The Effects of Online Crime

Online Crime Affects More Than You May Think
By Kristen Long

In the September 2014 issue of Concrete Openings, I wrote an article titled “The Threat Posed by Cyber Criminals.” In the article, I discussed the emerging risk of cybercrime and the link between main street American businesses and the Fortune 500 company attacks. Now is the time to revisit this topic, because since that time cyber criminals have elevated their game and continue to carry out malicious attacks on American businesses and individuals through phishing emails and malware viruses. Several large data breach events have taken place in the mere five months since I last addressed the issue. JP Morgan Chase, Staples, Sony, Michael’s, Home Depot, Albertson’s, Kmart and Dairy Queen have all fallen victim to cyber criminals. Even last month we witnessed possibly the most devastating breach to date—the attack on a health insurance giant, Anthem Inc. As the level of sophistication and number of attacks continue to increase, it can be overwhelming to attempt to protect your household or your business. In the following article, I am going to share some basic information and tips to help equip you in the fight against cyber perils.

Cyber-attacks on the Household
The breach on Anthem Inc., the second-largest health insurer in the U.S., compromised the information of over 80 million people, or 1 in 4 people, in the United States. The attack included spouses, dependents (such as children) and even deceased family members. The information stolen includes the following: social security numbers, date of births, addresses, names, phone numbers, email addresses and even salary information. Having all of this confidential personal information is like giving a criminal or outsider a passkey into your life.

What is concerning, is the lack of outcry from the public. Hundreds of millions of people have been affected by the data breaches over the past year and yet there remains no urgency to fend off the hackers. Why is that? Up until now, data breaches have mostly affected credit cards. Credit card companies have provided fraud protection, paying out of their corporate pockets any expenses/damages and replacing credit cards when customers’ information has been compromised. While the attacks reached a huge number of people, the outcome for most individuals was a minor annoyance rather than a crippling event. Now, imagine instead of merely needing to update your Netflix payment method, you discover that your credit rating has been damaged, your social security number was used by another person to obtain employment or you are now unable to receive healthcare when needed. To take it one step further, what if somebody stole your child’s identity? That is a very real possibility and touches on the magnitude of medical and Social Security identity theft.

Monitoring and correcting medical or Social Security identity theft can be a difficult and time-consuming task. Since this is a new breed of attack, we are just learning the power of these crimes and it could take years or even decades to understand the true enormity of the events. Below are the definitions and details of medical and Social Security identity theft:

  • Medical Identity Theft occurs when someone steals your personal information (like your name, Social Security number or Medicare number) to obtain medical care, buy drugs or submit fake billings to Medicare in your name. The Coalition against Insurance Fraud offered the following warning regarding medical identity theft, “But be warned: Correcting records can be hard. In general, federal law lets patients’ correct medical records created only by the medical provider or insurer that now maintains your information. A hospital or insurer that later receives your information doesn’t have to correct its records—even when they’re wrong. But you do have the right to have your records state that you disagree with the information, and why. Be sure your complaint is entered into your records”.
  • Social Security Identity Theft involves fraudulently using someone’s Social Security Number (SSN) to get a job, file for governmental benefits, fraudulent tax returns, credit and medical care. The Social Security Administration says, “If you have done all you can to fix the problems resulting from misuse of your Social Security Number and someone still is using your number, we may assign you a new number”.

According to the Identity Theft Assistance Center (ITAC), “Adults can monitor their own credit reports every few months to see if someone has misused their information, and order a fraud alert or freeze on their credit files to stymie further misuse. But most parents and guardians don’t expect their youngster to have a credit file, and, as a result, rarely request a child’s credit report, let alone review it for accuracy. A thief who steals a child’s information may use it for many years before the crime is discovered. The victim may learn about the theft years later, when applying for a loan, apartment, or job”. Further the ITAC states, “until recently, very little was known about the scope of the crime and how the stolen information is used. ITAC sponsored the 2012 Child Identity Fraud Report to get verifiable data that can be used to develop solutions to identity theft.” Prior to the current string of data breaches, ITAC conducted a study into child identity theft, below are the key findings.

2012 Child Identity Theft Key Findings

  • Social Security Numbers are the most commonly used piece of information by identity thieves targeting children. In fact, 56% of respondents reported theft or misuse of a child’s SSN.
  • The most common way criminals use a child’s personal information is to combine a child’s SSN with a different date of birth to create a new identity that can be used to commit fraud. Fraud involving “synthetic identity” is especially difficult for victims and industry to detect.
  • The study found that 2.5% of U.S. households with children under age 18 experienced child identity fraud at some point during their child’s lifetime. This equates to one in 40 households with minor children being affected by this crime.
  • Fraud committed by family and friends is to blame in many child ID theft cases. The data shows that 27% of respondents reported knowing the individual responsible for the crime.
  • Low-income households are disproportionately affected by child identity theft. As family income decreases, the risk of child identity fraud increases. While 50% of households of child identity theft victims had incomes under $35,000, only 10% of households of child identity theft victims had incomes of more than $100,000.
  • Child identity theft is more difficult to detect and resolve than adult identity theft. The survey showed that these crimes took 334 days to detect, 44 hours to resolve and 17% of children were victimized for a year or longer.

