Preventing Identity Theft with Adam Levin
Easy Prey15 Sep 2021

Preventing Identity Theft with Adam Levin

At some point in our life we will encounter a cyber intrusion, either through somewhere we have done business or because we are targeted as an individual. It is important to know how to prevent identity theft as well as how to respond if you've already been compromised.

Today's guest is Adam Levin. As a graduate of Stanford University and the University of Michigan School of Law, Adam Levin is a nationally recognized expert on cybersecurity, privacy, identity theft, fraud, and personal finance. He is an author and the former director of the New Jersey Division of Consumer Affairs. Levin is the chairman and founder of Cyber Scout and co-founded Credit.com. He has been featured in the New York TImes, Associated Press, Wall Street Journal, The Los Angeles Times, USA Today, and The Chicago Tribune. In addition to that, he has appeared on The Today Show, Good Morning America, CBS Evening News, CNBC, MSN, and many others.

Show Notes:
  • [1:14] - Adam shares his background and education in law and politics.
  • [2:29] - In 2003, Adam created an Identity Theft company that later became a global business called Cyber Scout.
  • [4:49] - Adam believes that security breaches are a certainty of life these days.
  • [6:35] - While hacking has been around for a long time, Adam shares how he got into the business of identity theft protection.
  • [8:36] - Over time, insurance companies have come to be support in identity theft.
  • [10:01] - Chris shares a scenario of a friend that had their identity stolen.
  • [12:23] - Many victims feel like they were in the wrong when in reality they may not have done anything wrong at all.
  • [13:56] - In recent years, the IRS has been a lot more proactive.
  • [16:02] - What is Adam's definition of identity theft?
  • [19:01] - Adam explains why you should be vetting your vendor as well.
  • [21:13] - There are four kinds of threat actors - state sponsored, for-profit, cause-related, and "because I can."
  • [23:29] - Social engineering is the most successful method of identity theft.
  • [25:42] - Adam wrote the book Swiped and explains that there needs to be a new framework around mitigating the threat of identity theft.
  • [26:32] - How do we minimize your risk of exposure? This is very difficult.
  • [27:46] - Two factor authorization is extremely helpful in protection.
  • [28:41] - Always verify that the person you're speaking to is who you think they are.
  • [30:12] - How can you monitor everything on your accounts and reports?
  • [31:37] - One of the ways credit card numbers are sold on the dark web is by zip code which causes many banks to miss fraudulent use.
  • [32:51] - The third "M" is to manage the damage. What can you do after an incident?
  • [34:05] - Identity theft protection programs are relatively inexpensive.
  • [37:01] - You can set the threshold for when you are notified. But you should choose to be notified of any purchase, even the really small ones.
  • [38:50] - How do banks know when there's a fraudulent charge?
  • [40:38] - There are features where you can lock the use of your card before having to change account numbers.
  • [42:33] - The best protector of your portfolios, including your identity, is you the consumer.
  • [44:37] - Adam describes his new podcast called What the Hack.
  • [50:23] - Remember that many people are not who they claim to be.

Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

Links and Resources:

Episoder(321)

Art Heists

Art Heists

The world of art theft looks glamorous in the movies, but the reality is far more complicated. From multi-million dollar forgery schemes to undercover FBI operations recovering stolen national treasur...

29 Apr 37min

The Power of Prediction

The Power of Prediction

We make predictions all the time including about the weather, about traffic, about what someone is going to say next. It feels natural, even rational. But when algorithms start making predictions abou...

22 Apr 39min

Privacy vs Reality

Privacy vs Reality

Online security advice often sounds simple until you actually try to follow it. Between password managers, privacy settings, and data brokers, protecting yourself can start to feel like a full-time jo...

15 Apr 58min

Wired to Trust

Wired to Trust

It's easy to think scams only work when someone misses something obvious. In reality, most of them don't look obvious at the start. They show up as normal situations with just enough friction to notic...

8 Apr 41min

Intimate Partner Fraud

Intimate Partner Fraud

Most scams leave a digital trail. A fake email, a spoofed number, a fraudulent website. You can trace them, report them, sometimes even reverse them. But what happens when the scam has no digital trai...

1 Apr 45min

Identity without Passwords

Identity without Passwords

Every day, employees at hotels, restaurants, and resorts across the country are doing exactly what they were hired to do: being warm, responsive, and eager to help. It's what makes hospitality work. I...

25 Mar 38min

When Cybercrime Gets Personal

When Cybercrime Gets Personal

Most security breaches don't begin with sophisticated code or elaborate technical exploits. They begin with a phone call, a convincing email, or someone at a help desk who just wanted to be helpful. T...

18 Mar 45min

Stopping Phone Scams

Stopping Phone Scams

Phone scams get dismissed as background noise or just annoying interruptions and unknown numbers with robotic voices we learn to ignore. But behind that noise is an industry built on psychology, autom...

11 Mar 45min

Populært innen Politikk og nyheter

giver-og-gjengen-vg
aftenpodden
aftenpodden-usa
forklart
popradet
stopp-verden
fotballpodden-2
rss-gukild-johaug
lydartikler-fra-aftenposten
nokon-ma-ga
det-store-bildet
hanna-de-heldige
dine-penger-pengeradet
rss-ness
rss-espen-lee-usensurert
aftenbla-bla
e24-podden
rss-dannet-uten-piano
rss-penger-polser-og-politikk
frokostshowet-pa-p5