Protecting Yourself After A Data Breach - Shield Insurance Agency Blog

Protecting yourself after a data breach

A data breach is becoming more and more common. With over a billion records exposed since 2005, it’s likely that — if it hasn’t happened already — you’ll eventually rip open a letter to find that your data has been compromised and your personal information is at risk.

So what do you do next?

Just because you received this letter does not mean that you’re the victim of identity theft, it just means that your data was exposed, a data breach. However, there are five main steps you can take to better ensure that you come out of the situation with your identity and finances intact.

Breathe and read.

The first step is to not panic. That may sound counter-intuitive, but the best thing you can do is take a deep breath and thoroughly read the letter. The letter will explain what information is at risk, how the data breach occurred, and how you can get more information. When you’ve finished reading it over, keep it in a safe place in case you ever need to prove that your data was exposed.

Let your bank, mortgage lender, and other financial organizations know that your data has been compromised. This way, they can keep an eye out for suspicious activity.

Monitor billing and financial statements.

You must be on the lookout for fraudulent activity, too. Your bank or credit card provider may have text or email alerts to help you monitor your account, but be sure to check your statements regularly. And don’t just look for big withdrawals. Small purchases could be criminals seeing what they can get away with.

Check your credit report.

You can get a free credit report once per year. So after about 30 days, request your copy and check for anything suspicious. If you would like some extra protection, you may want to sign up for a credit monitoring service. While this typically comes at a cost, the business that exposed your data may offer these services for free in response to the breach.

Change your passwords.

In case the cybercriminals are in your online accounts or got a hold of the information that could give them access, change your passwords. Plus, it’s a good practice to update your passwords every 90 days. Be sure to include numbers, symbols, and uppercase and lowercase letters in your new passwords.

Grange Insurance offers an Identity Theft coverage endorsement that can be added to a Grange Personal Auto or Homeowners insurance policy. For full details on coverage and discounts, contact your Shield Insurance Agent. This article is for information purposes only. For specific coverage details, always refer to your policy.

Read More
Wallet Safety Check List - Shield Insurance Agency Blog

Wallet Safety Check List

10 items to leave out of your wallet

It’s simple for thieves to turn plain, old regular crime into cybercrime – if you give them the right information. Leave these ten items out of your wallet.

Over time, it’s easy for your wallet or purse to become stuffed full of crucial information – receipts, PIN numbers, and social security cards – that thieves can use to access your online life with only a few clicks.

Keep only what you need in your wallet and purse and keep your online life secure. Use the infographic below to help determine what should be, and more importantly, what should not be in your wallet.

Wallet Safety Check List

10 Items To Leave Out Of Your Wallet - Shield Insurance Agency Blog
  1. Social Security Cards
  2. Birth certificates
  3. Receipts
  4. Gift cards
  5. Extra credit cards
  6. Blank checks
  7. Passports
  8. Medicare cards
  9. Spare keys
  10. Pins and passwords
Read More
Package Theft And How To Avoid It – Shield Insurance Agency Blog

Package Theft and How to Avoid it

Not on my porch: How to avoid package theft

Package Theft: For all the convenience that ordering online gives us, there is an unfortunate downside – our delivery may be taken by someone else before we’re able to get our hands on it.

Package theft, especially around the holidays, is a growing inconvenience for many consumers. Approximately 26 million Americans say they’ve experienced package theft, with the number increasing every year as “porch pirates” get bolder and ordering online grows in popularity.1

No one wants to fall victim to the antics of a porch pirate – including you. Consider implementing these low-cost solutions so your package makes it off the porch and into your home.

