Sei sulla pagina 1di 8

SAFETY & SECURITY

What you need to protect yourself and why.

A SPECIAL SUPPLEMENT TO
THE DELPHOS HERALD
FEBRUARY 2011
2 – The Herald • Safety & Security • February 2011

‘Low-tech’ ID thieves - how to stop them


Identity theft rose to a record mailbox and take the mail. — Using unsolicited credit of mailbox is more difficult to
11.1 million victims, resulting That’s how the vast major- card applications to apply for break into with simple tools,
in nearly $54 billion in fraud ity of mail is stolen. Although, the new card and have it mailed like a screwdriver, and acts as
during 2009 – an average of some very aggressive methods to their addresses, not yours; a deterrent. The “Mail Boss,”
$4,864 per victim! It’s one of exist too: — Forging your newly issued for example, is made of heavy-
the country’s most common — Using a screwdriver to pry checks; duty galvanized steel and allows
non-violent crimes. open a flimsy mailbox lock. — “Washing” checks written incoming mail to slide down
Interestingly, one of the big- — Break into a bank of mail- to your name (such as social into a securely locked compart-
gest privacy security holes boxes (like you’d find in an security, stock dividends, etc), ment. It’s at hardware stores
found in the Internet age is apartment building). write in their names and cash for under $200.
actually very simple and low- — Rip out a freestanding Blue it; and — When you’re on vacation,
tech. Postal Mail Box from the street — Even stealing mail-order request that the post office hold
Postal mail theft is a continu- and drive away with it. prescription medications to sell your mail or have a trustwor-
ing reality — Steal racks of mail right on the street. thy neighbor retrieve it for you
Nationwide, the U.S. Postal from the back of a postal deliv- Protect yourself from falling daily.
Inspectors (the law enforce- ery truck while it’s parked and victim — Decrease your potential
ment arm of the U.S. Postal the letter carrier is doing rounds First, I want to touch on exposure to mail theft. Pick up
Service), “break more iden- on foot. paper shredding. your mail quickly; don’t let it sit
tity theft cases than any other — Even robbing a letter car- Shredding sensitive docu- in your mailbox any longer than
single law enforcement group,” rier by gunpoint. ments you receive by mail, it needs to.
according to the Identity Theft What do criminals want with the ones that contain personal — Drop outgoing mail directly
Center. your love letters? information, account numbers, at the post office (this may be
In fact, Postal Inspectors Naturally, they’re not after medical records and the like, is better than dropping the mail in
arrested over 3,500 suspects your love letters or birthday a quick and inexpensive meth- an isolated Blue Postal Mail Box
for crimes related to mail theft. cards. But they DO want your od to help shield yourself from since they tend to be attractive
Mail theft is so prevalent that private information so they can identity thieves. You can pick targets).
many jurisdictions are looking use it to create a fake ID, up a crosscut or confetti shred- — Use a P.O. Box or other
to change laws and make it fraudulently open a credit card der online or at any nation- mail accepting service like
a more serious offense. For or loan, or open a bank account al office supply store for well PostalNet. Because your box
instance, the Attorney General in your name. under $100. is found inside a post office
in Washington State recom- Surprisingly, these types of But, the danger most peo- or busy retail location it adds
mends new legislation to define identity theft are actually rare, ple overlook – shredding only another level of security. And
mail theft and possession of although they are more danger- works on the mail you actually as a bonus, it adds to your ano-
stolen mail as Class C felonies. ous and costly to the victim. receive. nymity.
If you think about it, using Most “low-tech” mailbox Here are some tips to help you Don’t let your guard down
the Internet, electronic devices thieves are after the easy pick- protect the mail you receive, against “Low-Tech” identi-
or online methods to steal your ings: and help the mail you send ty theft in the Internet age.
identity requires at least a basic — Grabbing your newly avoid getting hijacked by an Eliminate the soft underbelly
level of technical skill. Postal issued credit card or debit card opportunistic identity thief: by maintaining a heightened
theft, on the hand, is very easy. and spending all your money — Use a high-quality locking vigilance on your private postal
Anyone can do it with almost before you notice anything is mailbox. Preferably, one made mail and protect your family,
no training – just walk up to a wrong; of high gauge steel. This type identity and wealth.

Keep up to date on the


ring Your worlds of foreign affairs,
World Home local events, fashion,
sports, finance, and many
other subjects with your
newspaper. You’ll also
find entertaining features,
like cartoons, columns,
puzzles, reviews, and lots
more.

