How To Turn Off Unlock For USB Accessories On iOS 12

iOS 11.4 added a new feature whereby if you haven’t connected a USB accessory to your unlocked device for a few days, it will prevent the accessory from connecting with a locked phone. To enable the connection, you have to unlock your device and then connect the accessory. This is a security feature and in iOS 12 the duration for connecting a USB accessory to a locked device has been limited to one hour. What this means is that if you haven’t unlocked your phone in over an hour, you will have to unlock it to use USB accessories. Here’s how to turn off unlock for USB accessories.

Note: iOS 12 is currently in beta and unless you’re part of the Apple public beta program, you will not be able to use this unstable version of iOS. The stable release is set for fall, this year.

Unlock For USB Accessories

To turn off unlock for USB accessories, open the Settings app and go to Touch ID and Passcode. Enter your passcode, and then scroll down to the ‘Allow access when locked’ section. Here, look for a switch labelled USB Accessories and turn it On.

This will allow USB accessories, including your PC or Mac, to connect with and charge your phone even if it hasn’t been unlocked in over an hour. This option may not appear for everyone on the iOS 12 beta just yet and that’s probably a bug. Wait for the next build and it may eventually appear.

The real question is, should you turn this option On, or leave it Off? With newer iPhone models, everything connects via a USB connection. The headphone jack is gone and unless you have a pair of Airpods, you will need a USB connector to connect headphones. With respect to that, it can get annoying having to unlock your device when you connect an accessory. That said, you can unlock with Touch ID or Face ID so it’s not like you have to enter a long passcode.

If you’re the sort to forget about a feature like this, you might want to turn it off. Imagine connecting your iPhone to your Mac or PC to charge, and coming back a few hours later to find that the phone didn’t charge because USB accessory access was blocked.

For the most part, this is a good security feature but some users may find it more of a nuisance than something useful. If your phone is ever stolen or lost, you will find that this will deter anyone from attempting to erase and resell it.

Read How To Turn Off Unlock For USB Accessories On iOS 12 by Fatima Wahab on AddictiveTips – Tech tips to make you smarter

6 Best Security Information and Event Management (SIEM) Tools Worth Checking Out in 2018

It’s a jungle out there! Ill-intentioned individuals are everywhere and they’re after you. Well, probably not you personally but rather your data. It’s no longer just viruses that we have to protect against but all sorts of attacks that can leave your network–and your organization–in a dire situation. Due to the proliferation of various protection systems such as antiviruses, firewalls, and intrusion detection systems, network administrators are now flooded with information that they have to correlate, trying to make sense of it. This is where Security Information and Event Management (SIEM) systems come in handy. They handle most of the gruesome work of dealing with too much information. To make your job of selecting a SIEM easier, we’re presenting you the best Security Information and Event Management (SIEM) tools.

Today, we begin our analysis by discussing the modern threat scene. As we said, it’s no longer just viruses anymore. Then, we’ll try to better explain what SIEM is exactly and talk about the different components that make a SIEM system. Some of them might be more important than other but their relative importance might be different for different people. And finally, we’ll present our pick of the six best Security Information and Event Management  (SIEM) tools and briefly review each one.

The Modern Threat Scene

Computer security used to be just about virus protection. But in recent years, several different kinds of attacks have been uncovered. They can take the form of denial of service (DoS) attacks, data theft, and many more. And they no longer just come from the outside. Many attacks originate from within a network. So, for the ultimate protection, various types of protection systems have been invented. In addition to the traditional antivirus and firewall, we now have Intrusion Detection and Data Loss Prevention systems (IDS and DLP), for example.

Of course, the more you add systems, the more work you have managing them. Each system monitors some specific parameters for abnormalities and will log them and/or trigger alerts when they are discovered. Wouldn’t it be nice if the monitoring of all these systems could be automated? Furthermore, some types of attacks could be detected by several systems as they go through different stages. Wouldn’t it be far better if you could then respond to all related events as one? Well, this is exactly what SIEM is all about.

