In episode 99 of the Cybersecurity Minute, Deputy CISO Frank Domizio explores employment identity (ID) theft. He defines employment identity theft, describes features to look for in an employment ID theft prevention tool, and introduces one, Identity Protection from Trend Micro, a company on Acceleration Economy’s Top 10 Shortlist of Cybersecurity Enablers.
This episode is sponsored by “Selling to the New Executive Buying Committee,” an Acceleration Economy Course designed to help vendors, partners, and buyers understand the shifting sands of how mid-market and enterprise CXOs are making purchase decisions to modernize technology.
Highlights
00:33 — Employment identity theft occurs when someone steals personally identifiable information (PII), such as your name, birth date, or social security number, to secure a job. “The consequences can be far-reaching, impacting not only the victims but also the organizations that unknowingly hire these fraudulent workers,” Frank says.
01:01 — “Perpetrators of employment identity theft use stolen information during the hiring process, supplying the victim’s details to an employer for tax and payroll purposes,” Frank says. “This allows the culprits to work under false pretenses, earning wages, filing tax information, and potentially even accessing government benefits. Victims can remain unaware of this fraudulent activity unless they actively monitor for signs of identity theft.”

Which companies are the most important vendors in cybersecurity? Check out
the Acceleration Economy Cybersecurity
Top 10 Shortlist.
02:14 — There are many products on the market to help protect against becoming a victim of employment identity theft. IT leaders should seek tools that offer “a comprehensive approach to safeguarding personal information, leveraging advanced technologies to proactively search social media platforms, the internet, and even the dark web to identify any instances of where your personal information may have been breached,” Frank advises.
02:39 — Look for a tool that continuously monitors and scans a vast range of sources and provides real-time alerts and notifications. This lets you take immediate action if the tool detects suspicious activity.
02:52 — Identity Protection, from Trend Micro, which is on our Top 10 list of Cybersecurity Enablers, is such a tool, says Frank. It “acts as a first line of defense, notifying you if your credentials have been used in a fraudulent employment activity.”
03:40 — “Technology alone cannot solve this problem,” Frank says. “Collaboration and education are key. By educating individuals about the signs of employment identity theft, promoting secure practices, and encouraging open communication, we can collectively mitigate the risks associated with this form of identity theft.”
Want more cybersecurity insights? Visit the Cybersecurity channel: