CONSULTATIONS 
Individuals, Families or Business

 

Why Use These Programs?  Why Should You be Concerned?

A false sense of security can leave you, your family or your business vulnerable to abuses created by identity theft or identity fraud.  Your greatest asset is the relation-ships you have taken years to build and the trust others have in you.  Without knowing it, this can be taken from you in a matter of minutes.

Identity theft is the fastest growing crime throughout the world. More perpetrators of this crime go uncaught than any other crime.  It is possible to go 12 to 13 months before you even know it has happened to you. Then you discover it is up to you to prove your innocence and to do the restoration at your own expense.  

The most treacherous words are, “I am careful, therefore it cannot happen to me”.  It is not uncommon to hear next is, “Funny thing happened to me earlier this week, what can be done now?” and “Who will help me?”

There are three important things to consider that is normal for most people.

  • You do what you have always done
  • You don’t know what you don’t know
  • You cannot fix what you first refuse to acknowledge

Our “Keeping Your Identity Safe” assessments allow you to correct all three of these hazards.

For your family, it is the maintenance of a thoughtful lifestyle. In the case of your business it is honouring the trust that you have earned and by respecting the personal information of your employees and customers.

It is our mission to investigate and uncover the vulnerabilities that ultimately are a threat to you, your family, your business and all the people connected to you. How much safer will your customers feel, knowing that you and your staff have been trained to care for their privacy?

A majority of customers would discontinue doing business with you if they thought their personal information has been compromised.

Just a single incident can ruin the reputation that took you years to build.  Would it not make sense to know how to reduce any risk and decrease your vulnerability?   I know your answer is “Yes”. 

Allow us to assist you. Each and every “Keeping Your Identity Safe” assessment we do for you personally or for your business is as unique and different as the people or business for which we perform this unique service.

 

IDENTITY LOSS  (Loss, Theft or Fraud)   What Do You Have to Lose?

Based on a variety of surveys by organizations like Ipsos-Reid or the Federal Government as well as reports from the RCMP and my observations since 2003, most people tend to underplay the importance of identity theft or identity fraud, especially in Western Canada.  

There is a lack of awareness of the impact this crime can have on people.  To some victims, the hardship created never goes away and will stay with the individual for the rest of their life.  Sadly, many cases of identity loss are a result of poor management, their habits and procedures by those who are victimized. Another misconception is, that it is “someone else’s” responsibility to “fix it” after the fact. (i.e. The bank, police or governmental authorities)

Your character, self-respect and reputation is you.  When that is destroyed it takes  years and lots of money to rebuild… if, in fact, you even can.  All because someone did something in your good name.

These are some common results of becoming an identity theft victim, to name a few…

  • Time Loss
  • Inconvenience & Frustration
  • Embarrassment & Anxiety
  • Loss of Self Respect
  • Feeling Personally Violated
  • Loss of Reputation and Trust
  • Sickness, Stress or Suicide
  • Family Break-up
  • Loss of Home and/or Possessions
  • Financial Loss
  • Loss of Credit & Financial Standing
  • Bankruptcy
  • Loss of Employment
  • Loss of Business
  • Criminal Charges or Criminal Record
  • Regularly Flagged by Police
  • Fear of Future Vulnerability

Note – Up to 80% of Identity Abuse cases created by theft or fraud go unreported

The RCMP reports have shown that 1 in 4 or 1 in 6 Families in Canada (depending on the region) are affected in some way by identity theft. (ITIC Poll)   

Don’t YOU be the “1”!

 

POST VICTIM ASSISTANCE

Our program goes beyond the advice and assistance provided by the police or victim services. By no means are we suggesting you should not report your incident or utilize their services.  We are however, suggesting you can take control and do more.

We have a prepared 14-Step Assistance Program to walk through the process of restoration after having been victimized by an identity theft, identity fraud or the abuses created by this crime.  The program begins with a one hour consultation to review your case and situation.  From there we will meet either on the phone or in person as required.  The time will be well spent by giving you constructive tasks designed to effectively notify the proper organizations and take steps to evidentially protect yourself. Any general conversation within the discussion is not on the clock – you are only billed for real time.