What Is SIEM, Exactly?

The name says it all. Security Information and Event Management is the process of managing security information and events. Concretely, a SIEM system does not provide any protection. Its primary purpose is to make the life of network and security administrators easier. What a typical SIEM  system really do is collect information from various protection and detection systems, correlate all this information assembling related events, and reacts to meaningful events in various ways. Often, SIEM systems will also include some form of reporting and dashboards.

The Essential Components Of A SIEM System

We’re about to explore in deeper details each major component of a SIEM system. Not all SIEM system include all these components and, even when they do, they could have different functionalities. However, they are the most basic components that one would typically find, in one form or another, in any SIEM system.

Log Collection And Management

Log collection and management is the main component of all SIEM systems. Without it, there is no SIEM. The SIEM system has to acquire log data from a variety of different sources. It can either pull it or different detection and protection systems can push it to the SIEM. Since each system has its own way of categorizing and recording data, it is up to the SIEM to normalize data and make it uniform, no matter what its source is.

After normalization, logged data will often be compared against known attack patterns in an attempt to recognize malicious behavior as early as possible. Data will also often be compared to previously collected data to help build a baseline that will further enhance abnormal activity detection.

Event Response

Once an event is detected, something must be done about it. This is what the event response module fo the SIEM system is all about. The event response can take different forms. In its most basic implementation, an alert message will be generated on the system’s console. Often email or SMS alerts can also be generated.

But the best SIEM systems go a step further and will often initiate some remedial process. Again, this is something that can take many forms. The best systems have a complete incident response workflow system that can be customized to provide exactly the response you want. And as one would expect, incident response does not have to be uniform and different events can trigger different processes. The best systems will give you complete control over the incident response workflow.

Reporting

Once you have the log collection and management and the response systems in place, the next building block you need is reporting. You might not know it just yet but you will need reports. The upper management will need them to see for themselves that their investment in a SIEM system is paying off. You might also need reports for conformity purposes. Complying with standards such as PCI DSS, HIPAA, or SOX can be eased when your SIEM system can generate conformity reports.

Reports may not be at the core of a SIEM system but still, it is one essential component. And often, reporting will be a major differentiating factor between competing systems. Reports are like candies, you can never have too many. And of course, the best systems will let you create custom reports.

Dashboard(s)

Last but not least, the dashboard will be your window into the status of your SIEM system. And there could even be multiple dashboards. Because different people have different priorities and interests, the perfect dashboard for a network administrator will be different from that of a security administrator. And an executive will need a completely different one as well.

While we can’t evaluate a SIEM system by the number of dashboards it has, you need to pick one that has all the dashboard(s) you need. This is definitely something you’ll want to keep in mind as you evaluate vendors. And just like with reports, the best systems will let you build customized dashboards to your liking.

Our top 6 SIEM Tools

There are lots of SIEM systems out there. Far too many, actually, to be able to review them all here. So, we’ve searched the market, compared systems, and build a list of what we found to be the six best security information and management (SIEM) tools. We’re listing them in order of preference and we’ll briefly review each one. But despite their order, all six are excellent systems that we can only recommend you try for yourself.

Here’s what our top 6 SIEM tools are

  1. SolarWinds Log & Event Manager
  2. Splunk Enterprise Security
  3. RSA NetWitness
  4. ArcSight Enterprise Security Manager
  5. McAfee Enterprise Security Manager
  6. IBM QRadar SIEM

1. SolarWinds Log & Event Manager (FREE 30-DAY TRIAL)

SolarWinds is a common name in the network monitoring world. Their flagship product, the Network Performance Monitor is one of the best SNMP monitoring tool available. The company is also known for its numerous free tools such as their Subnet Calculator or their SFTP server.

SolarWinds’ SIEM tool, the Log and Event Manager (LEM) is best described as an entry-level SIEM system. But it’s possibly one of the most competitive entry-level systems on the market. The SolarWinds LEM has everything you can expect from a SIEM system. It has excellent long management and correlation features and an impressive reporting engine.