The Delphos Herald


Home in on the information 419-695-0015
you need. Read your
newspaper. www.delphosherald.com
The Herald • Safety & Security • February 2011 – 3

An
ineffective
lock.

A good
deadbolt.

2035190
How to burglarproof your home This safety awaren

Having your home burglarized is a wrenching experience.


Take these precautions to help prevent a burglary.
1. Keep windows closed and doors locked — don’t take
chances for even a few minutes. Use a 1-inch dead bolt for
each exterior door. Secure sliding glass doors by inserting a
broomstick or dowel in the inside track.
2. Consider installing an alarm system or motion-detecting
lights.
3. Suggest that someone is home by using electric tim-
ers to turn on the radio and house lights at certain hours.
Vary the lights that you turn on. Turn on second-story light
so burglars can’t see if anyone is home or in the room with
lighting.
4. Make sure that outside doors are made of metal or a
sturdy wood.
5. Check to ensure that doors fit tightly in their frames. If
they don’t, install weather-stripping around them.
6. Etch valuables with your driver’s license number and
state abbreviation in visible places. If you don’t want to ruin
valuables by marking them, photograph them instead. Keep
an inventory of your property.
7. Keep jewelry and other valuables in a safe.
8. Consider getting a dog — many kinds of dogs will make
enough noise to discourage burglars.
9. Leave spare keys with a neighbor rather than hidden
2035190

outside your house.


10. Keep shrubs and bushes trimmed so they can’t conceal
2035190

prowlers.
This safety awareness message is brought to you by the natural gas member companies of the Ohio Gas Association.

This safety awareness message is brought to you by the natural gas member companies of the Ohio Gas Association.
4 – The Herald • Safety & Security • February 2011