Your name and self respect are the two most valuable assets you have.  It is vital to get them both back in order so that you can move on with your life.

Allow us to be of service and assistance to you.

 

SOCIAL MEDIA REVIEW    Part 1… On-Line Activities

Who are you on-line? (Personally or Business)

The “Keeping Your Identity Safe” Social Media Review is a very thorough search of what others see about you or your business on-line. 

Part 1 looks for what information you freely give away and how you do that.  It is also a review of how you conduct yourself on-line and whether you are putting out a true representation of who you want to be known as.

On-line Profiles often provide inappropriate information for the purpose it is posted. Our review will offer alternatives customized to suit your purposes while maintaining your integrity and privacy in respect to personal information.

Some professionals will do a search on-line of those they are about to conduct business with in order to “see” if the prospect’s character is in line with the person they were approached by.  Many, if not most, potential employers will put more value to what they “see” on-line rather than depending on your resume that you have personally prepared.

A virtual inspection  will be preformed on-line.  Our program looks at all the popular Social Media sites: Facebook, LinkedIn, Twitter, Google+ and You-tube.  We also perform an up to 10 page search of Google and Bing Search Engines about you and your business.

Upon completion of our assessment, a complete and confidential report is presented to you at a face to face meeting.  Our report will show you where you “showed up” on-line and the recommendations we make to amend your social media habits. 

Should you wish, this program may be expanded in ways to delve deeper.

Your integrity and personal character is your most valuable asset and it needs to be well thought through before exposing it on-line.  Our review could make all the difference to how others see you.

Allow our review to ensure that…      You are the only you there is!

 

SOCIAL MEDIA REVIEW    Part 2… Account & Privacy Settings

How private are you on-line?

The “Keeping Your Identity Safe” Social Media Review is a thorough search of what people see about you on-line. 

Part 2 looks deeper into the social media sites to see what decisions you have made in order to control your information and how it can be used by the platform itself.

Some people tend to give out their information more freely than others. Some people do not realize they have the control of what information is given, what information has restricted access or should not be included at all.

Our assessment or review can either be a face to face inspection or one that is remotely conducted. 

The purpose of this review is to inform you and ultimately allow you to decide what information you post, can be seen or used by other parties.

It is one thing not to be safe, but it is worse when you think you are and you are not.

What if your privacy hangs on  a single selection you didn’t even know you had?

Your first choice is to have your on-line activities reviewed and establish your boundary lines of safety and security.

Allow our review to ensure that…  You establish the rules regarding your information’s security !

 

SOCIAL MEDIA REVIEW    Part 3… Computer Forensics

How secure and protected are you on-line?

The “Keeping Your Identity Safe” Social Media Review is a thorough search of your cyber world. 

Part 3 looks at what controls and protections are actively in place, up to date and working effectively. This can include but is not restricted to virus, malware and spyware protection as well as spam and junk mail controls.

Some people tend to question the need for these protections assuming that because their use is somewhat restricted, they are not subject to the abuse or not the subject of an attack. 

This segment is more about the hardware and the software you have installed, rather than the use or the content.  We can also subject the review to your multi-devices such as desktop, laptop, tablet and smart-phone applications as a custom package.

Pricing may vary dependent on the number of devises and their locations. 

This section could be expanded to include the repair of the units due to an array of various infestations of a virus or malware and the clean-up required as a result of being hacked.

A completed confidential report is presented to you at a face to face meeting. The report will show how well you are protected and will provide recommendations based on your individual requirements.

A single incident could be sending your private information around the world without you knowing.

Allow our review to ensure that…  Your on-line devices are controlled by you and NO one else!

