chevron-down Created with Sketch Beta.

GPSolo eReport

GPSolo eReport January 2025

TAPAs: How to Know If You Are the Victim of a Cybercrime

Jeffrey M Allen and Ashley Hallene

Summary

  • Technological And Practice Advice to help you become more efficient and effective. This month: tips for monitoring your financial records and credit reports for signs that you have been hacked.
  • Check your real property records regularly to ensure no unauthorized changes or fraudulent activities have occurred.
  • Regularly review your credit reports from Equifax, Experian, and TransUnion. You are entitled to an annual free credit report from each bureau through AnnualCreditReport.com.
  • Many banks and financial services offer account alerts that notify you of unusual activities so you can stay informed in real time.
TAPAs: How to Know If You Are the Victim of a Cybercrime
boonchai wedmakawand via Getty Images

Jump to:

The war continues. It grows and expands in scope and intensity daily. What war? The Russian invasion of Ukraine? The myriad invasions and counterattacks throughout the Middle East? The domestic war against food insecurity and homelessness? The first two sentences apply to all of those, but we speak of something different today. This article addresses the ongoing global Cyber War. We focus on the constant cyberattacks and the consequent loss of privacy, security, property, and peace of mind. We consider it a slow month if we get only one or two letters advising us that some company we have dealt with suffered a data breach or cyberattack that compromised some of our private information. We would find it surprising if more than a few readers have never received such a notice. Even if you do everything right and take all the precautions, the fact remains that the mistake of a third party over whom you have no control can make you a casualty.

Fortunately, none of the data breaches we have received notices about resulted in any consequences for us. We hope you have been as lucky. We know others have suffered serious consequences and recognize that, at any time, it could happen to us or to you.

In many, if not most, incidents of consequences from such an event, the victim will learn of the problem relatively quickly and usually in no uncertain terms. The new “owner” shows up at your door ready to move into your house, which you did not sell. You receive a bill for a payment on a borrowing you did not make. Your bank denies the use of your credit card when you make a purchase because it saw something suspicious in another transaction and froze your credit card. These offer just a few real-life examples of the consequences that can result from a data breach impacting your personal information.

We have written about how to protect yourself in the past, explaining that the game goes by the name of risk mitigation, as you can never completely avoid all risks. If you become a cyber casualty in this war, you will find it helpful to discover it as soon as possible. The longer it takes for you to learn of the attack, the more damage that likely will have occurred. You cannot take corrective action unless you know that you have become a casualty. This article will address the problem from a different perspective. You need to constantly check to see if you have taken a hit. Hopefully, you have not, but if you have, you want to find out and quickly start to correct the situation.

Tip 1. Review Real Property Records

Check your real property records regularly to ensure no unauthorized changes or fraudulent activities have occurred. This includes verifying the ownership of your real estate and ensuring no new liens or mortgages have been placed on your property without your knowledge. Most counties or municipalities offer online access to property records. You should check them several times a year. Ideally, you will make it a monthly ritual.

Tip 2. Monitor Your Credit Reports

Regularly review your credit reports from the three major credit bureaus: Equifax, Experian, and TransUnion. You are entitled to an annual free credit report from each bureau through AnnualCreditReport.com. Look for any unfamiliar accounts or inquiries that could indicate fraudulent activity. Check your credit report at least quarterly. Consider subscribing to services that will inform you of any changes to your credit reports.

Tip 3. Regularly Check Bank Statements

Closely monitor your bank and credit card statements. Look for unauthorized transactions or unfamiliar charges, and immediately report any suspicious activity to your financial institution. Statements usually come out monthly, and you should check each as soon as possible after it becomes available. Many banks have facilities that allow you to check prior statements and the current (yet unissued) statement online. We like doing that every seven to ten days. It only takes a few minutes, and you can do it almost anywhere.

Tip 4. Enable and Respond to Account Alerts

Many banks and financial services offer account alerts that notify you of unusual activities, such as large withdrawals or changes to your account information. Enable these alerts to stay informed in real time. Enabling the alerts does nothing if you do not timely respond to them, so if you get a notice of a potential problem or a communication from your bank asking for verification of a transaction, respond immediately. Know that most banks that send requests for transaction verification will freeze accounts until they receive that verification. If you inform them that you do not recognize a transaction, most banks automatically cancel your card and then mail you a new one with a different account number.

Tip 5. Long-Term Strategies for Protection

While immediate actions are essential to mitigate damages resulting from a breach, don’t forget to do what you can to help prevent future exposure. Here are a few best practices for you to follow:

Use Strong Passwords and Two-Factor Authentication

Create strong, unique passwords for all your accounts and enable two-factor authentication (2FA) wherever possible. 2FA adds an extra layer of security by requiring a second verification form, such as a code sent to your phone or email address.

Keep Software Updated

Regularly update your software, including operating systems, browsers, and applications. Updates often include security patches that protect against known vulnerabilities. If you reach the point where your hardware no longer accepts operating system or software updates (or they no longer want to talk to your older hardware), understand that this is a message from the cyber police that you have obsolete hardware. Take it out of service and replace it immediately.

Educate Yourself on Phishing Scams

Phishing scams are a standard method used by cybercriminals to steal personal information. Learn to recognize the signs of phishing emails and messages, such as unfamiliar senders, urgent language, and suspicious links. Be careful with such emails and any attachments. We recommend that you simply delete them.

    Authors