Do you know where your Identity is today?

Rob Taylor - Identity Theft Specialist

It takes…

It takes about 60 seconds to find out that you are a victim of identity theft...

It takes an average of 600 hours to restore your identity, if you try it yourself.

Don't be a victim, get the best protection on the market today

Sunday, January 12, 2014

Have You Heard About Tax Identity Theft?




Have You Heard About Tax Identity Theft?


Ready for tax season? If you haven’t heard about tax identity theft, you may not be.

Tax identity theft happens when someone files a phony tax return using your personal information — like your Social Security number — to get a tax refund from the IRS. It also can happen when someone uses your Social Security number to get a job or claims your child as a dependent on a tax return. Tax identity theft is the most common form of identity theft reported to the Federal Trade Commission. The IRS says tax identity theft is a top priority and says it has hired new staff, explored new technologies, and adopted new procedures to fight it.

For these reasons, I am participating in Tax Identity Theft Awareness Week, along with other federal, state, and local officials and law enforcement agencies. Here’s what you can do to lessen the chance you’ll be a victim:    

·        File your tax return early in the tax season, if you can.

·        Use a secure internet connection if you file electronically, or mail your tax return directly from the post office.

·        Shred copies of your tax return, drafts, or calculation sheets you no longer need.

·        Respond to all mail from the IRS as soon as possible.

·        Know the IRS won’t contact you by email, text, or social media. If the IRS needs information, it will contact you by mail.

·        Don’t give out your Social Security number (SSN) unless necessary.

·        Research a tax preparer thoroughly before you hand over personal information.

·        If your SSN has been compromised, contact the IRS ID Theft Protection Specialized Unit at 1-800-908-4490.

·        Check your credit report at least once a year for free at annualcreditreport.com to make sure no other accounts have been opened in your name.


What if you’re a victim? Tax identity theft victims typically find out about the crime when they get a letter from the IRS saying that more than one tax return was filed in the their name, or IRS records show they received wages from an employer they don’t know. If you get a letter like this, don’t panic. Contact the IRS Identity Protection Specialized Unit at 1-800-908-4490.

More information about tax identity theft is available from the FTC at http://www.ftc.gov/idtheft, the IRS at irs.gov/identitytheft, and from [state/local office].

See how our protection stacks up.  
 Get your Identity protected with Identity Theft Shield.

Posted by Unknown at 6:11 AM No comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

Friday, January 3, 2014

High-Energy Sales Manager - Boston, MA

sales_manager

High-Energy Sales Manager

In the next 24 months over 20 million people will purchase our protection plan! The question is will they purchase it from your organization?

We am looking for high-energy, and driven Sales Manager to grow a team of professionals with strong experience in B2B prospecting, lead generation, sales closure and over-achieving quotas.

The ideal candidates will join one of the largest and fastest growing broker of Identity Theft restoration plans, legal benefits and small business consulting companies in North America with recent growth into the United States and Canada. We offer an exciting opportunity for someone to dig in and make an impact.

We provide training and team building resources along with supportive management in a positive work environment.

Job Description

You will be running your own territory with a strong management and product team supporting you. The successful incumbent will be proactively growing a territory in the United States and Canada through direct channel sales. Furthermore, the incumbent will also be responsible for lead generation, lead qualification, and sales annual targets in excess of $500,000.

The ideal candidate!

You are a driven sales management professional with a strong command of sales methodologies. You are passionate about solving the growing Identity Theft crime in America, providing companies’ legal protection for employees, and have a strong personal interest in the growth of this emerging industry.

Primary responsibilities are:

  • Drive revenue through new sales recruits and build a pipeline while meeting revenue goals.
  • Dig in and be hands on in learning the product and leverage your presentation and product demonstration skills.
  • Engage and strategize with your team to determine business needs and formulate the correct proposal to win new business.
  • Forecast sales activity, revenue achievement, and update activity/prospect status in weekly sales meeting.
  • Build strength in managing team relationships.
  • Managing the full sales cycle from lead generation, prospect, demo, and close of initial deals and renewals of your team.

Accepted candidates will enjoy:

  • An aggressive compensation plan with front-loaded commissions paid daily
  • Unlimited earnings potential
  • Residual Income
  • Flexible Schedule
  • Perks including company trips, bonuses, and incentives
  • Comprehensive  training program which includes Field Training in your local market
  • Less than 4% average market penetration rate  - Perfect timing to start on the ground floor of a hot Industry.


