Saturday, January 4, 2020
10 Ways Identity Thieves Can Get Your Information
Identity theft is when someone fraudulently uses your personal information, such as your name, date of birth, Social Security number, and address, for their financial gain. These uses might include obtaining credit, getting a loan, opening a bank account, or obtaining a credit card account or false I.D. card. What Happens When Someone Steals Your Identity If you becomeà the victim of identity theft, chances are it will cause severe damage to your finances and your good name, especially if you dont find out about it immediately. Even if you do catch it quickly, you can spend months and thousands of dollars to repair the damage done to your credit rating. Worst-case scenario, you can even find yourself accused of a crime you did not commit because someone used your personal information to perpetrate the crime in your name. Consequently, it is vital in todays electronic age to secure your personal information in the best way possible. Unfortunately, identity thieves are just waiting for you to make a mistake or get carelessââ¬âand there is a wide variety of ways they go about stealing personal information. Read on to find out some of the most common methods identity thieves use and what you can do to avoid becoming their next victim. Dumpster Diving Dumpster divingââ¬âwhen someoneà goes through trash looking for personal information that can be used for identity theft purposesââ¬âis becoming less common in the digital age. However, identity thieves still sift trash in search of credit card and bank statements, medical information, insurance forms, and old financial forms (such as tax forms). What you can do: Shred any sensitive material that might be used for illegal purposes prior to disposing of it. Stealing Your Mail Identity thieves will often target a person and steal mail directly from your mailbox. Thieves will sometimes have your mail redirected by filling out a change of address request at the post office. What you can do: Whenever possible, go paperless. Do as much of your banking and bill-paying online at sites that you trust are secure. Keep track of your bills and statements and know whats due when. If things arent showing up that should be and you suspect your mail may have been redirected, contact your local post office immediately. You might also consider forgoing a traditional mailbox and installing a mail-slot. That way, your mail will be safe inside your (hopefully) locked home. Stealing Your Wallet or Purse Identity thieves thrive by illegally obtaining personal information from others, and what better place to get it but from a purse or a wallet? A drivers license, credit cards, debit cards, and bank deposit slip, are like gold to identity thieves. What you can do: Keep the important stuff separate if possible. If you must carry a purse, make sure its one thats not easily snatched. Messenger-style bags that cross your shoulder are a good bet. Pickpockets prefer to come from behind so if you carry a wallet, try to keep it in a front pocket of your pants rather than a back pocket. You Are a Winner! Identity thieves use the temptation of prize winnings to lure people into giving them personal and credit card information over the phone. The identity thief dangles contest winnings, such as a big sum of money, a free vacation, or a new carââ¬âbut insists that you must verify your personal information, including date of birth,à to prove you are over 18 years of age. Or, theyll say that the car or vacation is free, except for the sales tax, and explain that the winner must provide them with a credit card number. Theyll usually try to pressure you into telling them what they want to hear, saying they have to have the information immediately, or youll forfeit the prize. What you can do: If it sounds too good to be true, it likely is. Never give out your personal information over the phone to someone who says youve won a contestââ¬âeven if youve entered a contest. In the event you actually do win something, you will be contacted by verifiable means. Skimming Debit or Credit Card Numbers Skimming is when thieves use a data storage device to capture the information from the magnetic strip on your credit, debit, or ATM card at an ATM or during an actual purchase.à When skimming from an ATM, thieves attach card readers (called skimmers) over the legitimate terminal card reader and harvest data from every card swiped. Other tactics are to place a fake PIN pad over the real one to capture victims PINs (personalà identificationà numbers) as they enter them, or installing tiny cameras. Shoulder surfingââ¬âwhich is more old-schoolââ¬âis when a person reads over the shoulder of a card user to get their personal identification number. Skimmingà can occur anytime someone with a digital card reader gains access to your credit or debit cards. It can be done easilyà when the card is surrendered, such as in restaurants where it common practice for a waiter to take the card to another area to swipe it. Once thieves have collected the stolen information, they can log into an ATM and steal money from the harvested accounts, or clone the credit cards to sell or for personal use. What you can do: The good news is that credit card technology has advanced to combat the problem of identity theft. Using chip-enabled cards whenever possible will cut down on the threat. Make sure youre signed up for fraud alerts for your credit and debit cards and that the pertinent apps for them are enabled. To thwart cameras and prying eyes on the low-tech side of things, do what you can to obscure any direct view when you enter your PIN number. Of course, if you want to avoid the issue altogether, you could pay cashââ¬âbut its not a recommended option for dealing with large sums of money. Phishing Phishing is an email scam in which the identity thief sends an email falsely claiming to be from a legitimate organization, government agency, or bank to lure victims into surrendering personal information such as aà bank account number, credit card number, or password. Phishing emails often send victims to a phony website thats designed to look like the real business or government agency. Most major banks, eBay, Amex, and PayPal are regular bait in phishing scams. What you can do: Look at the email closely. Many phishing scammers use poor grammar and spelling. Another giveaway is if they address you with anything other than the full name on your account. Salutations such as Dear Customer and Attention Account Holder are red flags that indicate a phishing expedition. Check the full return email address. While it might contain some of the company name the phisher is claiming to represent, it wont be complete and will likely have a bunch of unrelated add-ons. If you suspect phishing report it immediately. ââ¬â¹Obtaining Your Credit Report Some identity thieves obtain a copy of your credit report by posing as your employer or rental agent. This gives them access to your credit history including your credit cards numbers and loan information. What you can do: Consumers are entitled to one copy of their personalà credit reportà from the three nationalà credit reportingà companies each year at no cost from AnnualCreditReport.com. Theseà reportsà include a complete listing of everyone who has requestedà your credit report (theseà requests areà called inquiries). Pretexting Pretexting is the practice of obtaining someones personal information using illegal tactics, then selling the information to people who will use it, among other things,à to steal the persons identity, Pretexters may call and claim that theyre with the cable company and are doing a service survey. After exchanging pleasantries, theyll askà about any recent cable problems, and see if youd mind completing a short survey. They may also offer to update your records, including the best time of the day to provide service should you need it, and take your contact information including name, address, and telephone number. Armed with your personal information,à pretexters oftenà search for public information about you, to learn your age, if youre a homeowner, whether or not you paid your taxes, places that you lived before, and the names of your adult children. If your social media profile settings are public, they can learn about your work history and the college that you attended, which may give them the ammunition they need to call former or current companies with which youre associated to gain information that will give them access to yourà financial information, health records, andà Social Security number. What you can do: Unless youve initiated a call to a company, dont give out any information. Its that simple. Be polite but firm and hang up. Keep your social media settings private, and limit any information you include on professional networking sites. Business Records Theft and Corporate Data Breaches Theft of business records involves the theft of paper files, hacking into electronic files, or bribing an employee for access to files at a business. Identity thieves will sometimes goà through the trash of a business to get employee records which often contain Social Security numbers and customer information from charge receipts.A corporate data breach occurs when a corporations protected and confidential information is copied, viewed or stolen by someone who is unauthorized to obtain the information. The information can be personal or financial including names, addresses, telephone numbers, Social Security numbers, personal health information, banking information, credit history, and more. Once this information has been released, it will likely never be recovered and the individuals affected are at an increased risk of having their identities stolen.à What you can do: Theres not much you can do to prevent something like this. As soon as you become aware of any situation involving a public entity that has compromised your personal information, alert your bank and credit card companies, and contact the department of motor vehicles to alert them to the possible misuse of your drivers license number. Depending on what information was stolen, take as many proactive steps as possible. The FTC offers these guidelines: If the company responsible for exposing your information offers you free credit monitoring, take advantage of it.Obtain your free credit reports from AnnualCreditReport.comà to look for any activity you dont recognize.Consider putting a credit freeze on your accounts with the three major credit report agencies. This makes it harder for someone to open a new account in your name.File your taxes early, before a scammer has the opportunity to use your Social Security number to file a fraudulent tax return.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment