In 2012, there were 12.6 million cases of identity theft in the United States alone. This figure has increased by more than a million people since 2009. And in case you weren't worried, the San Diego-based Identity Theft Resource Center has calculated that it takes about 600 hours to restore your reputation after identity theft. Even though technology is advancing now in recognizing identity theft and minimizing the damage, the best solution is to prevent it from happening. Therefore follow these steps.
Step
Method 1 of 5: Strengthening Digital Security
Step 1. Choose a strong password and PIN
Choose words and numbers that no one can guess, even if they know some of your personal information. Or, use familiar words and numbers, but disguise them into hard-to-guess code, such as the Vigènere Cipher. There are even password-generating programs on the internet that can provide almost unbreakable, or guessable, passwords. Other good habits include:
- Do not use the same password for all accounts. Vary the password for each account.
- Avoid easy-to-guess PINs such as birthdays, common numeric sequences, phone numbers, last four digits of social security numbers, etc.
- A good password has upper and lower case letters, numbers and characters, and is at least 8 characters long.
- Do not store passwords or sensitive information on the computer. Any computer can be hacked. If you must save it digitally, save it on a CD or on an external hard drive that is only installed for off-network backups (turning off internet connection when performing backups).
- For more information, read the information on how to keep your PIN secure.
Step 2. Protect your computer
Today many identity thieves are using sophisticated software such as surveillance devices and key recorders to obtain sensitive information such as passwords and login details without the user's knowledge. Just because you don't see anything wrong with your computer doesn't mean it's safe to use. Unlike viruses and advertising tools, many snooping devices and key capture programs are designed to run silently, so they can collect as much passwords and sensitive data as possible without being noticed. A strong and regularly updated firewall program, antivirus program and anti-spyware program provide most of the protection you need.
If you're not sure what's best for your computer, contact your subscription computer store for advice
Step 3. Watch out for phishing scams
Phishing involves emails being sent to you that, and appear harmless, ask you to verify certain things like passwords, account numbers or credit/social security details. Any email asking for this kind of information should be suspect. The best response is to call and ask the service provider directly.
- If you get an email claiming to be a bank asking you to check or update information such as your password (for whatever reason), don't use a link in the email, even if the email has a letterhead/background similar to your bank's. If you think the email is genuine, go directly to the company or bank's website and take a look at your notes there; if there is no change, you have avoided a scam. This type of fraud is known as phishing and has several modes. (You can also contact your bank to verify - use the actual bank number of the Yellow Pages contact, and not the number listed in the email.)
- Scam scams include winning fake lotteries, requests for money to "help" people who have lost money/tickets/houses, or claims from Nigerian princes.
- Check the website of the government responsible for updating fraudulent information (usually consumer affairs or security agencies); which usually sends periodic emails with update information. Several nonprofit consumer watchdogs and consumer safety-oriented TV shows also have similar information available on the internet.
Step 4. Be careful about selling or giving away your identifying details by mistake
When you throw away an unused computer, make sure you delete all of your information first. Ideally, restore to factory settings - this information is usually described in the computer manual or can be found on the internet. If you don't know how, ask a reputable computer retailer for help.
Others with expertise can even recover deleted information from the hard drive. Data erasure programs can be downloaded for free from the internet, or ask your subscription computer retailer or a friend who has the expertise to help
Step 5. Be careful when shopping on the internet
Always check for safety symbols when using the site when shopping. If encryption lock icon is not present, do not provide credit details. Also check that the site is valid - never visit the site from a random email and make a purchase. Visit the site via a URL that you are familiar with or by searching for it from a search engine first.
- Use a separate credit card for online purchases. This will make it easier for you to cancel in the event of a problem, and your credit card that you normally use "in real life" can still be used without a problem.
- Do not store information on any store's website. Even though it looks safe, there is still the possibility of the site being hacked.
Step 6. Don't answer emails you didn't ask for or want
Even if you're joking, the email you reply will confirm your presence to the scammer.
Avoid opening emails that don't make sense, or that come from people or organizations you don't know. Viruses or worms can hide in emails. You should be suspicious if the email goes to the spam folder. Make sure your antivirus is up to date and on
Method 2 of 5: Take Care When Traveling
Step 1. Beware of "snoopers."
They are behind you at the ATM or supermarket line or in the form of other shoppers, and they are watching you so they can see your account balance or PIN. Cover the monitor area with your hand when typing your PIN and block the view of others from the screen. Always do this even when no one is around; some thieves use binoculars or attach cameras so they can see you from a distance.
- Some ATM machines now add some kind of shield. Use the shield to protect and cover your hands over the keypad as you enter numbers.
- You may feel silly while protecting a number. But you will feel even more ridiculous if someone knows your PIN number.
Step 2. Pay attention to what you bring
We often carry a lot of identifying information in our wallets or purses. And in the event of theft, other people will easily and quickly use the information to their advantage. Here are some precautions for you:
- Don't bring a credit card (or anything that works like a credit card, such as a debit card with the VISA logo). This will not only minimize the impact of theft, but also serve as a useful saving practice. If you must bring a credit card, just bring one and write "SEE ID" next to your signature on the back.
- Add PINs to all your credit cards, if possible. That way, if someone else steals your credit card, he or she must know the card's PIN to be able to use it. To avoid use on the internet, do not carry address identification in your wallet. You can use your email or mobile number to request the "back to owner" feature.
- Do not carry additional check forms, passports, or other IDs that you do not plan to use. If you must carry it, put it in a bag attached to the body.
- If you're in the United States, don't carry a Social Security card (or a card with a social security number on it) unless you're going somewhere that requires one.
Step 3. Carry your wallet or purse with care
Even if you live in a safe area, you are still at risk of losing your wallet or purse. There are many ways to help prevent the theft of your wallet or purse, wherever you are.
- Do not leave your bag or purse unattended. If there is a grocery store, don't put your bag in the shopping cart or cart. Even if you continue to hold it, thieves can snatch the bag when you reach out or bend down to pick up the product. Trust doesn't mean testing other people's resolve!
- Don't leave your wallet or purse in a jacket or coat pocket hanging behind a cafe or restaurant chair. This unattended thing is too easy to pick up.
- If you're using a one-strap purse or bag, wear it across your body, so thieves don't easily snatch it from your shoulder.
- If you carry a wallet, attach it to your body with a chain or bungee cord. You can also create fake wallets, which are wallets that you can hand over to thieves if you are robbed. This is an extreme measure, and is appropriate if you live or travel to areas known for theft problems.
- Be prepared if your wallet should be stolen. You have to know what to do, and you have to do it fast. The sooner you can undo all stolen cards, the less damage will be done.
Method 3 of 5: Security at Home
Step 1. Destroy the documents that have the information
Don't just throw billing reports and other documents that contain important information in the trash. There are other people who can rummage through the trash for your data. Buy a paper shredder and destroy every piece of paper that has your credit card number, social security number, or bank account number on it.
- If you have a paper shredder, make sure it's not just shredding paper that can be put back together. If you don't have a shredder, tear the paper into small pieces. If necessary, use two different garbage bags. Half of those shredded documents go into one trash bag, and the other half in another trash bag in the house (or, if you're separating compost bins, mix some of the documents into it).
- Be sure to spoil any credit card offers (like sending blank checks) - and don't just throw them away. Many thieves will use the offer to apply for credit on your behalf at another address, and will try to use the check. Better yet, call your credit card company and ask them not to send cash checks. Contact the credit card company to stop accepting credit card offers.
Step 2. Protect your mailbox
Mail transports millions of pieces of personal information every day and is one of the most common places for identity theft. A study found that the most frequently used non-technological method of identity theft is changing the destination of the mail through a change of address card! So pay attention to your letter.
- Make sure you get all your bills on time. If your mailbox is easily accessible to others, use a postal box instead, or check your email as often as possible so that no one has time to retrieve it except you.
- Most banks offer "paperless" bills via email or smartphone. If your bank offers this service, sign up to reduce the risk.
- If you are waiting for a new credit card but it has not arrived at the appointed time, please contact the bank immediately. Better yet, ask your bank to keep the card so you can pick it up straight away instead of mailing it to you.
Method 4 of 5: Freezing Credit as a Safety Measure
Step 1. Freeze your credit
In the United States, you can contact the three major credit agencies (TransUnion, Equifax and Experian) to freeze credit. The costs involved are relatively small, depending on your circumstances and/or location. This will prevent anyone (including you) from opening a new line of credit, or viewing credit. This is probably the best course of action if you know you won't be opening a new line of credit or getting a credit report anytime soon.
You can lift the credit freeze at any time by using the Personal Identification Number provided by the credit institution, and you only need to pay a small fee
Method 5 of 5: If You Are a Victim
Step 1. Act quickly
Do what you can to minimize the damage to your reputation and money. Therefore:
- Immediately contact all credit providers to request cancellation of cards and lines of credit. Follow the credit agency's advice and make sure you keep a record of the conversation, including the names of the officers you contacted, their titles and the time and date of the conversation.
- Call the police. Make a police report. This is important to note, and may also be required by insurance companies. Police can also start looking for suspects. In addition you can show police reports to credit agencies and others affected.
- In the United States, contact one of the three credit agencies to explain what has happened and request fraud notices on all of your credit accounts. Follow their advice for a particular case. (Similar agencies may exist in your area if you live outside the United States.)
Step 2. Be prepared to do a lot of things to restore your reputation
For additional information you can visit the Federal Trade Commission's Identity Theft Clearinghouse at https://www.consumer.ftc.gov/features/feature-0014-identity-theft. While this only applies to US citizens, this information may be useful to those living in other countries.
Tips
- Check credit reports regularly. An identity thief will most likely try to get a credit or store card in the victim's name. This card is usually used from time to time with the aim of increasing the existing credit limit on the card. This means that by checking your credit file once or twice each year, you can see which credit you are not using. If you see the card, it is imperative that you report it to the companies involved, the police and credit reference agencies as soon as possible. Be sure to keep copies of all letters sent, as they may be needed at a later date to help you prove your story.
- Make sure your kids know how important it is not to leave personal information on the internet. Talk to them about safe computer use, as well as how to stay safe outside when making purchases.
Warning
- Don't let the information you've provided circulate, including credit cards, mortgages, jobs and rental properties. Ask the company policy regarding the application files that have been provided, and have this information destroyed or returned to you for disposal.
- In the United States, do not provide a national social security/insurance number. This number is usually used by the government to identify you regarding taxation, health care and retirement benefits. It is also the number used by credit reference agencies for identification. If an identity thief finds your social security number, the credit and loan application process will be easier. Before you give a number, ask this question: "How will the number be used?" or "How are you going to save it?".
- Identity thieves are now targeting almost anyone. They can even use the identities of children or people who have died. The only types of people who are unlikely to be targeted are those who have poor credit records or have gone bankrupt. Application for credit on behalf of these people is very difficult.