Skip to the main content.
FAQs

Frequently asked questions.

Videos

Instructional videos about Horizon and working with our solutions.

Downloads

Helpful downloads and eBooks to empower your business.

Tax & HR Alerts

Helpful tax and HR alerts to help keep your business compliant.

Forms & Documents

Payroll and tax-related forms and documents.

Blog

Horizon's blog provides valuable insight into payroll, compliance, human resources, and more.

Success Stories

See our client success stories for a case study on how we can help your business.

Featured blog post

How Long Should Employee Onboarding Take

Featured blog post

Tips For Success With Seasonal Employees

Our Team

Payroll and HR strategy requires intelligent technology, personal attention and specialized expertise in the needs and nuances of your business. 

Clients & Industries

We provide payroll and tax processing services for businesses from 1 to 1,000 employees or more. Today, we have nearly 1,000 customers in 40 states.

2 min read

The Real Costs of Identity Theft

Identity theft happens. According to the 2015 Identity Fraud Study, $16 billion was stolen from 12.7 million U.S. consumers in 2014. But how is all this identity theft happening? Where is it happening? The answers may surprise you.

Common Types

Let's start with the most common types of identity theft. According to the Federal Trade Commission (FTC), they are:

  • Government documents/tax-related identity theft
  • Credit card fraud
  • Phone/utilities fraud

Government documents fraud accounts for nearly 40% of all identity theft. Most government documents fraud is tax-related, and it's on the rise. Between 2013 and 2014, the number of complaints to the FTC regarding IRS impostors increased by 2300%! Tax-related identity theft occurs when someone files a fraudulent return in someone else's name in order to obtain the refund. Most victims don't find out they've been duped until they're notified by the IRS. The IRS Identity Theft page offers some advice for avoiding tax-related identity theft and what to do if you've been had.

We're all probably more familiar with the second most prevalent form of identity theft, credit card fraud. This can range from a thief simply using your credit card number to an elaborate scam where thieves set up entire accounts using your personal information. Victims often don't find out about the latter until they receive the bills or a negative credit report. 

Phone or other utilities fraud occurs when a thief sets up a phone, electric or other utilities account using someone else's stolen personal information. When the thieves don't pay the bills, the utility companies come after you.

keyboard-628703_1280.jpg

How Theft Happens

How do thieves access the information they need to steal your identity? Their methods range from basic to pure technological genius. According to the Center for Identity Management and Information Protection, top methods (and the ways to thwart them) include:

  • Dumpster diving. When thieves go through the right garbage, they find anything from junk mail to actual credit card or social security numbers. Be sure to shred everything with your contact information and account numbers.
  • Mail theft. Much cleaner than going through your garbage, the thief merely opens your mailbox. Be sure to grab your mail as soon as possible each day, and put a hold on your mail if you're out of town.
  • Skimming. This occurs when a thief plants a device within a credit or debit card reader, often at a gas station or ATM. This device transmits your credit card information directly to the thieves. Stay in the know - be sure to keep an eye on your credit reports, check your credit card statements as often as possible and use a monitoring service. If you notice anything strange, report it immediately.
  • Phishing. Ever gotten an email from your bank or another merchant asking for your personal information or credit card number? It was most likely a phishing attempt, which is when a thief attempts to gain information by posing as a legitimate inquirer. Legitimate organizations will never ask for your passwords or other information via email, so mark these as spam and move on.
  • Vishing. Similar to phishing, vishing is when a thief attempts to elicit your information verbally, usually by phone. Again, legitimate organizations will never call you and ask for personal information. If you receive a vishing call, report it to the FTC.

Prevent It

Now we know what identity theft is and how it occurs. What else can we do to prevent it? Whatever it takes! Financial guru Dave Ramsey estimates it takes 600 hours to clean up after an identity theft. 600 hours!

As previously mentioned, always shred. Regularly check your credit reports. Subscribe to a credit monitoring service, such as LifeLock. Be proactive about your mail. Did I mention shred?

If it's too late, the Federal Trade Commission recommends you follow these steps to repair the damage:

  1. Call the companies where you know the fraud occurred
  2. Place a fraud alert
  3. Obtain your credit report
  4. Report the theft to the FTC
  5. File a police report with your local police department

Do you have an identity theft story? We sure hope not but if so, feel free to share your story in the comments section.

 

 LifeLock Protection

 

 

 

Identify Theft - Protect Yourself and Your Employees

3 min read

Identify Theft - Protect Yourself and Your Employees

Identify theft is a problem we've been hearing about for years. Maybe it's happened to you or someone you know. But just how big is the problem these...

Read More
It’s Phishing Season: Don’t Take the Bait

5 min read

It’s Phishing Season: Don’t Take the Bait

We've blogged on phishing before, but it's time for a refresh. In 2017 the IRS received approximately 900 complaints about phishing and suspected...

Read More
W-2 Phishing Scam Targets Small Businesses, Schools and Others

5 min read

W-2 Phishing Scam Targets Small Businesses, Schools and Others

As if you need one more thing to worry about this time of year, the IRS has issued an urgent alert regarding phishing scams. These scams target...

Read More