. Louis

  • Business Shredding
  • Residential Shredding
  • FAQs
    • Frequently Asked Questions – Business
    • Residential Document Destruction FAQs
  • Blog
  • Contact Us

by

The Growing Threat of ChatGPT Data Security Issues for Businesses and Consumers

The Growing Threat of ChatGPT Data Security Issues for Businesses and Consumers

If you keep up with technology even in the slightest, no doubt you’ve heard about the wonders of ChatGPT.  Developed by the artificial intelligence (AI) research laboratory OpenAI, Chat Generative Pre-Trained Transformer, ChatGPT for short, is an artificial intelligence-powered language model designed for conversational systems such as chatbots and virtual assistants.

But is has become much more than that, and that’s why a lot of red flags are being raised for consumers to understand both its pros and cons when it comes to privacy and security with the potential of significant data breaches.

ChatGPT doesn’t have any knowledge of its own. It generates responses and information based only on the data it was trained on such as information from the internet, books and much, much more.

Many hail it as a life-changing development in technology that is already starting to transform how we live. ChatGPT is already writing and debugging code, translating text, creating summaries of long documents, writing music, creating art and automating many other challenging tasks. And it is easy to use.

Let’s look at some of the things both businesses and consumers should be wary of.

What are the Security Risks of ChatGPT?

The first thing that new users take from their first experience with ChatGPT is its ability to almost instantly generate realistic responses to questions on just about any subject.

Like any new technology, criminals using cyberattacks are turning those AI capabilities upside down to develop a growing set of threats. Here are a few examples.

Phishing Attacks

These have become an almost daily occurrence in personal and business email inboxes. An email comes from a trusted source asking you to do something that surprises you. It could be from your bank or any other website you have visited. The purpose of these attacks is to get you to reveal sensitive information like credit card numbers, Social Security number or even your login credentials.

Business email compromise has become more sophisticated with ChatGPT as well. This attack uses email to trick someone in an organization into sharing confidential company data or sending money. Security software usually detects these types of attacks by identifying patterns, but an attack like this powered with ChatGPT can get past sophisticated security filters.

Social Engineering and Impersonation: Text and Voice

AI tools like ChatGPT are so advanced they can write text in a real person’s voice and style. This is especially troubling for people in the public’s eye or business leaders who want to convey important and timely information to a mass audience. Imagine the chaos if Elon Musk or Bill Gates fell victim to this type of activity. 

AI can also fake voices to scam people and businesses. AI-driven voice cloning technology can replicate an individual’s voice with only a small sample from sources like interviews, podcasts or social media videos. Scammers use these voices to impersonate someone the victim knows and trusts, like a family member, friend or colleague. The voice may claim to be in a crisis situation and/or request financial assistance. 

When in doubt, verify the caller’s identity by asking them something only the real person would know, or hang up and contact the real person for verification. And, it probably goes without saying, don’t give them any important information about you or your company.

Automated Customer Service Scams

Many companies are moving to automated customer support technology using AI chatbots that allow you to “chat” with an AI-driven program to solve many of the more simple issues customers typically call customer service for. Cyber criminals can replicate these capabilities and convince individuals to reveal sensitive personal or business information as part of the chat history and make payments to the criminals, not the company.

Malware and Spam

One of the major security concerns is how AI can be used to generate text that appears legitimate in emails and can evade even the most sophisticated website spam filters. Criminals use these emails to get individuals to click on links that distribute malware or ransomware to their devices. 

Spam. While many people have become more competent at spotting spam, there remains a large percentage of society that will be fooled into a dialog with simple offers. The bad thing about ChatGPT is that spam output can be generated exponentially in seconds, often with embedded malware that can lead users to malicious websites. The ability to generate professional-looking phishing emails that mimic outreach from legitimate sources such as banks or retailers is closely aligned with this. Users who click links to respond put themselves at significant risk of a bad experience and the potential exposure of personal data. 