 

1 on 1 INDIVIDUAL VULNERABILITY RISK ASSESSMENT

It is so easy for an individual to build habits and routines regarding the use of personal data and go unchecked by anyone.  It is also very probable that you are doing routines that you don’t even realize because they have evolved unnoticed over time. An assessment by one of us will see what you don’t see almost immediately, based on similar situations found from other people who went down those same paths before you.

Therefore, most of your vulnerabilities begin here. It is about the innocence of not understanding the powerful role you perform toward the safety and vulnerability to such things as identity loss, theft from auto or a home break-in.

The “Keeping Your Identity Safe” Individual Vulnerability Risk Assessment is designed to enlighten you about the need for awareness and understanding of this crime and how you can avoid putting yourself and those connected to you at risk.

Our assessment looks at a wide variety of your activities: Collecting and sending mail, the use of credit and debit cards, ATM use, using cheques – personal and pay-cheques, a review of what you are doing on social media, and more.  The program looks at your habits and your daily routines and breaks them down into areas than can be easily changed in order to eliminate the temptations you unknowingly provide a potential thief to simply take advantage of. These include, as an example, important document storage, what is left in your vehicle, placement of on-line devices and much more. After all, it is about your safety and the security of your name and identity.

Our program will also include the initial Social Media Review and will show you how to effectively keep yourself safer based on your individual requirements.

The targeted areas of concern of this assessment are the: “How”, “Where”, “What”, “Who”, “When” and “Why” related to what you do with your personal data – on-line and off-line.

Together we will answer the following questions:

  • What is the difference between your identity and your ID?
  • What does your wallet tell you about you?
  • How are you affected by RFID technology?
  • Can your On-line activities come back to bite you?

This is a highly confidential review and your information will be handled with the utmost respect to your privacy.

 

FAMILY VULNERABILITY RISK ASSESSMENT

Families are the root of almost everything in our society.  Therefore, most of our vulnerabilities begin here. It is about the innocence of not understanding the powerful role each member of a family has toward the safety and vulnerability against such things as identity loss or a home break-in.

The “Keeping Your Identity Safe” Family Vulnerability Risk Assessment is designed to enlighten every resident member of your family about the need for awareness and understanding of this crime and how each member plays an important role to avoid putting the rest of the family in harms way.

Our assessment looks at a wide variety of your collective activities: Collecting and sending out mail, the use of your credit and debit cards, ATM use, using cheques – personal and pay-cheques, a review of what family members are posting on social media, and more.  Together we look at what each member of the family carries with them on a regular basis.

Our program will show you what would happen if an attack were to occur, such as your computers being hacked, text messages being used for spiteful purpose, bullying in respect to computers and smart-phones, what is vulnerable when carried in backpacks left at school or on a sports field unattended.

Together we will look at how you, as a family, collectively deal with sensitive and personal information, private documentation, the placement of computers within your home, your garbage and recycled paper at the curb, who has access to your home and when, as well as a whole lot more. As a bonus, we will also include the first and second phase of the Social Media Review and look at the programs you have in place to protect your home against mortgage fraud as well as a review of how you are affected by RFID technology.

The targeted areas of concern of this assessment are the: “How”, “Where”, “What”, “Who”, “When” and “Why” related to what you do with your personal data – on-line and off-line.

This is a highly confidential review and your information will be handled with the utmost respect to your privacy.

Note – this program will only be conducted if every resident member of the family is present for this “Kitchen Table” meeting.

 

HOME-BASED BUSINESS VULNERABILITY RISK ASSESSMENT

The “Keeping Your Identity Safe” Home-Based Business Vulnerability Risk Assessment is designed to expose areas of vulnerability in business operations that are conducted from the home address.  This may encompass a wide variety of operational styles such as Construction Contractors, Day-Care, Designers, Accountants or MLM/ Networking businesses typically run from home.

Our assessment is actually a blending of the Family Assessment and the Small Business Assessments. 60% of homes in Canada are reported to have a business of one type or another operated within them. Often the habits of home life get caught up in the procedures of operating a business within this category of assessments.

Instead of employees, you have family members taking on responsibilities related to the family, the business or family office. It is about the information you hold at home and how to separate the family “stuff” from the business entity and still be compliant to your responsibilities as presented in the various Privacy Acts.

Our program is a result of blending information derived from interviews with former convicted identity thieves that specialized in business attacks, and the Canadian privacy Acts. [The Personal Information Protection and Electronic Documents Act (PIPEDA) and Personal Information Privacy Acts (PIPA)]

The targeted areas of concern within our assessment are: “How”, “Where”, “What”, “Who”, “When” and “Why” relating to the data of the business, considering how the data is collected, used, stored and disposed of.

Home-Based businesses are especially vulnerable, not because of carelessness, but because of systems and procedures required. We analyze the flaws in your system that you cannot see and our assessment will allow you to see your operation from a new perspective. It will show you what a thief can see that you don’t see. This program will break-down the habits of your family while considering the working procedures of running a business and taking into account how data and privacy matters are handled in compliance with the various Acts.

This program is not about your data, but it is about what you do with it.

 

SMALL BUSINESS VULNERABILITY RISK ASSESSMENT

The “Keeping Your Identity Safe” Small Business Vulnerability Risk Assessment is designed to expose areas of vulnerability in business operations that have less than 12 employees, are generally owner managed and operate in a single location.

This is a complete assessment of your business’s policies, procedures and methods of using personal data held by the business, about the business, its directors, share holders, employees and customers. 

Our program is a result of blending information derived from interviews with former convicted identity thieves that specialized in business attacks, and the Canadian privacy Acts. [The Personal Information Protection and Electronic Documents Act (PIPEDA) and Personal Information Privacy Acts (PIPA)]

The target areas of concern within this 15-point detailed assessment are the: “How”, “Where”, “What”, “Who”, “When” and “Why” relating to data used by the business considering how the data is collected, used, stored and disposed of.

Our thorough assessment will take into consideration how your data is handled, how your staff are trained in privacy matters, location and upkeep of related equipment, compliancy to the various Acts, and much more depending on the specific operation and it’s needs.

This program is not about your data, but it is about what you do with it.

All businesses are vulnerable.  Not because of carelessness, but because of new technology and that your systems and procedures have evolved over time and are not observed in the same way as they once were. A fresh set of eyes know what they are looking for. 

Simply put, we see the holes created in your system that you do not see.  This exercise will allow you to see your own operation from a new perspective, and show you what a thief can see that you don’t.

 

BIG BUSINESS VULNERABILITY RISK ASSESSMENT

The “Keeping Your Identity Safe”  Business Vulnerability Risk Assessment is designed to expose areas of vulnerability in larger operations with more than 12 employees, generally corporately owned, perhaps operating in multiple locations and are possibly administered from another location.

This is a comprehensive assessment of your business’s policies, procedures and methods of using personal data held by the business about the business and its directors, share holders, employees and customers. 

Our program is a result of blending information derived from interviews with former convicted identity thieves specializing in business attacks, and the Canadian privacy Acts. [The Personal Information Protection and Electronic Documents Act (PIPEDA) and Personal Information Privacy Acts (PIPA)]

The target areas of concern within this 15-point detailed assessment are the: “How”, “Where”, “What”, “Who”, “When” and “Why” relating to data used by the business considering how the data is collected, used, stored and disposed of.

Our thorough assessment will take into account how your data is handled, transferred from one location to another, how your staff are trained in privacy matters, the location and upkeep of related equipment, and your compliance to the various Acts.

This program is not about your data, but it is about what you do with it.

All businesses are vulnerable.  Not because of carelessness, but because of new technology and that your systems and procedures have evolved over time and are not observed in the same way as they once were. A fresh set of eyes know what they are looking for. 

Simply put, we see the holes created in your system that you do not see.  This exercise will allow you to see your own operation from a new perspective, and show you what a thief can see that you don’t.