SolarWinds LEM Dashboard

As for the tool’s event response features, they leave nothing to be desired. The detailed real-time response system will actively react to every threat. And since it’s based on behavior rather than signature, you’re protected against unknown or future threats.

But the tool’s dashboard is possibly its best asset. With a simple design, you’ll have no trouble quickly identifying anomalies. Starting at around $4 500,  the tool is more than affordable. And if you want to try it first, a free fully functional 30-day trial version is available for download.

2. Splunk Enterprise Security

Possibly one of the most popular SIEM system, Splunk Enterprise Security–or Splunk ES, as it is often called–is particularly famous for its analytics capabilities. Splunk ES monitors your system’s data in real time, looking for vulnerabilities and signs of abnormal activity.

Security response is another of Splunk ES’ strong suits. The system uses what Splunk calls the Adaptive Response Framework (ARF) which integrates with equipment from more than 55 security vendors. The ARF perform automated response, speeding up manual tasks. This will let you quickly gain the upper hand. Add to that a simple and uncluttered user interface and you have a winning solution. Other interesting features include the Notables function which shows user-customizable alerts and the Asset Investigator for flagging malicious activities and preventing further problems.

Splunk ES Risk Analysis

Splunk ES is truly an enterprise-grade product and it comes with an enterprise-sized price tag. You can’t even get pricing information from Splunk’s web site. You need to contact the sales department to get a price. Despite its price, this is a great product and you might want to contact Splunk and take advantage of a free trial.

3. RSA NetWitness

Since 20016, NetWitness has focused on products supporting “deep, real-time network situational awareness and agile network response”. After being acquired by EMC which then merged with Dell, the Newitness business is now part of the RSA branch of the corporation. And this is good news RSA is a famous name in security.

RSA NetWitness is ideal for organizations seeking a complete network analytics solution. The tool incorporates information about your business which helps prioritize alerts. According to RSA, the system “collects data across more capture points, computing platforms, and threat intelligence sources than other SIEM solutions”. There’s also advanced threat detection which combines behavioral analysis, data science techniques, and threat intelligence. And finally, the advanced response system boasts orchestration and automation capabilities to help get rid eradicate threats before they impact your business.

RSA NetWitness

One of the main drawbacks of RSA NetWitness is that it’s not the easiest to use and configure. However, there is comprehensive documentation available which can help you with setting up and using the product. This is another enterprise-grade product and you’ll need to contact sales to get pricing information.

4. ArcSight Enterprise Security Manager

ArcSight Enterprise Security Manager helps identify and prioritize security threats, organize and track incident response activities, and simplify audit and compliance activities. Formerly sold under the HP brand, it has now merged with Micro Focus, another HP subsidiary.

Having been around for more than fifteen years, ArcSight is another immensely popular SIEM tools. It compiles log data from various sources and performs extensive data analysis, looking for signs of malicious activity. To make it easy to identify threats quickly,  you can view the real0tme analysis results.

ArcSight Command Center

Here’s a rundown of the products main features. It has powerful distributed real-time data correlation, workflow automation, security orchestration, and community-driven security content. The Enterprise Security Manager also integrates with other ArcSight products such as the ArcSight Data Platform and Event Broker or ArcSight Investigate. This is another enterprise-grade product–like pretty much all quality SIEM tools–that will require that you contact ArcSight’s sales team to get pricing information.

5. McAfee Enterprise Security Manager

McAfee is certainly another household name in the security industry. However, it is better known for its virus protection products. The Enterprise security manager is not just software. It is actually an appliance. You can get it in virtual or physical form.