Ransomware. One of the darker ways that ChatGPT is being used is to embed ransomware that hijacks computer systems. To unlock systems, victims must pay extortionists large sums of money to regain control. Attackers usually don’t write their code. Instead, they buy it from ransomware creators on dark web marketplaces, but that could change as ChatGPT becomes more adept at generating malicious ransomware code.

Fake Reviews and Ratings

Some criminals use AL-generated content to flood e-commerce platforms with fake product reviews, ratings and comments. These fake reviews can influence consumer decisions, leading them to purchase low-quality or counterfeit products. 

User Data Protection and Data Privacy from ChatGPT Incursions

To protect yourself from these scams never share confidential information such as name, address, login credentials and credit card information. Here are some other steps to protect yourself. 

Password Protection Strategies. This seems basic, but so many of us are guilty of choosing ease over effectiveness when assigning passwords. A strong password is one of the most effective defenses against data incursions. Mix it up and use biometric security and multi-factor authentication when possible. 

Monitor Accounts. Make it a habit to monitor your banking, credit card, emails and other sensitive data pages and accounts so you can quickly spot abnormal activities. Turn on page alerts for all accounts. The use of ChatGPT by hackers can generate compelling phishing attacks.  

Keep Software Current. Always install the latest updates, which may patch security breaches and vulnerabilities crooks could use to steal your data. 

Antivirus Protection. Advanced cybersecurity software has morphed into a fully comprehensive protection package to guard against ransomware and other potentially invasive ways to steal your data. 

Enable Operating System’s Firewall. This will create a barrier that monitors traffic and blocks potentially malicious attempts to harm your cyber presence. For added protection, you can also activate your router’s firewall or invest in a virtual private network (VPN) to encrypt your data. 

Multi-Factor Authentication.  MFA can secure your accounts with an added layer of protection.  When MFA is activated, you are sent a code to your phone or email address to authenticate a login attempt. 

Network Detection and Response (NDR) Technology.  Effective NDR solutions can detect threatening patterns and prevent unauthorized access, even if a hacker has stolen login credentials. 

ChatGPT is still in its infancy, and while it will continue to improve lives in countless ways, thieves will do everything they can to make your life miserable through all the ways we’ve documented above.  

You don’t need ChatGPT to tell you why an ounce of prevention is worth a pound of cure. The best thing you can do is take proactive steps before you become a victim. Be smart and understand the potential threats, then take steps to ensure ChatGPT works for you instead of against you.

Filed Under: Identity Theft, Security

by

What to do When a Hacker Comes After Your Accounts

What to do When a Hacker Comes After Your Accounts

Hacking and identity theft are as prevalent as ever. At some point, don’t be surprised if one or more bad guys come looking for your sensitive information to criminally exploit.

New scams pop up constantly. You know this if you’ve ever gotten one of those “potential data breaches” emails or letters which I suspect most people have by now. Nobody is 100% safe in a digital environment, but there are several things you can do to make it harder for hackers in advance of an attempted breach and actions you can take after an attempted hack.

What to do Before an Attempted Hack Occurs

If you haven’t done so already, the easiest and smartest thing to do is turn on two-factor authentication for your financial accounts. Hackers may try to get around this by going after password manager systems instead.

That means that you could be contacted by text or email that you’ve been targeted by a hacker trying to steal your information. However, don’t automatically assume security protocols have kicked in due to an attempted breach. Some people are contacted repeatedly by hackers who appear to be administrators. Before you give up sensitive password change information, it’s best to reach out to the institution supposedly requesting the change to verify they have actually done so.

After you verify, start the process of changing your potentially impacted passwords. While it’s unsettling that a hacker obtained at least one of your passwords, be thankful that virtually every financial institution now has red flags and warning systems to alert you to suspicious activity.

You should also know that there are multiple types of two-factor authentication. Biometric data is one of the more secure ways to protect your accounts. Two-factor authentication via text is secure, but it is susceptible to hacking. Criminal activity is why the industry is slowly moving away from passwords. Hackers long ago learned how to defeat almost any password system.

