Identity Theft Protection Guide

In today’s digital world, your personal information is constantly at risk of being stolen. Be sure to take proactive steps to avoid identity theft with offline and online vigilance to avoid becoming one of the 1.4 million+ victims of identity theft per year.

Here’s what you need to know:

  • Adults between the ages of 30-39 are the most common victims of identity theft

  • Criminals can access your personal information through both online and offline sources

  • Identity theft protection services provide a helpful shield to guard your identity

Many people choose their cities and neighborhoods by considering crime rates in the local area. Yet there is one area of life where criminals work around the clock to steal money and peace of mind – identity theft.

The FBI has reported that the total impact of cybercriminal activity tops $10 Billion per year and much of that involves the fraud and theft that occurs when someone’s personally identifiable information or PII is stolen.

However, like home security, several ways exist to protect yourself and your family from this pervasive criminal enterprise. Keep reading for an in-depth guide to identifying and preventing identity theft – both online and offline.

What Is Identity Theft?

Identity theft is the unauthorized use of an individual’s personally identifiable information, typically for financial gain. Each year one in 20 Americans will have their identity stolen and used in nefarious ways, such as opening new credit or loan accounts, obtaining medical services, or stealing tax refunds.

In today’s digital landscape, any of your personal details, including your name, social security number, address, or other personal identifying information, is at risk. Identity theft may cause severe damage to the victim’s credit score, financial standing, and personal reputation. While most victims will only see financial issues in the worst-case scenario, victims might be wrongfully apprehended because of criminal activities conducted under their stolen identities.

Types of Identity Theft

The types of identity theft continue to expand as the creativity of identity theft criminals grows. At the core, the kind of theft is based on who the target is or how the information was obtained. Common types of identity theft include:

  • Synthetic

    Synthetic identity theft is a complex type of fraud in which criminals create an entirely new yet believable identity by attaching a made-up name, birth date, mailing address, email, and phone number to a legitimate Social Security number.

    Once the synthetic identity is established, criminals apply for credit cards or loans. They can sometimes maintain this identity for years by making consistent payments while their credit limits increase. However, the end goal is a “bust out” maneuver where they max out the credit cards and abruptly disappear, leaving the credit companies to deal with the losses.

    This identity theft is particularly insidious because it’s challenging to detect with standard fraud monitoring systems. The criminals The most common victims are often those least likely to monitor their credit history or frequently use credit, such as children, the elderly, and homeless individuals.

  • Medical

    Medical identity theft happens when someone pretends to be you to use your health insurance or name. They might use it to see a doctor, get medicine, file fake insurance claims, etc. This type of fraud is especially problematic as it can confuse doctors and hospitals looking for critical information to aid in healthcare recommendations and decisions.

  • Child

    Kids are some of the easiest targets for identity theft because they have no reason to regularly check their credit reports, bank accounts, or other records. This type of theft happens when an adult uses your child’s social security number to open new financial accounts, apply for utilities, get a loan, or rent a home. In fact, many parents only realize their child’s personal information has been stolen once it becomes time to apply for college loans or when their child goes to rent their first apartment.

  • Business

    Business identity theft occurs when an unauthorized person obtains the identifying information of a business, such as its Employer Identification Number (EIN), with the intention of misusing it.

    The primary motive behind business identity theft is to secure illicit tax benefits whereby fraudsters file fraudulent business tax returns in the unsuspecting company’s name. These fabricated returns are often tailored to claim refundable business credits and other tax-related refunds.

  • Taxpayer

    Taxpayer identity theft is a fraudulent activity where scammers use your Social Security number to file a tax return, attempting to claim your tax refund or credit.

    The warning signs of taxpayer identity theft are subtle. You might encounter difficulties when trying to e-file your tax return because someone else has already filed using your Social Security number, or you may receive notice or a letter from the IRS about an activity you’re unaware of. These signs warrant prompt attention.

The list above is in no way comprehensive. Additional types of identity theft and fraud include:

  • Senior
  • Real Estate (Mortgage and Home Title)
  • Passport
  • Social Security
  • Mail
  • Driver’s License
  • Military
  • Communications such as phone and email scams
  • Internet of Things

How Common Is Identity Theft?

Personal identity theft is far more common than most people realize. In fact, the Federal Trade Commission reports that every 14 seconds, someone new becomes a victim of this crime, costing Americans billions of dollars each year. As technology continues to evolve, so do identity theft criminals and their innovative ways to steal personal information both online and offline.

Not all types of identity theft are created equal. Unsurprisingly, the most common type – financial – is designed to line the pockets of identity theft criminals. This type of theft is also fast growing, given our increased use of online banking, online shopping, and digital transactions in general. Other types of identity theft, such as medical or criminal, don’t happen as often but are still harmful and can leave lasting effects.

Global Network

How Does Identity Theft Happen?

