Latest news with #IdentityTheft


Medical News Today
04-08-2025
- Business
- Medical News Today
What to know about beneficiary notice codes (BNCs)
Historically, the Social Security Administration (SSA), Medicare, and other organizations have used Social Security numbers (SSNs) as personal identifiers. However, in recent years, some people have raised concerns about individual privacy and identity concerns have led many organizations to discontinue using SSNs as personal identifiers on statements and other is a BNC? A beneficiary notice code or beneficiary notice control number (BNC) is a 13-character encrypted alphanumeric code that helps organizations like the SSA and the Centers for Medicare & Medicaid Services (CMS) identify the notice and the beneficiary, helping to eliminate the use of 2018, the SSA and other agencies began replacing SSNs with BNCs on notices and mailings. The CMS also began using BNCs on benefit verification letters. »Learn more: How Medicare and Social Security work togetherWhere can I find my BNC?The SSA may request a person's BNC if the person contacts the SSA for specific reasons, such as a change in estimated earnings or a change to direct deposit can find their BNC on any letter the SSA sends them about their when a person contacts Medicare, they may need their Medicare number, not their BNC. However, any statements or mailings that used to have SSNs on them may now have BNCs instead.»Learn more: How to find your Medicare number Medicare resourcesFor more resources to help guide you through the complex world of medical insurance, visit our Medicare hub.


Phone Arena
14-07-2025
- Business
- Phone Arena
T-Mobile users should update settings if they don't want sensitive info to be shared with other firms
T-Mobile has added two privacy toggles to settings and they may rub some users the wrong way. T-Mobile 's "Privacy Center" now features new toggles that are turned on by default, per The Mobile Report . The first is called "Fraud and identity theft protection," and it uses your information to prevent fraud. The company explains that it uses your data, such as account information and activity, communication patterns, and interactions with sketchy URLs, to identify fraudulent activity and shares indicators of fraud with other companies you have an account with to stop unauthorised transactions from going through. T-Mobile now creates indicators of financial fraud and shares them with other companies. | Image Credit - The Mobile Report One example given by T-Mobile is when your bank might inquire about any changes to your contact information to help it flag fraudulent transactions. It's hard to come up with other use cases for this toggle beyond anything involving payments, but all things considered, it doesn't look like having this toggle enabled will put you at risk. The other toggle is a bit worrying, though. It's called "Sharing certain financial information," and if it's turned on, it will permit T-Mobile to share any financial data it has on you, including payment history and account balance, with other companies for marketing and business purposes. T-Mobile will also share your financial information with other companies. | Image Credit - The Mobile Report Financial information is some of the most sensitive information, and it can be misused to profile you or impersonate you, among other things. That's why, most people will not want T-Mobile to share this information with other companiesIf you want to turn these toggles off, launch the T-Life app, navigate to the Manage tab, tap the gear icon at the top right, and select "Privacy & policies". After that, go to "Privacy dashboard". You can alternatively visit the Privacy Center on T-Mobile 's website. You'll have to select the brand you use and sign in if you haven't already. You will then be directed to the main dashboard, which will have most of the opt-out toggles. You will have to turn off each of the toggles separately, and that too for each line. While you are tinkering with these settings, you might also want to check out the "Manage Do Not Sell or Share" and "Update marketing preferences" buttons to make sure everything is to your liking. While T-Mobile might have introduced the new settings to improve the user experience, they should have been opt-in by default, instead of the other way around. Even though it's commendable that the process to disable the toggles is pretty straightforward, T-Mobile should let users decide if they want to enable them. Secure your connection now at a bargain price! We may earn a commission if you make a purchase Check Out The Offer


