Multiple Security Services
Focus on Feasibility, Suitability and
Acceptability.
Security assessments involve situations and
scenarios with prerequisites of expertise, methodology and relevant
tools.
Assumptions, Applications, Competition and
Alternatives (comparisons - effectiveness) are the building blocks
to facilitate Deliverables and Results (quality -
technology).
Ask if in doubt - after all it is about peace of
mind aswell as prevention.
Card Fraud - Identity Theft
Prevention better than cure
philosophy:
Identity Fraud may involve loans, credit, goods,
services and personal details. Consider the Fraud Act 2007 and
fraud by misrepresentation.
Passwords and Personal Identification Number(s)
[PINS] should not be written down or revealed to anyone. They
should be cryptic and not obvious. Never use Date of Birth or phone
Number data for example.
Ensure Personal Information is only provided to
legitimate Users for legitimate purposes. Thus not for others to
'overhear' or 'see' your personal information. Do not volunteer
information over the phone or to a third party - confirm they are
who they say they are and only consider if they supply a written
request.
Financial Statements should arrive on date and
consistently on going as requested. Inconsistencies of delivery
timing or content/statement items should be queried
immediately.
Keep documents in a safe place, hidden or locked
away at home to prevent burglars gaining easy access, till disposed
of.
Invest in a cross shredder to eliminate personal
information paperwork no longer required (bills, receipts and other
financial papers for example). Thus destroy all documents
containing personal, bank or credit card account details before
disposing of them.
When moving house notify all critical parties
(Family, Friends, your Bank and/or Building Society, Insurance,
Utility Providers etc. and have your mail / post redirected
(old-home-new)).
Regularly obtain a copy of your credit file from
a legitimate credit reference agency (Callcredit, Equifax and
Experian are examples) to ascertain any suspicious transactions and
to whom correspondence should be sent to. Lenders may take into
account the number of searches per credit file for lending
consideration. Ensure your file is relevant and up to date (e.g.
missed payments, errors removal, disputes (evidence and
proof)).
Online procedure:
Only use trusted computer software and hardware
provision. Single User (you) is preferred.
Ensure Anti-virus and Firewall protection are
active, up to date and utilities regularly used. For example
scanning for viruses, spyware, malware, Torjans, adware, e-mail
attachments from trusted source(s).
Follow Internet / intranet / world wide web /
surfing best practice and etiquette. For example trade on only
secure web sites (locked padlock), take hard copies of
transactions, follow logging off procedures, don't share sign on
details with anyone and always think, prepare then action.
Banks' Operating Systems,for example, should also
be considered for protection. Two, three or more pass codes for
secure log on policy appraisal. Two tier authentication for
example: "Fingerprinting" PCs or Card Readers (unique number
generation) in addition to pass codes.
Victim's procedure:
Once identified contact Credit Reference
Agencies, Financial Institutions (Banks, British Bankers
Association), Law Enforcement Agencies, Police and your local
Member of Parliament (MP). In particular:
- Contact Organisational Provider or Issuer of
stolen item(s). Like a Passport or Driving Licence.
- Contact card provider immediately to cancel
card
- Complete the Card Provider's Dispute Form.
Explaining circumstances of fraud, your security precautions and
the Police's Crime Investigation Number (you must inform the Police
at time of missing the card).
- Bank instigates audit trail of fund movements
of card use. ATM / PIN / OTHER
- Bank usually arranges a temporary overdraft to
cover account deficit and charges once their Fraud Investigation is
completed (could take more than a month and a half)
- Checkout Association for Payment Clearing
Services (APACS) and the Financial Ombudsman Service for further
information
- Checkout and comply with all your Bank's Code.
Checkout Securecode by Mastercard Service and Verified by Visa
(VBV) Service.
- Ensure reinstatement / reimbursement of
position prior to fraud (funds, cleared name (consider defamation
of character) and credit ratings).