Check the background of this investment professional on FINRA’s BrokerCheck

Thanks to Equifax, Your Social Security Number (SS#) Could Be Compromised: Here are 4 Steps to Protect Yourself

Print Friendly, PDF & Email

As a wealth advisor, I usually write about informative and educational topics like preparing for retirement, helping your kids fly the nest, and making better investment decisions. But in light of the recent Equifax hack, along with similar hacks at Target, Yahoo!, and others – and the common misperceptions about them – I think it’s important to tackle another issue: the steps you can take to protect your wealth in the digital age.

The biggest mistake you can make right now is to think your information is perfectly safe. Even excluding the many corporate hacks that happen regularly, up to 148 million people were affected in the Equifax breach. There are about 250 million people over the age of 18 in the US.

That gives you better than 50-50 odds that your information is out there. If you’re frustrated and angry, I’m with you. I was one of the many who actually paid for Equifax to monitor my personal information, only to have it compromised.

But like I tell my kids: you can get angry about a problem or deny that it exists – or you can roll up your sleeves and do something about it.

Here’s what I’m doing.

Step 1: Deal with your credit record 

The very first decision you need to make is what to do about your credit record. Do you freeze it, so no one can take credit under your name unless you lift the freeze? Sign up for ongoing credit monitoring?

The answer is that it depends on your needs and your trust level. Monitoring is convenient and usually effective. Of course, a lot of people are concerned about giving Equifax the very same information they already failed to protect.

But if you need your credit record to stay open, a monitoring service could be a good solution. Equifax is offering their monitoring service for free for a year, and other bureaus have a monitoring option as well.

You could potentially improve the security of monitoring if you add a free 90-day fraud alert to your credit report. This will give you an extra layer of protection for 3 months because it requires every lender to verify your identity before proceeding with any applications. You may even be able to set up an automatic renewal on the 90-day fraud alert. I have this in place and I think it’s a good combination of simplicity and security.

If you won’t be needing to use your credit report anytime soon, you can also freeze your file with each credit bureau. You’ll likely need to pay for this service.

When a lender has a legitimate request, like a credit check on a car loan, you’ll have a special PIN that you can use to temporarily open the file. You’ll need to know which credit bureau your lender uses, call in to “thaw” your file so they can access it, then freeze your record again afterwards. You may need to pay a fee each time you freeze and thaw your report.

This is obviously a little inconvenient, but it could be the best way to ensure that no one can access credit in your name.

If you want to learn more about identity theft and some of the serious issues that can accompany it, click here to see my 3-minute TV segment on the subject.

Step 2. Set up two-factor authentication on every account that you can

This, in my opinion, is a must. Two-factor authentication notices if someone is trying to log into your accounts from an unknown computer, mobile phone, or tablet. To make sure it’s really you, the system will send a security code to your phone number (or, sometimes, an email address). Once you’ve logged in from a particular device, you can check a box to remember it if you want to, so that you only have to go through these steps once. Some systems, like Gmail, will automatically remember your device after the first authentication.

Two-factor authentication can seem annoying, but it can also prevent someone from getting into your bank account. That’s why it’s important to set it up on any website that you can. Put together a list of all your bank and investment accounts, insurance agencies and credit cards, and then go to this website to learn how to set up two-factor authentication on each one. I have personally also set it up on all my email and social media accounts.

It only takes a few minutes, and in my opinion it’s very much worth it.

Step 3. Add a PIN on your phone number (I’m not talking about the PIN to open your phone!)

Next, close another potential gap in security: your cell phone number.

As noted above, one of the most common features of two-factor authentication is a text message that provides you with a temporary security code. So what if someone else was able to compromise your phone number?

This isn’t a stretch: it’s easy to port a phone number from one carrier to another using only some basic personal information. If someone had that information already and just needed to get access to your security codes… well, let’s just say it’s happened before and it can easily happen again.

Make it harder by putting a PIN on your phone number with your carrier so that it can’t be ported by someone else. Call your phone providers today and make sure you have this extra layer of security in place. It’s an extremely fast and easy way to make sure two-factor authentication always works the way it’s supposed to.

Step 4. Update your passwords

A lot of us are guilty of using the same basic password for all our logins, with a few tweaks here and there. It’s convenient, but it’s also unsafe. Once someone knows part of your password, it becomes a lot easier to figure out the rest of the sequence. This doesn’t just make your password easier to crack: if you reuse your passwords, it gives criminals access to a huge amount of digital information.

That’s why unique passwords are so important. One recent recommendation (you can read or hit the play button next to the title, within this link) on passwords is to forget about complicated letters and symbols, and use long sentences for your passwords instead. So, instead of something impossible to remember, like “P@77yW3N7”, you could try “pattywenttothebank”.  Although in my opinion you should have a different phrase for each login. Reason being, if they hack one website and compromise your password, you don’t want them to have access to all of your sites.

The reason a phrase is better because sentences – very long passwords in general – are harder to crack because they’re long. Each character can be one of 26 letters: a password with 18 characters and no numbers, like the one above, has over 1.5 million possible combinations of letters. If you wanted to (or were required to) add a number or a symbol, your possibilities only go higher. However, for the user, they’re still memorable enough to be useful.

Of course, remembering dozens of different passwords can still be hard. To help you manage, you could use a password manager. Again, it depends on your level of trust: these tools are convenient, but they can also be hacked. Consumer Reports has a great introduction to password managers, including how to get the most value from them and some of the more popular products available.

That’s why some people find it more secure and less of a headache to use a more old-fashioned tool: a pen and a piece of paper. Few hackers are going to make that kind of effort, and you know it can’t be compromised online because it’s nowhere to be found. Just make sure you keep it in a very safe place.

The reality of the modern age  

Hacking is, unfortunately, here to stay. There’s a high probability your information was compromised in the Equifax hack, and it may have been compromised before (check out this site to learn if your email address and site password were involved in other hacks – all you have to do is enter your email address).

That’s why you need to take these basic security precautions.

I’m not a cyber-security expert, and none of these tools or methods are foolproof. But much like the way you lock your doors, set the alarm in your house, or install a password to unlock your phone (by the way, you should have one of those too), these tools provide extra layers of protection that make stealing harder.

That alone is worth a lot.

So don’t wait: take these steps, and start taking control of your information today.

Written by Bradford Pine with Anna B. Wroblewska

 

To learn about retirement savings, download my free eBook, “10 Tips You Need to Know About Your IRA Rollover.” This short book is packed with critical information that will help you make the right decisions about your retirement savings.

Written by Bradford Pine
Bradford Pine Wealth Group – New York City Financial Advisors

The views and opinions expressed in an article or column are the author’s own and not necessarily those of Cantella & Co., Inc. It was prepared for informational purposes only. It is not an official confirmation of terms. It is based on information generally available to the public from sources believed to be reliable but there is no guarantee that the facts cited in the foregoing material are accurate or complete.

Comments may not be representative of the experience of other investors. Investor comments and experiences are not indicative of future performance or results. Views and opinions expressed in the comments section are the author’s own and not those of Cantella & Co., Inc. No one posting a comment has been compensated for their opinions.

, , , , , , , , ,

Comments are closed.