{"id":1088,"date":"2021-03-03T10:14:00","date_gmt":"2021-03-03T15:14:00","guid":{"rendered":"http:\/\/blog.uvm.edu\/cap\/?p=1088"},"modified":"2022-06-29T10:49:08","modified_gmt":"2022-06-29T14:49:08","slug":"identity-theft-and-phishing","status":"publish","type":"post","link":"https:\/\/blog.uvm.edu\/cap\/identity-theft-and-phishing\/","title":{"rendered":"Identity Theft and Phishing"},"content":{"rendered":"\n<p>By Crystal Baldwin<br \/><br \/>When I presented on the topic of identity theft a decade ago, the concept seemed somewhat distant, impacting few individuals with identity thieves using dated and laborious tactics to steal&nbsp;identities.&nbsp; A section of my presentation was devoted to informing about dumpster diving\u2014the fact that people can get a lot of information about your identity from the trash you discard\u2014and encouraging shredding as an identity theft prevention step.&nbsp; Another section focused on phishing and educating about what phishing is; not to be confused with fishing, except metaphorically of course.&nbsp;<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blog.uvm.edu\/cap\/files\/2021\/03\/Identity-Theft-protection-1024x1024.png\" alt=\"Protect yourself from Identity Theft! Safeguard your personal information.  Verify requests for information. Shred documents using a cross cutting shredder.\" class=\"wp-image-1091\" width=\"463\" height=\"466\" \/><\/figure><\/div>\n\n\n\n<p>In the age of the robocall and the internet, <strong>phishing and identity theft have become more sophisticated<\/strong> in that scammers can make the same automated call to many people at once and <strong>data security breaches&nbsp;expose consumers to&nbsp;widespread identity theft<\/strong>.&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p>Even with advances in technology, identity thieves can still obtain your personal information by rummaging through your trash and phishing.&nbsp; To demonstrate, let\u2019s take a quiz:&nbsp;<\/p>\n\n\n\n<p class=\"has-text-color\" style=\"color:#132f9d\"><strong>What do you do with your expired credit card when a replacement arrives in the mail?<\/strong>&nbsp;<\/p>\n\n\n\n<p class=\"has-text-color\" style=\"color:#132f9d\">          A.  Cut it down the middle and throw it out.&nbsp; The card cannot be used once the magnetic strip is severed.&nbsp;&nbsp;<br \/><br \/>          B.  Run it through a straight-line shredding machine. The card will be of no use when made into little strips.&nbsp;&nbsp;<br \/><br \/>          C.  Cut it into as many small pieces as possible, either with scissors or a cross-cutting shredder. Throw out the pieces in different trash bags. It will be virtually impossible to decipher the card with it in so many pieces and places.&nbsp;<br \/><br \/>          D.  Discard as it is.&nbsp; Without additional instruction from the bank, no additional steps are necessary.&nbsp; The card is of no use once it expires.&nbsp;<\/p>\n\n\n\n<p>My answer is C: Cut the card into a million pieces and discard in multiple places.&nbsp; Why?&nbsp; Because even though the card is expired, with card updates the card number stays the same.&nbsp; <strong>Once a determined scammer has obtained the card, all they need to do is follow up with a strategic phishing phone call to you<\/strong>.&nbsp; When they call, they may claim to be your financial institution and ask a series of phishing questions, which exposes other important numbers about the valid card in your possession: the expiration date and the CCV.&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p class=\"has-text-color\" style=\"color:#132f9d\"><strong>What exactly is phishing?&nbsp;<\/strong>&nbsp;<\/p>\n\n\n\n<p class=\"has-text-color\" style=\"color:#132f9d\">          A.  A sport of catching fish, using a fishing pole.&nbsp;<br \/><br \/>          B.  A fun excursion with Vermont Phish Phans.&nbsp;&nbsp;<br \/><br \/>          C.  The fraudulent attempt to obtain your personal information or data.&nbsp;<br \/><br \/>          D.  Testing the water pH before ice fishing.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Hopefully this quiz question was easier.&nbsp; The answer is also C.&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p><strong>Identity thieves phish for information about you<\/strong>, your Social Security number, your bank account number, your credit card and debit card numbers, your birthday, and more in order <strong>to use the information for their own financial gain<\/strong>.&nbsp; When an email purports to be your bank, saying you have been locked out of your account and you must login using the enclosed link, a scammer hopes you provide them all&nbsp;of&nbsp;your personal information by completing their realistic-looking bogus form.&nbsp; Once you have, they can access and use your account.&nbsp; And, depending on the information you have provided, they may also open up new lines of credit in your name without your knowledge or consent.&nbsp; Identity thieves have opened home loans, car loans and credit cards.&nbsp; They usually don\u2019t pay the bills they run up, creating a mountain of work for you to dispute debts you do not owe.