In terms of its analytics capabilities, the McAfee Enterprise Security Manager is considered one of the best SIEM tool by many. The system collects logs across a wide range of devices. As for its normalization capabilities, it is also top notch. The correlation engine easily compiles disparate data sources, making it easier to detect security events as they happen

McAfee Enterprise Security Manager

To be true, there’s more to the McAfee solution than just its Enterprise Security Manager. To get a complete SIEM solution you also need the Enterprise Log Manager and Event Receiver. Fortunately, all products can be packaged in a single appliance. For those of you who may want to try the product before you buy it, a free trial is available.

6. IBM QRadar

IBM, possibly the best-known name in the IT industry has managed to establish its SIEM solution, IBM QRadar is one of the best products on the market. The tool empowers security analysts to detect anomalies, uncover advanced threats and remove false positives in real-time.

IBM QRadar boasts a suite of log management, data collection, analytics, and intrusion detection features. Together, they help keep your network infrastructure up and running. There is also risk modeling analytics that can simulate potential attacks.IBM QRadar Dashboard

 

Some of QRadar’s key features include the ability to deploy the solution on-premises or in a cloud environment. It is a modular solution and one can quickly and inexpensively add more storage of processing power. The system uses intelligence expertise from IBM X-Force and integrates seamlessly with hundreds of IBM and non-IBM products.

IBM being IBM, you can expect to pay a premium price for their SIEM solution. But if you need one of the best SIEM tools on the market, QRadar might very well be worth the investment.

In Conclusion

The only problem you risk having when shopping for the best Security Information and Event Monitoring (SIEM) tool is the abundance of excellent options. We’ve just introduced the best six. All of them are excellent choices. The one you’ll choose will largely depend on your exact needs, your budget and the time you’re willing to put into setting it up. Alas, the initial configuration is always the hardest part and this is where things can go wrong for if a SIEM tool is not properly configured, it won’t be able to do its job properly.

Text 50 – 2300

Read 6 Best Security Information and Event Management (SIEM) Tools Worth Checking Out in 2018 by Renaud Larue-Langlois on AddictiveTips – Tech tips to make you smarter

How To Generate Two Factor Authentication Codes On Linux With Authenticator

Two-factor authentication is nice, but it’s irritating having to deal with random text messages every time you try to log in. If you’re looking for a better way to use 2FA, consider trying out Authenticator. It’s an application that users can set up to get two factor authentication codes on Linux.

Note: To install this software, you’ll need to be able to use Flatpak.

Flatpak Installation

The easiest way to install Authenticator on Linux is to use the Flatpak version, as it doesn’t require any configuration aside from installing the Flatpak runtime. If your Linux distribution supports Flatpak technology, you can easily install the Authenticator app.

Before continuing, be sure you already have Flatpak working on your Linux PC. Head over to our tutorial and follow the instructions to learn how to do this if you are unsure. When Flatpak is working correctly, you’ll be able to install Authenticator via the terminal.

sudo flatpak install flathub com.github.bilelmoussaoui.Authenticator

Need to uninstall Authenticator from Flatpak? Try:

sudo flatpak remove com.github.bilemoussaoui.Authenticator

Source Installation

Clearly installing this application via Flatpak is the best choice, as users will deal with the least amount of hassle. However, for as great as the Flatpak runtime is, not every Linux distribution actively supports it. If you’re running a version of Linux that doesn’t, you’ll need to build this software from source.

To build from source, open up a terminal and install the following dependencies. Keep in mind that these dependencies may differ, depending on your operating system. For best results, search your package manager for the items on the list below:

  • Gtk 3.16+
  • meson 0.38+
  • ninja
  • python3-pip
    • python-pip (Arch)
  • pyotp
  • Pillow
  • pyzbar
    • libzbar-dev (Ubuntu)
    • zbar (Arch)
  • libsecret
  • zbar
  • git

After installing all required dependency files, Authenticator is ready to build. First, use the Git tool to clone the latest version of the Authenticator source code from Github.

git clone https://github.com/bilelmoussaoui/Authenticator

Next, use the CD command to move from the Home folder into the newly cloned Authenticator folder.

cd Authenticator

Inside of the Authenticator folder, use Python Pip to install important Packages.

sudo pip install pyotp pyzbar Pillow meson ninja

Using Meson, start the building process:

meson builddir

Finish up the building process with Ninja.

sudo ninja -C builddir install

Run Authenticator with:

authenticator

Set Up Authenticator

Using Authenticator is done on a per-site basis. There’s no way to set the app up to work with every site. Instead, you’ll have to dig into the security settings of every account and get it working with two-factor-authentication. In this example, we’ll go over how to configure the Authenticator app to work with Amazon.

The instructions outlined with this app are very straightforward and can be duplicated with pretty much every website that is supported by the app.

To get started, open up Authenticator, click the search icon and search for “Amazon”. After opening Amazon in the Authenticator app, open up a web browser and log into your Amazon.com account.

On the Amazon website, hover over “Account & Lists”, then select the “Your Account” option in the drop-down menu.

In the “Your Account” area, look for “Login & security” and click on it.

The “Login & security” area of Amazon.com houses everything related to logging in, email info and etc. Find the option that says “Advanced Security Settings”, and click on it.

On the next page, Amazon will brief you on what 2FA login can do for your account, how it works and etc. Be sure to read over it carefully. When ready, click the “get started” button to move onto the activation page.

Amazon.com’s 2FA settings allow the user to get secret codes from a text sent to a mobile device. Alternatively, users can set up an authentication app. Ignore the phone settings, look for Authenticator App and check the box next to it to enable this feature for your account.

Enabling 2FA within your Amazon account will generate a scannable QR code. At this point, go back to Authenticator, ensure you have Amazon open in it, and click the QR icon in the top-right corner to activate scanning mode.

With scanning mode enabled in Authenticator, go back to the Amazon 2FA page and use your mouse to draw a square around the QR code.

Note: if scanning the QR code doesn’t work in Authenticator, select the “can’t scan QR code” option, and paste the text code it gives you into Authenticator instead.

If Authenticator successfully reads the QR image, it’ll generate a code. Enter the code into the “verify” box.

From now on when you log into Amazon (or any site linked to Authenticator), follow this process:

  1. Go to the website and enter username/password.
  2. Open Authenticator, search for the correct site and copy the generated code.
  3. Paste the code into the web page to log in.

Read How To Generate Two Factor Authentication Codes On Linux With Authenticator by Derrik Diener on AddictiveTips – Tech tips to make you smarter

Best Background Check Services for 2018

Most people know that information and data are hugely valuable and desirable commodities in this day and age. But did you know just how much information about everyone is freely and publicly available? Public data records exist on just about every citizen in the USA and the information they contain is openly available to everyone. The difficulty is in trying to access these records. There are millions of them and getting to the data you need on your own can be a long and complicated process.

That is where Background Check companies come in. They employ the latest technology to sweep all available public records and can compile remarkably detailed guides about almost anyone. They are great for anyone who is seeking out a family member or friend you have lost contact with, if you want to look into the background of a potential employee, or just find out more about someone you have concerns over. In this article, we are going to tell you everything you need about Background Check Services and how they work, as well we recommend the best companies operating in this space right now.

Best Background Check Services 2018

How we identified our recommendations

There is no shortage of companies on the market that claim to offer the best Background Check Services, so finding the best company to suit your specific needs can be difficult. That’s where this article can help. We have done the legwork for you and taken a look at all of the main Background Check Service providers to see which offer the best all-round service for their clients. In seeking to pick the best from the rest, we have applied the following main criteria:

  • A full range of background checks – some companies offer a more comprehensive search than others, so we have sought out those which offer the widest possible range.
  • Proper research –there are some charlatans out there who will claim to do a proper job but actually produce little more than the results of a quick internet search. All our recommended providers so their research properly.
  • Accurate and comprehensible reports –There is no point employing a Background Check company if the report they provide for you makes no sense. We have identified those companies which offer easy-to-understand, accurate, and readable reports.
  • Search Customization – The best background Check Companies allow you tonarrow down your research by entering as much detail as you have available. This helps to ensure you get information on the right person and is a vital tool, especially in the case of common names.
  • Ease-of-Use – Some Background Check services can be easier to use than others. Most will provide a dashboard to enable you to access the data that has been compiled easily. But some of these dashboards are easier to use than others, so we have tried to identify those that offer the best possible customer experience.
  • Good Customer Support –The best Background Check companies will offer their clients an effective customer support service and reliable lines of communication.
  • Mobile apps –This is the 21stcentury after all and most people want to be able to access their data on mobile devices. So, all our recommended providers offer mobile apps as standard.

Background checking is not a precise science, so we cannot absolutely guarantee that all of our recommended Background Check companies will get everything right every time. But we have used these core criteria to identify those companies which offer the best and most reliable possible service at the moment and which, in testing, have always delivered positive results. On that basis, we have narrowed the field down to four providers which we believe offer the Best Background Check Services 2018:

1. Intelius

Our pick of the Background Check Companies for 2018 is Intelius, which offers one of the broadest range of background checks around at a great price. Their extensive research includes a criminal records check, a reverse phone number lookup service, and a public records people search. They gather together information to tell you about a person’s criminal records, their financial history, property records, educational history, and much more besides. Their attention to detail is impressive and they have already completed more than 50 million background checks for satisfied customers from across the USA.

As well as the usual online searches, Intelius also have a human element to their research too. They can also send an individual to search through non-digitized records in criminal and civil courthouses to make sure nothing slips through the net. The Intelius online dashboard is a neatly designed and easy-to-use tool and they have a fine reputation for producing reports that are easy to follow and highly accurate. They have dedicated apps available for Android and iOS devices too as well as a comprehensive customer service team who can be contacted via email, on the phone, or through their online troubleshooter service.

2. BeenVerified

BeenVerified is another Background Check provider which offers a comprehensive research service and impressive results. Their prices are generally a little higher than Intelius and their pricing structure is a little more complicated too. For their standard rates, you can expect them to take minimal information, such as a person’s name, email address, or phone number, and search through financial records, property reports, social media photographs, criminal records and convictions, address history, and the names of known relatives.

If you are willing to pay a little more for their premium service, BeenVerified can dig even deeper. They too can send a runner to courthouses to seek out more detailed criminal records and at their Premium rate, you can expect as comprehensive a report as it is possible to get. They have great apps available for iOS and Android devices too, plus a customer support service that operates long hours, seven days a week, and can be accessed via email or phone.

3. CheckMate

Instant CheckMate pops up a window warning you that Background Checks can throw up shocking information. Of course, this is what many people are hoping to find so this makes their service even more alluring. But there is more to CheckMate that such clever marketing gimmicks though. Their service lets you search by full or even partial name, as well as last known location.

The basic CheckMate service is a little limited and will only search for sex offender status, criminal records, marriage and divorce records, details of relatives, address history, and any public social media profiles. If you want to access such details as financial history, court records, driving licenses and weapons licenses, you will need to pay for their premium plan. They are also a little on the pricy side compared to some of their rivals, but their reports are easy to access and their customer service, which is available around the clock on phone or email, is great. They only have an app for Android devices right now, but CheckMate is still a Background Check service that’s well worth considering. 

4. TruthFinder

Last, but by no means least on our list of recommended Background Check Companies for 2018 is Truthfinder. They offer another comprehensive research service that covers just about every public record you can think of. Truthfinder claims to search through millions of public records and can provide such information as contact details, current and previous addresses, criminal and court records, driving records, personal information, and details of known relatives.

They also offer a deep web research service too which claims to probe through more online and social media records than any of their competitors. Meanwhile, their premium report can also offer you details of a person’s education history, voter registration records, weapons and other licenses held, and much more besides. Truthfinder’s pricing is around the median for the Background Check’s industry, with many other companies charging more, but some also available for less too. They only have an Android app at the moment too, which is a shame, but they do also offer round the clock customer support, which is provided on a toll-free number too. If you want access to a detailed and reliable Background Check, Truthfinder is another company well worth considering.