Please respond with your contact information.

Founded in 1993 Harvard Risk Management Corporation is a privately held company based in Dallas Texas which specializes in risk management consulting, corporate compliance, and the marketing of quality employee benefits.
Posted by Unknown at 3:15 PM No comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

High-Energy ID Theft Benefits Professionals - USA/Canada

High-Energy ID Theft Benefits Professionals

In the next 24 months over 20 million people will purchase this protection plan! With Identity Theft and Legal issues growing at such an alarming rate for businesses and employees these products are the next generation in the Benefits Market.

The question is will they purchase it from YOU?

We am looking for high-energy, and driven Sales Professionals with strong experience in B2B prospecting, lead generation, and a proven track record closing sales and over-achieving quotas.

The ideal candidates will join one of the largest and fastest growing broker of Identity Theft restoration plans, legal benefits and small business consulting companies in North America with recent growth into the United States and Canada. We offer an exciting opportunity for someone to dig in and make an impact.

We provide training, sales tools & resources along with a supportive team and positive work environment.

Requirements


What's our ideal candidate? You are a driven sales professional with a strong command of sales methodologies. You are passionate about solving the growing Identity Theft crime in America, providing companies’ legal protection for employees, and have a strong personal interest in the growth of this emerging industry.
Primary responsibilities are:
  • Drive revenue through new client acquisition and build a pipeline while meeting revenue goals.
  • Own, manage, and drive the full sales cycle.
  • Dig in and be hands on in learning the product and leverage your presentation and product demonstration skills.
  • Engage and strategize with companies to determine their business needs and formulate the correct proposal to win new business.
  • Demonstrated experience managing the full sales cycle from lead generation, prospect, demo, and close of initial deals and renewals.
  • Entrepreneurial spirit.

Accepted candidates will enjoy:

  • An aggressive compensation plan with front-loaded commissions paid daily
  • Unlimited earnings potential
  • Residual Income
  • Flexible Schedule
  • Perks including company trips, bonuses, and incentives
  • Comprehensive  training program which includes Field Training in your local market
  • Less than 4% average market penetration rate  - Perfect timing to start on the ground floor of a hot Industry.

Compensation:

Commission - Highly Paid - Perks



Please respond with your contact information.

Founded in 1993 Harvard Risk Management Corporation is a privately held company based in Dallas Texas which specializes in risk management consulting, corporate compliance, and the marketing of first-rate Legal and Idenity Theft protection benefits.
Posted by Unknown at 11:41 AM No comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

Friday, December 27, 2013

What they don't tell you about Credit Freezes

This is what they don't tell you"Security freezes are designed to prevent a credit reporting company from releasing your credit report without your consent. However, you should be aware that using a security freeze to take control over who is allowed access to the personal and financial information in your file may delay, interfere with or prohibit the timely approval of any subsequent request or application you make regarding a new loan, credit, mortgage, insurance, government services or payments, rental housing, employment, investment, license, cellular telephone, utilities, digital signature, Internet credit card transaction or other services, including an extension of credit at point of sale."
And sometimes this can take days.   Why not end the hassle and get the only protection on the market that will not only alert you but will start fighting right away to restore your personal security.  https://sites.legalshield.com/aasites/Multisite?site=idt&assoc=taylor_ra
Posted by Unknown at 7:51 AM No comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

Thursday, November 28, 2013

A Few of the Major Incidents of Data Breachs

Major incidents From Wikipedia, the free encyclopedia

Well known incidents include:

2013[edit]

  • In October 2013, Adobe Systems revealed that their corporate data base was hacked and some 130 million user records were stolen. According to Adobe, "For more than a year, Adobe’s authentication system has cryptographically hashed customer passwords using the SHA-256 algorithm, including salting the passwords and iterating the hash more than 1,000 times. This system was not the subject of the attack we publicly disclosed on October 3, 2013. The authentication system involved in the attack was a backup system and was designated to be decommissioned. The system involved in the attack used Triple DES encryption to protect all password information stored."[7]
    Further information: Adobe Systems#Source code and customer data breach

2012[edit]