If you have the option, switching your two-factor authentication from SMS (text message) to an authenticator app is not a bad idea.

If you suspect a hack is taking place, another way to lock out criminals is to freeze your credit. Freezing your credit at the three major credit bureaus makes it difficult for anyone to open accounts in your name with your Social Security number. You can easily unfreeze your credit if you want to open a new account or other similar reasons.

You’ll need to go through Experian, Equifax, and TransUnion separately to freeze your records.

What to do After a Hack

Here’s the #1 rule you must follow after being hacked.

Act fast!

Do not let data breaches or hacks of any kind go into your “I’ll get to it eventually” stack of things to do. Treat the breach urgently to minimize damage to your accounts and online identity. Don’t be surprised if you start getting notifications after a breach from your banks, credit card providers, Google, online merchant accounts, and other places where your identity lives.

Not every hack is large or steals information from millions of accounts. Some hacks also take a while to uncover, meaning that your data may be compromised over a long period. Many hacks are small such as your credit card information being compromised by a crooked online merchant, a credit card skimmer at a local gas station, or just about anyone you hand your card to while shopping and dining.

You may not notice anything unusual until you get your next statement. Always read those bills and figure out what every line means, even the smallest of the charges that appear. Card thieves sometimes put through a few small purchases just to make sure the card is “live” before making a big purchase.

An identity thief can also use your personal information to open credit accounts without your knowledge. This could lead to months of charges until somebody spots the problem and notifies you. One way to limit the duration is to use AnnualCreditReport.com to request a free report from Equifax, Experian, and TransUnion once per year, spreading the requests out at four-month intervals.

Keep in mind that credit monitoring agencies are not immune from hackers either. A recent breach of Equifax went on for months and exposed sensitive data of millions of accounts. Equifax ended up paying $650 million in damages after the discovery.

Another way to monitor your credit is to use Credit Karma. This free service automatically pulls your credit from TransUnion and Equifax weekly to keep an eye on your credit. These are “soft” inquiries, not the “hard” inquiries that companies make when you apply for more credit. Soft inquiries have no impact on your credit score. Hard inquiries can degrade your score if there are too many in a short period.

There are several other credit monitoring services you should consider: 

  • Avast BreachGuard and IDX Privacy  regularly monitor the Dark Web to ensure your personal data hasn’t come up for sale. 
  • Norton 360 Deluxe includes a similar scan, powered partly by the company’s LifeLock identity theft technology.
  • Some monitoring services such as Keeper and LastPass also include password manager tools which make it easier to change potentially hacked passwords to a strong, unique password you don’t use for any other site.

Hacked credit cards used by someone else are easier to recover from because you’re not responsible for the fraudulent charges, and once the bank has issued a new card, the problem is solved.

Regaining control of a hacked email account is tougher. You must contact the email provider and prove that you’re the true account holder. This is problematic if the hacker changes your password and you can’t use your regular email to contact the provider. To minimize this, have more than one email address and make each the alternate contact address for the other.

Also, if you used the password from your hacked email account at any other sites, those accounts are compromised too. A hacker who gets hold of your login credentials for one site may try the same username and password pair on many other popular sites.

Resetting your passwords can be a challenge too. When you forget a website password, the first thing you do is hit that “Forgot Password?” link to get a password reset link sent to your email address. A smart hacker who has control of the email account will quickly seek your other accounts, social media, perhaps, or worse, shopping and banking accounts. After a simple password reset, the hacker owns those accounts, exponentially compounding your problems.

When you recover from an email hack, visit every site associated with that email address and change your password.

When you’re out and about, shop at merchants accepting chipped credit cards, which secure in-person transactions. However, they can’t help with online transactions where the chip does not come into play.

