Identity Protection - The Best Ways to Prevent ID Theft
Submitted by JMB Financial Managers on May 20th, 2024There isn’t a week that goes by when you don’t read about some data breach, and tens of thousands of people becoming victims of identity theft. Safeguarding your personal and financial information starts with understanding cybersecurity risks, knowing what to look for, and doing everything you can to help protect your personal identity.
A Growing Problem
Last year, identity theft continued to grow, setting 2024 up as another year of ever-increasing cybersecurity issues. Here are a few statistics:1
- In 2023, the Federal Trade Commission (FTC) received a total of 5.7 million fraud and identity theft reports.
- Georgia, Maryland, Delaware, Nevada, and Florida were the five states reporting the most identity theft cases per capita. South Dakota had the lowest.
- The median loss for victims of fraud cases is about $500.
- Total losses are estimated to be $10.2 billion.
- Every 22 seconds, identity fraud claims a new victim.
- Nearly 33% of Americans have faced some kind of identity theft attempt.
As the chart below illustrates, the number of reports of identity theft and fraud to the FTC has risen steadily since 2001.1
No-Tech, Low-Tech, and High-Tech Identity Theft Vulnerabilities
While businesses, law enforcement, and legislators contend with identity theft, some of the most effective methods to help manage your personally identifiable information are in your own hands. There are no-tech, low-tech, and high-tech ways to help address your vulnerabilities. The best way to mitigate the risk of identity theft is to combine all three:
No-Tech
You might be surprised to learn that the FTC reports that over half of all identity theft comes from physical documents falling into the wrong hands. You can help manage this risk by taking a few simple actions, such as the following:
- Registering for US Postal Service Informed Delivery so you know what mail to expect each day.
- Buy a shredder and use it for any statements or other documents, including anything that may include any personal data, account numbers, etc.
- Regularly check your bank statements for suspicious activity in your bank account.
- Avoid keeping sensitive information in your wallet or purse.
- Go paperless with as many companies as possible.
Low-Tech
Many “phishing” attacks come from scammers disguised as trustworthy sources. Here are some of the most common types of phishing:2
- Email phishing is the most common, and tactics like phony hyperlinks lure email recipients to share their personal information.
- Malware phishing involves planting malware disguised as a trustworthy attachment in an email. In some cases, opening a malware attachment can harm your system.
- “Vishing” has attackers in fraudulent call centers attempting to trick people into providing sensitive information over the phone.
Here are a few ways to identify some types of phishing attempts:
- Don’t trust email display names—click to see the sender's full email address. Scammers often create logical display names over their actual addresses.
- Check emails for typos and poor grammar -- these are often important warning signs.
- Hover over hyperlinks before clicking.
- Read the salutation; don’t open the email if it looks off.
- Be wary if the email is addressed to “Valued Customer” instead of your name. It’s likely fraudulent.
- Review the signature to ensure the contact information is in the email footer.
- Beware of threats like “Your account has been suspended” via email or phone.
- Be very wary if any sense of urgency is implied or information is requested.
- Be skeptical of any text messages you receive from unknown senders.
High-Tech
Most mobile devices and smartphone apps collect details about you, including age, GPS data, and browsing habits. Make certain you understand if an app accesses your camera, tracks your location, records your audio, or reads your call logs and text messages. Check out the app privacy report occasionally to see which apps are accessing your data. You should be able to turn off data tracking with an app at any time.
Avoid using public phone chargers at airports or restaurants. They can contain malware that gives hackers access to your devices. Use a portable charger instead.
Public Wi-Fi can be risky, especially in public settings. While at home, you should consider password-protecting your network and keeping router and security software up to date. You might also consider using a virtual private network (VPN) when in public. If you are on a public network, look for sites marked HTTPS. If possible, avoid making financial transactions when using an unfamiliar internet connection.
Peer-to-peer (P2P) Payment Apps like Venmo have become popular for everything from paying babysitters to splitting the check at a restaurant, but they can have some hidden risks. Top P2P scams include:3
- Impersonation scams: Criminals persuade victims to send money by pretending to be someone they’re not, and thanks to artificial intelligence, by which scammers can now clone voices and faces, these scams are becoming even more challenging to detect.
- Fake seller scams: Criminals advertise a phony product or service online, collect your money upfront, and disappear without delivering the goods.
- Advance-fee scams: A scam where someone claims you’ve won a prize and offers to send your winnings in exchange for you sending them a service fee.
- Venmo is owned by PayPal. Remember, all the companies mentioned are for illustrative purposes only. It should not be considered a solicitation for the purchase or sale of securities.
To protect yourself from P2P scams, only use these payment apps with people you know and trust, such as friends, family, or local businesses. Consider using a credit card if you’re transacting with someone new or unseen. Credit card providers may offer some level of fraud protection as part of their value proposition.
The Best Defense is a Good Offense.
You can take proactive steps to defend against identity theft and fraud, such as strong passwords for your online accounts, multi-factor authentication (MFA), and credit monitoring.
Create, Manage, and Store Strong Passwords4
- Consider using a password manager.
- Password managers store and organize your passwords with secure digital encryption and multi-factor authentication.
- Certain password managers are designed to connect your login information across multiple devices, websites, and apps.
