{"id":1620,"date":"2020-09-05T12:59:19","date_gmt":"2020-09-05T19:59:19","guid":{"rendered":"https:\/\/betterdefend.com\/?p=1620"},"modified":"2020-10-04T07:43:01","modified_gmt":"2020-10-04T14:43:01","slug":"identity-theft-overview","status":"publish","type":"post","link":"https:\/\/betterdefend.com\/identity-theft-overview\/","title":{"rendered":"What is Identity Theft and Why You Need Protection Today."},"content":{"rendered":"

Identity theft is one of the fastest-growing crimes worldwide. According to the Bureau of Justice Statistics, 10% of individuals aged 16 or older had been victims of identity theft in 2016.\u00a0 Based on the 2016 survey, 13.5 million females experienced identity theft while 12.5 million males had also experienced the same crime. So, how does identity theft occur? This crime happens when someone uses your personal information to purchase anything without your permission.<\/p>\n

Today, several forms of identity theft can affect you in different ways. Although there\u2019s no solid platform or method to exclude yourself from this crime, you can still prevent these criminals from targeting you by increasing your awareness, learning how your information can be at risk, and what they can do with it.<\/p>\n

What is a Data Breach?<\/h2>\n

Data breaching can happen when someone gains access to an individual\u2019s or organization\u2019s data without their permission. Perpetrators usually target personal, sensitive, confidential, and protected data such as full names, Social Security numbers, and bank information (account number, PIN, mailing address). Based on data from the Identity Theft Resource Center (ITRC), over 1,244 data breaches incidents were reported in the US, which disclosed more than 446 million records in 2018.<\/p>\n

Forms of Identity Theft<\/h2>\n

Driver’s License Identity Theft <\/strong>Once a person steals your driver’s license, it can be used to buy items under your name by using your information when filling out forms of identification, while using their picture. If your driver\u2019s license is stolen, immediately contact the DMV (Department of Motor Vehicles) and put a freeze on your credit accounts.<\/p>\n

Mail Identity Theft <\/strong>
\nMail identity theft is one of the classic methods for criminals to collect your personal information through your mail. If someone stole your mail like your pre-approved credit card, they can retrieve valuable information like your financial account information, which can be used to make purchases or open up new credit cards. Once they have your primary identification such as your full name and account number, they can easily change the information of your mailing address to their desired location.Based on the data gathered by the US Postal Service\u2019s Annual report, it received over 60,000 complaints of mail theft in 2016, which resulted in over 2,000 convictions. If you think one of your mail has been stolen, you can file a mail theft complaint with the US Postal Inspection Service.<\/p>\n

Debit Card Fraud or Credit Card Fraud <\/strong>
\nDebit or Credit card fraud is done when someone uses your debit account or credit card to make a transaction without your permission. These criminals can also steal your personal information from your credit cards such as your personal identification number (PIN), account number, and security code to make unauthorized transactions without needing your physical credit card.<\/p>\n

One of the known credit card scams is the card-not-present fraud where defrauders use your credit card information to make a remote transaction.\u00a0 If you’re a victim of credit and debit card fraud, you can visit the US Fraud Center<\/a> to report the crime. Also, notify your bank if there\u2019s unauthorized or suspicious information that appears on your credit report.<\/p>\n

Online Shopping Fraud<\/strong>
\nAccording to a report by Experian, online shopping, or eCommerce fraud cases have increased more than 30% in the first six months of 2017 after credit cards with new chips were implemented in the US.<\/p>\n

Social Security Number Identity Theft<\/strong>
\nSocial security number (SSN) identity theft can occur when data breaches or Tax ID theft happen. If you find out that one of your mails has indicated the wrong last four digits of your SSN, or the wrong name or address, then you might be a victim of a Social Security Number Identity theft. To avoid this, make it a habit to regularly check your credit report and immediately report if you notice something unusual in your bank accounts \u2014 there are instances that it may just be an error from entering wrong information on a loan or credit application, but it still pays to check your information often.<\/p>\n