Mobile-based payment systems like Apple Pay and Google Pay are more secure than physical credit cards. Each transaction uses a unique number, so hackers gain nothing by stealing existing transaction data. You can use the mobile payment system for online purchases as well. Be sure to protect your mobile device with a fingerprint or a strong passcode, and always keep it with you.

After you’ve done all you can to shut down the breach, you’ll still need to monitor your accounts closely for at least a couple of weeks and maybe longer to make sure all your breach bases are covered.

Another smart action you can take is to visit IdentityTheft.gov to report the theft and get help developing a recovery plan. The information you provide can help authorities monitor the latest trends and develop proactive deterrents to minimize impacts on other potential victims.

Filed Under: Identity Theft, Security

by

Secure Online Shopping is All About Common Sense, Especially Around Holidays.

Secure Online Shopping is All About Common Sense, Especially Around Holidays.

Will Rogers is famous for his saying, “Common sense ain’t common.”

And if truer words were ever spoken, I have yet to find them.

While many people take precautions when they shop online, the Covid-19 pandemic has elevated that need to new levels. The percentage of people shopping online today is up, signaling a continuing shift in how many of us buy goods and services. Coupled with an unprecedented closure of brick-and-mortar businesses, that trend is expected to continue.

Even before the pandemic, secure online shopping was a rising concern, whether related to payment fraud, ID theft, data hacking, and other criminal activities.

That’s not going away.

According to a report by Juniper Research, online payment fraud losses will increase by more than 50% between 2020 and 2024. That was before the pandemic was figured in.

Now, according to Nick Maynard, a lead analyst at Juniper, “We anticipate that this growth will accelerate to over 70% over the next four years, compared with the 52% we outlined in March. This is mainly due to the increased usage of e-commerce during the pandemic, which has also generated a rise in fraud.”

Yikes!

While technology continues to improve, the biggest defense against online security issues is most often common sense.

In our research for this article, we reached out to a company we trust—lifelock.com—and found some solid strategies that are worth a few minutes of your time.

1. Shop at websites you trust

Some businesses on the web are fabricated by people who just want your credit card information and other personal details. Play it safe and consider doing online business only with retailers you trust and have shopped with before to play it safe.

2. Check out the business

Did you find the perfect purchase on an unfamiliar website? Break out your detective skills whenever you want to buy something from a new merchant. Does the company interact with a social media following? What do its customer reviews say? Does it have a history of scam reports or complaints at the Better Business Bureau? Take it one step further by contacting the business. If there’s no email address, phone number, or address for a brick-and-mortar location, that could be a signal that it’s a fake company.

3. Beware rock-bottom prices

If a website offers something that looks too good to be true, then it probably is. Compare prices and pictures of the merchandise at similar websites. Rock-bottom prices could be a red flag that the business doesn’t have those items in stock. The website may exist only to get your personal information. You may find a few loss-leader gems, but is saving a few bucks really worth the worry that you could get ripped off for hundreds of times that amount?

4. Avoid public Wi-Fi

You might be tempted to take your online shopping adventures to a coffee shop for a cup of joe. Keep in mind, Wi-Fi networks use public airwaves. With a little tech know-how and the freely available Wi-Fi password at your favorite cafe, someone can intercept what you’re looking at on the web. Shopping online usually means giving out information that an identity thief would love to grab, including your name and credit card information. Bottom line: It’s never a good idea to shop online or log in to any website while you’re connected to public Wi-Fi.

5. Use a Virtual Private Network (VPN)

Still can’t resist the lure of shopping online while sipping that peppermint latte? If you must shop online on public Wi-Fi, consider installing and using a VPN on all mobile devices and computers before connecting to any Wi-Fi network. A VPN creates an encrypted connection between your smartphones and computers and the VPN server. Think of it as a secure tunnel your Internet traffic travels through while you browse the web, making your data safer from interception by nearby hackers.

6. Create strong passwords

If someone has the password to your account, they can log in, change the shipping address, and order things while you get stuck with the bill. Help keep your account safe by locking it with a strong password; “Santa123” won’t do.

Here are some tips on how to create the strongest passwords:

  • Use a complex set of lowercase and uppercase numbers, letters, and symbols.
  • Don’t use personal information that others can find or guess, such as birthdates, your kids’ names, or your favorite color.
  • Don’t use the same password—however strong—on multiple accounts. Admit it! We are ALL guilty of this one. A data breach at one company could give criminals access to your other, shared-password accounts.

7. Check out website security

That small lock icon in the top corner of your URL field tells you that the web page you’re on has privacy protection installed. The URL will start with “https.” These websites mask and transfer data you share, typically on pages that ask for passwords or financial information. If you don’t see that lock or the “s” after “http,” the web page isn’t secure. There is no privacy protection attached to these pages, so we suggest you exercise caution before providing your credit card information over these sites.

8. Watch out for email scams

Sometimes something in your email in-box can stir your consumer cravings. For instance, it might be tempting to open an email that promises a “special offer.” But that offer could be special in a bad way. Every one of us has experienced “click regret” at one time or another.

Clicking on emails from unknown senders and unrecognizable sellers could infect your computer with viruses and malware. It’s better to play it safe. Delete them, don’t click on any links, and don’t open attachments from individuals or businesses you are unfamiliar with.

9. Don’t give out too much information

No shopping website will ever need your Social Security number. This should be the most common sense of all common sense tips in the article. But it still bears mentioning. If you’re asked for very personal details, call the customer service line and request whether you can supply other identifying information. Better yet just walk away and find a more well-known, accommodating website for your purchases.

10. Pay with a credit card

Attention shoppers! You’ll usually get the best liability protection—online and offline—when you use a credit card.

If someone racks up unauthorized charges on your credit card, federal regulations say you won’t have to pay while the card company investigates. Most major credit cards offer $0 liability for fraudulent purchases. Keep in mind, your liability for unauthorized charges on your debit card is capped at $50 if you report it within two business days. But if someone uses your account and you don’t report the theft, after 60 days, you may not be reimbursed at all.

You can also try a virtual credit card. Some banks offer this nifty tool that acts as an online version of your card. With a virtual credit card, the issuer will randomly generate a number that’s linked to your account, and you can use it anywhere online and choose when the number expires. It might be best to generate a new number every time you buy something online or shop with a new retailer. Anyone who tries to use that number will be out of luck.

11. Check your statements

Lots of online shopping can add pages to your credit card statements, especially around the holidays. Check your statements for fraudulent charges at least once a week or set up account alerts. When you receive a text or email about a charge, you can check the message and easily recall whether you made the charge.

12. Mind the details

After you make a purchase, keep the receipt, order confirmation number, and postal tracking number in a safe place. If you have a problem with the order, this information will help the merchant resolve the problem.

13. Take action if you don’t get your goods

Call the merchant and provide the details from the information you saved from your original purchase. If the merchant turns out to be fake, or they’re just plain unhelpful, then your credit card provider can help you sort out the problem. Often, they can remove the charge from your statement.

14. Report the company

If you suspect the business is bogus, notify your credit card company about the charge and close your account. File a complaint with the U.S. Federal Trade Commission. The FTC offers an identity theft recovery plan, should you need it.

The bottom line is that your money is YOUR money. You earned it along with the right to spend it as you choose. With a few simple strategies, you can ensure a cyber thief doesn’t rob you of that pleasure.

Filed Under: Identity Theft, Security

by

You’re at Risk for Many Different Kinds of Identity Theft

You’re at Risk for Many Different Kinds of Identity Theft

As technology continues to dominate every part of our lives, the threat of identity theft has become a significant target of criminals seeking to cash in on vulnerable consumers.

Despite the efforts of law enforcement, criminals have simply become more sophisticated. Hacking stories into company databases have become commonplace, despite the application of highly advanced protection solutions.