What is an Online Background Check?

An Online Background Check is a service which searches all publically available information and collates this into an easy-to-understand report. It is a process that pulls together legally-stored and publically available information from a whole host of different sources into a single place and makes it available quickly and easily to users. There is, of course, nothing to stop individuals from seeking out all of this information themselves. But the process would take many hours of hard work and there is a skill in being able to find the right information for your needs.

This is where Background Checking companies come in. They employ the latest technologies to scour all of these sources of information automatically and pull together every available bit of information fast. They will communicate with their customers along the way to make sure they are getting the right data and then provide a straightforward report which distills all of this information into an easily-digestible format which tells you everything you need to know.

Where do Background Checking Companies source their information? 

Every Background checking company is different, and each will use a slightly different set of sources when compiling their reports. Many will also use different sources depending on the nature of what their customers are looking for. But broadly speaking, they will all research the same type of places for information that is freely and legally in the public domain and available to be accessed.

These will include sources as diverse as criminal records, education records, credit check records, driving records, social security data, litigation records (to reveal details of any legal proceedings they were involved in), archive records, personal references, and any information that has been posted online. This data could take many days to source on your own, but Background Check companies have the tools to access it fast.

Why are some Background Checks free and others have to be paid for?

Everybody loves a bargain, so it is no surprise that the idea of a free background Check is an attractive one. But the reality is that if you want to carry out a comprehensive background check on somewhere, there is always going to be a fee involved. This is because, although some local and state records can be accessed for free, any nationally retained data requires the payment of a fee in order to be accessed.

A Background Check Company also has its owns costs to cover too. The technology required to get to all of the data needed is pretty advanced and does not come cheap. They also have their own costs and overheads to consider as well. Prices can vary significantly between Background Check companies, but we would not necessarily recommend users always opt for the cheapest option. In general, the higher the fee, the more comprehensive a report you are likely to receive, so choosing the right company can depend on the level of detail you want to know about your target. A free Background Check will tell you some things about them you didn’t already know, but it is highly unlikely to provide you with the full picture.

When can I use a Background Check?

Some readers might be questioning the morality of hiring a company to research an individual and provide you with personal information about someone else. But it is important to realise that these Background Check Companies are not accessing any information that is not already readily available and in the public domain. They research publically available data and compile it into reports. They do not undertake any nefarious activities to covertly gather information about people without their knowledge.

Having said that, there are some scenario’s where it is not permitted to use a Background Check and it is important that anyone who uses these services is aware of these rules up front. Most Background Check Companies will make these rules clear on the websites and in their terms and conditions. But some are more transparent than others, so all customers should be aware of these restrictions in advance.

Background Checks can be used for…

It’s ok to use a Background Check Company in the following scenarios:

  • Finding out more about your new neighbors
  • Looking into your new date
  • Seeking out long-lost friends or relatives
  • Finding out who it is that keeps calling your phone
  • Identifying for sex offenders in your community
  • Looking into publically available information about yourself

Background Checks cannot be used for…

It is not ok to use a Background Check Company in the following scenarios:

  • Researching future employees without their permissionThis is illegal under the the Fair Credit Reporting Act (FCRA). If you want to research a potential employee you must obtain written permission from them before doing so.
  • Looking into the background of domestic workers – This is also illegal under the FCRA without first obtaining written permission.
  • Checking if someone is eligible for credit, insurance, scholarships, or grants – also illegal under the FCRA
  • Identifying suitable tenants for a property to be rented out – also illegal under the FCRA.

If you do try to use a Background Check company for one of these purposes, you should be aware that if caught, you could face legal repercussions including potentially having to pay significant damages to the person you have looked into.

Read Best Background Check Services for 2018 by David Spencer on AddictiveTips – Tech tips to make you smarter