No One Is Safe From Identity Theft. Are You Next?

With nearly 60 million Americans being affected by identity theft according to a 2018 online survey conducted by The Harris Poll, there is a chance you may fall victim next. Identity theft is one of the most common outcomes from data breaches.

Identity Theft is the fraudulent acquisition and use of a person’s private identifying information, usually to gain financial benefit. 

Thieves can use personal identifiable information (PII) as a way to steal your identity. Common examples of PII include name, social security, birthday, phone numbers, citizenship, gender, race/ethnicity, driver license number, biometric data, asset information (IP or MAC addresses), medical information, and more.

Here are the 10 common ways your identity can be stolen:

  1. Data Breaches
  2. Internet Hacking
  3. Dark Web Marketplaces
  4. Malware Activity
  5. Credit Card Theft
  6. Mail Theft
  7. Phishing and Spam Attacks
  8. WiFi Hacking
  9. Mobile Phone Theft
  10. ATM Skimmers

How Can It Affect You?

Being victim to identity theft can place you through immediate financial loss, damage to your credit score, and being at risk for others to steal your information from other sources. There are financial and emotional impacts of identity theft since the time and money involved to resolve the issue brings emotional distress. Many experience fear regarding their personal and financial security safety, a sense of powerlessness, distress by the misuse of their information, and some have even sought professional help to alleviate physical symptoms.

6 Tips to Protect Yourself

  1. Protect your social security number – Do not carry your SSN card with you.
  2. Fight “phishing” bait – Be wary of scam artists who pretend to be other entities to lure you in giving your personal information.
  3. Maintain strong passwords – Use sentences to make it harder for brute force attacks or for others to guess.
  4. Be mysterious on social networks – Oversharing information such as your birthday, location, name, and so on only makes it easier for thieves to obtain your PII.
  5. Check your statements – Carefully check for unauthorized chargers or withdrawals and report suspicious activity immediately.
  6. Encrypt your emails – All the date in your messages are at risk if you are not using end-to-end encryption.

About IBSS
Since 1992, IBSS has provided specialized professional and technical, cybersecurity, IT, and software engineering solutions to the Federal sector. Our clients include the National Oceanic and Atmospheric Administration (NOAA), the Department of Defense (DoD), and the Department of Justice (DOJ). We are committed to serving our clients and employees by delivering service excellence, creating value through technology, and continually improving our skills, services, and processes. Moreover, we maintain an ISO 9001:2015 certification which allows us to optimize current industry best practices to enhance delivery outcomes for our clients.