IDCARE FACT SHEETS

IDCARE Fact Sheets help you to learn how to prepare, prevent, detect and respond. This is where IDCARE prescribes and offers immediate treatment for identity theft and other cyber related issues.
Engaging Credit Reporting Agencies
Suppressions - New Zealand
Suppressions - New Zealand

When a suppression is put in place it ‘freezes’ access to your credit file.

VIEW FACT SHEET
Credit Reporting Agencies
Credit Reporting Agencies

A credit reporting agency collects data and maintains historical information.

VIEW FACT SHEET
Credit Reports - New Zealand
Credit Reports - New Zealand

A credit report is a point in time snapshot of what credit related transactions you have made.

VIEW FACT SHEET
Credit Bans - Australia
Credit Bans - Australia

When a ban is put in place it ‘freezes’ access to your credit files.

VIEW FACT SHEET
Credit Reports - Australia
Credit Reports - Australia

A credit report is a point in time snapshot of what credit related transactions you have made.

VIEW FACT SHEET
Tips for Business
No items found.
Credentials and Identity Fraud
Physical Theft of Credentials

Lost or stolen credentials may put you at risk of identity theft.

VIEW FACT SHEET
Understanding Identity Theft

Identity theft is a type of fraud that involves the use of your personal information.

VIEW FACT SHEET
Scam Prevention and Education
Travel Visa Scams

Apply for a travel visa safely

VIEW FACT SHEET
Caller ID Spoofing

Learn how scammers disguise their numbers to appear more legitimate.

VIEW FACT SHEET
Investment Scams

Is this investment too good to be true?

VIEW FACT SHEET
Telephone Scams

When criminals come calling.

VIEW FACT SHEET
Remote Access Scams

Have you had a call from someone who asked you to download and install programs to your device recently?

VIEW FACT SHEET
Mandarin phone scam

Have you received a call from someone speaking in Mandarin?

VIEW FACT SHEET
SMS Scams

Should I click the link?

VIEW FACT SHEET
Safely Shopping Online

Online shopping has made the shopping experience more efficient and more accessible.

VIEW FACT SHEET
Employment Scams

Employment Scams recruit unsuspecting individuals to launder money for organised crime.

VIEW FACT SHEET
Cold call & automated message scams

Have you received a cold call or automated voice message recently?

VIEW FACT SHEET
Data breaches and scam risks

Don’t let an organisation’s breach become your scam!

VIEW FACT SHEET
Relationship Scams

Relationship Scams involve a person developing a relationship with an individual they believe is real and genuine.

VIEW FACT SHEET
Engaging Organisations
Reporting Cyber and Identity Crimes in Australia

Should I report this to the Police, AFP or ReportCyber?

view fact sheet
Engaging Service Providers - Image of cyber/web background with contact icons
Engaging Service Providers

Service providers are organisations that transact with your identity information.

view fact sheet
Dealing with Debt Collectors

Debt collectors work to collect debts on the behalf of business and government.

view fact sheet
Credit Reporting Agencies

A credit reporting agency collects data and maintains historical information.

view fact sheet
Social Media
WhatsApp Security

Avoid a hacked WhatsApp account

view fact sheet
Cyberbullying & Cyberstalking

This is exploitation of the online environment to harass, intimidate or threaten someone.

view fact sheet
Image Exploitation

Image exploitation is when an individual’s image is used without their knowledge or consent.

view fact sheet
Instagram Security

Instagram is a social networking app made for sharing photos and videos.

view fact sheet
Linkedin Security

LinkedIn is a social media tool for individuals interested in developing their professional network.

view fact sheet
Twitter Security

Twitter is a virtual and public forum used by individuals, groups and businesses.

view fact sheet
Facebook Security

Keep your personal and business Facebook accounts secure.

view fact sheet
Your Rights
Data Breaches and You

A data breach is the unauthorised disclosure or loss of personally identifiable information.

view fact sheet
Dealing with Debt Collectors

Debt collectors work to collect debts on the behalf of business and government.

view fact sheet
Knowing your privacy rights

We all have rights in relation to the protection of personal information.

view fact sheet
Devices and Technology
Caller ID Spoofing

Learn how scammers disguise their numbers to appear more legitimate.