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Phishing scammers may contact you by email, phone, text message, and any other communication mechanism you use currently, including social media.&nbsp; <strong>Phishing scams often present a problem that must be solved by you disclosing some personal information<\/strong>.&nbsp; They may even pretend to be your computer company, warning about viruses that need to be repaired on your computer.&nbsp; They offer to help you resolve your virus problem, if you grant them access to your computer and, unknowingly, your personal information stored on your computer.&nbsp; Phishing scammers may also say a package will soon be delivered to you and you must reply if you did not order a product, or else your credit card will be charged. Then when you call, they ask for your credit card number.&nbsp;<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignright size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blog.uvm.edu\/cap\/files\/2021\/03\/Phishing-Scams-1-1024x1024.png\" alt=\"Protect yourself from phishing scams! Scammers claim to be someone you know. They present a problem that can only be resolved by providing personal info or money, they may contact you by phone, email, text, mail, and even social media.\" class=\"wp-image-1090\" width=\"340\" height=\"342\" \/><\/figure><\/div>\n\n\n\n<p>Phishing scams can be tricky, because there are scenarios in which a bank institution may contact you, such as if there has been fraudulent activity on your credit card. Scammers take advantage of this and try to replicate it.&nbsp; Rather than trying&nbsp;to determine the difference between a scam call and a call from your bank, <strong>take out the guesswork by disconnecting the contact and calling your bank directly on a number you know to be valid<\/strong>.&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p><strong>Resist the&nbsp;impulse&nbsp;to reply to urgent requests of phishing scammers.&nbsp;<\/strong> By slowing down and taking steps to verify, you can stop phishing scammers from reeling you into their trap.&nbsp;<\/p>\n\n\n\n<p>Help CAP prevent scams by sharing this information with your community.&nbsp; Have a scam to report? Use CAP\u2019s&nbsp;<a href=\"https:\/\/ago.vermont.gov\/cap\/stopping-scams\/\" target=\"_blank\" rel=\"noreferrer noopener\">online scam reporting form<\/a>.&nbsp;<\/p>\n\n\n\n<p>For more information about identity theft, visit our&nbsp;<a href=\"https:\/\/ago.vermont.gov\/identity-theft\/\" target=\"_blank\" rel=\"noreferrer noopener\">website<\/a>.&nbsp;<\/p>\n\n\n\n<p>Help us stop these scams by sharing this information with those you care about. Get notified about the latest scams: Sign up for&nbsp;<a href=\"https:\/\/ago.vermont.gov\/cap\/stopping-scams\/\" target=\"_blank\" rel=\"noreferrer noopener\">VT Scam Alert System<\/a>&nbsp;alerts.&nbsp;&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Crystal Baldwin When I presented on the topic of identity theft a decade ago, the concept seemed somewhat distant, impacting few individuals with identity thieves using dated and laborious tactics to steal&nbsp;identities.&nbsp; A section of my presentation was devoted to informing about dumpster diving\u2014the fact that people can get a lot of information about&hellip; <a class=\"more-link\" href=\"https:\/\/blog.uvm.edu\/cap\/identity-theft-and-phishing\/\">Continue reading <span class=\"screen-reader-text\">Identity Theft and Phishing<\/span><\/a><\/p>\n","protected":false},"author":4480,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[505556],"tags":[383389,639415,639395,481474,639406,639410,639411,639412,639403,505515,639405,607,639409,482450,505542,639414,639407],"class_list":["post-1088","post","type-post","status-publish","format-standard","hentry","category-national-consumer-protection-week","tag-bank","tag-call-cap","tag-computer-tech-support-scam","tag-consumer","tag-credit-card-fraud","tag-cross-shred-documents","tag-disconnect-unsolicited-contacts","tag-dont-take-the-bait","tag-financial-institution-phishing","tag-identity-theft","tag-ncpw2021","tag-phishing","tag-safeguard-your-personal-information","tag-scams","tag-social-security-number-phishing","tag-take-steps-to-verify","tag-unauthorized-purchases","entry"],"_links":{"self":[{"href":"https:\/\/blog.uvm.edu\/cap\/wp-json\/wp\/v2\/posts\/1088","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.uvm.edu\/cap\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.uvm.edu\/cap\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.uvm.edu\/cap\/wp-json\/wp\/v2\/users\/4480"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.uvm.edu\/cap\/wp-json\/wp\/v2\/comments?post=1088"}],"version-history":[{"count":2,"href":"https:\/\/blog.uvm.edu\/cap\/wp-json\/wp\/v2\/posts\/1088\/revisions"}],"predecessor-version":[{"id":1098,"href":"https:\/\/blog.uvm.edu\/cap\/wp-json\/wp\/v2\/posts\/1088\/revisions\/1098"}],"wp:attachment":[{"href":"https:\/\/blog.uvm.edu\/cap\/wp-json\/wp\/v2\/media?parent=1088"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.uvm.edu\/cap\/wp-json\/wp\/v2\/categories?post=1088"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.uvm.edu\/cap\/wp-json\/wp\/v2\/tags?post=1088"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}