FICO, President Obama and the future of consumer protection

BLOG-FICO-Obama-and-Consumer-Protection

  Friday morning was a momentous day for FICO—and for American consumers. President Obama arrived at the Consumer Financial Protection Bureau on Friday to sign an executive order to improve consumer protection and identity theft prevention. The initiative is called the BuySecure program.   FICO was an active participant in this event, and we are honored to be able to contribute to the program.   Millions of Americans have fallen victim to data breaches in the last year as a result of weak security systems. Because of this, the President has decided to take action. Before signing the executive order, President Obama explained, “we've all experienced the benefits of new technologies that let us buy and sell things faster and more efficiently than ever before. … [Read more...]

The Home Depot Data Breach: 3 Things You Can Do Now to Protect Yourself

BLOG-Home-Depot-Data-Breach

As you have probably heard, Home Depot announced that their payment systems have been hacked, resulting in what might be one of the biggest data breaches yet. Between Target, Neiman Marcus, Goodwill and now this, it seems that hackers aren’t losing any speed nor audacity.   If the rise in breaches and identity theft hasn’t gotten your attention yet, it should. Every time you hear of a major data breach at a place where you shop, you should be taking steps to protect yourself. Here are three ways you can take action now.     1. Request a new credit card If you regularly use your credit card, it’s time to request another one. The service is usually free and this simple step can save you the pain of fraud resolution. Just make sure you have a backup payment method … [Read more...]

Are you the ideal target for identity theft?

BLOG-Are-You-The-Ideal-Identity-Theft-Target

  One of the biggest misconceptions about identity theft is that identity thieves only target rich people with high FICO® Scores who do careless things like lose a credit card. This mentality results in a lot of people thinking they would never be targeted by an identity thief. But the truth is, identity thieves have a variety of motives that ultimately result in a payout. What’s worse, they have a long list of ways they can steal your information.   In short, you don’t have to be rich and careless to be valuable to an identity thief. So who exactly is an identity thief targeting? Good question. Here are 5 types of identity theft victims.   The social butterfly How did we all survive before social media? You love logging in to your social channels, making … [Read more...]

Identity theft protection vs. credit monitoring: Which one is best?

BLOG-Identity-Theft-Protection-vs-Credit-Monitoring

You have one noble goal: don’t become a victim of fraud. But what’s the best way to protect yourself? The most popular forms of protection fall into two categories: credit monitoring and identity theft protection. There’s a lot of debate about which type of service can protect you best. Here’s what you need to know about both.   Credit Monitoring One of your biggest concerns is probably how fraud and identity theft could impact your credit and thus ability to get a good loan. Credit monitoring is a great protection option, as you’ll be able to stay on top of suspicious changes to your credit reports—changes that could signify fraud.   PROS:   Most credit monitoring services scan your credit reports for changes at least weekly (FICO monitoring products … [Read more...]

PII at Risk Part 2: Why Your Phone Number is Valuable to Hackers

BLOG-Why-Hackers-Want-Your-Phone-Number

Last time we met, I explained why your email account is valuable to hackers—what value it has and how it could be used to gain access to more of your coveted personally identifiable information (PII) than you might think.   But it’s not just your email that hackers want; they want your phone number, too. Cell phone numbers are particularly valuable, as they have become the modern-day equivalent of your wallet. Your mobile device contains valuable information like your contacts list (a great way to get a list of your friends—future identity theft targets), affinity account and reward numbers  (frequent flyer miles have value that thieves can cash in on), web history, and other equally valuable information. Using your phone number, two tactics are then commonly deployed. Let’s see … [Read more...]

PII at Risk Part 1: Why Your Email Account is Valuable to Hackers

BLOG-Why-Your-Email-Account-is-Valuable-to-Hackers

Identity is a funny thing. I used to think I knew exactly what it was made of—Social Security number, date of birth, and first and last name. Period. But then came the Internet and the notion of identity began to change and evolve along with the latest technology. Now I’m also known by my Twitter handle, Facebook name, and even my Xbox gamertag. Increasingly, in an online world, people know not only my name, but also my email address.   The miscreants of the “dark web” (anonymous, virtually untraceable global networks used by criminals) are looking for email addresses to harvest. Why? Because they make money selling consumer’s online credentials—usernames and passwords to online accounts for companies like iTunes, Groupon, dell, overstock, Walmart, BestBuy, etc[i]. These login … [Read more...]

The real-life effects of data breaches and identity theft

BLOG-The-Real-Life-Effects

Due to what feels like a constant flow of data breach announcements, the threat of identity theft has become common knowledge. We hear of personal information being stolen or exposed, but how that stolen information is used remains somewhat of a mystery unless you’ve actually experienced it. So let’s take a minute to imagine what it would really be like to become a victim of identity theft. Here are three scenarios.   1. Your favorite store gets hacked Hundreds of businesses are affected by data breaches every year, and these data breaches can expose your personal information. The real victim is the consumers, not the businesses themselves. Only a few weeks ago EBay suffered a data breach affecting its millions of consumers. It appears the hackers didn’t get any financial … [Read more...]

Medical Data Breaches: Why Your Doctor Might Need a Check Up

blog-Medical-data-breaches

Think about the last time you went to the doctor’s office. Did you fill out a form with your Social Security number (SSN)? Were you prescribed any medicine? Did you disclose past allergic reactions?     Now think about what an identity thief could do with that kind of information. There’s a myriad of options, which is one of the reasons why medical identity theft impacted almost half (43%) of all identity theft victims in 2013. To get your information, an identity thief might hack your doctor’s digital filing system, find records leaked on file-sharing sites by an employee, or simply steal your doctor’s laptop. No matter how the data breach occurs, you’re left cleaning up a potentially life threatening mess. Here are just three potential … [Read more...]

Cloud Security: Keeping your information safe in the cloud

blog-how-to-keep-your-information-safe-in-the-cloud

Although we have a long ways to go to conquering outer space, we should look perhaps a bit closer to our own atmosphere and consider the following: How safe are the contents we store in the cloud?   What’s this ‘cloud’ you speak of? Good question. Cloud services are applications that are Software as a Service (SaaS) based and hosted on OPP — Other People’s Property — so that a user is not required to download and install a software package in order to use the service. All you need is the Internet browser of your choice and you’re good to go.   Millions of consumers interact and store massive amounts of personal data every day. For example, those of us who watch Netflix or use Instagram to send pictures — all that content is stored in the cloud. DropBox, a file storage … [Read more...]

How to Help Your Child Avoid ID Theft

blog-help-your-child-avoid-id-theft

A blog post for myFICO Kids – Making financial awareness, protection & health a part of the entire family.   Earlier this month we posted an article about the abundance of child ID theft and what parents can watch for to protect their children from those who may be seeking a new identity. Identity theft is highly preventable, not only for parents, but for children as well. Our youth are growing up with new technological advances that give them access to all things the internet has to offer. Most classes today even require the use of the Internet for research or projects.   One study found that 85% percent of kids aged 12-17 used social media networks in 2013, with 94% of teens on Facebook. With the constant updates to Facebook, everything your teen posts - status … [Read more...]

Disclaimer: This content is not provided or commissioned by a credit card issuer. Opinions expressed here are the author's alone, not those of a credit card issuer, and have not been reviewed, approved or otherwise endorsed by a credit card issuer. This site may be compensated by credit card issuers mentioned on the site by such companies.