  1. Ship it to work.
    Keep your package off the porch in the first place. If your company allows, consider shipping your packages to your workplace instead of your home.
  2. Enlist a neighbor’s help.
    Do you have a neighbor or a friend that’s usually home? If so, see if they can wait for your package or keep an eye out for it.
  3. Require a signature.
    Consider requesting a signature for your package to be dropped off. That way, your package won’t be left on your porch exposed to potential thieves.
  4. Be proactive.
    If you’re sending a package, ask the recipient to share information on the safest way for them to receive deliveries.
  5. Take advantage of alternative delivery options and alerts.
    FedEx, the U.S. Postal Service and UPS all have alternative pickup and delivery options available. Visit their websites to explore your options and update your delivery preferences. You can also sign up for delivery alerts to track your package and stay up-to-date on delivery times.
  6. Get technical.
    Consider investing in low-cost technologies like automatic light timers and motion-censored lights.
  7. Keep your porch clear and visible.
    It may seem counter-intuitive, but if a thief has no place to hide, they’re less likely to take the risk of going up to your porch in the first place.
  8. Ask for your box to be nondescript.
    Ordering from a high-end store? Consider marking the “gift” checkbox when you purchase so the package comes in a plain box. You can also request this of friends and family so your box doesn’t grab attention.
  9. Find strength in numbers.
    Neighborhood groups on social media or community apps like Nextdoor can provide your neighborhood a system for reporting suspicious activity to each other.
  10. Visit the UPS article on How to keep packages safe from box bandits

It may not be a low-cost option, but our list wouldn’t be complete without the recommendation of a home security device. Signs announcing the presence of a home security system can go a long way in your efforts to scare off a thief. In fact, homes without security systems are 300% more likely to be broken into or vandalized.2 Bonus: You may be able to receive a discount on your homeowners’ insurance. Contact one of our agents for details.

Strategically-placed security cameras, or devices like video doorbells and lock boxes, can also go a long way in mitigating package theft and have increased in popularity for their ability to catch thieves in the act.

As long as you’re shipping products to your door, there’s a chance your package will be a target. Use these strategies to deter package theft and finally get rid of porch pirates for good.

Read More

How To Treat These 3 Cyber Tricks

Shield Insurance Blog | Cyber Tricks | Contact our office today!

It’s All A Scam! 3 Cyber Tricks

Halloween is a few short days away, and under the cover of the dark web, cybercriminals are refining their sinister methods. And they’re only getting more sneaky and destructive.

Here are three of their most common tricks and how you can avoid getting fooled.

1)  You get a dreadful call that your computer is infected

You receive a call from someone disguised as a technician who claims your computer has a virus, and for $300 they can fix your problem by accessing your machine.

You provide your payment information and login credentials, and it appears that the tech is “fixing” your computer. In fact, they are either doing absolutely nothing or downloading malware to transmit your personal and financial information. Scary, right?

How do you prevent this menacing scam?

  • Document the phone number of the caller and their name
  • Hang up
  • Block their number from calling again
  • Submit your number to the National Do Not Call Registry
  • Report the matter to the (IC3), which collects and follows up on this information

No reputable computer security company or software firm calls to inform anyone that they have a computer virus. Normally, your firewall will prompt a message prior to accessing a bad file or site, and your anti-virus software will scan and fix your files automatically.

2) You receive a shocking email

An email pops into your inbox with a subject line that says, “Your payment of $4,890 to PayPal has been approved,” or, “I am NOT paying this invoice.”

You can’t resist the urge to open it; it might seem like you’re on the hook for a lot of money or being accused of something you didn’t do.

Emails with subject lines like these are remarkably successful in luring their victims into opening them. The real danger lies in the links. Clicking on these could open the door to malicious software, with ransomware being the usual suspect.

How to prevent this sinister scam of cyber tricks?

  • Beware of signs that an email is malicious or fraudulent
  • Delete the email
  • If this happens at work, alert the appropriate person or department, so other employees can be warned and protected

3) You are tricked into transferring funds by an imposter

A Business Email Compromise (BEC) scam usually starts off with an email that makes a pressing demand. It appears to come from an executive or trusted vendor who is unavailable to confirm the demand.

The sender demands that you transfer funds immediately to facilitate a deal or to pay an invoice. The receiver may be deceived by the sender’s inside information, such as details of a pending deal or specific relationship.

How to prevent this nefarious scam?

  • Watch for emails that demand you make a funds transfer, change vendor information, or supply personal or financial information
  • Before taking action, confirm the request verbally, either by phone call to a known number or in person
  • Alert the appropriate internal contact so that preventive actions can be taken, such as blocking the scammers and raising co-workers’ awareness
  • Report the attempt to the IC3 on their website.

Read More