10 Types of Identity Theft And How You Can Prevent Them

identity-theft-hacker-types-of-identity-theft

You identity is your one of your most valuable possessions, hence it is paramount you help protect yourself from identity theft. Identity theft can be defined as the act of stealing details about another person with the intention of pretending you are that person. Some of the reasons for committing identity theft include: to gain financial benefits the person is entitled to, to avoid court orders by appearing to be a different person or to maliciously impersonate the person probably to make it appear that they think or believe something controversial.

Due to change in technology, methods used by criminals to steal identity are quickly changing every now and then. The following are some of the methods that have been used in the past and they can be divided into three categories.

 

Information given away

This is the simplest method people use to steal other people’s identity. This is mostly witnessed in social networking sites. It is imperative that you have privacy controls in your social networking sites and do not accept friend requests from people you do not know.

 

Offline methods

  • Pretexting

This occurs when the identity thief contacts a business and impersonates a legitimate customer to request details of their contact information

  • Skimming

Capturing the details encoded on the magnetic strips on the back of the credit and eftpos cards. These data is then put onto a black card and used to access the account.

  • Shoulder surfing

This looking over the shoulder of an individual as they are entering their ATM pin at an ATM, when using internet banking in public place or at eftpos terminal.

  • Wallet or document theft

This is stealing or acquiring a document belonging to person and using the information on that document, if this is a wallet, there is likely to be a huge amount of information about the person on the wallet.

  • Business record theft

This involves stealing data from a business and it can either be paper records or computerized data. The data can be in large numbers than pretexting and both can also involve staff members.

Online methods

  • Malware

These are software used to cause harm to a computer system or to subvert it for a different use than what it is meant for. Some of the malware includes worms, Trojan horses, backdoors, screen scrapers, root kits and spyware.

  • Phishing

This is luring people into providing information using emails and mirror websites which look like they come from legitimate business.

  • Smishing

This is the same as phishing however; it is usually directed towards the cell phones. Take note as the smart phones are advancing, so is smishing.

  • Spam

These are unsolicited electronic messages which can be used by criminals who are phishing or to deliver malware.

  • Hacking

This is exploiting vulnerabilities in an electronic system or the computer software with the intention of stealing personal data.

How to prevent identify theft

  1. Be careful with your private information in terms of how much you give out and whom you give it to.
  2. Always confirm why someone or an organization are asking you for your identity information and find out what they are intending to do with it
  3. Always be suspicious of unexpected events such as letters from creditors or bank transactions you could not remember. These could be as a result of identity theft.
  4. Ensure you remove all personal information from your personal computer before you dispose them.
  5. Ensure you properly dispose, such as shredding or burning of your bank statements, electricity bills and any piece of correspondence with your name and address on it. These documents should never be dumped in a public rubbish bins or the recycle bin.
  6. If you are using internet banking do not do that on shared or public computers.
  7. Go for an identity theft insurance program such as velvetprotection.com. These protection plans are important since:
  • Identity theft cannot only be related to financial loss but it can be sued to commit a fraud or other illegal activities leaving you liable.
  • Most insurers take it upon themselves to offer both credit monitoring and fraud resolution and restoration. This is separate from your expenses coverage after your loss.
  • Insurers also advice you what to do in the event of identity theft

What to do if you are a victim of identity theft

  1. Put a Fraud Alert on your Credit reports

This puts a red flag on your credit report and notifies lenders and creditors that they should be more careful when verifying your identity before extending any credit.

  1. Contact the institution directly affected

For instance if your credit card was stolen, report the issue to the credit card issuer.

  1. File a police report

To complete your ID theft report, contact your law enforcement officer and report the theft. The theft report will help you while dealing with the creditor reporting agencies.

  1. Protect your social security number

Contact the social security administration and the internal revenue service to protect your social security number.

  1. Contact the federal trade commission

In this case, you can file an Identity Theft affidavit and create an Identity theft report.

identity-guard-protection-plan

Identity Guard helps stop identity theft & fraud before the damage can be done.

Start your 30-day Free Trial today. Get up to $1 million in ID Theft Insurance and protect yourself with 5-star rated Information Protection Services.  Start Free Trial >>
0 replies

Leave a Reply

Want to join the discussion?
Feel free to contribute!

Leave a Reply

Your email address will not be published. Required fields are marked *