Welcome!

News Feed Item

Consumers: A Click Away From the Heartbleed Bug Ruining Credit

Community Choice Financial Offers Tips to Protect Against Identity Theft

COLUMBUS, OH--(Marketwired - April 18, 2014) - Every year approximately 10 million Americans become victims of identity theft. Just last week a new online virus, the Heartbleed Bug, was discovered that can compromise the usernames and passwords of websites that people use every day to shop, email and bank.

CNNMoney.com reported that more than 80 percent of sites run on Web server programs that are vulnerable to the Heartbleed Bug.

"Americans work hard to build their credit and provide financial security for themselves and their families," said John Rowe, a senior vice president at Community Choice Financial. "With the click of a mouse, those Americans could make themselves vulnerable to identity theft. The good news is that there are a variety of ways that you can minimize the damage caused by thieves as well as your chances of scammers taking advantage of you in the first place."

Community Choice Financial, a leading retailer of financial services to unbanked and underbanked consumers through a network of over 500 retail storefronts across 15 states and across more than 20 states via the Internet, outlined nine ways individuals can protect themselves from identity theft.

The following are some steps you can take to protect yourself and your finances from identity thieves:

  • Be sure to shred financial documents. Do not just throw out paperwork with financial and personal information.
  • Protect Social Security numbers. It is important to leave Social Security cards at home. Do not carry the cards in wallets or write the numbers on checks. Only provide Social Security numbers when absolutely necessary.
  • Avoid disclosing personal information by phone. Do not give out any personal information to unknown individuals or organizations over the phone, online or by mail. Legitimate business people will understand and won't apply pressure to do otherwise.
  • Establish a secure password. It's not a good idea to use obvious passwords such as a birthday or the last few digits of a Social Security number. These can be easily hacked, leaving important accounts vulnerable to thieves.
  • Check credit reports regularly. These reports contain important information that should be monitored regularly, such as bill payment history and active accounts. Regular reviews can provide an early warning of potential identity theft.
  • Review all financial statements. In addition to reviewing credit reports, it is critical to review all financial statements to check for any unauthorized transactions.
  • Close accounts that have been opened fraudulently or that have been misused by scammers. If one becomes the victim of identity theft, it is important to contact the security and fraud departments of financial companies and obtain any supporting documents in writing.
  • Report identity theft to your local authorities. Some creditors may want proof of the crime, so reporting it to local law enforcement and the Federal Trade Commission is beneficial. This will assist law enforcement nationwide with any investigations.
  • Keep Calm. Federal law limits liability for unauthorized charges on credit or debit cards. An individual's liability will depend on the type of card and the timeliness in reporting the theft.

"While there are certainly consumer protections in place to reduce the damage to individuals who are victims of identity theft, sometimes those protections are not enough," Rowe said. "It's important to remain vigilant and use opportunities, such as the Heartbleed Bug, to access your risks and strengthen your defenses against identity theft."

About Community Choice Financial

Community Choice Financial Inc.™ (CCFI) is a leading retailer of financial services to unbanked and underbanked consumers through a network of over 500 retail storefronts across 15 states and across more than 20 states via the Internet. CCFI focuses on providing consumers with a wide range of convenient consumer financial products and services to help them manage their day-to-day financial needs including short-term consumer loans, installment loans, check cashing, prepaid debit cards, money transfers, bill payments and money orders. For more information, visit www.ccfi.com.

The following files are available for download:

Amanda Wurst
Paul Werth Associates
[email protected]
614-224-8114

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
In this presentation, you will learn first hand what works and what doesn't while architecting and deploying OpenStack. Some of the topics will include:- best practices for creating repeatable deployments of OpenStack- multi-site considerations- how to customize OpenStack to integrate with your existing systems and security best practices.
"MobiDev is a software development company and we do complex, custom software development for everybody from entrepreneurs to large enterprises," explained Alan Winters, U.S. Head of Business Development at MobiDev, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
Agile has finally jumped the technology shark, expanding outside the software world. Enterprises are now increasingly adopting Agile practices across their organizations in order to successfully navigate the disruptive waters that threaten to drown them. In our quest for establishing change as a core competency in our organizations, this business-centric notion of Agile is an essential component of Agile Digital Transformation. In the years since the publication of the Agile Manifesto, the conn...
Leading companies, from the Global Fortune 500 to the smallest companies, are adopting hybrid cloud as the path to business advantage. Hybrid cloud depends on cloud services and on-premises infrastructure working in unison. Successful implementations require new levels of data mobility, enabled by an automated and seamless flow across on-premises and cloud resources. In his general session at 21st Cloud Expo, Greg Tevis, an IBM Storage Software Technical Strategist and Customer Solution Architec...
"We work around really protecting the confidentiality of information, and by doing so we've developed implementations of encryption through a patented process that is known as superencipherment," explained Richard Blech, CEO of Secure Channels Inc., in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
Major trends and emerging technologies – from virtual reality and IoT, to Big Data and algorithms – are helping organizations innovate in the digital era. However, to create real business value, IT must think beyond the ‘what’ of digital transformation to the ‘how’ to harness emerging trends, innovation and disruption. Architecture is the key that underpins and ties all these efforts together. In the digital age, it’s important to invest in architecture, extend the enterprise footprint to the cl...
Data is the fuel that drives the machine learning algorithmic engines and ultimately provides the business value. In his session at Cloud Expo, Ed Featherston, a director and senior enterprise architect at Collaborative Consulting, discussed the key considerations around quality, volume, timeliness, and pedigree that must be dealt with in order to properly fuel that engine.
"We were founded in 2003 and the way we were founded was about good backup and good disaster recovery for our clients, and for the last 20 years we've been pretty consistent with that," noted Marc Malafronte, Territory Manager at StorageCraft, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
Effectively SMBs and government programs must address compounded regulatory compliance requirements. The most recent are Controlled Unclassified Information and the EU's GDPR have Board Level implications. Managing sensitive data protection will likely result in acquisition criteria, demonstration requests and new requirements. Developers, as part of the pre-planning process and the associated supply chain, could benefit from updating their code libraries and design by incorporating changes. In...
Two weeks ago (November 3-5), I attended the Cloud Expo Silicon Valley as a speaker, where I presented on the security and privacy due diligence requirements for cloud solutions. Cloud security is a topical issue for every CIO, CISO, and technology buyer. Decision-makers are always looking for insights on how to mitigate the security risks of implementing and using cloud solutions. Based on the presentation topics covered at the conference, as well as the general discussions heard between sessio...
IoT is rapidly becoming mainstream as more and more investments are made into the platforms and technology. As this movement continues to expand and gain momentum it creates a massive wall of noise that can be difficult to sift through. Unfortunately, this inevitably makes IoT less approachable for people to get started with and can hamper efforts to integrate this key technology into your own portfolio. There are so many connected products already in place today with many hundreds more on the h...
Andi Mann, Chief Technology Advocate at Splunk, is an accomplished digital business executive with extensive global expertise as a strategist, technologist, innovator, marketer, and communicator. For over 30 years across five continents, he has built success with Fortune 500 corporations, vendors, governments, and as a leading research analyst and consultant.
No hype cycles or predictions of zillions of things here. IoT is big. You get it. You know your business and have great ideas for a business transformation strategy. What comes next? Time to make it happen. In his session at @ThingsExpo, Jay Mason, Associate Partner at M&S Consulting, presented a step-by-step plan to develop your technology implementation strategy. He discussed the evaluation of communication standards and IoT messaging protocols, data analytics considerations, edge-to-cloud tec...
Today we can collect lots and lots of performance data. We build beautiful dashboards and even have fancy query languages to access and transform the data. Still performance data is a secret language only a couple of people understand. The more business becomes digital the more stakeholders are interested in this data including how it relates to business. Some of these people have never used a monitoring tool before. They have a question on their mind like “How is my application doing” but no id...
Announcing Poland #DigitalTransformation Pavilion