  • In the Summer of 2012, Wired.com Senior Writer Mat Honan claims that "hackers destroyed my entire digital life in the span of an hour” by hacking his Apple, Twitter, and Gmail passwords in order to gain access to his Twitter handle and in the process, claims the hackers wiped out every one of his devices, deleting all of his messages and documents, including every picture he had ever taken of his 18-month-old daughter.[8] The exploit was achieved with a combination of information provided to the hackers by Amazon's tech support through social engineering, and the password recovery system of Apple which used this information.[9] Related to his experience, Mat Honan wrote a piece outlining why passwords cannot keep users safe.[10]

2011[edit]

  • In April 2011, Sony experienced a data breach within their PlayStation Network. It is estimated that the information of 77 million users was compromised.
  • In March 2011, RSA suffered a breach of their SecurID token system seed-key warehouse, where the seed keys for their 2-Factor authentication system were stolen, allowing the attackers to replicate the hardware tokens used for secure access in corporate and government environments.
  • In June 2011, Citigroup disclosed a data breach within their credit card operation, affecting approximately 210,000 or 1% of their customers' accounts.[11][12]

2009[edit]

  • In December 2009 a RockYou! password database was breached containing 32 million user names and plaintext passwords, further compromising the use of weak passwords for any purpose.
  • In May 2009 the United Kingdom parliamentary expenses scandal was revealed by The Daily Telegraph. A hard disk containing scanned receipts of UK Members of Parliament and Peers in the House of Lords was offered to various UK newspapers in late April, with The Daily Telegraph finally acquiring it. They published details in installments from 8 May onwards. Although it was intended by Parliament that the data was to be published, this was to be in redacted form, with details the individual members considered "sensitive" blanked out. The newspaper published unredacted scans which showed details of the claims, many of which appeared to be in breach of the rules and suggested widespread abuse of the generous expenses system. The resulting media storm led to the resignation of the Speaker of the House of Commons and the prosecution and imprisonment of several MPs and Lords for fraud. The expenses system was overhauled and tightened up, being put more on a par with private industry schemes. The Metropolitan Police Service continues to investigate possible frauds, and the Crown Prosecution Service is considering further prosecutions. Several MPs and Lords apologised and made whole, partial or no restitution, and retained their seats. Others who had been shamed in the media did not offer themselves for re-election at the United Kingdom general election, 2010. Although numbering less than 1,500 individuals, the affair received the largest global media coverage of any data breach (as at February 2012).
  • In January 2009 Heartland Payment Systems announced that it had been "the victim of a security breach within its processing system", possibly part of a "global cyber fraud operation".[13] The intrusion has been called the largest criminal breach of card data ever, with estimates of up to 100 million cards from more than 650 financial services companies compromised.[14]

2008[edit]

  • In January 2008, GE Money, a division of General Electric, disclosed that a magnetic tape containing 150,000 social security numbers and in-store credit cardinformation from 650,000 retail customers is known to be missing from an Iron Mountain Incorporated storage facility. J.C. Penney is among 230 retailers affected.[15]
  • Horizon Blue Cross and Blue Shield of New Jersey, January, 300,000 members [1]
  • Lifeblood, February, 321,000 blood donors [1]
  • British National Party membership list leak,[16]
  • In Early 2008, Countrywide Financial (since acquired by Bank of America) allegedly fell victim to a data breach when, according to news reports and court documents, employee Rene L. Rebollo Jr. stole and sold up to 2.5 million customers' personal information including social security numbers.[17][18] According to the legal complaint: "Beginning in 2008 - coincidentally after they sold their mortgage portfolios under wrongful and fraudulent 'securitization pools,' and coincidentally after their mortgage portfolio went into massive default as a result thereof - Countrywide learned that the financial information of potentially millions of customers had been stolen by certain Countrywide agents, employees or other individuals."[19] In July 2010, Bank of America settled more than 30 related class-action lawsuits by offering free credit monitoring, identity theft insurance and reimbursement for losses to as many as 17 million consumers impacted by the alleged data breach. The settlement was estimated at $56.5 million not including court costs.[20]

2007[edit]