www.delphosherald.com Make a
home
Safety Matters

Can you tell when all your power is completely off and safe?
inventory
If your home was damaged by fire
or a burglar made off with your valu-
Do you know how to properly “de-energize” a circuit breaker? ables, would you remember the details
of your possessions? If asked, could
Is your business safe from hidden electrical hazards? you recall your TV’s screen size and
brand name? How about your camera
or video camera? Do you remember
when and where you bought these
items and how much they cost?
If your belongings are stolen or
destroyed, your insurance company
will ask you to provide a record of
them. Without an inventory, important
details are sure to escape you. Add
the trauma and stress a major loss
can cause, and inevitably, you’ll for-
get items. Save yourself time, money
To answer questions like these... turn to our professional staff. and frustration by planning ahead and
completing a personal property inven-
Our staff has the safety knowledge and experience to protect your tory.
business and workers in times of unexpected trouble— we’ve been doing How an inventory can help you
so since 1953. If a disaster strikes, a personal
property inventory will help you:
• Provide your insurance company
Give us a call at 800.589.2357 for a safety consultation. with a complete list of your household
goods and personal belongings so
you’re sure to receive compensation
for everything your policy covers.
• Promptly file a complete claim that
can be settled quickly and accurately.
• Confirm that you have adequate
coverage for your belongings.
• Determine which items were sto-
len and identify recovered property
after a burglary.
• Provide a record of serial and
model numbers for easy identification
of your items.
Sidney Office Lima Office Muncie Office
• Provide a receipt from the original
840 S. Vandemark Rd. 800 Buckeye Rd. 3100 E. County Road 350N place of purchase.
Sidney, Ohio 45365 Lima, Ohio 45804 Muncie, Indiana 47303 • Verify any parts of your loss that
937.498.2357 419.222.1109 765.284.1594 you may write off on your federal
income taxes.
A complete inventory contains:
• A listing of all your items with per-
tinent facts
• Receipts for your most valuable
Experienced  •  Knowledgeable  •  Customer Focused  •  Safety Minded objects
• A videotape or photographs of
www.sidneyelectric.com OH LIC# 21016
See INVENTORY, page 6
With over visit www.visitfindlay.com.
n Hancock
provides an
he Greater The Herald • Safety & Security • February 2011 – 5
bove:With
addition to
rts Pavilion
ampus, the
Fox Run Manor Finds DSC Storage
pace for a
art exhibit
d apprecia-
Is Important Factor
ses original
ors of chil-
ld’s largest
The collec- ³2EYLRXVO\VHFXULW\RIRXU ZLWK+,3$$FRQ¿GHQWLDOLW\
00 pieces, GRFXPHQWVLVLPSRUWDQWWR UHTXLUHPHQWVRISDWLHQW
lustrations XV´VD\V6KDQH6WHZDUW UHFRUGV'6&XQGHUVWDQGV
drawings by
whom the $GPLQLVWUDWRURI)R[5XQ WKHUHJXODWLRQVDQGKHOSVXV
0DQRU³EHFDXVHZHGHDO PHHWWKHP´
ZLWKDORWRIFRQ¿GHQWLDO
ON information. Findlay Surgery
s home to
ng a variety
ackgrounds.
³)RURYHUVL[\HDUV'RFXPHQW
6HUYLFH&RPSDQ\KDVEHHQ Committed
Center
lities in the
he Gateway
DJUHDWUHVRXUFHIRUXV´KH
H[SODLQHG Relies On DSC
to exceeding
ongregation
part of the
rch (EPC),
³:HXVHGWRXWLOL]HDVWRUDJH
XQLWEXWWKDWZDVUHDOO\
Service Foryour
Medical, Busi-
ing, spiritu-
QRWVDWLVIDFWRU\7KHUH
ounty’s rich
many faith-
munity. St.
ZDVQRFOLPDWHFRQWURODQG
GRFXPHQWVKDGWKHSRWHQWLDO
“One call does it all”
expectations
ness Records
ed its new WREHFRPHPRLVWDQGWR
er the pri- deteriorate. When we needed 0U6WHZDUWOLNHVGRLQJ
e with new DGRFXPHQWZHKDGWRVHQG
e feet. The EXVLQHVVZLWKDORFDO
are feet and DVWDIIPHPEHURXWWRJHWLW FRPSDQ\ZKLFKFDUHVDERXW
ol through 7KDWPHDQWWLPHVSHQWDZD\ WKHFRPPXQLW\MXVWDVPXFK
mnasium, 21 IURPWKHLUQRUPDOGXWLHV
er comput- DV)R[5XQ0DQRUFDUHV
ms are wel-
“Now when I need a ³:HNQRZRXUUHFRUGVDUH
Wendelin GRFXPHQW,MXVWSLFNXSWKH VDIHZHNQRZWKH\DUHLQD
a religious
gher educa- SKRQHDQG'6&EULQJVLWULJKW ORFDWLRQZKLFKNHHSVWKHP
Seminary is out. LQWDFWDQGZHNQRZZH
foot build- FDQKDYHDFFHVVWRWKHP
y of Findlay ³,ZRXOGKDYHWRVD\
ea is proud whenever we need them.
basketball FXVWRPHUVHUYLFHLVWKH'6&
evangelistic VWURQJSRLQW$VDPHGLFDO “Document Service Company
ough sixth IDFLOLW\ZHQHHGWRFRPSO\
D promotes VHUYLFHLVRXWVWDQGLQJ´
-esteem in
heerleading
indlay area.
tunities for I www.documentmanagementcompany.com I
to become
ministries of I I
/LPD$YHQXH )LQGOD\2KLR  I 
April 2008 TheBusinessJournal 7C
6 – The Herald • Safety & Security • February 2011
Inventory
your home and contents article. expensive items and group chase, update your inven-
• Current appraisals shots of lower-value items. tory as soon as possible. And
Cover one room at a Zoom in on labels and special remember to delete items you
It’s easy to get started time features, like signatures on no longer have.
Prepare your inventory One way to complete your artwork or serial numbers on
by hand or on a computer. inventory is to tackle a differ- appliances and electronics. Be Is your insurance what
Several software packages ent room of your home each sure to date each photo or you want?
are available just for this pur- week until everything’s list- use the date imprint function Too many people find out
pose, or design your own form ed. Record your high-valued on your video camera. after a loss that they should
with a spreadsheet program. items, such as jewelry, sil- When you inventory out- have increased their cover-
Keep in mind, a computerized verware, special collections, door items, include bicycles, age amounts or purchased
inventory is easy to update antiques, paintings and art- sporting goods, yard equip- replacement cost coverage.
and store. work. ment and any other articles Use your inventory to help
If you design your own Then list furniture, carpet- kept outside. While you’re you avoid this common mis-
form, include columns for the ing, electronics like TVs, ste- outside, it’s also a good idea take.
name and description of each reo equipment and computers. to photograph each side of Add up all of your cur-
item, the quantity, model and Remember clothing, draper- your home’s exterior. Include rent estimated values to find
serial number, purchase date, ies, wall hangings, rugs, CDs, your carport and other struc- out how much it will cost to
where you bought it, original tapes, pots and pans, linens, tures like a storage shed. replace everything, then com-
cost and estimated current tools, lamps and appliances Capture rare trees or shrubs pare this figure with your pol-
value. You may want to add that weren’t included in the and unusual landscaping. icy’s personal property limit.
a column to indicate if you purchase of your home. These things aren’t consid- This will be a good indicator
have a receipt or photo of the Open drawers, cupboards ered personal property, but of whether or not you need to
and closets, and record what’s it will be helpful to have a increase your coverage.

