Email

admin@documentsecuritysolutions.net

Parish Morris

Founder & President

The Fundamentals of Identity Theft

A stack of personal documents being shredded by a paper shredder

We explore how identity theft occurs and the most common tactics used by thieves. Understanding how personal information, like Social Security numbers and account numbers, is targeted helps us protect ourselves better.

Defining Identity Theft

Identity theft happens when someone uses another person’s private information without permission to commit fraud or other crimes. It involves misusing details such as Social Security numbers, bank account numbers, and other sensitive information. Thieves often use this data to open new lines of credit or make unauthorized purchases. This crime can ruin credit scores and cause financial loss.

We must remain vigilant about guarding our personal information. Safeguards like regularly checking account statements and shredding documents with sensitive information can help prevent theft. Keeping track of online data and being cautious about emails requesting personal details also mitigates risks.

Common Types and Methods

Identity thieves use various methods to steal information. Phishing scams are one popular technique, where fake emails trick us into providing personal information. Skimming involves capturing card details at ATM points using hidden devices.

Another common tactic is account takeover, where thieves obtain enough information to gain control over our financial accounts. Dumpster diving can uncover unshredded documents containing account numbers or other sensitive information. Protecting our digital and physical data is crucial in minimizing the threat of these methods.

Strategies for Preventing Identity Theft

A stack of papers being fed into a paper shredder, with the shredded pieces falling into a bin below

To protect ourselves from identity theft, we must be vigilant about our personal data, check our financial records regularly, and be aware of legal protections.

Safeguarding Sensitive Data

Keeping our sensitive information private is crucial. We should shred paper documents that contain personal details such as Social Security numbers, account numbers, and medical information. Shredding reduces the risk of dumpster diving—a common tactic used by thieves. Additionally, storing digital data securely requires using strong, unique passwords for each account.

Encrypting files and folders on our devices can add an extra layer of protection. Avoid sharing sensitive information over unsecured networks. Being mindful of phishing scams in emails and messages is also essential. If we don’t recognize a sender, we should avoid clicking on any links or downloading attachments.

Monitoring Financial Records

By regularly reviewing our financial records, we can catch suspicious activity early. Checking our bank statements, credit card bills, and credit reports allows us to spot unauthorized transactions or accounts. We can request free credit reports annually from major credit bureaus, which include Experian, Equifax, and TransUnion.

Enrolling in fraud alert services with these bureaus adds an extra security measure. Notifications about changes to our credit report can help us respond quickly. Additionally, setting up automatic alerts for our banking and credit card accounts lets us track activity more closely. If something doesn’t look right, we should report it immediately to our financial institution.

Understanding Legal Protections

Several laws exist to protect us from identity theft. The Fair and Accurate Credit Transactions Act (FACTA) gives us access to free yearly credit reports. It also helps us place fraud alerts on our credit files. The Health Insurance Portability and Accountability Act (HIPAA) protects our medical information, ensuring it remains private.

We should familiarize ourselves with these legal rights to take full advantage of them. Knowing about the legal assistance available can aid us if our identity is stolen. Being informed gives us the power to protect ourselves and pursue corrective measures more effectively if our personal information is compromised.

The Role of Paper Shredding in Identity Protection

A hand-operated paper shredder sits on a desk, surrounded by stacks of paper. Shredded strips of paper spill out of the machine onto the floor

Taking care of our sensitive documents by shredding them can drastically reduce the chances of identity theft. There are clear benefits to using a paper shredder, choosing the right one, and following best practices.

Benefits of Shredding Documents

Shredding documents helps keep our sensitive information secure. Credit card bills, bank statements, and personal letters can include details that thieves use for identity theft. By shredding them, we make it much harder for anyone to access our private data.

Recycling shredded paper can help the environment. Many communities accept shredded paper for recycling, so we can dispose of our documents responsibly. Local governments often provide guidelines on how to recycle shredded materials, allowing us to contribute to environmental conservation while staying secure.

Peace of mind is another significant benefit. Knowing that sensitive information is destroyed properly helps us feel more secure about our information. By regularly shredding documents, we’re actively reducing the risk of identity theft.

Selecting a Paper Shredder

Choosing the right paper shredder is crucial. Different shredders offer various levels of security, from strip-cut to cross-cut and micro-cut. Micro-cut shredders provide the highest level of document destruction, making it nearly impossible for thieves to put pieces back together.

Consider the volume of documents we need to shred. If we regularly dispose of large amounts, a high-capacity shredder may be beneficial. For typical household use, a smaller, less expensive model might suffice.

Shredders come with many features like jam-proof technology, quiet operation, and energy savings. Evaluating these can help us select a shredder that fits our needs and budget. A practical model will ensure we shred documents efficiently and securely.

Shredding Best Practices

Following industry best practices can maximize identity protection. We should make shredding part of our routine disposal process, ensuring that any document with personal information gets shredded. This habit reduces the chance of thieves getting hold of our sensitive documents.