Fast Company
10-07-2025
- Fast Company
Data privacy is failing. Here's what encryption and MFA can (and can't) do
Cybersecurity and data privacy are constantly in the news. Governments are passing new cybersecurity laws. Companies are investing in cybersecurity controls such as firewalls, encryption, and awareness training at record levels. And yet, people are losing ground on data privacy. In 2024, the Identity Theft Resource Center reported that companies sent out 1.3 billion notifications to the victims of data breaches. That's more than triple the notices sent out the year before. It's clear that despite growing efforts, personal data breaches are not only continuing, but accelerating. What can you do about this situation? Many people think of the cybersecurity issue as a technical problem. They're right: Technical controls are an important part of protecting personal information, but they are not enough. As a professor of information technology, analytics, and operations at the University of Notre Dame, I study ways to protect personal privacy. Solid personal privacy protection is made up of three pillars: accessible technical controls, public awareness of the need for privacy, and public policies that prioritize personal privacy. Each plays a crucial role in protecting personal privacy. A weakness in any one puts the entire system at risk. The first line of defense Technology is the first line of defense, guarding access to computers that store data and encrypting information as it travels between computers to keep intruders from gaining access. But even the best security tools can fail when misused, misconfigured, or ignored. Two technical controls are especially important: encryption and multifactor authentication (MFA). These are the backbone of digital privacy—and they work best when widely adopted and properly implemented. Encryption uses complex math to put sensitive data in an unreadable format that can only be unlocked with the right key. For example, your web browser uses HTTPS encryption to protect your information when you visit a secure webpage. This prevents anyone on your network—or any network between you and the website—from eavesdropping on your communications. Today, nearly all web traffic is encrypted in this way. But if we're so good at encrypting data on networks, why are we still suffering all of these data breaches? The reality is that encrypting data in transit is only part of the challenge. Securing stored data We also need to protect data wherever it's stored—on phones, laptops, and the servers that make up cloud storage. Unfortunately, this is where security often falls short. Encrypting stored data, or data at rest, isn't as widespread as encrypting data that is moving from one place to another. While modern smartphones typically encrypt files by default, the same can't be said for cloud storage or company databases. Only 10% of organizations report that at least 80% of the information they have stored in the cloud is encrypted, according to a 2024 industry survey. This leaves a huge amount of unencrypted personal information potentially exposed if attackers manage to break in. Without encryption, breaking into a database is like opening an unlocked filing cabinet—everything inside is accessible to the attacker. Multifactor authentication is a security measure that requires you to provide more than one form of verification before accessing sensitive information. This type of authentication is more difficult to crack than a password alone because it requires a combination of different types of information. It often combines something you know, such as a password, with something you have, such as a smartphone app that can generate a verification code or with something that's part of what you are, like a fingerprint. Proper use of multifactor authentication reduces the risk of compromise by 99.22%. While 83% of organizations require that their employees use multifactor authentication, according to another industry survey, this still leaves millions of accounts protected by nothing more than a password. As attackers grow more sophisticated and credential theft remains rampant, closing that 17% gap isn't just a best practice—it's a necessity. Multifactor authentication is one of the simplest, most effective steps organizations can take to prevent data breaches, but it remains underused. Expanding its adoption could dramatically reduce the number of successful attacks each year. Awareness gives people the knowledge they need Even the best technology falls short when people make mistakes. Human error played a role in 68% of 2024 data breaches, according to a Verizon report. Organizations can mitigate this risk through employee training, data minimization—meaning collecting only the information necessary for a task, then deleting it when it's no longer needed—and strict access controls. Policies, audits, and incident response plans can help organizations prepare for a possible data breach so they can stem the damage, see who is responsible and learn from the experience. It's also important to guard against insider threats and physical intrusion using physical safeguards such as locking down server rooms. Public policy holds organizations accountable Legal protections help hold organizations accountable in keeping data protected and giving people control over their data. The European Union's General Data Protection Regulation is one of the most comprehensive privacy laws in the world. It mandates strong data protection practices and gives people the right to access, correct, and delete their personal data. And the General Data Protection Regulation has teeth: In 2023, Meta was fined €1.2 billion (US$1.4 billion) when Facebook was found in violation. Despite years of discussion, the U.S. still has no comprehensive federal privacy law. Several proposals have been introduced in Congress, but none have made it across the finish line. In its place, a mix of state regulations and industry-specific rules—such as the Health Insurance Portability and Accountability Act for health data and the Gramm-Leach-Bliley Act for financial institutions —fill the gaps. Some states have passed their own privacy laws, but this patchwork leaves Americans with uneven protections and creates compliance headaches for businesses operating across jurisdictions. The tools, policies, and knowledge to protect personal data exist—but people's and institutions' use of them still falls short. Stronger encryption, more widespread use of multifactor authentication, better training, and clearer legal standards could prevent many breaches. It's clear that these tools work. What's needed now is the collective will—and a unified federal mandate—to put those protections in place.