Protect yourself from identity theft.
Identity theft is a federal crime. It occurs when someone uses your personal information without your knowledge or permission for financial or other gain. It's one of the fastest growing crimes in America. Prime targets include children, college students, military members, veterans and seniors, but can happen to anyone at any time.
Identity theft can create havoc in your life, so it is very important to know how to protect yourself, detect warning signs and correct problems as they arise if your identity is stolen.
Resources
Equifax - 800.525.6285
Experian - 800.397.3742
TransUnion - 800.680.7289
Better Business Bureau
Federal Trade Commission (FTC)
Internal Revenue Service
Federal Bureau of Investigation's Internal Crime Complaint Center
National Cyber Security Alliance
US Department of Homeland Security
Below is information on identity theft and ways to protect your identity.
- Use a locking, security mailbox if possible, or consider renting a PO Box at your local post office. Put outgoing mail into a postal mailbox.
- Sign up for the free Informed Delivery service offered by the US Postal Service. It provides digital previews of mail scheduled to arrive soon.
- Shred unwanted documents containing personal information and all unsolicited credit card or loan offers.
- Invest in a high-quality cross-cut shredder. Thieves can piece together papers shredded into horizontal strips.
- “Shoulder surfers” observe your actions or eavesdrop on stealing personal information and may use a phone to record you.
- Shield keypads with your hand or body before entering PINs, passwords or
card numbers. - Avoid sharing personal information over the phone in public. If you must, use a low voice and shield your mouth.
- Carry minimal payment cards.
- Don’t carry your social security card, PINs or account passwords and memorize passwords tor keep them safely secured at home.
- Be aware of current scams. Watch or read the news. The Federal Trade Commission (FTC), offers information and tips on current scams at consumer.ftc.gov/scams. The FBI also offers tips and prevention information about scams at uspis.gov.
- Before divulging personal information to anyone, know who you’re dealing.
Independently verify any information provided. Find the physical address and phone number of who contacted you by yourself. Don’t trust email addresses given by unknown people. Search online for a company name and website. Read through the site and read any online reviews of the person or business. - Never reply to messages asking for personal information, whether the message was sent over the phone or by email, text or through an ad. Do not call phone numbers or click on links containing these messages. You could be a target of phishing.
- Never send money or account information in reply to a notice that you won a prize or lottery.
- Give only to established charities. Avoid pop-up charities that suddenly appear after disasters. Check a charity’s trustworthiness with the Better Business Bureau’s Wise Giving Alliance site at give.org.
- Don’t fall for pressure tactics. Never react quickly or impulsively to offers or requests.
- Be wary of “impostor” scams in which a scammer pretends to be someone close to you or an entity you’re unlikely to question. Fraudsters pretend to be family members, friends, love interests, government agencies or companies often trying to get personal information.
- Safely store cards when they are not in use.
- Always memorize your card PINs. Never write them down on cards or share them with others. Change them frequently.
- Make a list of your card account numbers, expiration dates and customer service phone numbers. Keep the list in a secure place that you can access quickly if your cards are lost or stolen.
- Go paperless with bills and statements.
- Check your card activity and bank accounts regularly. Look for unfamiliar charges.
- Don’t allow websites to remember your card numbers.
- Use a credit monitoring service. Paid services have more robust monitoring. Free services let you look up your credit score and tell you if a new account has been created or closed.
- Report and investigate any questionable charges to your card immediately. A thief may first charge a small amount to “test out” using your card. Unwary consumers often do not notice or care about small amounts, making them prime targets for identity theft and fraud.
- When you receive replacement cards, thoroughly destroy the old ones.
- Ask your credit card companies to stop sending balance-transfer checks. Thieves can steal these from your mailbox or trash and use them to access your credit and identity.
- Don’t give your card information over the phone unless you have made the call and you know you’re dealing with a trustworthy business.
And remember, if anything looks funny or doesn’t feel right, walk away.
Whether you are running errands or just out for fun, be vigilant about payment card safety.
- Observe the person you’re paying. Make sure that person isn’t holding anything like a portable skimmer and that your card doesn’t leave your sight. When you receive your card back, double check that it is indeed yours and was not swapped for another.
- Insist on privacy when entering your PIN.
- Check sales vouchers carefully before signing.
- Never leave a line blank on a receipt. Draw a squiggly line through any blank space to prevent an unwanted amount being added.
- Be sure a transaction is complete before you walk or drive away from an ATM machine.
- Always take card sales receipts or ATM transaction slips. Never leave them near the ATM or sales terminal. Save them to compare against account statements. Shred them when no longer needed.
- When eating at a restaurant, ask to pay your bill up front at the sales terminal instead of giving your card to a server, or pay at the table when available.
- Consider using Apple Pay or Google Pay with your mobile device. Cashiers can’t see your card number, and the process is secure.
- Consider using RFID-blocking card carriers and protectors. Although rare, skimming devices can scan, read and capture information from payment card embedded with RFID tags just by being near them.
Before you leave, clean out your purse and/or wallet. Remove all unnecessary cards or items. Carry nothing with your social security number on it. Make note of which cards and documents you decide to carry in case of loss or theft.
These are favorite payment card skimming spots as well as popular with purse snatchers.
They could have information-stealing software in place. If you must use one, avoid entering any personal information or logging onto online accounts.
Your checks show your name, address, bank name, checking account number and checking account routing number—a whole “kit” thieves can use to take over your account. They also can forge checks to withdraw money. If you opt not to use cash or payment cards, use traveler’s checks.
A common scam involves a call to your hotel room from the “desk clerk”. This person tells you about a problem that requires you to provide a credit card number over the phone. If this happens, hang up and call or visit the front desk to check.
Thieves slip made-up flyers for fake food delivery services under hotel room doors, hoping you will call and order using your credit card. Check the reliability of all fliers with the front desk.
Airports, hotels and other public places offer Wi-Fi for Internet access. A secure wireless network encrypts all the information you send using that network. However, Wi-Fi hotspots are often not secure. This measures information you send though some websites or mobile apps can be accessed by other network users. If you choose to use public Wi-Fi, be very cautious.
- Make sure it’s an authenticated Wi-Fi
network. Always manually select network connections and know the exact name of the establishment’s network. Scammers may set up “free”
computer-to-computer networks with look-alike names to fool you. - Never log in or send personal information to unencrypted website and be aware that for security, the site should be fully encrypted.
- Always log off an account as soon as you have finished using it.
- Consider a VPN (virtual private network) service to protect your information when using public Wi-Fi.
attachments, downloads and the links within emails or pop-up windows. Carefully read all disclosures, including the privacy statement and licensing agreement, before downloading and installing software. Malware may be bundled in with it. Look for wording about personal information collection, Internet activity monitoring or additional programs.
- Slow or sluggish performance
- Computer crashes
- Repeated error messages
- Being automatically sent to websites you didn’t mean to visit
- An unintended reset to a new Internet home page that can’t be undone
- Getting bombarded with pop-up ads and/or ads popping up when a browser is not open
- Finding a new toolbar added to your browser
- Seeing new icons on your desktop
- Your online search results page shows only ads
- Emails sent from your account that you didn’t write
- Decreased battery life, interrupted or dropped calls and crashing apps on mobile devices are also warning signs of a malware infection
When a person creates a fake identity on social media, usually targeting a specific victim for abuse, deception or fraud. Catfishing is often used for romance scams on dating website.
When cyber thieves send you emails that try to lure you into providing or confirming personal information. The emails look like they’re from legitimate organizations, often ones you know. These ordinarily used threats, warnings or
enticements to create a sense of urgency. You’re usually asked to click on a link. If you do, it can lead to a spoof website. The site looks real enough to trick you into entering personal information. Signs of phishing emails could include:
- Request (usually urgent) for you to make contact through a provided link
- Spelling and grammar mistakes
- Generic greetings, like “Dear User”
- Unsolicited attachments
Very similar to phishing, this is when criminals use automated dialing systems to call or text you with messages intended to trick you into sharing personal information. The message will direct you to a phone number or website that asks you for the information.
phishing, smishing and vishing frequently cause identity-stealing malware downloads.
- Never click on links from unknown senders.
- Be cautious about clicking emails and text message links even from known senders.
- Don’t trust contact information provided in emails, text messages or pop-ups. Verify it on your own.
- Don’t respond to text or automated voice messages on your mobile phone if they’re from an unknown or blocked called.
- Know that most legitimate companies and organizations won’t request personal information via email.
- Be cautious about downloading email attachments. Ensure you know and trust the sender.
A firewall is basically a software program or a piece of hardware that helps to screen out malware and hackers that try to reach you through the Internet while you are on it.
Don’t assume an anti-virus program offers protection against all kinds of malware.
Viruses are one type of malware. Other types, including the information-stealing malware known as spyware, may not be covered by an anti-virus program. Investigate security software programs and make sure yours is comprehensive.
- Always update. Keeping your operating systems, security software programs and browsers current can help secure your identity. Updates provide new patches for any security weaknesses.
- Evaluate your browser’s privacy settings, plus think about limiting or disabling
cookies—those tiny bits of data used by web servers to identify users. Some cookies are useful, but others can be used maliciously and collect information about you. - Explore security options for all devices that connect to the Internet, including
gaming systems. - Make sure mobile devices aren’t set to automatically connect to nearby Wi-Fi, as this can expose you to unsecured network.
- When not in use, disable mobile device features that connect you to other devices.
- Set mobile phones, tablets and laptops to lock automatically after five minutes or less of non-use.
- Back up your data regularly.
- Before disposing of a computer, mobile device or any Internet-connected item, completely and permanently remove all personal information from it.
- If you use an at-home wireless network, take steps to secure it. Otherwise, unauthorized users may be able to access your personal information, see what you’re transmitting and download malware.
- Create strong passwords that are at least 10-12 characters long and include
a combination of capital and lowercase letters, digits and special characters. - Don’t make them predictable. Change them frequently.
- Consider using a password manager to create complex passwords without
needing to remember them. - Don’t use the same password for multiple accounts.
- Don’t open emails from unknown senders.
- Never email financial information or your social security number.
- Download software or email attachments only from sources you know are trustworthy.
- Read all disclosure information before downloading software, including apps.
- Always type authenticated web addresses directly into your browser bar instead of clicking links.
- Limit what you share on social media.
- Consider increasing your privacy settings.
- Don’t stay signed into accounts. When you are finished, log off and close your browser.
- Close all pop-up windows by clicking on the “x” in the title bar. Consider using a pop-up blocker.
- Don’t put unknown flash drives into your computer. Use two-factor authentication for online accounts when available. This is when you provide two different ways to verify yourself, such as a password and a phone
number, to better protect you.
The “https” at the beginning of the web address indicates the page uses a secure form of encryption to protect the information you enter. Most browsers use other security indicators—a symbol, such as a padlock and/or a color change. Learn how your browser reports website security levels but remember, indicators are not foolproof.
Research businesses on the Better Business Bureau’s website, bbb.org or through an online search. Read the reviews. Confirm the business or seller’s physical address and phone number. Legitimate entities provide this so you can contact them with problems.
Understand what personal information the site collects, how it’s used and if it’s shared. Learn what security measures are used to protect your information.
Read through return, refund or shipping policies, terms of use and other information provided about the establishment, its site and how it conducts online businesses.
Shop online with a credit card rather than a debit card, which provides direct access to the money in your bank account.
- Lock up your purse or wallet when it’s not with you. Too often, payment cards, checks and other identity-related items are stolen at the workplace.
- Also lock up personal and work-issued mobile devices, ID badges and workplace access cards with not in use.
- Don’t put your personal information at risk in the case of a workplace security breach. Never reuse personal passwords for work, log into personal accounts from work or store personal data or material on work computers or devices.
- Keep all work passwords and usernames confidential. Don’t write them down and store then in your work area.
- Securely store anything with your or others’ personal information at the end
of your workday. - Verify the identity of anyone who claims to work for or with your workplace and asks you to share personal or sensitive information in person, online, over the phone or by mail.
- Be aware of who is around you when you input, share or access sensitive information. Shield screens, keyboards or keypads when necessary. If speaking, take eavesdropping precautions.
- Thoroughly shred unwanted documents containing others’ personal information.
- Log off and close all screens when you step away from your computer.
- Be extra vigilant about personal information safety when temporary workers, service professionals, delivery people and other visitors are present.
- Watch out for phishing targeted to employees at your workplace. Don’t assume work computers, software and Internet security systems will prevent you from accidentally introducing malware. You share in the responsibility of keeping your organization’s system safe.
- Immediately report any signs of suspicions of malware or security breaches according to your employer’s procedures.
- Call any business where you know fraud took place. Ask to speak to the fraud department. Say your identity was stolen. Ask for your account(s) to be closed or frozen so an identity theft can’t add new charges.
- Place an initial fraud alert on your files. Contact one of the three major US credit reporting companies to report yourself as a victim of identity theft and to place the initial fraud alert. That one must tell the other two. Ask the credit reporting company you contact for confirmation that this will be done.
- A fraud alert on your credit report lets lenders and creditors know that they should take steps to verify your identity before they issue you credit. This may help prevent identity thieves from opening new accounts in your name. An initial fraud alert is good for 90 days and may be renewed. You may later choose to place an extended fraud alert. You might also choose at this time to place a credit freeze.
- Order a credit report. By law, you are entitled to a fee copy of your credit report once a year from all three companies. You must contract each individually to order a report. You may wish to order one now and the other two at later times to track new activity or corrections. Immediately review your credit report and note any unfamiliar transactions or accounts. Give this information to authorities such as the FTC and the police.
- File a complaint about the theft with the FTC. You can do so online at reportfraud.ftc.gov or by phone at 1.877.438.4338. Include as much information as possible and follow instructions carefully and make sure to save and print out your completed complaint. Once it’s printed out, it becomes an Identity Theft Affidavit. The affidavit helps you create an Identity Theft Report.
- File a police report. Go to your local police station (or the police station where the theft occurred). Say you are a victim of identity theft and wish to file a police report. Bring along the following:
-
- A copy of your Identity Theft Affidavit
- Any other proof of identity theft
- Proof of your address
- Government-issued photo ID
As you respond to identity theft, set up a system that helps you track information and deadlines.
- Log every phone call. Write down the date and time, phone number and any other contact information. Also record the name, department and title of the person you spoke with, as well as a summary of the information discussed.
- Confirm discussions in writing with follow-up letters or emails.
- Set up a filing system especially for this issue.
- Never send original documents. Keep them security filed. Send only copies to others.
- Send all letters, documents copies or other materials by certified mail with a
return receipt requested. Log who you sent that and when. - Make and file copies of all the correspondence or completed forms you
send. File all correspondence or documents you receive.
Resources subject to change.