It’s essential to store documents safely until they’re shredded. Keeping them in a secure area prevents unauthorized access. Once we’ve shredded everything, promptly recycle the shredded paper if applicable. This final step creates an extra layer of security and also helps the planet.

Proper maintenance of our shredder will ensure its effective operation for years to come. This includes regularly oiling the blades and clearing any jams promptly. Observing these best practices protects our information and keeps our shredder in top shape.

Proper Disposal of Sensitive Documents

Proper disposal of sensitive documents is crucial to protect personal and financial information. We must handle receipts, bank statements, and credit card applications with care. Utilizing shredding services can ensure secure destruction of these items.

Items Requiring Secure Destruction

We often receive many paper documents that contain confidential information. Receipts, bank statements, and insurance forms may contain sensitive data. It’s vital to destroy these documents to prevent identity theft.

Tax records should also be securely shredded once they are no longer needed. ATM receipts, credit card applications, and utility bills contain personal data. Destroying these offers peace of mind.

Properly handling credit cards before disposal is also important. Cutting through the magnetic strip, chip, and card number is recommended. This makes it impossible for someone to reconstruct the card information.

Employing Shredding Services

Choosing to use shredding services provides added security in disposing of documents. These services can handle large amounts of paper documents that need document shredding. This ensures complete destruction, which is often more reliable than personal methods.

Many shredding services offer various options, such as on-site or off-site shredding. On-site shredding allows us to witness the destruction of our documents. Off-site shredding involves secure transportation of documents to a facility.

Some shredding services offer scheduled pickups, making it easy and convenient. They help us manage and dispose of sensitive documents regularly, reducing the risk of keeping unnecessary confidential papers. By trusting professionals, we ensure the confidentiality of our information.

Technological Aids and Challenges in Identity Theft Prevention

In our modern world, tackling identity theft involves balancing both digital and physical elements. Technology offers tools like identity theft protection services, yet it presents new security challenges. We must study these differences to effectively protect our identity.

Digital versus Physical Security Threats

We face both digital and physical threats to our identity. Digital threats include online data breaches, phishing, and weak passwords. Hackers often target login credentials and personal information. To protect our identity, strong passwords and two-factor authentication are essential. Physical threats include stolen mail or discarded documents without paper shredding.

On the digital side, we need to be careful with how we share information online. Public Wi-Fi can expose us to data theft. Encryption and using a VPN can help secure our data. Taking steps to protect both our physical and digital data is crucial to stay secure.

Leveraging Identity Theft Protection Services

Identity theft protection services offer several tools to shield us from threats. Many services monitor credit reports, alerting us of suspicious activity. They may also keep an eye on the dark web for stolen information. Credit freezes can prevent unauthorized accounts in our name.

These services often offer insurance to cover costs if our identity is stolen. However, relying solely on these services isn’t enough. We must remain vigilant, reviewing bank statements and being cautious of scams. By combining technology with personal caution, we can better guard against identity theft.

Brian Huff

Operations Logistics Division

Brian works in the Operations Logistics Division but is also a secondary contact for Services. He is the primary contact for Total Recall, handheld scanners, and barcoding questions or concerns. Brian also manages daily work orders to maintain operations with our Site Operations Coordinators nationwide. Brian is retired from the United States Air Force with 21 years of service. His time in service was spent mainly managing aircraft maintenance and personnel. He has a meticulous eye for quality and is an experienced supervisor and manager. The knowledge and experience gained from his service has ensured an easy transition into the Document Security Solutions team. I plan to grow within Document Security Solutions and master my craft. I am also looking to further my education in both my professional and personal life.

Andrew Mills

TRAINING & COMPLIANCE MANAGER

Andrew is Document Security Solutions Training and Compliance Specialist. Andrew onboards and trains all new employees to the standards of DSS. If required, he submits for a background check for each particular location. He organizes and plans individual and company training to ensure that all is current on all required training and policies for DSS. He meets quarterly with all Contracting Officer Representative (COR) and Privacy Officers at each location to assist in inspections requirements and Finally, Andrew has honorably served in the U. S. Navy as a Radio Teletype Morse Code Operator and currently Serves in the U.S. Army as the Senior Intelligence Analyst for EUCOM JAC HQ as the Training and Operations Non Commissioned Officer In Charge (NCOIC) since May of 2022. Andrew has also served as the Lead Intel All Source Training NCOIC of the Army Reserve Intelligence Service Center at Fort Gillem, Ga. Andrew has a total of 32 years of service.

Randy McGinnis

CONTRACTING MANAGER

Randy has 20 years of experience in the United States Air Force working as a Contracting Officer, Fiscal Budget Planner, Communication Technician, as-well-as leading diverse teams that has provided him with priceless experience in Federal Procurement Strategies that make him an indispensable member of the DSS team.Randy is Document Security Solutions Contract Specialist. Randy develops strategic plans to secure future Government contracts, establishes relationships with Government agencies, and markets our capabilities. Additionally, Randy assists the Capture Team as they source Government contracting opportunities daily establishing contract submission, awards, sources sought, and manage administration to existing contracts.