NOW
GOOD NEWS
inside. Open toolboxes, china
cabinets and storage bins and
include their contents.
record of their appearance in
case of a loss.
Special limits on high-value
items
Insurance policies place
REALLY TRAVELS After you’ve completed special limits on valuable per-
FAST! Use a camera or video your inventory sonal property, such as jewel-
Just because camera Once you’ve completed your ry, silverware, artwork, tools,
you’re going away Supplement your inventory inventory, copy everything, special collections like stamps
for the summer with photos or a videotape of including lists, appraisals, and coins, and firearms. If you
doesn’t mean
you have to miss your belongings. These will receipts, videotapes, disks own these items, check the
out on a single provide further proof of own- and computer printouts, and limits in your policy. If they’re
issue of your favorite hometown paper. ership and add detail to your have an extra set of photos not high enough, you may
All you need do is contact our customer written descriptions. They also developed. Store one inven- need to purchase a scheduled
service department at least 10 days prior to
your departure and have your subscription help document each item’s tory packet off premises. A personal property endorse-
forwarded to your vacation address. It’s condition and size. safe deposit box is the most ment. This is an addition to
simple, and it won’t cost you an extra cent Videotape or take wide- secure location, or ask a friend your policy that will increase
— that’s what we call really good news! angle photos of entire rooms, or relative to keep a copy. your insurance limits on these
TAKE US ALONG! which will help show the Be sure to update your items.
magnitude of a loss. If you inventory packet every four It’s a good idea to have
SUBSCRIPTION use a video camera, you can to six months. In the mean- valuable items appraised on a
FORWARDING record audio descriptions and time, save receipts for any regular basis and to keep your
419-695-0015 make special comments. Take new items you’ll need to add. appraisals with your inven-
individual, close-up shots of If you make a major pur- tory.

DELPHOS ACE HARDWARE


YOUR SECURITY HEADQUARTERS
•100 Different Locks in stock •Master Key & Other Types of Lock Smithing
•Residential & Commercial Locks, Pad Locks •Pepper Spray & Other Security Items
•We Key Locks to Match Your Present Locks •Ammo
Neighbors Insuring Neighbors Since 1863
William Massa 419-692-0951 112 E. Third St. P.O. Box 37 Delphos Hardware
Lucy Pohlman 419-339-9196 Delphos, OH 45833-0037 242 North Main St. Delphos Ph. 419-692-0921 Mon.-Fri. 8-7:30, Sat. 8-5
Jim R. Rhoades 419-238-2341 Phone & Fax 419-692-3413
The Herald • Safety & Security • February 2011 – 7

