Welcome!

News Feed Item

Consumers: A Click Away From the Heartbleed Bug Ruining Credit

Community Choice Financial Offers Tips to Protect Against Identity Theft

COLUMBUS, OH--(Marketwired - April 18, 2014) - Every year approximately 10 million Americans become victims of identity theft. Just last week a new online virus, the Heartbleed Bug, was discovered that can compromise the usernames and passwords of websites that people use every day to shop, email and bank.

CNNMoney.com reported that more than 80 percent of sites run on Web server programs that are vulnerable to the Heartbleed Bug.

"Americans work hard to build their credit and provide financial security for themselves and their families," said John Rowe, a senior vice president at Community Choice Financial. "With the click of a mouse, those Americans could make themselves vulnerable to identity theft. The good news is that there are a variety of ways that you can minimize the damage caused by thieves as well as your chances of scammers taking advantage of you in the first place."

Community Choice Financial, a leading retailer of financial services to unbanked and underbanked consumers through a network of over 500 retail storefronts across 15 states and across more than 20 states via the Internet, outlined nine ways individuals can protect themselves from identity theft.

The following are some steps you can take to protect yourself and your finances from identity thieves:

  • Be sure to shred financial documents. Do not just throw out paperwork with financial and personal information.
  • Protect Social Security numbers. It is important to leave Social Security cards at home. Do not carry the cards in wallets or write the numbers on checks. Only provide Social Security numbers when absolutely necessary.
  • Avoid disclosing personal information by phone. Do not give out any personal information to unknown individuals or organizations over the phone, online or by mail. Legitimate business people will understand and won't apply pressure to do otherwise.
  • Establish a secure password. It's not a good idea to use obvious passwords such as a birthday or the last few digits of a Social Security number. These can be easily hacked, leaving important accounts vulnerable to thieves.
  • Check credit reports regularly. These reports contain important information that should be monitored regularly, such as bill payment history and active accounts. Regular reviews can provide an early warning of potential identity theft.
  • Review all financial statements. In addition to reviewing credit reports, it is critical to review all financial statements to check for any unauthorized transactions.
  • Close accounts that have been opened fraudulently or that have been misused by scammers. If one becomes the victim of identity theft, it is important to contact the security and fraud departments of financial companies and obtain any supporting documents in writing.
  • Report identity theft to your local authorities. Some creditors may want proof of the crime, so reporting it to local law enforcement and the Federal Trade Commission is beneficial. This will assist law enforcement nationwide with any investigations.
  • Keep Calm. Federal law limits liability for unauthorized charges on credit or debit cards. An individual's liability will depend on the type of card and the timeliness in reporting the theft.

"While there are certainly consumer protections in place to reduce the damage to individuals who are victims of identity theft, sometimes those protections are not enough," Rowe said. "It's important to remain vigilant and use opportunities, such as the Heartbleed Bug, to access your risks and strengthen your defenses against identity theft."

About Community Choice Financial

Community Choice Financial Inc.™ (CCFI) is a leading retailer of financial services to unbanked and underbanked consumers through a network of over 500 retail storefronts across 15 states and across more than 20 states via the Internet. CCFI focuses on providing consumers with a wide range of convenient consumer financial products and services to help them manage their day-to-day financial needs including short-term consumer loans, installment loans, check cashing, prepaid debit cards, money transfers, bill payments and money orders. For more information, visit www.ccfi.com.

The following files are available for download:

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
MongoDB Atlas leverages VPC peering for AWS, a service that allows multiple VPC networks to interact. This includes VPCs that belong to other AWS account holders. By performing cross account VPC peering, users ensure networks that host and communicate their data are secure. In his session at 20th Cloud Expo, Jay Gordon, a Developer Advocate at MongoDB, will explain how to properly architect your VPC using existing AWS tools and then peer with your MongoDB Atlas cluster. He'll discuss the secur...
Historically, some banking activities such as trading have been relying heavily on analytics and cutting edge algorithmic tools. The coming of age of powerful data analytics solutions combined with the development of intelligent algorithms have created new opportunities for financial institutions. In his session at 20th Cloud Expo, Sebastien Meunier, Head of Digital for North America at Chappuis Halder & Co., will discuss how these tools can be leveraged to develop a lasting competitive advanta...
Most companies are adopting or evaluating container technology - Docker in particular - to speed up application deployment, drive down cost, ease management and make application delivery more flexible overall. As with most new architectures, this dream takes a lot of work to become a reality. Even when you do get your application componentized enough and packaged properly, there are still challenges for DevOps teams to making the shift to continuous delivery and achieving that reduction in cost ...
SYS-CON Events announced today that Interoute, owner-operator of one of Europe's largest networks and a global cloud services platform, has been named “Bronze Sponsor” of SYS-CON's 20th Cloud Expo, which will take place on June 6-8, 2017 at the Javits Center in New York, New York. Interoute is the owner-operator of one of Europe's largest networks and a global cloud services platform which encompasses 12 data centers, 14 virtual data centers and 31 colocation centers, with connections to 195 add...
SYS-CON Events announced today that Cloudistics, an on-premises cloud computing company, has been named “Bronze Sponsor” of SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Cloudistics delivers a complete public cloud experience with composable on-premises infrastructures to medium and large enterprises. Its software-defined technology natively converges network, storage, compute, virtualization, and management into a ...
SYS-CON Events announced today that SD Times | BZ Media has been named “Media Sponsor” of SYS-CON's 20th International Cloud Expo, which will take place on June 6–8, 2017, at the Javits Center in New York City, NY. BZ Media LLC is a high-tech media company that produces technical conferences and expositions, and publishes a magazine, newsletters and websites in the software development, SharePoint, mobile development and commercial UAV markets.
In his session at Cloud Expo, Alan Winters, an entertainment executive/TV producer turned serial entrepreneur, will present a success story of an entrepreneur who has both suffered through and benefited from offshore development across multiple businesses: The smart choice, or how to select the right offshore development partner Warning signs, or how to minimize chances of making the wrong choice Collaboration, or how to establish the most effective work processes Budget control, or how to max...
SYS-CON Events announced today that Juniper Networks (NYSE: JNPR), an industry leader in automated, scalable and secure networks, will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Juniper Networks challenges the status quo with products, solutions and services that transform the economics of networking. The company co-innovates with customers and partners to deliver automated, scalable and secure network...
"I think that everyone recognizes that for IoT to really realize its full potential and value that it is about creating ecosystems and marketplaces and that no single vendor is able to support what is required," explained Esmeralda Swartz, VP, Marketing Enterprise and Cloud at Ericsson, in this SYS-CON.tv interview at @ThingsExpo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Why do your mobile transformations need to happen today? Mobile is the strategy that enterprise transformation centers on to drive customer engagement. In his general session at @ThingsExpo, Roger Woods, Director, Mobile Product & Strategy – Adobe Marketing Cloud, covered key IoT and mobile trends that are forcing mobile transformation, key components of a solid mobile strategy and explored how brands are effectively driving mobile change throughout the enterprise.
After more than five years of DevOps, definitions are evolving, boundaries are expanding, ‘unicorns’ are no longer rare, enterprises are on board, and pundits are moving on. Can we now look at an evolution of DevOps? Should we? Is the foundation of DevOps ‘done’, or is there still too much left to do? What is mature, and what is still missing? What does the next 5 years of DevOps look like? In this Power Panel at DevOps Summit, moderated by DevOps Summit Conference Chair Andi Mann, panelists l...
Virtualization over the past years has become a key strategy for IT to acquire multi-tenancy, increase utilization, develop elasticity and improve security. And virtual machines (VMs) are quickly becoming a main vehicle for developing and deploying applications. The introduction of containers seems to be bringing another and perhaps overlapped solution for achieving the same above-mentioned benefits. Are a container and a virtual machine fundamentally the same or different? And how? Is one techn...
My team embarked on building a data lake for our sales and marketing data to better understand customer journeys. This required building a hybrid data pipeline to connect our cloud CRM with the new Hadoop Data Lake. One challenge is that IT was not in a position to provide support until we proved value and marketing did not have the experience, so we embarked on the journey ourselves within the product marketing team for our line of business within Progress. In his session at @BigDataExpo, Sum...
Keeping pace with advancements in software delivery processes and tooling is taxing even for the most proficient organizations. Point tools, platforms, open source and the increasing adoption of private and public cloud services requires strong engineering rigor - all in the face of developer demands to use the tools of choice. As Agile has settled in as a mainstream practice, now DevOps has emerged as the next wave to improve software delivery speed and output. To make DevOps work, organization...
Without a clear strategy for cost control and an architecture designed with cloud services in mind, costs and operational performance can quickly get out of control. To avoid multiple architectural redesigns requires extensive thought and planning. Boundary (now part of BMC) launched a new public-facing multi-tenant high resolution monitoring service on Amazon AWS two years ago, facing challenges and learning best practices in the early days of the new service.