Account Takeover Identity Theft<\/strong>
\nThis type of identity theft occurs when someone gains access to your bank or credit card accounts \u2014 it can happen from a data breach, malware attack, or a phishing scam. Small businesses, commercial businesses, and corporate accounts are prone to account takeover identity theft, which has been happening for years. To prevent this from happening to your business, make it a habit to look for suspicious transactions on your account such as unknown charges. If someone manages to take over your account without your permission, call your bank and request a credit lock to prevent any damages or loss to your account.<\/p>\n

Senior Identity Theft\/Senior Scams<\/strong>
\nOne of the most common forms of identity theft in the US is senior identity theft or senior scam. It\u2019s a crime where retired individuals entrust their bank account information to scammers who have already developed a relationship over time by preying on them over the phone or via email. According to the Federal Trade Commission (FTC ), 37% of Americans (60 years or older) made fraud complaints in 2016; 20% of those complaints were for ID theft.<\/p>\n

What Can Happen if Someone Steals Your ID?<\/h2>\n

In our current age of digital technology, many cybercrimes occur every single day. Identity theft is becoming a norm in our daily life as there were 650,000 reported ID theft incidents in 2019. Many people have been victims of identity theft, which turns their world upside down in the blink of an eye. Here are some scenarios that you may experience from Identity theft:<\/p>\n

Low Credit Score:<\/strong> One common sign of being a victim of identity theft is having a low credit score even if you\u2019re paying your bills on time. Having a low credit score means it\u2019s going to be hard for you to get approved for a car loan application, home loan, personal loan, or even a student loan for your child.<\/p>\n

One possible reason why you\u2019re receiving a low rating on your credit scores can be because of an identity thief that has been using your personal information to obtain credit. After they get what they want, they will intentionally fail to make the monthly payments for the credit that they took out under your name, resulting in damages to your credit score.<\/p>\n

A Huge, Expensive Headache:<\/strong> Once you\u2019ve discovered that your account has been compromised by an identity thief, you need to do a lot of things to prevent damaging your credit score. You\u2019ll have to contact each of your credit reporting agencies associated with your account to freeze it and call them again to lift your credit account. Also, you have to manage a lot of paperwork, which may take longer than a year to get everything straightened out.<\/p>\n

That\u2019s why it\u2019s important to provide safety measures with your credit account to prevent anyone from stealing your personal information. Here are some ways to identify any suspicious activities that may lead to stealing your valuable information.<\/p>\n

Get Fraud Alert on Your Credit Report:<\/strong> A fraud alert is a preventive measure that notifies any businesses to confirm your identity before moving forward with a new credit application. It\u2019s a method that hinders identity thieves to make a new application under your name. Fraud alerts can last from 90 days to 7 years depending on the type of alert you add on your credit report. Also, adding a fraud alert to your credit report gives you a free copy of your credit report, which is a great opportunity to find any suspicious activity under your name.<\/p>\n

Freeze Your Credit Report:<\/strong> Unlike fraud alerts that require the creditor to verify your identity, a security freeze places a lock on your credit record, which prevents identity thieves from making new accounts under your name. It’s free to freeze your account, just hand in the required documents to prove your identity, and make a call to the credit bureaus to request a security freeze.<\/p>\n

Order Your Free Credit Reports<\/strong> Every year, you’re entitled to get a free copy of your credit report from the three main credit bureaus \u2014 utilize the opportunity by requesting one of your three reports every four months, so that you can monitor your credit for the whole year. However, the downside of this method is you can only see one bureau’s report at a time.<\/p>\n

Buy Your Credit Reports<\/strong> You can also buy credit reports from the credit bureaus if you have already used your free credit reports. If you want to thoroughly monitor your credit report, you can request a three-in-one report that gives you a more comprehensive view of your credit history.<\/p>\n