Identity theft criminals have many ways they gain access to personal identifying information. Their methods include low-tech and high-tech access points, so ongoing vigilance is essential to protecting your data. Common techniques used by identity thieves include:

  • Social Engineering

    Social engineering involves manipulating individuals into divulging confidential information, typically over the phone or in person.

    Be wary of unsolicited communications asking for personal data, and always verify the source before sharing any information. If in doubt, contact the organization directly.

  • Phishing

    Phishing is a method fraudsters use to trick you into revealing personal information by pretending to be a legitimate organization. This tactic often happens through deceptive emails or text messages.

    Be cautious of emails or texts that ask for personal information, especially if they convey urgency, and check the sender’s email address. If it looks suspicious or doesn’t match the organization’s official email, it’s likely a phishing attempt.

  • Spyware and Malware

    Spyware is malicious software that is installed on your computer without your knowledge. It can monitor your online activity, collect your personal information, and send it to another location.

    Be sure to regularly update your computer’s antivirus software to protect against spyware and use caution when downloading software or files from the internet.

  • Dumpster Diving

    Believe it or not, thieves will go through your trash, looking for discarded documents that contain personal information.

    Always shred documents that contain sensitive information before throwing them away. Consider going paperless with your bills and financial statements to reduce the amount of personal information that could potentially end up in the trash.

  • Card Cracking

    Card cracking involves the unauthorized use of your credit or debit card information. Thieves may use skimming devices at ATMs or gas stations to steal card data.

    Regularly monitor your bank and credit card statements for any unauthorized transactions. When using an ATM or paying at the pump, look for any signs of tampering with the card reader. If something looks suspicious, use a different machine.

  • Man-in-the-Middle Attacks

    In a man-in-the-middle attack, the thief intercepts communication between two parties to steal or manipulate data. This often happens on unsecured public Wi-Fi networks.

    Avoid conducting sensitive transactions on public Wi-Fi networks like online banking or shopping. Use a Virtual Private Network (VPN) to encrypt your internet connection and protect your data from potential eavesdroppers.

  • Pretexting

    Pretexting involves the thief pretending to need your data for a seemingly legitimate purpose. For example, they might pose as a bank or government agency representative.

    Be skeptical of unsolicited calls or emails asking for personal information. If you need more clarification, hang up or ignore the email and contact the organization directly through a trusted method. Never share sensitive information like your Social Security number, bank account details, or credit card numbers unless you’re certain of the recipient’s identity and the necessity of the information.

  • View Circle 1 Streamline Icon: https://streamlinehq.com

    Shoulder Surfing

    Shoulder surfing is a low-tech method where the thief simply looks over your shoulder to see what you’re typing or writing. This can happen at ATMs, while using your smartphone, or even at your office.

    Be aware of your surroundings when entering sensitive information. Use your body or hand to shield your screen or keypad from view. Avoid accessing personal or financial information in crowded public places whenever possible.

  • Conversation Text Streamline Icon: https://streamlinehq.com

    Smishing

    Smishing is a form of phishing that uses text messages instead of emails. The message might ask you to provide personal information or click on a link.

    Be wary of text messages from unknown numbers, especially those asking for personal information or urging you to click on a link. Don’t respond or click on links if you receive suspicious texts. Instead, contact the organization directly to verify the message’s authenticity.

Potential Victims of Identity Theft

Everyone is at risk of identity theft, but some people are more vulnerable than others. Factors like age, gender, ethnicity, and income can also influence the risk of identity theft. These include:

  • Age

    Data from the Federal Trade Commission (FTC) in the US indicates that individuals between the ages of 30 and 39 are the most common victims of identity theft. This group is closely followed by those aged 40 to 49. According to reported numbers, the least likely to fall victim to identity theft are people over 80 years old and children. Still, these cohorts remain easy prey due to their dependence on others for care and financial matters, so diligence is essential.
  • Gender

    Both males and females were equally susceptible to identity theft.
  • Ethnicity

    Caucasians are the most likely victims of identity theft. People of Hispanic origin were the next most affected group, accounting for nearly 12% of the cases.
  • Income

    Those with a household income of $75,000 or more were most likely to be victims of identity theft.

Practical Steps to Preventing Identity Theft

While no method guarantees total protection from identity theft and monitoring services often alert you post-event, there are strategies you can use to strengthen your defenses. Here are some steps you can take:

  • Freeze your credit: Freezing your credit with the three major credit bureaus—Equifax, Experian, and TransUnion—blocks access to your credit files, hindering the creation of new accounts. It’s free and the most effective way to prevent identity thieves from misusing your data.
  • Secure your Social Security number: Protect your Social Security number, the cornerstone of your personal data. Don’t carry your card in your wallet; safely store or shred any documents containing it.
  • Beware of phishing and spoofing: Be skeptical of phone calls and emails pretending to be from trusted entities. Always verify through official websites or initiate a callback yourself.
  • Use robust passwords and multi-factor authentication: Create unique, complex passwords using a password manager and enable an additional layer of security, such as an authenticator app. Avoid sharing details on social media that could answer your security questions.
  • Set up alerts: Sign up for notifications from your financial institutions to monitor real-time transactions.
  • Monitor your mail: Guard against mail theft, especially when you’re away, by using a lockable mailbox or holding your mail. USPS’s Informed Delivery can notify you of arriving mail.
  • Shred important documents: Shred credit card, bank, or investment statements and junk mail, particularly those containing preapproved credit offers.
  • Adopt digital wallets: For safer online or in-store payments, consider using digital wallets that offer tokenized and encrypted transactions.
  • Secure your mobile devices: Protect your devices with passwords and use banking apps rather than mobile browsers for safer transactions.
  • Regularly check your credit reports: Use free services like AnnualCreditReport.com for regular checkups to detect anomalies like unrecognized accounts.
  • Review financial and medical statements: Scrutinize all transactions on your financial statements and ensure your medical service records match your medical history to prevent healthcare fraud.

Identity Theft Protection Services

Identity theft protection services such as Aura, ID Shield, LifeLock, and Identity Guard offer helpful hand in defending against people becoming victim to this pervasive crime. When evaluating potential solutions for your protection, be sure to consider the following:

  • Touch Id Desktop Streamline Icon: https://streamlinehq.com

    Credit and Identity Monitoring

    Credit and identity monitoring is at the heart of identity theft protection services. Identity monitoring is a 24/7 endeavor, and identity monitoring services such as Norton LifeLock and Aura constantly scour the web for signs of identity theft. Once they detect unusual activity, they alert you through your chosen contact method.

    Credit monitoring is usually performed across all three major credit bureaus in the U.S. — TransUnion, Experian, and Equifax. Like identity monitoring, services keep an eye out for any unexpected changes, such as sudden shifts in your credit score or unanticipated credit inquiries, which could signal potential identity theft.

  • Identity Recovery Services

    Since no service can fully guarantee protection against identity theft, the recovery process becomes vital to any identity theft protection plan. Many services provide dedicated identity recovery assistance to help individuals regain control of their financial information and personal data.

    These services often deploy case managers or trained advisors to guide customers through the process. They assist in tasks ranging from writing letters to debt collectors and creditors to helping freeze credit reports, effectively taking the burden off the victims of identity theft. Moreover, many supportive professionals are available round-the-clock to ensure timely and efficient identity restoration.

  • Identity Theft Insurance

    Identity theft insurance policies are typically an attractive part of an identity theft protection service, especially when their coverage limits top $1 million or more. However, these policies usually only cover out-of-pocket costs related to restoring your identity instead of compensation for legal expenses and financial losses. Additionally, the policy may include deductibles or other exclusions, so reading the fine print is critical.

  • Protection for the Whole Family

    When it comes to PII protection, it’s essential to focus on the whole family – even the kids. Most identity protection services provide individual plans as well as plans for up to five family members. One of the most comprehensive family protection plans is from Norton LifeLock, although it is also one of the most expensive per month on the market.

Recovering from Identity Theft

The good news is that recovering from identity theft is possible, and the sooner you detect the fraud, the quicker the recovery process will be.

If you find yourself a victim of identity theft, even with the best identity theft protection in place, it’s important to take immediate action. Here are the essential steps to follow when your identity is stolen:

  • Contact the companies where fraudulent activity has occurred and explain the situation to them.
  • Place a fraud alert on your credit report to freeze it. Obtain copies of your credit report for further examination.
  • Report the theft to the Federal Trade Commission (FTC) through their website at IdentityTheft.gov.
  • File a report with your local police department to document the crime.

Additional resources

Credit Bureaus:

  • Call (800) 685-1111

  • Call (888) 397-3742

  • Call Call (888) 909-8872

Identity Theft Organizations:

  • The FTC offers free personal recovery plans and a platform to report identity theft. They cover over 30 different types of identity theft.

  • This federally approved website allows every U.S. citizen to request a free credit report once a year. Regularly monitoring your credit report is crucial as signs of identity theft often appear there.

  • This center provides free assistance to victims, helping them resolve their cases without any cost.

By utilizing the available resources, you can begin the process of recovering from identity theft and regaining control over your personal information and financial well-being.

So What Now?

Identity theft is an ever-evolving problem affecting millions of individuals annually so constant vigilance – both online and offline – is essential. This guide underlines the importance of understanding the various types of identity theft, how online criminals might exploit your personal information, some prominent identity theft protection services, and what to do should you become a victim of identity theft.

If you’re interested in a service to help protect your identity, finances, and personal information, visit our 10 Best Identity Theft Protection providers page to find the solution best for you

While complete immunity from identity theft is never guaranteed, proactive measures like securing your Social Security number, adopting digital wallets, setting up transaction alerts, and regularly checking your credit reports – help safeguard you from dramatic losses from this crime.