A couple of alarming stats back those facts. According to the Federal Trade Commission, identity theft is the fastest-growing white-collar crime in America. Another eye-opening cause for concern is that a stolen ID is used an average of 30 times before the victim finds out about it. In some cases, it can take months or years before you even realize you’re a victim.

Identifying Types of Identity Theft

Identity theft involves any action where a person knowingly uses another individual’s personal identifying information without their authority or consent. Theft occurs when that information is used to obtain goods or services using that information.

The first step in knowing how to combat identity theft is understanding all of the places where you could be vulnerable. Let’s take a look at some of the different ways you’re at risk.

Social Security ID Theft. A thief who gets your Social Security number can steal benefits from you that you’ve worked for your entire life. That could include welfare benefits, HUD benefits, medical and dental claims, and in some cases, falsifying passports to leave and enter the U.S. undetected.

Driver’s License ID Theft. Your driver’s license has a wealth of information that criminals can use to enrich themselves. They can apply for loans, credit cards, open bank accounts, buy cars, boats, and other big-ticket items, and have it all charged to you. Because your home address is listed on your license, criminals know where you live and can commit other kinds of crimes ranging from burglary, robbery, and stalking to more serious acts against you and your family.

Existing Account ID Theft. When a thief has pins or access information to your bank accounts, they can quickly go in and empty all the funds before you have an inkling of what’s happened. At other times, a thief may only make small purchases or withdraw small amounts to test how vulnerable you are. Checking your accounts regularly can thwart this practice.

New Account ID Theft. Instead of hacking into existing accounts, it’s also common practice for identity thieves to set up new accounts in your name. Once accounts are approved and opened, they will run up balances before you even get a statement.

Medical ID Theft. This information can be used to file false workers’ compensation claims, file for Social Security and Medicare benefits, apply for false disability claims, insurance scams, and have legitimate medical procedures done that ultimately stick you with the bills.

Medical identity theft can happen in many ways. For example, someone posing as a Medicare official may contact you by phone or mail, telling you they need to update your medical records or information so that your coverage can be re-evaluated. You will be asked for your personal information, such as your Medicare number, Social Security number, and bank account information, along with the claim that these details are needed to process an overdue medical bill. However, Medicare already has this information and does not need to collect it from you. Medicare will never request personal information by phone or mail.

Medicare can also be a victim of ID theft, as well. That happens when Medicare is billed for services or supplies that a beneficiary never got. For example, if someone obtains your Medicare card information, they can bill Medicare and then pocket the money for the fake services. A healthcare provider can also bill Medicare for care a beneficiary never received, also pocketing funds for services that were never rendered.

Bank Fraud. This involves a wide range of possible criminal actions. Your ID can be used for forgery, embezzlement, wire fraud, stolen checks, accounting fraud, ATM theft, and other similar financial crimes. The key here is that when banks are involved, it is a federal crime that can result in a hefty penalty ranging up to 30 years in prison and fines of $1 million or more.

Employment ID Theft. If a person can’t get a job because they have a criminal record or poor credit, they can piggyback off of your good name and finances to get a job in your name. Complicating matters is when an employer reports wages to the IRS, that agency will want to collect taxes from you! That can also mess up your Social Security wages and impact your retirement many years down the road.

Child ID Theft. The very young are especially at risk for identity theft because their account information is not checked as often as working-age adults. Scammers often use children’s’ Social Security numbers to apply for government programs, take out loans, and so forth, which often isn’t detected until years later. Information can be stolen from school databases or other soft targets.

Senior ID Theft. Seniors are also highly vulnerable. As many as 20% of seniors may experience some form of financial exploitation, including identity theft, every year. For seniors, identity theft is more likely in cases where there are diminished capacities due to age or illness, but any senior can fall victim. Seniors are often more trusting and less likely to monitor their financial accounts. They also have more considerable savings and don’t know what threats to look out for, making the potential for larger losses more likely. The tragic part of senior identity theft is that seniors have much less time to try and recoup losses if they become victims.