Monitor Your Accounts Online<\/strong>: Creating an online account with your bank and each of your credit card and loan accounts allows you to easily keep up with your account activity. Log in to check your account periodically to make sure no unauthorized charges have been made on your account. Keep your login information safe by not writing it down and not sharing it with anyone.<\/p>\n

Keep Your Social Security Number Safe<\/strong>: If your SSN falls into the wrong hands, it may play a major role in your credit score. Social Security numbers can be used for opening various accounts under your name, filing fraudulent tax returns, accessing medical care, or committing crimes. To prevent that from happening, avoid carrying your SSN card in your wallet and be aware of your surroundings when giving your number to customer service representatives.<\/p>\n

Stop Pre-Approved Credit Card Offers<\/strong>
\nNotify your banks to stop sending your pre-approved credit cards to you via mail. Pre-approved credit cards contain personal information that thieves can use for illegal activities. Also, if you have already received your credit card and are planning to dispose of it, shred it first to destroy any prints that could expose your identity.<\/p>\n

How do Thieves Steal your ID?<\/h2>\n

Thieves or fraudsters have different ways to steal your information. Here are some methods that criminals use to obtain personal and sensitive information from you.<\/p>\n

Phishing and SMiShing<\/strong> This cybercrime method occurs when cybercriminals attempt to send a fraudulent business email \u2014 emails that look very similar to official bank emails \u2014 to your email. They usually try to copy bank emails to get confidential and sensitive information from you. For example, a fraudulent email that looks very similar to an official email from a bank that wants you to verify your account. Once you\u2019ve clicked the \u201cverify link\u201d indicated in the email, it will direct you to a website, which looks similar to your local bank and requires you to fill out personal information to \u201cverify\u201d your account.<\/p>\n

Phishing can be done by opening anonymous emails that pretend to be official emails from different establishments like banks, restaurants, universities, and others. On the other hand, SMiShing is most likely similar to phishing, however, criminals use text messaging to obtain personal information instead of using emails.<\/p>\n

Dumpster Diving<\/strong> Even though it may sound like a load of rubbish, dumpster diving is another method for criminals to obtain information from pre-approved credit cards and bank statements. To avoid getting your information stolen from the dumpster diving method, make it a habit to shred important documents before you dispose of it.<\/p>\n

Wireless Hacking<\/strong> Wireless hacking is a new method to collect personal information without getting permission from its owner. It occurs when hackers intentionally gather confidential data from individuals that connect their devices into public WIFI networks or unsecured home networks. Some hackers may even install keylogging software \u2014 software that tracks users\u2019 credentials such as usernames and passwords \u2014 which track the websites that you visit on your devices. To prevent this from happening, always make sure to connect your device from secured WIFI and home networks.<\/p>\n

Fake Lottery Winnings and Job Ads<\/strong> \u201cYou\u2019ve won $300, click this link to claim your prize!\u201d Sounds familiar, doesn\u2019t it? These ads circulate on the internet and lure individuals to click the advertisements. Once you\u2019ve clicked these ads on the internet, it directs you to a web page that requires you to fill out personal information before you claim your prize. This is another method of identity theft that fraudsters use to obtain information and create fake identification to make illegal transactions. Protect yourself by remembering this simple saying, \u201cIf it sounds too good to be true, it probably is.\u201d<\/p>\n

ATM and Payment Machines<\/strong> Automated Teller Machines (ATM) and payment machines are not exempted from identity theft criminals, as these machines are often used by many people to withdraw money and pay different transactions. Cybercrime occurs when thieves tamper with the machines\u2019 card slot with a device that can steal information. To avoid this crime, be aware of your surroundings and conduct a simple inspection of the machine. If it looks like it has been tampered with, don\u2019t use it.<\/p>\n

What Information is Considered Private?<\/h2>\n

When talking about privacy, there are different terms that you can use to define it, such as: personal information, personal data, personally identifiable information, private information, protected health information, individually identifiable information, or individually identifiable health information. Here are some forms of information that can be considered private:<\/p>\n