- Some browsers have built-in password managers that can help.
- There are many password managers you can subscribe to with a variety of features and benefits. Here are some of the most popular, according to a 2024 report from Cybernews.com.5
- NordPass
- 1Password
- RoboForm
- Keeper
- Bitdefender
If you are not using a password manager, you should focus on password strength. As a general guideline, strong passwords:
- It should be at least 12 characters long, but 14 or more is better.
- It is a combination of uppercase letters, lowercase letters, numbers, and symbols.
- Do not include personal names, characters, products, or organizations.
- Do not use information that can be gathered from your social media accounts
- Are significantly different from your previous passwords.
- Are easy for you to remember but difficult for others to guess.
Once you’ve created a strong password, keep it secure:
- Never send a password by email, instant message, or any other means of communication that is not reliably secure.
- Consider using a unique password for each website.
- You can write your passwords down but keep them in a safe location.
- You can save your passwords in a spreadsheet but password protect the sheet.
- Change your password immediately if you suspect an account is compromised.
- Get in the habit of changing your passwords periodically.
Protect Your Devices
- Install antivirus software
- Install antimalware software
- Install software updates regularly
- Install a Virtual Private Network (VPN)
Use Online Providers That Employ Multi-Factor Authentication (MFA).
If you don’t know the term “multi-factor authentication”, you may have seen it in action. If you’ve ever tried to log into an account and received a text with a code you need to enter, or you are asked a series of questions like “Who is your high school best friend”, or “What was your first car”, you have used multi-factor authentication (MFA).
MFA is an identity verification method in which users must supply at least two pieces of evidence to prove their identities. It may be annoying, but it’s worth it. MFA blocks 99.9% of modern automated cyberattacks.6
Consider Identity Theft Protection Services
You can engage the helping hand of identity theft protection companies, which frequently offer identity monitoring, monitoring of financial accounts, and even identity theft insurance coverage. These services can alert you about credit inquiries, new credit applications, changes in your credit score, requests for your credit file, and the presence of your email address and associated passwords on the dark web. Once fraud has actually occurred, identity fraud insurance can help with shutting down the fraudulent activity, restoring your good credit, and filing a police report.
Monitor and/or freeze your credit
You can monitor your credit using the three main credit service providers. You can also take the additional step of placing a freeze on your credit. Freezing your credit may help prevent fraud because it prevents new lines of credit from being opened without your permission. The cost is free, but keep in mind that the freeze remains in place until you remove it.
Contact the major credit bureaus to request a fraud alert, a security freeze, and opt-outs from prescreened credit offers. Each firm has its own guidelines, so ensure you understand the rules before placing restrictions or a credit freeze on your account.
- Equifax: 800-685-1111
- Experian: 888-EXPERIAN (888-397-3742)
- TransUnion: 888-909-8872
While security systems have been put in place by most companies to monitor and fight large-scale cyber threats, it is important that you stay vigilant regarding your own cybersecurity, passwords, and identity. he good news is that your day-to-day routines are the first line of defense and may provide the peace of mind.
- IdentityTheft.org, January 2024 https://identitytheft.org/statistics/#:~:text=The%20FTC%20received%205.7%20million%20reports%20of%20identity,fraud%2C%20up%20from%204.7%20million%20the%20previous%20year.
- Microsoft.com, February 2024 https://www.microsoft.com/en-us/security/business/security-101/what-is-phishing
- AARP.org, January 2024 https://www.aarp.org/money/scams-fraud/info-2024/safely-send-money-on-zelle.html?intcmp=AE-FRDSC-MOR-R2-POS3
- 4. Microsoft.com, February 2024 https://support.microsoft.com/en-us/windows/create-and-use-strong-passwords-c5cebb49-8c53-4f5e-2bc4-fe357ca048eb
- Cybernews.com, February 2024. Any companies mentioned are for illustrative purposes only. It should not be considered a solicitation for the purchase or sale of the securities. Any investment should be consistent with your objectives, timeframe, and risk tolerance. https://us.cybernews.com/lp/best-password-managers-us/?utm_source=bing&utm_medium=cpc&utm_campaign=Bing_CN_PM_S_T1_US_G-B_All-Lang&utm_content=82669896208215&utm_term=best%20password%20manager&utm_id=414415436&campaignId=414415436&adgroupId=1322713715420697&adId=82669896208215&targetId=kwd-82670572028797:loc-4116&device=c&munique=87a532ab2a9f1f6111ef577d5d1ec55e&source=bing&medium=cpc&campaign=Bing_CN_PM_S_T1_US_G-B_All-Lang&content=82669896208215&term=best%20password%20manager&msclkid=87a532ab2a9f1f6111ef577d5d1ec55e
- Zippia.com, February 2023 https://www.zippia.com/advice/mfa-statistics/
--
About the Author
Jack Brkich III, is the president and founder of JMB Financial Managers. A CERTIFIED FINANCIAL PLANNER TM, Jack is a trusted advisor and resource for business owners, individuals, and families. His advice about wealth creation and preservation techniques have appeared in publications including The Los Angeles Times, NASDAQ, Investopedia, and The Wall Street Journal. To learn more visit https://www.jmbfinmgrs.com/.
Connect with Jack on LinkedIn or follow him on Twitter.