Posted: Alayna Pehrson|May 4th, 2018

Identity Theft

Why You Should Take Identity Theft Seriously

Share:

Facebook Tweet mail
blog post author image
Written by Alayna Pehrson
Alayna Pehrson is a Content Management Specialist for Best Company. With a communications degree and a journalism background, she strives to provide helpful online content that is focused on credit repair, identity theft, business loans, & guns and ammo.

identity theft image

Especially in recent years, the term "hacker" has gained a lot of notoriety and tends to refer to the world's greatest technologically-based criminals. Moderns hackers are often labeled as people who intentionally access information/data without authorization through technological means. Identity theft typically comes into play after a hacker obtains the data or information they were targeting. The stolen data is taken to create a fake identity, and then often used for the hacker's own purposes or personal financial gain. Although large corporations and organizations are usually shown as the targets of cyber attacks, they aren't the only ones who should be preparing for security breaches.

What the Past Has Shown

The rise of identity theft and other cyber-related threats has become fairly obvious as security breaches have affected anywhere from millions to billions of people each year. According to USA Today, the top five largest security breaches include the following:

  • December 2016 Yahoo! breach (affected 1 billion people)
  • September 2016 Yahoo! breach (affected 500 million people)
  • May 2016 MySpace breach (360 million affected)
  • May 2014 eBay breach (145 million affected)
  • September 2017 Equifax breach (affected 143 million people)

The Equifax breach, although not as large as some breaches, was one of the most frightening identity theft cases in history. Everything from names to social security numbers to birth dates, addresses, credit card information, and even driver's license numbers were exposed. Although many people were affected, only a few actually knew for sure if they were victims or not. The unknown seemed to haunt many people as they struggled to learn if their accounts were secure or not. All of these past breaches have proven that anyone can become a victim and security should be made a priority.

What the Experts Say

Identity theft and scam prevention expert, Rob Douglas explained why people should be taking necessary precautions regarding their personal security:

"we are all being targeted daily by those who seek to steal our personally identifiable information (PII) or directly steal our money by means of cyber crime. Almost every day, Americans receive an email or a text message or other form of electronic communication (e.g. clicking on a seemingly innocent advertisement on a website that is infected with malvertising) that has the potential to do serious harm if not recognized for the threat contained within the communication."

Douglas warned that everyone is susceptible to hackers, which makes the hacker-related threat even more of an unfortunate reality. He explained that "as for hacking as a specific subset of security threats, even with the best virus/malware protection and cybersecurity practices, we are all under constant barrage from those seeking to overcome our defenses. Bottom line: The threats are real and they are never-ending.”

What You Can Do

Identity theft is a difficult crime to overcome, however there are a few things you can do to enhance your security. Douglas recommends four specific key actions that people can do to lessen their vulnerability to this type of crime:

  1. Use the technology you already have
    "Be sure to use the security technology embedded in your operating systems (be sure those programs are up to date)."
  2. Avoid deceptive emails
    "Never click on links or attachments in emails that you aren't 100 percent certain of who transmitted the email (and even then, steer clear of emails forwarded by friends and family members as they may have been tricked or their account hijacked)."
  3. Create unique passwords
    "Use individual, never-used-before passwords/passphrases for web-based accounts that contain personal, financial, or medical information (this includes all email accounts); use two-factor authentication."
  4. Monitor your accounts
    "Review all critical accounts for signs of fraud on at least a monthly basis."

Resources You Can Use

Although you can increase your security by performing the previously recommended actions, you are still largely at risk if you lack professional aid. Identity theft companies are often the smart way to go when it comes to protecting your identity. Reliable identity theft companies offer constant monitoring, instant notifications, recovery options, etc. Having this type of service can help you be aware of potential threats and allows you to have a peace of mind when it comes to your identity protection. Finding the right identity theft company may prove difficult, however there are trustworthy online resources that can help you locate the company that best fits your identity protection needs.

Compare the top ranked companies

Find the right company for you.

IdentityIQ image #1
MyIDCare image #2
LifeLock image #3
Complete ID image #4
LegalShield IDShield image #5
Zander ID Protection image #6 View
More

Learn More About The Top Identity Theft Companies

company logo
#1 IdentityIQ chevron_right
6.8 Overall Score
8.2
starstarstarstarstar_half
(264)
company logo
#2 MyIDCare chevron_right
6.5 Overall Score
7.8
starstarstarstar_halfstar_border
(156)
company logo
#3 LifeLock chevron_right
6.4 Overall Score
7.9
starstarstarstarstar_border
(910)

Related Articles

Card image cap
Your Online Guide to Writing an Identity T...

Guest Post by Nora Mork If you’ve been the victim of identity theft, this can be a very stressful and confusing ti...

Read More
Card image cap
How to Make Smart Choices for Your Smart H...

Guest Post by D. Greg Scott This is Part 2 of a two-part series. Read Part 1 here. Your new smart home may need a smarte...

Read More
Card image cap
How to Make Smart Choices for Your Smart H...

Guest Post by D. Greg Scott This is Part 1 of a two-part series. Read Part 2 here. A few years ago, a sales rep approach...

Read More