Charming Group: How to safegaurd our personal and financial data?

Wednesday, June 18, 2008

How to safegaurd our personal and financial data?

There are certain steps to safegaurd our personal financial life:

1. Shred old documents. To protect ourselves against potential fraud or identity theft, the best way is to eliminate our own paper trail.

2. Review our monthly statements. Review our monthly statements can alert us to possible fraudulent charges and we may also find legitimate charges for services that are redundant.

3. Get it in writing. Require anyone who solicits us over the phone to first send their information by mail, so we can check its legitimacy.

4. Use a credit card with a small limit when doing mail-order and online purchases. It's all too easy for a dishonest sales clerk to use our credit card information. If the card we used for these purchases has a low credit limit, at least thieves won't be able to pay many bills.

5. Opt ourselves out of all pre-approved credit card offers. Internet is littered with many pre-approved credit offers; all of them could spell disaster in the hands of the unscrupulous.

6. Use certain credit counseling services. For example: http://www.safeguardcredit.org/site/
More anti-online fraud related websites:
Paypal Protection: http://www.paypal.com/cgi-bin/webscr?cmd=_home-general&nav=0
CyberSource: http://www.cybersource.co.uk/

7. Choose our PIN wisely. It cannot to be something that a thief could easily figure out just by knowing our birth date or any information of us. A combination of uppercase and lowercase letters, numbers, and symbols will offer more security.

8. To be vigilant while using the Internet. Independently verify the validity of any requests for personal information before give out any of our sensitive data.

9. Protect computer's security. Use as many tools as we can (anti-virus software, spyware, firewalls, and passwords) to guard our computer information from nefarious software.

10. Check for anonymous and open proxy IP addresses. IP addresses can be forged to hide the true location of the fraudster. Organized credit card fraud rings often use anonymous Open Proxies to "cover their track". To find out whether the IP logged by particular customer is originating from an open proxy, we can use the tools provided by
If the IP is listed as an open proxy, be extra careful with the order.
Print this post

No comments: