Cookie Preference Centre

Your Privacy
Strictly Necessary Cookies
Performance Cookies
Functional Cookies
Targeting Cookies

Your Privacy

When you visit any web site, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences, your device or used to make the site work as you expect it to. The information does not usually identify you directly, but it can give you a more personalized web experience. You can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, you should know that blocking some types of cookies may impact your experience on the site and the services we are able to offer.

Strictly Necessary Cookies

These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site may not work then.

Cookies used

Performance Cookies

These cookies allow us to count visits and traffic sources, so we can measure and improve the performance of our site. They help us know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies, we will not know when you have visited our site.

Cookies used

Google Analytics

Functional Cookies

These cookies allow the provision of enhance functionality and personalization, such as videos and live chats. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies, then some or all of these functionalities may not function properly.

Cookies used




Targeting Cookies

These cookies are set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant ads on other sites. They work by uniquely identifying your browser and device. If you do not allow these cookies, you will not experience our targeted advertising across different websites.

Cookies used


This site uses cookies and other tracking technologies to assist with navigation and your ability to provide feedback, analyse your use of our products and services, assist with our promotional and marketing efforts, and provide content from third parties


Here are some suggested Connections for you! - Log in to start networking.

Sefanaia Silimaibau
Supervisor Quality Assurance & Trainer
Aprialdi Hendryana
Assistant Vice President
Vijay s

How To Protect Yourself From Identity Theft - Finnegan Pierson - Blog

How To Protect Yourself From Identity Theft

Millions of American consumers fall victim to identity theft on an annual basis, yet only a small fraction take measures to protect themselves from it. According to Experian, only 13% of consumers use a paid product to monitor their credit and finances, and 18% use a paid monitoring product. A whopping 81% rely on their banks, credit unions and lenders to monitor activity for them.


If you are part of the majority, it’s only a matter of time before your personal information — which includes your birthdate, social security number, driver’s license number and address — is misappropriate by a thief. From there, the perpetrator has access to your most private and valuable information, which it could use to cause you personal, professional or financial harm. If you want to safeguard your identity, as you should, take the following measures today.


Know the Signs of Identity Theft


First and foremost, it’s important that you know how to identify identity theft. Unfortunately, many people are unaware that they’ve become a victim until their bank accounts are emptied, a police officer shows up at their doors with an arrest warrant or their tax return is rejected. You can avoid being blindsided by knowing what signs to look for:


  •     Bills no longer coming in the mail
  •     A rejection notice for a loan or credit card, despite an outstanding credit history
  •     Bills for purchases you did not make
  •     Financial accounts with seemingly fraudulent transactions
  •     “Test” charges on your credit card statement (small purchases to see if a card is still active)


Safeguard Your Social Security Number


Knowing the signs is important if you suspect that you’ve already fallen victim to identity theft. However, you can take proactive measures to ensure it never gets to that point, the first of which is to safeguard your Social Security number. Never carry your Social Security card with you. Secure or shred any paperwork with your number on it. If someone or some entity asks for your number, ask why it is needed and make sure the recipient plans to safeguard it.


Strengthen Your Passwords


Make sure that every digital device you own is password protected. Most people don’t realize how much personal information their devices contain and often leave them unsecured. When it comes to selecting passwords, try to mix them up. Use a different password for every device, bank account, social media account, email account, etc. Never use obvious information for your passwords, either. “Obvious” includes your kids’ birthdays, your address, your own birthday and your name.


Stop Clicking


One of the worst things you can do is to click on a link from an unknown sender or that originates in a popup ad. Identity thieves routinely use emails, text messages and websites to steal information regarding individuals’ bank accounts, credit cards, mortgage lenders and finances. If a link looks suspicious in any way, or if you don’t recognize the name of the sender, do not click it. You should also never type your username or password information into an unfamiliar login screen.




What is TLS? TLS stands for Transport Layer Security and is a method by which networks keep internet connections secure. TLS is a cryptographic protocol that provides robust authentication, privacy and data integrity across computer networks. It is used in everything from email to instant messaging to data browsing and is more effective than SSL, or Secure Sockets Layer. TLS was designed to address and overcome SSL vulnerabilities and support stronger and more secure algorithms.


Monitor Your Credit Report and Financial Statements


Finally, stay vigilant. Don’t count on your banking institution or credit union to search for, identify and inform you of discrepancies in your reports. It is ultimately up to you to spot suspicious activity and bring attention to it.


The best way to protect yourself against identity theft is to take control of your information and take proactive measures to safeguard it. Use the above tips to do just that today.

Publish Date: January 23, 2020 7:31 PM



Starting on the hour every hour today

My Role As A CX Champion In My Company

Coming up this Week

About us - in 60 seconds!

Submit Event

Upcoming Events

The 19th EMEA Annual Best Practices Conferences are here! Meeting Point for the World's Best Contact Center & CX Companies Read More...
The 19th Asia Pacific Annual Best Practices Conferences are here! Meeting Point for the World's Best Contact Center & CX Companies Read More...
The 19th World Final Annual Best Practices Conferences are here! Meeting Point for the World's Best Contact Center & CX Companies Read More...

Newsletter Registration

Please check to agree to be placed on the eNewsletter mailing list.

Industry Champion Award Leaderboard

Most active award entrants in the past 48 hours! - Vote for Others / About Program
both ids empty
session userid =
session UserTempID =
session adminlevel =
session blnTempHelpChatShow =
session cookie set = True
session page-view-total = 1
session page-view-total = 1
applicaiton blnAwardsClosed =
session blnCompletedAwardInterestPopup =
session blnCheckNewsletterInterestPopup =
session blnCompletedNewsletterInterestPopup =