If these data breaches have taught us anything, it is that every American household, child and business should be taking, at a minimum, the following steps to monitor their identity:

  1. Credit Monitoring / Freezing – Sign up for monitoring with all credit bureaus directly or via a credit monitoring company. Remember to include children.
  2. Child Identity Protection – http://www.consumer.ftc.gov/articles/0040-child-identity-theft
  3. Medical Identity Monitoring – Review your health insurer’s monthly and annual report of charges.
  4. Review Social Security Activity – http://www.socialsecurity.gov/myaccount/

The opportunity for children to socialize online has risks and rewards. As adults, we must reduce the risks by talking to kids about making safe and responsible decisions. SafeKids.com (http://www.safekids.com/safety-advice-tools/) offers many suggestions on areas of discussion with your children.

Cyber-attacks on your Businesses
My previous article highlighted the potential for smaller businesses to become a gateway to much larger companies. As discussed, the massive Target attack in late 2013 was a perfect example of how cyber criminals hone in on small businesses to gain access points to larger prey. In that instance, hackers penetrated an HVAC contractor in Pittsburgh that performed contracting work for a local Target. Once the hackers had taken control of the HVAC contractor’s systems, the thieves discovered an online portal that Target used for its vendors for payment and contract delivery. That was all the hackers needed to hit the mother-load. So, how many larger companies do you do business with? Large general contractors, banks, owners, suppliers, etc. could all be targets and you could unknowingly serve them up on a platter. Does your company execute vendor contracts that allocate liability and indemnification for data breaches? When protecting cyber risks, companies often ignore the risks created by their vendor agreements. Your business partners create exposures outside of your internal IT business network. Cyber breaches involving a third party muddy the waters and spill into complex litigation.

As a first line of defense, every company should establish training and a risk management program for its cyber exposure, including remote access, cell phones, laptops and even tablets. This should include a response plan in the event your company is hacked. Who will you call first? Your company IT professional should be included as a strategic partner to help guide your plan and company training. Equally important, is the purchasing of Cyber Liability Insurance. Cyber insurance is an continuously developing product that can cover both liability and property damage losses that may result from a business engaging in various electronic activities, such as selling on the Internet or collecting data within its internal electronic network (such as payments from clients via credit cards). Cyber insurance policies can cover a business’ liability for a data breach in which customer information, such as Social Security or credit card numbers, are stolen by a hacker who has gained access to the firm’s electronic network. The policy would cover a variety of expenses associated with data breaches including: notification costs, credit monitoring, costs to defend claims by state regulators, fines and penalties and losses resulting from identity theft.

Currently, there is a market for cyber liability insurance, but as the amount of attacks have increased, insurance carriers have tightened up their underwriting guidelines before accepting new policyholders. The insurer will need verification that the company is up to date on firewalls, antivirus, anti-malware and if it monitors how access is granted to company systems. So, please be aware that bringing you “up to code” in terms of insurability and finding the proper market for your company may require time and effort.

When considering the probability of whether you or your company will suffer a cyber attack, it is no longer a question of “if,” but “when”. As cybercrime continues to progress and the stakes become more severe, it is our responsibility as heads of households and professionals to educate ourselves as to how to best defend our own information as well as others. Kaspersky, Internet Security Company, has an excellent training tool called the “Stop Cyber Crime Guide.”

As an insurance professional who specializes in the construction industry, and a victim of identity theft, it troubles me to say that less than five percent of my clients have implemented the security procedures discussed above. I implore each of you to take this issue seriously and to be proactive in protecting your personal, business and client’s information. While the thought and expense of putting a security plan into action may seem daunting, it is a fraction of what you will be forced to deal with if you are attacked without one.

Kristen Long is an Area Senior Vice-President for Arthur J. Gallagher & Co., an insurance company that provides risk management options for concrete sawing and drilling companies. Long has over 20 years experience as an insurance broker and has specialized on managing property and casualty insurance for construction operations. She can be reached at 312-803-7420 or by email at kristen_long@ajg.com.

Author: Russell Hitchen

Share This Post On

Submit a Comment

Your email address will not be published. Required fields are marked *