4 Easy-to-Do Tips to Defend Against the Target Hacks

4 Easy-to-Do Tips to Defend Against the Target Hacks

4 Easy-to-Do Tips to Defend Against the Target Hacks What should you do if you are a Target shopper, especially if you used your debit or credit card at Target stores between November 27, 2013 and December 15, 2013?

Don’t let your guard down. Remember, criminals now have three was to contact you.

  • If a person calls you claiming to be with your bank and references the Target hacks, hang up immediately and then call the toll-free number on your debit or credit card.
  • If you receive an email, do not click on any links. Go to www.target.com/databreach for all legitimate communication. Always type this URL into the bar manually; never just click the link.
  • Never respond to paper mail.

Be proactive; don’t just sit around and wait for something to happen.

  • Contact Target at 866-852-8680 if you suspect unauthorized activity on your account(s).
  • Inspect your bank and credit card statements thoroughly. Criminals will “test” stolen cards by spending just a few cents before using it for larger purchases.

Sign up for credit monitoring and identity theft protection.

  • Remember, Target is offering this for FREE!
  • If you don’t want to wait, do some Internet research, choosing monitoring and protection companies that are “Better Business Bureau certified,” or ask friends or family members for references.

If your debit or credit card information is saved at other websites (ie. Amazon, iTunes, Etsy, etc.), remove it. Some online retailers allow purchasers to bypass passwords if they know the last 4 digits of the card.

Bonus: Target is offering FREE credit monitoring through Protect my ID, a part of Experian. Here’s the link to sign up: https://creditmonitoring.target.com/#?v=1B19TW011314

About the Author

Ginger Hill is Group Social Media Manager.

Featured

  • Trends Keeping an Eye on Business Decisions

    Today, AI continues to transform the way data is used to make important business decisions. AI and the cloud together are redefining how video surveillance systems are being used to simulate human intelligence by combining data analysis, prediction, and process automation with minimal human intervention. Many organizations are upgrading their surveillance systems to reap the benefits of technologies like AI and cloud applications. Read Now

  • The Future is Happening Outside the Cloud

    For years, the cloud has captivated the physical security industry. And for good reason. Remote access, elastic scalability and simplified maintenance reshaped how we think about deploying and managing systems. But as the number of cameras grows and resolutions push from HD to 4K and beyond, the cloud’s limits are becoming unavoidable. Bandwidth bottlenecks. Latency lags. Rising storage costs. These are not abstract concerns. Read Now

  • Right-Wing Activist Charlie Kirk Dies After Utah Valley University Shooting

    Charlie Kirk, a popular conservative activist and founder of Turning Point USA, died Wednesday after being shot during an on-campus event at Utah Valley University in Orem, Utah Read Now

  • The Impact of Convergence Between IT and Physical Security

    For years, the worlds of physical security and information technology (IT) remained separate. While they shared common goals and interests, they often worked in silos. Read Now

  • Unlocking Trustworthy AI: Building Transparency in Security Governance

    In situations where AI supports important security tasks like leading investigations and detecting threats and anomalies, transparency is essential. When an incident occurs, investigators must trace the logic behind each automated response to confirm its validity or spot errors. Demanding interpretable AI turns opaque “black boxes” into accountable partners that enhance, rather than compromise, organizational defense. Read Now

New Products

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.