Fact Sheets
Videos
Apps & Tools
Contact
Social Media

IDCARE FACT SHEETS

IDCARE Fact Sheets help you to learn how to prepare, prevent, detect and respond. This is where IDCARE prescribes and offers immediate treatment for identity theft and other cyber related issues.
Engaging Credit Reporting Agencies
Credit Reports - Australia
Credit Reports - Australia

A point in time snapshot of what credit related transactions you have made.

VIEW FACT SHEET
Credit Bans - Australia
Credit Bans - Australia

When a ban is put in place it basically ‘freezes’ access to your credit files.

VIEW FACT SHEET
Suppressions - New Zealand
Suppressions - New Zealand

When a suppression is put in place it basically ‘freezes’ access to your credit file.

VIEW FACT SHEET
Credit Reports - New Zealand
Credit Reports - New Zealand

A credit report is a point in time snapshot of what credit related transactions you have made.

VIEW FACT SHEET
Credit Reporting Agencies
Credit Reporting Agencies

A credit reporting agency is a private company that collects data and maintains historical information.

VIEW FACT SHEET
Tips for Business
Ransomware & Mobile Phones

Ransomware targeting mobile phones is an emerging trend internationally.

VIEW FACT SHEET
Understanding Patching

A patch is a piece of software designed to update a computer program.

VIEW FACT SHEET
Data Breaches and You

A data breach is the unauthorised disclosure or loss of personally identifiable information.

VIEW FACT SHEET
Employment Scams

Employment Scams are designed to recruit unsuspecting individuals to launder money.

VIEW FACT SHEET
Small Business & Ransomware

Ransomware is software designed to infiltrate and remotely lock your device.

VIEW FACT SHEET
Credentials and Identity Fraud
Physical Theft of Credentials

Identity theft is a type of fraud that involves the theft of someone’s personal information.

VIEW FACT SHEET
Mobile Porting/Sim Swap

Criminals attempt to gain ownership of mobile numbers in order to access online accounts.

VIEW FACT SHEET
Understanding Identity Theft

Identity theft is a type of fraud that involves the compromise of identifying information.

VIEW FACT SHEET
Theft of your Identity Documents

Identity theft is a type of fraud that involves the theft of someone’s personal information.

VIEW FACT SHEET
Scam Prevention and Education
Cold call & automated message scams

Have you received a cold call or automated voice message recently?

VIEW FACT SHEET
Manadrin phone scam

Have you received a call from someone speaking in Mandarin?

VIEW FACT SHEET
SMS Scam Purporting to be Australia Post or another provider

SMS Scam Purporting to be Australia Post or another provider

VIEW FACT SHEET
Telephone Scams

The most prolific form of identity compromise currently impacting the community.

VIEW FACT SHEET
Employment Scams

Employment Scams are designed to recruit unsuspecting individuals to launder money.

VIEW FACT SHEET
Engaging Organisations
Engaging Service Providers - Image of cyber/web background with contact icons
Engaging Service Providers

Service providers are organisation that transact with your identity information.

view fact sheet
www.cyber.gov.au and the Police

www.cyber.gov.au or the Police? Which one to report the compromise of personal information?

view fact sheet
Dealing with Debt Collectors

Debt collectors work to collect debts on the behalf of business and government.

view fact sheet
Credit Reporting Agencies

A credit reporting agency is a private company that collects data and maintains historical information.

view fact sheet
Social Media
Image Exploitation

Image exploitation is when an individual’s image is used without their knowledge or consent.

view fact sheet
Instagram Security

Instagram is a social networking app made for sharing photos and videos from a smartphone.

view fact sheet
Linkedin Security

LinkedIn is a social tool for individuals interested in developing their professional network.

view fact sheet
Twitter Security

Twitter is a virtual and public forum used by individuals, groups and businesses.

view fact sheet
Facebook Security

Facebook give users the option to enable email or login notifications.

view fact sheet
Your Rights
Data Breaches and You

A data breach is the unauthorised disclosure or loss of personally identifiable information.

view fact sheet
Dealing with Debt Collectors

Debt collectors work to collect debts on the behalf of business and government.

view fact sheet
Knowing your privacy rights

We all have rights in relation to the protection of personal information.

view fact sheet
Devices and Technology
Understanding Patching

A patch is a piece of software designed to update a computer program.

VIEW FACT SHEET
Protecting Network Accessed & Other Storage Devices

It’s good cyber security practice to backup your data and files.

VIEW FACT SHEET
Cyberbullying & Cyberstalking

This is exploitation of the online environment to harass, intimidate or threaten someone.

VIEW FACT SHEET
iPhone Security

iPhones are commonly viewed as being more secure than Android devices.

VIEW FACT SHEET
Ransomware & Mobile Phones

Ransomware targeting mobile phones is an emerging trend internationally.

VIEW FACT SHEET
Safely Shopping Online

Online shopping has made the shopping experience more efficient and more accessible.

VIEW FACT SHEET
Understanding Cryptocurrency

Cryptocurrencies such as Bitcoin or Ethereum are digital currencies.

VIEW FACT SHEET
Mobile Porting/Sim Swap

Criminals attempt to gain ownership of mobile numbers in order to access online accounts.

VIEW FACT SHEET
Understanding Ransomware

Ransomware is a form of malware (a virus) that encrypts files.

VIEW FACT SHEET
Image Exploitation

Image exploitation is when an individual’s image is used without their knowledge or consent.

VIEW FACT SHEET
Instagram Security

Instagram is a social networking app made for sharing photos and videos from a smartphone.

VIEW FACT SHEET
Linkedin Security

LinkedIn is a social tool for individuals interested in developing their professional network.

VIEW FACT SHEET
Twitter Security

Twitter is a virtual and public forum used by individuals, groups and businesses.

VIEW FACT SHEET
Small Business & Ransomware

Ransomware is software designed to infiltrate and remotely lock your device.

VIEW FACT SHEET
Facebook Security

Facebook give users the option to enable email or login notifications.

VIEW FACT SHEET

CONTACT US

IDCARE is here to provide you with specialist support and guidance when faced with a cyber and identity related issue. Contact one of our Identity & Cyber Security Case Managers to learn more about our Support Services and how we can help you.   
Call Centre Icon

Call our AUSTRALIAn
NATIONAL CASE MANAGEMENT CENTRE

1800 595 160

Mon - Fri: 8am - 5pm AEST

QLD: 07 3555 5900
ACT & NSW: 02 8999 3356
VIC: 03 7018 2366
NT, SA & WA08 7078 7741

Call Centre Icon

call our NEW ZEALAND
NATIONAL CASE MANAGEMENT CENTRE

0800 121 068

Mon - Fri: 10am - 7pm NZST

AKL: 09 884 4440