Estate ID Theft. If you think identity theft stops when someone passes away, you are wrong. Unscrupulous criminals have been known to use a deceased person’s information to drain accounts, set up new loans, and claim government benefits. Surviving family members are the real victims because it means they will not inherit what they were entitled to receive.

Tax ID Theft. This is a favorite target of thieves who will call or email and threaten you with IRS sanctions if you don’t comply with their requests. This is called “phishing,” and the goal is to get you to provide personal information or click on links that either lead to bogus websites or install malware to hack into your computer. If you submit a return that is rejected, this could be one of the reasons why. You need to contact the IRS immediately and may have to file a fraud claim to protect yourself.

Protecting Yourself and Recovering from Identity Theft

Recognizing the growing threats posed by identity theft, lawmakers have enacted several protections in recent years. One such law is “The Identity Theft Protection Act.” It eases the burden of a victim’s financial liability for falsely incurred debt and exonerates them of the other crimes committed in his/her name. Several states have also enacted similar legislation as well.

Implement a protection strategy

Between widespread mass hacking of personal information and the individual threats you are at risk for, it’s wise to have a strategy to protect yourself.

To start, monitor all your bills that come in monthly. Look for unfamiliar charges and dispute anything you don’t recognize or remember. Augment these efforts by checking your credit reports regularly as well. You can request a free report from each of the three major credit bureaus—Experian, Equifax, and TransUnion—once per year. Make sure to monitor all family members’ credit information, even young children, as part of your efforts.

Think about signing up for a credit monitoring service such as Lifelock. This will give you a high degree of protection. Your accounts and identity information will be protected proactively, guarding against breaches that can exploit your identity. These services also scour known malicious websites for your personal information to see if it is being used for fraudulent activity.

When you have major life-changing events, such as a death or divorce, notify credit bureaus and the deceased person’s financial institutions. Consider placing a freeze on the account if you are the executor to avoid unauthorized access.

If you’re a victim of identity theft, take the following steps:

Contact the companies where you know fraud or theft took place. Ask to close or freeze all accounts so that no one can add any new charges without your authorization.

Change your login, passwords, and PIN data.

Review copies of your credit reports. Also, contact the major credit bureaus and place a one-year fraud alert on your information. It’s free, and by alerting one company, they must tell the other companies as well.

Experian.com/help
888-EXPERIAN (888-397-3742)

TransUnion.com/credit-help
888-909-8872

Equifax.com/personal/credit-report-services
800-685-1111

Report your identity theft to the Federal Trade Commission. Complete the online form or call 1-877-438-4338.

Consider filing a report with your local police department. Be prepared to give as many details as possible, including a copy of your FTC complaint. Get a copy of the police report, which you may need to try and recover potential losses.

Close any new accounts opened in your name that you did not authorize.

Remove unauthorized charges from your impacted accounts.

Take steps to correct your credit reports.

If you haven’t already done so, add a fraud alert service or place a freeze on your accounts. You may not be out of the woods yet.

For additional steps and information, the Federal Trade Commission maintains the website IdentityTheft.gov which has a lot of additional information you can use to assist you in recovering from incidents of identity theft.

Filed Under: Identity Theft

by

Equifax Settlement Agreement Will Compensate Consumers Affected by 2017 Breach

Equifax Settlement Agreement Will Compensate Consumers Affected by 2017 Breach

After almost two years since the huge breach of its customer database, Equifax has settled most of the legal action against the company.

Below are some highlights, and for more information if you believe you were affected, here is the link to the Equifax breach settlement website.

The total settlement, according to the Wall Street Journal, will be “up to $700 million with the Federal Trade Commission, the Consumer Financial Protection Bureau and most state attorneys general, in addition to a nationwide consumer class-action lawsuit.”

For those participating in the class action settlement, they will receive from Equifax (according to its website):

  • Free credit monitoring for at least three years or a $125 cash payment, and
  • Other cash payments up to $20,000 for a variety of problems the consumer may have encountered such as identity theft or fraud. In some cases, Equifax will compensate consumers for the time they spent dealing with the problems, and
  • Up to seven years of free identity restoration services.

More details can be found at the Equifax breach settlement website.

Secure Document Destruction of St. Louis provides a wide variety of onsite document destruction and shredding services for consumers and businesses.

Click here today for a no obligation quote.

Filed Under: Data Breach, Identity Theft

  • « Previous Page
  • 1
  • 2
  • 3
  • Next Page »

Other posts you might like...

  • Better Business Bureau’s Top 9 Tips for Safe Online Shopping
  • Secure Online Shopping is 90% Common Sense.
  • Secure Online Shopping is All About Common Sense, Especially Around Holidays.
  • Guard Against These Consumer Scams

Free Quote

Secure Document Destruction

We specialize in secure onsite document and data destruction across the St. Louis Metro area!

Testimonials

"Thanks, John. Your company is first rate and I have already recommended it to several friends and relatives. Keep up the good work!"
Mike W.
"Thank you John. The service provided by SDD was outstanding. You provided everything that was promised and at the designated time arranged and I might add that your man that handled the job couldn't have been nicer or accommodating.. It is rare to find businesses that follow through with their promises. We appreciated doing business with you and would recommend SDD to anyone needing this service. Thank You!"
Joe B.
Distribution Sales, Leviton Manufacturing
"John did a great job! Friendly, answered all my questions, very helpful. Thanks for providing good service!"
Lana E.
Alton, IL
"We had a problem when our previous shredding company raised their prices sky-high. When we called SDD; John gave me a quote over the phone and came out the next day. They performed the same size job in about half the time, … at a lower price! We would recommend them highly to anyone who needs shredding."
Chris K.
Missouri Insurance Exchange
"It gives our company "peace of mind" to depend on the professional & personable, fast & efficient shredding services of Secure Document Destruction of St. Louis. I would highly recommend SDD STL. The service and price is exceptional!"
Laura K.
La De Da Entertainment
"Secure Document Destruction is AWESOME!! John always takes great care of us, the service is fast and reliable; John, our service/driver is great too. Looking back, I wish I would have switched to SDD sooner! 5 out of 5 stars!"
Tracy T.
Central Bank of St Louis
"Thank you! Everything went very well. Great customer service from beginning to end!! I am sure we will be in touch for future clean up projects."
Amy F.
Oasis Institute
"THANKS!!!! My house feels better with ALL that paper gone! The service was excellent!!! Thanks again!"
Kathy Ames
Desoto, MO
"SSD provided the shredding services for my business when I closed in 2013 and again in 2024 when I called on them to shred the last of the documents that had been held in storage. They were friendly, honest and very helpful throughout the difficult process which was made easy with their professionalism over the years I dealt with them and I highly recommend them."
Bob L.
Rock Hill, MO
"You and John are wonderful people and I thank you so much for working with me. God Bless you both."
Laura E
"Your service/driver guy, JP just came and did our pickup. He is such a nice, friendly person and so are you. It is great doing business with you guys."
Berry Silberberg Stokes PC

Contact Us

Secure Document Destruction of St. Louis
2517 Adie Rd.
Maryland Heights, MO 63043
(Appointments only at this location. Please call 314-795-0004)

314-795-0004
Fax: 618-281-7153
In Illinois: 618-281-3245

Email Us

About Us

  • Email
  • Facebook
  • LinkedIn

Services

Onsite Shredding Service
Business Shredding Service
Residential Shredding Services
Hard Drive Destruction
Data Destruction
Routine Service
One-time or Purge Service
Document Shredding Services
Mobile Shredding Services
Document Destruction Services
Residential Shredding Services
Medical Records Shredding

Categories

STLCHAMBERLOGONAID AAA LogoOFallon-Chamber-Logo

Review Us

  • Business Shredding
  • Residential Shredding
  • FAQs
  • Blog
  • Contact Us

Copyright © 2025 · Secure Document Destruction