Identity theft prevention
This is when someone takes over your phone number. You may stop getting calls and texts, or you may get a notice that your phone has been activated.
Set up a PIN or password on your cellular account. Consider using an authentication app for accounts with sensitive financial information. Some fraudsters try to get you to disclose personal data, such as credit card numbers, Social Security numbers and banking information, by sending an official-looking email.
Spoofing involves doing much the same thing with caller ID, so that the number appears to be that of a trusted company or government agency. Do not give out personal data in response to an email or call. Find contact information from a trusted source, such as your bank website, and use it to verify whether the call or email is legitimate.
Skimming is getting credit card information, often from a small device, when a credit card is used at a brick-and-mortar location such as a gas pump or ATM. Use cards with chips, which have added protections. Pay inside at the gas station if you can, because skimming devices are more likely to be placed at unmonitored payment sites.
Detect fraudulent activity early by setting email or text alerts that let you know when your credit cards are used. If a card is used without your authorization, call the issuer immediately.
You may be told you have won something or even that you are in danger of being arrested. The caller claims to need personal, banking or credit information to verify your identity or to know where to send you money.
Be aware of common phone scams. The IRS, for example, does not initiate contact with taxpayers by phone or email or social media to request personal or financial information, nor does it call with threats of arrest or lawsuits.
Fraudsters can learn a password just by watching your fingers as you key it in. The information on your credit card can be photographed with a smartphone while you shop online in a public place.
A business might leave sensitive information where people can see it. Cover your hand when you key in passwords or codes. Opening an email attachment or visiting an infected website can install malicious software on your computer, such as a keylogger.
That does what it sounds like — logs every keystroke, giving criminals access to passwords, account numbers and more. Be cautious about clicking on attachments or links in emails and about the websites you visit.
Use a password manager, which lets you avoid keying in login credentials. The FTC's IdentityTheft. gov is a one-stop shop for information and reporting identity theft.
Start with that site and follow its recommended steps to make a recovery plan. You may also need to contact your police department, the Postal Service and the credit bureaus. The IRS has a phone line for identity theft, at , and a taxpayer guide to identity theft on its website.
The FTC takes scam and identity theft reports over the phone or online in multiple languages including Spanish, Mandarin, Tagalog, Vietnamese, French, Arabic, Korean, Russian, Portuguese and Polish.
It also offers consumer education in a variety of languages. You can also go directly to your credit card issuer if your credit card was lost, stolen or used without your knowledge. Reporting identity theft starts an investigation and the process of restoring your good name.
The exact steps will depend on the type of identity theft. Credit card issuers generally replace the cards with new ones with a different number, and you are back in business.
Taxpayer identity theft or theft of benefits typically are resolved more slowly. No matter which type of identity theft you experience, keep extensive notes about phone conversations and retain related emails. Identity theft protection services let you know that your identifying information has been used, or that it is at risk because it was exposed in a data breach.
If you are a victim of identity theft, they may also guide you — and reimburse you for costs — through the process of cleaning up the mess and restoring your identity. Protections vary, and most offer additional ways to protect your privacy and other services. The best choice among the paid services is one that fits your budget and offers you the coverage you care about.
If you decide to buy, NerdWallet has reviews of:. On a similar note Personal Finance. Identity Theft: What It Is, How to Prevent It, Warning Signs and Tips. Follow the writer. MORE LIKE THIS Personal Finance.
What is identity theft? Back to top. Credit identity theft. Child identity theft. Synthetic identity theft. Box , Atlanta, GA Get more details. Note: Remember that after you request a report, you will have to wait a year to get it free of charge again from the same credit reporting company.
Of course, you can pay for a copy of your credit report at any time. Review your credit score. Look to see if there are new credit cards, loans or other transactions on your account that you are not aware of.
If there are, take immediate steps to have these terminated and investigated. Freeze your credit. Criminals use stolen IDs to open new lines of credit. You can thwart their efforts to use your identity by simply locking called freezing your credit so that no new credit can be given without additional information and controls.
To determine whether there are any costs associated with placing a security freeze on your credit, and for temporarily lifting that credit freeze when you do seek credit, see State Freeze Requirements and Fees.
Only use reputable websites when making purchases. How are they reviewed by other users? Do they have a strong rating with the Better Business Bureau?
Do they use a secure, encrypted connection for personal and financial information? Hypertext transfer protocol Secure https , as its name suggests, is a more secure variant of the older Hypertext transfer protocol http.
Missing bills or other mail. A missing bill may indicate that an ID thief has hijacked your account and changed your billing address to help hide the crime. Having a credit approval denied or being subjected to high-interest rates for no apparent reason.
Be wary of public WiFi and think twice before joining an unsecured network. Virtual private networks, or VPNs , are tools that can help you shield yourself from prying eyes on public WiFi networks.
A thief might get a credit card using your name. He changes the address. The bills go to him, but he never pays them. That means the credit card company thinks you are not paying the bills. That will hurt your credit. This is the kind of trouble identity theft can cause for you.
For Example. Audio file. What To Know. How can a thief steal my identity? A thief might: steal your mail or garbage to get your account numbers or your Social Security number trick you into sending personal information in an email steal your account numbers from a business or medical office steal your wallet or purse to get your personal information How do I know if someone steals my identity?
Sometimes, you can tell if someone steals your identity. Read your bills. Do you see charges for things you did not buy? Watch your bank account statement. Are there withdrawals you did not make? Are there changes you do not expect?
Check your mail. Did you stop getting a bill? Or did you start getting a new bill you do not know about? Are there accounts or other information you do not recognize? If you answer yes to any of these questions, someone might have stolen your identity.
What is a credit report? Your credit report is a summary of your credit history. It lists: your name, address, and Social Security number your credit cards your loans how much money you owe if you pay your bills on time or late All the information in the credit report should be about you.
Why should I try to fix my credit report? You can lower your risk. Every time you shop in a store, you: watch your wallet are careful with your credit card or debit card do not tell people your PIN number When you shop online, you can: use passwords that people cannot guess shop on secure websites.
Be alert to phishing and spoofing Use strong passwords and add an authentication step Use alerts