VIEW FACT SHEET
Password Managers

What is a Password Manager?

VIEW FACT SHEET
Understanding Cryptocurrency

Cryptocurrencies such as Bitcoin or Ethereum are digital currencies.

VIEW FACT SHEET
Mobile Porting/Sim Swap

Criminals attempt to gain ownership of mobile numbers in order to access online accounts.

VIEW FACT SHEET
Understanding Patching

A patch is a piece of software designed to update a computer program.

VIEW FACT SHEET
Gmail account security

Find out how to keep your Gmail account safe, and what do if something goes wrong.

VIEW FACT SHEET
Ransomware & Small Businesses

Ransomware is a form of malware (a virus) that encrypts files.

VIEW FACT SHEET
Ransomware & Mobile Phones

Ransomware targeting mobile phones is an emerging trend internationally.

VIEW FACT SHEET
Protecting Network Accessed & Other Storage Devices

It’s good cyber security practice to backup your data and files.

VIEW FACT SHEET
iPhone Security

iPhones are commonly viewed as being more secure than Android devices.

VIEW FACT SHEET
Small Business and Sole Traders
Popular Events Affecting Small Businesses in Australia

Here are a variety of popular events currently affecting small businesses in Australia.

VIEW FACT SHEET
Web Security for Small Business

For small businesses, having a secure website is not just about maintaining a professional image—it is essential for protecting your business and your customers.

VIEW FACT SHEET
Security Awareness Training for Small Business Staff

Providing cybersecurity awareness training for employees is important for ensuring that they have the necessary knowledge and understanding of security best practices to safeguard the business from cyber-related risks and threats.

VIEW FACT SHEET
What to do if your business has been breached

A small business is defined under the Privacy Act 1988 (Cth) as one which has an annual turnover of less than 3 million Australian dollars.

VIEW FACT SHEET
What to do when your employees are being impersonated

Scammers can benefit from impersonating employees or managers of small businesses to trick legitimate employees into providing sensitive information, transferring money, and/or granting access to a business’s systems or network.

VIEW FACT SHEET
What to do when your business is impersonated

Scammers often impersonate businesses to appear more legitimate and trustworthy, resulting in scams that are harder to detect.

VIEW FACT SHEET
Ransomware and Small Business

Ransomware is a form of malware (a computer virus) that encrypts files.

VIEW FACT SHEET
Email Security for Small Businesses

Cyber threats are constantly evolving, and a compromised email can lead to data breaches, reputational damage, and financial loss.

VIEW FACT SHEET
Social media security for small businesses

Social media is often seen as an attractive target for scammers. Social media account details may be phished, leading to impersonation and other misuse.

VIEW FACT SHEET
Bring Your Own Device (BYOD)

The recent increase in remote and hybrid working arrangements has resulted in a significant increase in the use of BYOD.

VIEW FACT SHEET
Data Storage and Backup for Small Businesses

Secure data storage and regular backups are essential for protecting your business from cyber threats and unexpected disruptions.

VIEW FACT SHEET
Offboarding Employees for Small Businesses

Properly managing the offboarding process is crucial to ensure a smooth transition and protect your business from risks.

VIEW FACT SHEET
Malware and Small Business

Malware is software that has been built for malicious purposes.

VIEW FACT SHEET

CONTACT US

IDCARE is here to provide you with specialist support and guidance when faced with a cyber and identity related issue. Contact one of our Identity & Cyber Security Case Managers to learn more about our Support Services and how we can help you.   

Get help
ONLINE FORM

Submit a web request

Call Centre Icon

Call our AUSTRALIAn
NATIONAL CASE MANAGEMENT CENTRE

1800 595 160

Mon - Fri: 8am - 5pm AEST

QLD: 07 3555 5900
ACT & NSW: 02 8999 3356
VIC: 03 7018 2366
NT, SA & WA08 7078 7741

Call Centre Icon

call our NEW ZEALAND
NATIONAL CASE MANAGEMENT CENTRE

0800 121 068

Mon - Fri: 10am - 7pm NZST

AKL: 09 884 4440