Fact Sheets
Videos
Apps & Tools
Contact
Social Media

IDCARE FACT SHEETS

IDCARE Fact Sheets help you to learn how to prepare, prevent, detect and respond. This is where IDCARE prescribes and offers immediate treatment for identity theft and other cyber related issues.
Engaging Credit Reporting Agencies
Credit Reporting Agencies
Credit Reporting Agencies

A credit reporting agency is a private company that collects data and maintains historical information.

VIEW FACT SHEET
Credit Reports Australia
Credit Reports Australia

A point in time snapshot of what credit related transactions you have made.

VIEW FACT SHEET
Credit Bans - Australia
Credit Bans - Australia

When a ban is put in place it basically ‘freezes’ access to your credit file.

VIEW FACT SHEET
Credit Reports - New Zealand
Credit Reports - New Zealand

A credit report is a point in time snapshot of what credit related transactions you have made.

VIEW FACT SHEET
Suppressions - New Zealand
Suppressions - New Zealand

When a suppression is put in place it basically ‘freezes’ access to your credit file.

VIEW FACT SHEET
Scam Prevention and Education
Employment Scams

Employment Scams are designed to recruit unsuspecting individuals to launder money for criminal.

VIEW FACT SHEET
Physical Theft of Credentials

Identity theft is a type of fraud that involves the theft of someone’s personal information.

VIEW FACT SHEET
Telephone Scams

The most prolific form of identity compromise currently impacting the community are telephone scams.

VIEW FACT SHEET
Understanding Identity Theft

Identity theft is a type of fraud that involves the compromise of identifying information.

VIEW FACT SHEET
Theft of your Identity Documents

Identity theft is a type of fraud that involves the theft of someone’s personal information.

VIEW FACT SHEET
Engaging Organisations
Engaging Service Providers

Service providers are organisation that transact with your identity information.

view fact sheet
ACORN and the Police

ACORN or the Police? Which one to report the compromise of personal information?

view fact sheet
Dealing with Debt Collectors

Debt collectors work to collect debts on the behalf of business and government.

view fact sheet
Credit Reporting Agencies

A credit reporting agency is a private company that collects data and maintains historical information.

view fact sheet
Social Media
Image Exploitation

Image exploitation is when an individual’s image is used without their knowledge or consent.

view fact sheet
Instagram Security

Instagram is a social networking app made for sharing photos and videos from a smartphone.

view fact sheet
Linkedin Security

LinkedIn is a social tool for individuals interested in developing their professional network.

view fact sheet
Twitter Security

Twitter is a virtual and public forum used by individuals, groups and businesses.

view fact sheet
Facebook Security

Facebook give users the option to enable email or login notifications.

view fact sheet
Your Rights
Data Breaches and You

A data breach is the unauthorised disclosure or loss of personally identifiable information.

view fact sheet
Dealing with Debt Collectors

Debt collectors work to collect debts on the behalf of business and government.

view fact sheet
Knowing your privacy rights

We all have rights in relation to the protection of personal information.

view fact sheet
Devices and Technology
Understanding Cryptocurrency

Cryptocurrencies such as Bitcoin or Ethereum are digital currencies in which ‘coins’ are exchanged for goods and services via the internet.

VIEW FACT SHEET
Safely Shopping Online

Online shopping has made the shopping experience more efficient and more accessible.

VIEW FACT SHEET
Ransomware & Mobile Phones

Ransomware targeting mobile phones is an emerging trend internationally that is presently targeting the Android phone market.

VIEW FACT SHEET
iPhone Security

iPhones are commonly viewed as being more secure than Android devices when it comes to hacking and viruses.

VIEW FACT SHEET
Cyberbullying & Cyberstalking

This is exploitation of the online environment to harass, intimidate or threaten someone.

VIEW FACT SHEET
Understanding Patching

A patch is a piece of software designed to update a computer program or it’s supporting data to enhance performance

VIEW FACT SHEET
Understanding Ransomware

Ransomware is a form of malware (a virus) that encrypts files, or denies the user the ability to access their device.

VIEW FACT SHEET
Image Exploitation

Image exploitation is when an individual’s image is used without their knowledge or consent.

VIEW FACT SHEET
Instagram Security

Instagram is a social networking app made for sharing photos and videos from a smartphone.

VIEW FACT SHEET
Linkedin Security

LinkedIn is a social tool for individuals interested in developing their professional network.

VIEW FACT SHEET
Twitter Security

Twitter is a virtual and public forum used by individuals, groups and businesses.

VIEW FACT SHEET
Small Business & Ransomware

Ransomware is software designed to infiltrate and remotely lock your device or network until your pay a fee.

VIEW FACT SHEET
Mobile Porting/Sim Swap

Criminals attempt to gain ownership of mobile numbers in order to access online accounts.

VIEW FACT SHEET
Facebook Security

Facebook give users the option to enable email or login notifications.

VIEW FACT SHEET
Tips for Business
Ransomware & Mobile Phones

Ransomware targeting mobile phones is an emerging trend internationally that is presently targeting the Android phone market.

VIEW FACT SHEET
Understanding Patching

A patch is a piece of software designed to update a computer program or it’s supporting data to enhance performance

VIEW FACT SHEET
Data Breaches and You

A data breach is the unauthorised disclosure or loss of personally identifiable information.

VIEW FACT SHEET
Employment Scams

Employment Scams are designed to recruit unsuspecting individuals to launder money for criminal.

VIEW FACT SHEET
Small Business & Ransomware

Ransomware is software designed to infiltrate and remotely lock your device or network until your pay a fee.

VIEW FACT SHEET

Success Stories!

CONTACT IDCARE

IDCARE is here to provide you with specialist support and guidance when faced with a cyber and  identity related issue. Contact one of our Identity & Cyber Security Counsellors to learn more about our Support Services and how we can help you.   

AUSTRALIA

1300 432 273
Mon - Fri : 8am - 5pm AEST

NEW ZEALAND

0800 201 415
Mon - Fri: 10am - 7pm NZST