  • D. A. Davidson & Co. 192,000 clients' names, customer account and social security numbers, addresses and dates of birth[21]
  • The 2007 loss of Ohio and Connecticut state data by Accenture
  • TJ Maxx, data for 45 million credit and debit accounts[22]
  • 2007 UK child benefit data scandal
  • CGI Group, August, 283,000 retirees from New York City [1]
  • The Gap, September, 800,000 job applicants [1]
  • Memorial Blood Center, December, 268,000 blood donors [1]
  • Davidson County Election Commission, December, 337,000 voters [1]

2006[edit]

  • AOL search data scandal (sometimes referred to as a "Data Valdez",[23][24][25] due to its size)
  • Department of Veterans Affairs, May, 28,600,000 veterans, reserves, and active duty military personnel,[1][26]
  • Ernst & Young, May, 234,000 customers of Hotels.com (after a similar loss of data on 38,000 employees of Ernst & Young clients in February) [1]
  • Boeing, December, 382,000 employees (after similar losses of data on 3,600 employees in April and 161,000 employees in November, 2005) [1]

2005[edit]

  • Ameriprise Financial, stolen laptop, December 24, 260,000 customer records [1]
Posted by Unknown at 12:33 PM No comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

Saturday, November 16, 2013

Great Information on Business and Commerical Identity Theft



Business Identity Theft

ShareThis  Print   E-Mail   Comment
By Dan Jones November 15, 2013

Click to enlarge.
Business identity theft: Is your company's EIN safe?
To combat identify theft, most of us have learned to be very careful with our personal information. We are protective of our individual bank statements, credit card information and Social Security numbers.

Similarly, most businesses are aware of the need to thoroughly protect their customers' personal information. Televised stories of misplaced laptop computers and hacked databases from banks, government agencies and merchants remind us all of the need to protect information that can subject clients to identity-theft concerns. Security failures pose threats not only to clients, but also to the reputation of any business from which such information is obtained.

It is critical that businesses not forget that they too can have their identities stolen. Business identity theft is an increasingly common development, one which can take several forms. Even relatively "small" cases of business identity theft can have potentially catastrophic results for businesses. Online searches for the phrase "business identity theft" pull up pages of stories.

For example, a couple's business was a victim of identity theft when a criminal wrote fraudulent checks where the name and address of the couple's business appeared on some of the checks possessed and passed by the criminal. The account number on the checks actually did not belong to the business, and the bank account of the business had not actually been attacked.

While relieved to find that their business's bank account had not been drained, the couple soon found that because fraudulent checks totaling in excess of $12,000 had been written in the name of their business, check verification companies such as Telecheck had blacklisted their business. They were required to fill out countless forms and police reports detailing each forged check before they could get their business removed from the blacklists. The potential harm to reputation and the time required to make things right could be a devastating blow to a fledgling or otherwise struggling business.

Other criminals may attempt to obtain credit by stealing the Employer Identification Number of a business, creating and even recording false corporate documents such as authorizations to act on behalf of the business, and then using that information to obtain merchandise, credit cards or lines of credit in the victim company's name. Small businesses can be a great avenue to realize criminal gains. Business owners can have access to larger credit lines than individuals, and can be slower to realize and resolve a problem.

For example, a law firm in San Diego found that criminals had moved into its building, ordered and received $70,000 worth of computers and furniture in its name, hired a moving truck and disappeared before the law firm actually received the bill. In a different extreme case in 2006, authorities overseas discovered a sophisticated ring of criminals who had established a complete counterfeit NEC-branded company, including more than 50 factories producing a full line of counterfeit NEC products. The factories even boldly displayed the NEC name. Thankfully for NEC, the counterfeit products were not so inferior as to create havoc for their reputation, but the counterfeit operation certainly succeeded in stealing a great deal of income from the legitimate company. Had the counterfeit products been substantially inferior, it could have been disastrous for NEC.

Colorado's secretary of state and attorney general have worked to warn businesses about identity theft risks. Together with the ID Theft Unit from the Colorado Bureau of Investigation, they also have prepared the "Business Identify Theft Resource Guide – A Guide to Protecting Your Business and Recovering from Business Identity Theft." This guide can be found online at www.sos.state.co.us/pubs/business/ProtectYourBusiness/BITresourceguide.html.

