Carrie Kerskie, President & CEO of Griffon Force, LLC, is a member of Collier County Identity Theft Task Force. She is a sought-after speaker, trainer and consultant on identity theft, internet safety, fraud and data breach.
Data breaches are increasingly common, and it’s likely that your sensitive information has already been exposed at some point. Be proactive and thwart identity thieves by freezing your credit.
Taking steps to declutter your mailbox and protect your phone number(s) can greatly minimize your frustration and reduce your vulnerability to fraud and identity theft.
Phishing emails can be used to steal consumers’ personal information and gain access to electronic devices and bank accounts. Discover how to spot fake emails and keep your important information secure.
It can be difficult to know what to do if you click on a phishing link. Follow these steps to protect your identity and finances if you believe you have fallen victim to a phishing email or text message.
Talking to aging parents about fraud and ways to reduce their risk of falling prey to scammers (especially online) is never an easy discussion. Here are some strategies to help you find common ground.
If you don't know these important deadlines for reporting identity theft and stolen credit, ATM or debit cards, you could end up losing thousands of dollars.
After a loved one passes away, they are still susceptible to identity theft and fraudulent activity. However, there are some steps that you can take to ensure that their information does not fall into the wrong hands.
Online access to accounts is extremely convenient, but electing to forgo such access can leave you vulnerable to criminal activity. Learn how you can safeguard your accounts from fraudsters by using extra security measures.
Many family members are eager to buy the latest gadgets for themselves and their loved ones. However, gifting a smart phone to a senior can leave them open to security breaches. Proper setup and secure use can make all the difference.
Scammers have adopted a new strategy for manipulating caller ID to persuade people to answer their phone calls. Knowing what kinds of suspicious signs to look for can help you avoid people who are calling with shady intentions.
Using snail mail, writing checks, and placing all refuse in the garbage are a few traditional ways of managing finances and household affairs. While these may seem like simple and secure everyday actions, it is important to learn how these things can place you at risk and how to adapt your habits to better protect your identity.
Countless businesses and organizations are targeted by hackers every year, leaving consumers vulnerable to fraud. Use these steps to protect your identity and finances.
Identity theft is a serious issue that everyone is at risk for. Some specialized companies claim to protect their subscribing customers from data breaches and compromised identities, but are they really that effective? Can't you just monitor and safeguard your financial and personal information yourself?
Con artists can more easily manipulate someone in person, so they often approach seniors at home under the guise of offering some kind of service. Learn from these real-life examples and use these tips to avoid falling victim to a scammer.
Mobile devices and social media platforms have provided a number of benefits to society, but these tools have also made it easier for unsavory people to exploit vulnerable individuals, such as the elderly and those with dementia. Learn more about this prevalent issue and see how you can prevent your loved one from becoming a victim.
There are a few important steps that you must take after your identity has been compromised, but there are also a couple of roadblocks to avoid and minor details to be aware of when you are going through this process.
For years, Medicare cards have plainly displayed beneficiaries’ Social Security numbers, leaving millions of seniors vulnerable to identity theft. Fortunately, the government has implemented system improvements to protect this sensitive information.