Lisa Ochoa

Executive Assistant

Lisa provides executive-level support to the Founder and the Chief Operating Officer. She provides additional support to team members to ensure that company goals and objectives are accomplished and that operations run efficiently. Lisa brings 18 years of office experience that is utilized daily by planning and orchestrating work to ensure that senior executives’ priorities are met, organizational goals are achieved, and best practices are upheld.

Latrice Franklin

Business Development Specialist

Latrice Franklin identifies new business opportunities and clients for Document Security Solutions, while developing long term relationships. She uses her craft to develop marketing and sales strategies to help grow the company’s business. Latrice is responsible for coordinating strategies with operations, marketing, and executives to propose new business ideas that can improve revenue margins.

Serene Obak

Invoice Billing Clerk

Serene is part of DSS’ Quality Assurance Team. Serene understands the work others in her division do and how it impacts her own, therefore collaborating to achieve business’ quality standards, she recognized it’s a key quality of team effort.

Serene communicates with our Vendors and Subcontractors requesting Invoices, Service Tickets, and Certificates of Destruction be submitted weekly, her process is to review for accuracy, which in turn ensures we all receive prompt payment.

Nicole Rogers

Service Manager

Nicole handles logistical coordination of all company contracts. Nicole’s prior military experience as an intelligence Analyst brings all the skill set needed to successfully maintain numerous government and local contract organizing personnel, schedules, and material.

Norris "Chuck" Thurmond

Operations Team Member

Chuck served as an Operations Specialist in the United States Navy. He developed a passion for managing, training, planning, and organizing from conducting domestic and global operations for 24 years on active duty. While transitioning to the civilian world as a member of Document Security Solutions operation team, Chuck utilizes the skills and experience gained to oversee the day-to-day scheduling of services and the movement of personnel and material for a rapidly growing company.

Robert “Bobby” Warden

Regional Site Operations Coordinator & Compliance Associate

Bobby is the first Regional Site Operation Coordinator for Document Security Solutions. He oversees the day-to-day operations of the Eastern region. His scope of work includes all things training and compliance working hand in hand with Christal in doing so. Bobby served as an Electronics Technician in the U.S. Navy. He cultivated his leadership and organizational skills by leading thousands of Sailors during his 24 years of active-duty service.

Christal Miller

Training & Compliance Manager

Christal is the Training and Compliance Manager with employees and contractors. The work encompasses handling employee training, badging, and background checks. The goal is to ensure that Document Security Solutions has the most knowledgeable, diligent, and prepared staff possible. Christal’s 22 years in the United States Navy of training and leading hundreds of sailors, is the source of her acquired knowledge and skill to work everyday with the DSS team.

Jack Mussett

Scanning Technician

Jack oversees the scanning department. He applies the best practices to the scanning production process and leverages his skills to help Document Security Solutions expand its service offerings. He brings more than twenty years of corporate experience in the application of document management systems, hybrid systems, and end-user training for the paperless world.

Alisha Carey

Contract Administrator

Alisha is Document Security Solutions inside Contract Manager. Alisha received her contract Management certification at the University of California Irvine. She is responsible for all contract submissions, awards, modifications, and contract closeouts. Additionally, she assists in the development of DSS’s procurement strategy plan for both SDVOSB set aside and GSA procurement. Since joining DSS Alisha has helped the company win 23 awards in just under 2.5 years.

Darryn DiSanto

Capture Manager

Darryn creates strategic plans to secure future government contracts. Darryn builds relationships with government agencies and markets our capabilities. Darryn also leads the Capture Team as they source government contracting opportunities daily. Darryn has 20 years of experience in the United States Air Force working in government acquisition, finance, budget, and accounting as well as leading diverse teams has provided him with keen insights and experience that make him an indispensable member of the DSS team.

Donna-Marie Morris

Chief Operating Officer

Donnamarie Morris Chief Operating Officer (COO) Design and implement business strategies, plans, and procedures, set comprehensive goals for performance and growth, and Establish policies that promote company culture and vision. Oversees our outsourced Human Resources and the daily operations of the company and the work of executives!
Donnamarie Morris oversees Compliance, and Training develops compliance processes and procedures and reviews implemented training, reviews company policies, and advises on possible risks.
Donnamarie’, goal as the Chief Operating Officer (COO) is to manage all aspects of the organization’s plans and to cultivate a culture of performance and continuous improvement.

Parish Morris

Founder & President

Parish served as an Administrative Chief and a Military Recruiter in the United States Marine Corps. He retired after serving twenty faithful and honorable years in the United States Marine Corps. As a civilian, Parish quickly realized that his military skills had prepared him to become a Veteran Entrepreneur. Parish managed to use his leadership skills, professional training, education, and the experiences he had gained from traveling around the world to open a mobile document destruction business in Murrietta, California.

  • 877-747-3313