How online identity theft works


Internet id theft statistics reveal way for the thief... and that is be successful, with Internet users Panix, was hijacked to a site in
online id theft is the fastest grow- to steal the information from us divulging sensitive information to Australia.
ing id crime. or to trick us into providing the the scam artists. — In 2004 a German teenag-
It can occur even on web sites information. Based on Internet ID theft sta- er hijacked the eBay.de domain
we trust and is often underes- As there is not a lot we can tistics from a survey of 5000 name.
timated and misunderstood by do about theft of our information U.S. adult Internet users, Gartner — Secure e-mail provider
many people who take the most from third parties, let’s now con- estimated that: Hushmail was also caught, when
stringent precautions to guard centrate on what Internet ID theft — 57 million adults have expe- the attacker rang up the domain
privacy and safety on the Net. statistics show as the three main rienced a phishing attack registrar and gained enough
Although statistically this type ways Internet identity thieves — 1.78 million adults could information to redirect users to a
of identity theft occurs less fre- acquire our personal informa- have fallen victim to the scams bogus web page.
quently than other types, it is tion... — The cost of phishing —1.2 As you’d suspect, this type of
perhaps the type of ID fraud that 2. The phishing lure billion dollars! internet identity theft is extreme-
we should be most aware of. Just like fishing, phishing — The truth is that legitimate ly difficult for consumers to pro-
Internet id theft statistics also sometimes called spoofing — also companies will never ask for our tect themselves against. It is,
uncover how our online identities uses a lure to catch its victims. personal information in this man- therefore, up to the companies
are made up and how our identi- This lure often comes in the ner. But, many people take the themselves to engineer web sites
ties are stolen. form of a spam e-mail or pop- lure because the e-mails and that cannot be tampered with.
1. What is our digital iden- up warning that looks like it has pop-ups look like they really come As a result, more and more
tity? been sent from a company we from the company indicated. companies are taking steps
On the Internet, our identity is trust. Often the companies are 3. Pharming against pharming.
made up of... ones that we use regularly, like Internet identity theft through Such sites are known as pharm-
— IP (Internet Protocol) our bank, credit card company pharming is a great deal different ing-conscious, or “PC”. They have
address or some other online payment than phishing. It is of increasing taken the steps necessary to keep
— address where we live system. concern to business and web site our private information secure.
— usernames Thanks to the press, most peo- owners as well as consumers. They also use domain names that
— passwords ple are now aware that e-mails In pharming, a cyber criminal cannot be hijacked and scramble
— personal identification num- purporting to be from a bank and cracks a vulnerability in an ISP’s our personal information while it
bers (PINs) asking for their online details are (Internet Service Provider) DNS is being transmitted.
— social security numbers a phishing fraud. server and hijacks the domain
— birth dates Sometimes, however, the name of a commercial site.
— account numbers e-mail may be from a company Anyone going to the genuine
— mother’s maiden name, etc we haven’t heard of, but notifying site is then redirected to an iden-
These digital identities work us we are being invoiced for, say, tical but bogus site.
on the basis that we’re the only $700 for an order. It’s under- Once redirected, unsuspect-
individuals who know this infor- standable that many people will ing site users will enter personal
mation. be concerned and will click on the information, such as a password,
However, because we use the link to investigate further. PIN number or account number,
Internet for all sorts of financial The purpose of phishing lures which the pharmers immediately
transactions, criminals are devel- The purpose behind phishing use at the genuine web site
oping sophisticated techniques e-mails is to cause us to: The personal information • Keys Made • Deadbolts Installed
to steal these digital identities. — click on a link to verify/can- gained can be used to pur- • Locks Rekeyed
Internet ID theft statistics show cel a purchase chase merchandise, clean out
their aim is to use our identities — update our personal infor- bank accounts, open new ones • Locks Installed & Repaired
to open credit card accounts, mation and commit other identity theft • Windows & Sliding Doors Secured
bank loans, mortgages... in fact, — validate our account to pre- crimes. The information can even Residential & Commercial
any transaction that will make vent it from being cancelled etc. be sold to other criminal groups Auto - Home - Business
money. If we click on the link indicated, and used again and again. Professional Locksmithing
There is one main difference we are directed to a web site that Since pharming is so techni- Locally Owned & Operated
between internet identity theft is designed to look exactly like cally sophisticated, it is virtually Prompt Service
and other types of ID theft... the official site of the company impossible to detect or prevent. All Work Guaranteed.
With internet identity theft we being misrepresented. And since it is almost impossible
don’t have to wait for a thief to
physically steal our information.
Instead, we may unwittingly hand
Under the assumption that
they are at an official site, vic-
tims enter specific personal infor-
to measure, there are no Internet
id theft statistics to show how
prevalent it has become.
Mike’s
over the information ourselves.
Information about us can be
stolen by computer criminals from
mation, such as social security
number, credit card number or
password.
However, there are a number
of detected instances which illus-
trate that even well-known and
Lock & Key
the databases of banks, retailers, A study by Gartner, a security trusted sites can be affected: 414 Eastwood Ave., Delphos
ISPs and data clearinghouses.
However, there is an easier
company, found that as much as
3 percent of phishing scams may
— In January 2005, the domain
name for a large New York ISP, 419-230-2453
8 – The Herald • Safety & Security • February 2011
A U T O M A T I C H O M E S T A N D B Y G E N E R A T O R S

PROTECT THE THINGS THAT MATTER MOST

life is better
with power

Generac automatic standby generators provide peace of


mind for you and your family. Every Generac Guardian
Series generator offers 24/7 power protection, hands-free
operation and the easiest installation available.
Sales, parts and service.

1951 St. Rt. 66


Sales 1-XXX-XXX-XXXX
Dealer Name Here Cloverdale, OH 45827
Service 1-XXX-XXX-XXXX
Phone 419-453-3809 Ext. 228
Fax Website www.youraddress
419-453-3806
If you list your address, city, state,mfiedler@fiedlerelectricaltech.com
place it along the bottom as shown

Potrebbero piacerti anche