SEARCH OUR BLOG

ARTICLES BY TOPIC

RECENT ARTICLES

RELATED ARTICLES

The Blog

January 30, 2020

Protecting Yourself from Identity Theft

by Magali Cohen

Becoming a victim of identity theft is happening more often with today’s advanced technology. Because of this, you need to remain on high alert to protect yourself from fraud.

How does identity theft occur?

Unfortunately, it is very easy to find personal information online. If you have ever “Googled” yourself, you might have been surprised to see that your phone number, full name, previous addresses, current address, birth date, and possible relatives are all listed for everyone on the world wide web to see. This makes it easier for a thief to steal your information since addresses and birth dates are commonly used as identity verification tools. Your information can also be accessed on social networking sites. Remember to keep your accounts private and do not accept friend requests from people you do not know.

Someone can even steal your information by dumpster diving and looking for bank statements, credit card statements and other personal information. Remember to shred all of your personal documents when possible.

Some thieves will try to trick you into telling them your social security number on the phone by posing as a representative of a government agency such as the IRS. Robo-calls have also been very successful in stealing information. A government agency will never contact you by phone nor will they threaten you into making a payment or providing personal information. This includes the IRS!

Information is also frequently stolen through inauthentic emails. Never click on a link inside of an email. If an email asks you to validate your account when you did not recently create a new account, it is best to log into the website directly from outside of the email.

Information can be leaked through business data breaches. The famous Equifax breach affected up to 147 million people. Just for some perspective, there are about 330 million people in the United States (including children who do not have any credit history). The breach leaked millions of names, social security numbers, birth dates, addresses, and some driver’s license numbers. If you have been affected by this breach, the best preventive action you can take is to constantly monitor your credit reports. I have personally been affected by this breach and I use Credit Karma to monitor my credit report. It is free to use, does not affect your credit whenever you check the website, and has been very helpful in protecting me and others from identity theft.

What do I do if I suspect my identity has been stolen?

I personally received an email late one evening from Credit Karma alerting me that a new inquiry was reported on my credit report. I had not recently applied for any credit cards, so I knew that there was an error. Credit Karma will show you which bank the inquiry is from. The first thing I did was call that bank and alert them that this application did not come from me. Shockingly, the thief had my social security number, name, birth date, current address and old phone number. The bank immediately deleted the application.

The next step I took was to call the three credit bureaus (Equifax, Experian and Transunion) to freeze my credit. The bureaus will send you a pin that you will need to use each time you unfreeze your credit. It prevents anyone from being able to open new accounts in your name and new fraud from occurring. It also does not affect your credit score and it is free to freeze your credit. If you become a victim of identity theft, remember to keep track of these identification numbers.

If you have your identity stolen, in addition to freezing your credit, you should take the following steps:

  • Place a fraud alert on your credit report
  • Report the identity theft to the FTC
  • File a police report
  • Contact Equifax, Experian and Transunion to remove any fraudulent information
  • Change all of your passwords (as a precaution)
    • Use at least 10 characters
    • Use random letters
    • Include numbers
    • Include symbols such as:
       @#$%*?/-
    • Avoid dictionary words
    • Change your passwords often
    • Do not use the same password for all accounts
    • Do not use any obvious numbers such as address numbers, zip codes, or birth dates
    • Do not use obvious words such as names or cities related to you
  • Always use two-factor authentication when it is offered
    • Gmail now has the option to text your phone number a code before being able to access your email
    • Apple iCloud alerts you anytime someone is trying to login from a different location
  • Install firewalls and anti-virus software on your computer
  • Collect your mail daily
  • Place a password on your phone
  • Replace your stolen identification
    • If your social security card was stolen, request a replacement card from the social security administration
    • Replace any stolen driver’s license or ID
    • If your passport was stolen, report this to the State Department
    • Contact your telephone and utility providers
      • Identity thieves can try and open a utility account under your information as proof of residence

Never let your guard down

Remember to always stay alert for any fraudulent activity. Never give away your passwords. Check your credit card and bank statements frequently and scan your transactions to look for any suspicious activity. When traveling, remember to alert your banks of your upcoming trips. Act quickly if you do suspect suspicious activity to limit possible damage. Identity theft can happen to anyone even if you are careful about the information you share (especially with the Equifax breach).

You might also be interested in:

How a Company’s Cybersecurity Practices Impact ESG Ratings
How a Company’s Cybersecurity Practices Impact ESG Ratings

As organizations today implement digitized business models and leverage more and more technological advancements for increased productivity, cybersecurity has become a top concern for individuals and investors alike. Nobody want’s their data leaked, accounts hacked,...

A Case for the Fiduciary Advisor
A Case for the Fiduciary Advisor

I have seen many types of investors over the years, and most could not be more different from one another. The greatest commonality was they, like all of us, are wired to be emotional investors. The volatility and uncertainty associated with COVID times tends to...

Wedding Insurance – Why Should You Have It?
Wedding Insurance – Why Should You Have It?

Have you ever heard the phrase, “Anything that can go wrong will go wrong”? Well, wedding insurance is there to make sure that even if something does go wrong, your investment in your special day is covered. What is wedding insurance? Wedding insurance is an insurance...

Have You Named a Trusted Contact?
Have You Named a Trusted Contact?

Financial exploitation costs vulnerable adults in the United States an estimated $2.9 billion every year. Since 2017, suspicious activity report filings regarding seniors have almost quadrupled. Naming a trusted contact can help to keep your accounts secure. What is a...

And Then Came the Wolves
And Then Came the Wolves

Ever wonder what could happen if you received a major financial windfall? Read more to find out! The Situation A client of ours received a major financial windfall last year. The client’s family had created a legacy of charitable giving and this would be the 3rd...

How a Company’s Cybersecurity Practices Impact ESG Ratings
How a Company’s Cybersecurity Practices Impact ESG Ratings

As organizations today implement digitized business models and leverage more and more technological advancements for increased productivity, cybersecurity has become a top concern for individuals and investors alike. Nobody want’s their data leaked, accounts hacked,...

A Case for the Fiduciary Advisor
A Case for the Fiduciary Advisor

I have seen many types of investors over the years, and most could not be more different from one another. The greatest commonality was they, like all of us, are wired to be emotional investors. The volatility and uncertainty associated with COVID times tends to...

Wedding Insurance – Why Should You Have It?
Wedding Insurance – Why Should You Have It?

Have you ever heard the phrase, “Anything that can go wrong will go wrong”? Well, wedding insurance is there to make sure that even if something does go wrong, your investment in your special day is covered. What is wedding insurance? Wedding insurance is an insurance...

Have You Named a Trusted Contact?
Have You Named a Trusted Contact?

Financial exploitation costs vulnerable adults in the United States an estimated $2.9 billion every year. Since 2017, suspicious activity report filings regarding seniors have almost quadrupled. Naming a trusted contact can help to keep your accounts secure. What is a...

SEARCH OUR BLOG
ARTICLES BY TOPIC

RECENT ARTICLES

RELATED ARTICLES