Slovak national Computer Emergency Response Team.
  • Contacts
  • Report an incident
  • Text version
  • Graphic version
  • Slovenčina
www.nbu.gov.sk   www.slovensko.sk
  • About Us
  • Services
  • Statistics
  • Publications
  • Tips and Tricks
  • Legislation
  • Tips and Tricks
  • Responsible Vulnerability Disclosure Guideline
  • Security of Operational Technology Systems
    • Technological and Functional Difference between IT and OT
    • Myths and Superstitions
    • Concepts and Standards for Cybersecurity of OT Systems
    • Recommendations for Energy Sector
    • Frequently Asked Questions
  • When to Contact Us
  • Report an Incident
  • Security Recommendations
    • Online Safety Basics
      • What to Do if You Are a Victim
      • Spam
      • Phishing
      • Malicious E-mail
      • Spam and Phishing on Social Networks
      • Tips for Avoiding Being a Victim
    • Securing Accounts and Devices
      • Passwords and Securing Your Accounts
      • Hacked Accounts
      • Social Media Platforms
      • Securing Your Home Network
    • Data Backup
      • Cloud
    • Privacy Protection
      • Tips to Manage Your Privacy
    • Online Shopping
      • Shopping on the Go
      • Online Shopping Tips
      • Basic Safety and Security Tips
    • Mobile Devices
    • Malware and Botnets
      • Botnets
      • Ransomware
      • Spyware
      • Virus
      • Protection against Malware
    • Identity Theft, Fraud and Cybercrime
      • Identity Theft and Fraud
      • Cyberbullying and Harassment
  • Business Organizations
    • Asset Identification
    • Asset Protection
    • Incident Detection
    • Incident Response
    • Recovery
  • Teens
    • Tips for Teens
    • Tips for Parents
    • Parental Controls
  • Seniors
    • Tips for Seniors

Identity Theft and Fraud

Having your identity stolen can be scary and invasive and have damaging effects on your finances, medical records and reputation. If you become a victim, knowing how to respond and report the incident is vital. Here are some tips and resources to help you recover.

In cases of identity theft:

  • Make sure you change your passwords for all online accounts. When changing your password, make it a sentence that is 12 or more characters long, and make it unique to that account. You may also need to contact your bank and other financial institutions to freeze your accounts so that the offender is not able to access your financial resources.
  • Close any unauthorized or compromised credit or charge accounts. Cancel each credit and charge card. Get new cards with new account numbers. Inform the card companies that someone may be using your identity, and find out if there have been any unauthorized transactions. Close accounts so that future charges are denied. You may also want to write a letter to the company so there is a record of the problem.
  • Think about what other personal information may be at risk. You may need to contact other agencies depending on the type of theft. For example, if a thief has access to your Social Security number, you should contact the Social Security Administration. You should also contact your state’s department of motor vehicles if your driver’s license or car registration is stolen.
  • File a report with your local law enforcement agency. Even if your local police department or sheriff’s office doesn’t have jurisdiction over the crime (a common occurrence for online crime which may originate in another jurisdiction or even another country), you will need to provide a copy of the law enforcement report to your banks, creditors, other businesses, credit bureaus, and debt collectors.
  • If your personal information has been stolen through a corporate data breach (when a cyber thief hacks into a large database of accounts to steal information, such as Social Security numbers, home addresses and personal e-mail addresses), you will likely be contacted by the business or agency whose data was compromised with additional instructions as appropriate. You may also contact the organization’s IT security officer for more information.

(Author: National Cyber Security Alliance, published under Public License)

First publication 05. 3. 2018. Last update 16. 3. 2018 14:46
Current threats
Current threats

SK-CERT Bezpečnostné varovanie V20250520-08

Dôležitosť Kritická Klasifikácia Neutajované/TLP:CLEAR CVSS Skóre 10.0 Identifikátor Pluginy redakčného systému WordPress – ...20. May 2025

SK-CERT Bezpečnostné varovanie V20250520-07

Dôležitosť Kritická Klasifikácia Neutajované/TLP:CLEAR CVSS Skóre 9.8 Identifikátor Jenkins produkty – dve kritické ...20. May 2025

SK-CERT Bezpečnostné varovanie V20250520-06

Dôležitosť Kritická Klasifikácia Neutajované/TLP:CLEAR CVSS Skóre 10.0 Identifikátor Schneider Electric produkty – dve ...20. May 2025
all publications
CVEs
Tweets by sk_cert
Links
Links
  • ENISA
  • CERT
  • Trusted Introducer
  • FIRST
Copyright © 2025 All rights reserved - Last update 06. 06. 2025 11:44
  • Sitemap
  • Declaration of accessibility
  • Technical support
  • Content
  • Contacts
  • Report an incident
  • RSS