Identity Theft Protection

]

Identity theft protection COVERS your privacy

Your personal situation is different from someone else. The identity theft protection service that works for someone may not be the best choice for someone else. You should take the time to understand all the identity theft protection options available to you to find the best solution for your needs and goals.

What Is Identity Theft Protection?

Identity theft is a crime in which someone accesses information to commit fraud, typically by getting false credentials, opening new accounts in someone else’s name or using someone else’s existing accounts. Identity theft is a serious crime in the United States. Nearly 15 billion dollars were stolen from identity theft victims in 2017.

How Does Identity Theft Occur?

There are a lot of ways identity theft can happen to you. Hackers may get your information from a data security breach. Or you may unknowingly provide it on social media, during conversions others can hear or by leaving financial documents in unsafe places.

Types Of Theft | Difficult To Detect

QQ
TYPES OF IDENTITY THEFT

An identity thief might use your personally identifiable information (PII) to access and drain your bank accounts, damage your credit, or more.  Here are some of the different types of identity theft that you should know about to help protect your information and finances:

  • Existing Account Takeover – The is the most common type of identity theft.  This occurs when criminals access your existing accounts. Once they break in, thieves can charge your credit cards, file claims against your insurance policies, or otherwise drive your finances off a cliff.
  • New Account Creation – A thief can create a totally new account using your personal information, often via the Internet.  This is difficult to identify unless you closely review your credit report for new accounts openings.
  • Tax FilingIf a criminal has your personal information, he/she can file a tax return for a refund.  The IRS then rejects your tax return.  Problems.
  • Medical – When an identity thief uses your health insurance to get medical care in your name, doctors may update your records with the imposter’s medical information.  You may receive fraudulent bills.  Or bills not received are bills that are not paid  which will hurt your credit or future insurance coverage.
  • Employment – If an identity thief uses your name and SSN on an employment application, the employer will report wages to the IRS and state authorities.  You may then be liable for additional taxes.
  • Child – Children’s Social Security numbers and personal information are used by an identity thief to open new accounts, apply for government benefits, take out loans, and more.  Your child may not be aware of this until he/she applies for credit.
QQ
A Difficult crime to spot

Identity theft can be a difficult crime to spot.  It is one of the key reasons why so many people become victims. Here are facts about this growing crime that can give you the information you need to help protect yourself.

  • Identity theft is a problem for millions of people – 7 million consumers experienced identity theft in 2017.
  • Identity theft happens regularly – There was a victim of identity theft every 2 seconds in 2017.
  • Data breaches contribute to identity theft – A single data breach could expose enough of your personal information to make you an identity thief’s target. There were over 1,000 breaches in 2016
  • Social Security numbers are key– Social Security numbers aren’t easily replaced. If yours is lost or stolen, an identity thief could use it for years or even wait years before using it the first time.
  • Public Wi-Fi is an identity thief’s friend – With the right tools, identity thieves can monitor what you do on public Wi-Fi, even if it is password protected.
  • You can do everything right and still be a victim – If there is a data breach at your doctor’s office, school, or any other business that has your personal information, you could be at risk of identity theft. 36 million records were breached in 2016.
  • The risk is everywhere – In today’s digital world, you are more likely to have your identity stolen from the Internet than your car stolen or your home burglarized.
  • Recovery takes time – In 2017, over 140 million hours were spent by identity theft victims trying to solve their issues.

Identity Theft Crime Categories

Federal Trade Commission Identity Theft Complaints (2018)
Employment or Tax Fraud
0%
Credit Card Fraud
0%
Telephone or Utilities Fraud
0%
Bank Fraud
0%
Loan or Lease Fraud
0%
Government Documents or Benefits Fraud
0%

What Else Should I Know?

In this age of electronic data and the internet, our personal information and digital footprints circulate faster than ever.  And there are criminals ready to take advantage, at any time. Everyday activities may unknowingly put you and your family at risk. Even simple things like sharing phone numbers, home addresses, and email addresses, can open the door for thieves to get deeper access to personal information and potential risks.

Process | Checklist

QQ
Identity THEFT Protection Process

Identity theft can impact anyone, anywhere, at any time.  That is why an identity theft protection service needs to be a proactive, advanced system that helps keep your personal information safe.  The service delivers ongoing monitoring, rapid alerts, and recovery services so you can rest assured that someone with experience and knowledge is supporting you 24 X 7.

MONITOR

Continuous monitoring of your identity, privacy, and credit by using innovative and proactive identity theft protection technology.  Detection of illegal selling of your personal, financial, and credit information.

ALERT

A warning system rapidly notifying you when your personal information is at risk.   Alerts are sent to your smart phone, tablet, or desktop computer, so you have the power to act before damage is done.

CONTROL

When you want total identity control you need to know where or how your online information is being used. Protect your keystrokes, PIN numbers, and credit card information.

RECOVER

Certified Protection Experts offer comprehensive, 24/7 recovery services.   We will, on your behalf, complete paperwork, make calls, and handle every detail to restore your identity.

QQ
identity THEFT protection checklist

The following is a brief list of the six most important things your identity theft protection service should include:

  • Both Identity Protection and Credit Report Monitoring – Comprehensive protection that searches for unauthorized use of your identity in the dark web and public records and suspicious activity on your credit report will reduce your risk by increasing your chances of catching problems early.
  • Rapid Notification of Suspicious Activity – A service that proactively alerts you to suspicious activity in a timely manner will greatly reduce liability by catching problems early.
  • Privacy Protection Tools for Your Online ActivitiesAnti-phishing and anti-keylogging software is important. It helps protect you from malware and adds that extra layer of security you need when using the Internet.
  • Frequent Access to Credit Scores and Reports – You need to be aware of any changes to your credit scores or reports multiple times during the course of the year.
  • Fully Managed Restoration and Identity Theft Insurance – The service you choose needs to be committed to managing the restoration of your identity if you become a victim of identity theft. They should manage it for you every step of the way so you don’t have to.
  • Complete Coverage for You, Your Spouse, and Children – Adults aren’t the only ones vulnerable to identity theft. Be sure to select a identity theft protection service that offers you complete coverage for you and your family.

Thoughts On Identity Theft Protection

Approximately 1 out of every 4 adults are victims of identity theft and witness an average loss of about $3500 in each instance. The damage of ID theft can be devastating and the fall-out hard to contain.

Whether you choose to subscribe to a third-party identity theft protection service or simply want to take some basic steps to help protect your privacy and finances, here are some suggestions.

ACTION
REASON
Deleting Files Shed the unwanted risk of computer files you no longer need by deleting excess clutter.
Create Strong Passwords No two passwords should be the same. Passwords should be -8-12 characters, random strings of upper and lower-case letters, numbers, and symbols.
Avoid Public WIFI Don’t use WIFI for sensitive transactions; assume all your activities are being monitored. Use a Virtual Private Network (VPN) service, which encrypts your transmissions. Make sure your home WIFI is secure.
Don’t Click At Random Hackers put out links to lure people into clicking, to trigger a virus or spy download. When in doubt, don’t click.
HTTPS If you visit a website that has “https” that indicates that it is a Secure website, with server encryption software to protect communications. If the website has “http” instead, it means that it is not secure, but it does not mean that it is malicious.
Anti Spyware & Malware Run Anti-Spyware & Malware software on your computer frequently, to keep things clean.

Credit Repair | Identity Theft

Frequently Asked Questions

Debt Relief Articles

This Internet site provides information and reference material to consumers. It is intended to help connect them with providers of products and services that may assist them in their financial needs.