A particular area of concern for all business owners that I wish to highlight here involves the secretary of state's system for receiving business records. Nearly all of the business-related forms required by the secretary of state now are submitted online. The secretary of state's office has warned that since the system relies on the honesty of those submitting documents it can be abused by criminals who enter false records for existing businesses to give themselves the appearance of propriety when applying for credit or completing other transactions with unsuspecting third parties.

Because most business owners check the accuracy of their records at the secretary of state's office only rarely (for example, perhaps only once each year when submitting an Annual Report), a business record revised by a criminal might go unnoticed for months. Additionally, such revised records might create problems for the actual business owners if clients or lenders check the site.

Fortunately, business owners may monitor any changes made to their online records by receiving automatic email notification whenever any change is made to a business's record. The system does not limit the number of persons who can be notified in the event of a change to your business's online records. Additionally, the secretary of state's office also now permits businesses to set up "Secure Business Filing" accounts, where the online business record is password-protected, providing additional control over who is able to make changes.

To subscribe to the email notification system or to set up a Secure Business Filing account, there are links to do so within the Business Identity Theft Resource Guide described above.

In any event, I encourage you to educate yourself further about the threats identity thieves pose to businesses, and to review the resource guide to become familiar with ways to prevent suffering the untold harms identity thieves can cause you.

Dan Jones has been an attorney at the Greeley office of Otis, Coan & Peters, LLC. He can be reached at djones@nocolegal.com or 970-330-6700.


Our plan can help you with Business Identity Theft, we believe every business should have access to Business Id Theft and legal coverage and every business should be able to afford it. Check out business plan at:
https://sites.legalshield.com/aasites/Multisite?site=biz&assoc=taylor_ra 

Posted by Unknown at 3:05 PM No comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

Wednesday, October 9, 2013

Press Release - RobtaylorHRM Receives 2013 Best of Richfield Award- Risk Management Consultant category









Press Release
FOR IMMEDIATE RELEASE
RobtaylorHRM Receives 2013 Best of Richfield Award
Richfield Award Program Honors the Achievement
RICHFIELD October 2, 2013 -- RobtaylorHRM has been selected for the 2013 Best of Richfield Award in the Risk Management Consultant category by the Richfield Award Program.
Each year, the Richfield Award Program identifies companies that we believe have achieved exceptional marketing success in their local community and business category. These are local companies that enhance the positive image of small business through service to their customers and our community. These exceptional companies help make the Richfield area a great place to live, work and play.
Various sources of information were gathered and analyzed to choose the winners in each category. The 2013 Richfield Award Program focuses on quality, not quantity. Winners are determined based on the information gathered both internally by the Richfield Award Program and data provided by third parties.
About Richfield Award Program
The Richfield Award Program is an annual awards program honoring the achievements and accomplishments of local businesses throughout the Richfield area. Recognition is given to those companies that have shown the ability to use their best practices and implemented programs to generate competitive advantages and long-term value.
The Richfield Award Program was established to recognize the best of local businesses in our community. Our organization works exclusively with local business owners, trade groups, professional associations and other business advertising and marketing groups. Our mission is to recognize the small business community's contributions to the U.S. economy.
SOURCE: Richfield Award Program


http://richfield.awardprogram2013-3.net/PressReleaseub.aspx?cc=DCEL-PBB4-X622
Posted by Unknown at 7:18 AM No comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Newer Posts Older Posts Home
Subscribe to: Posts (Atom)

Followers

Blog Archive

  • ▼  2014 (4)
    • ▼  February (1)
      • LegalShield Identity Theft PremiumSM
    • ►  January (3)
  • ►  2013 (8)
    • ►  December (1)
    • ►  November (2)
    • ►  October (1)
    • ►  June (1)
    • ►  May (2)
    • ►  March (1)
  • ►  2012 (19)
    • ►  September (5)
    • ►  July (1)
    • ►  March (6)
    • ►  February (2)
    • ►  January (5)
  • ►  2011 (20)
    • ►  December (6)
    • ►  October (5)
    • ►  September (9)

Subscribe To

Posts
Atom
Posts
All Comments
Atom
All Comments

Identity Theft, don't be a victim.

Identity Theft, don't be a victim.
The Identity Theft Shield protects a person before, during and after they become a victim.

Rob Taylor

Unknown
View my complete profile
Watermark theme. Powered by Blogger.