{"componentChunkName":"component---src-templates-dictionary-term-tsx","path":"/dictionary/identity-theft","result":{"data":{"contentfulDictionaryTerm":{"title":"Identity Theft","slug":"identity-theft","descriptionMeta":{"childMarkdownRemark":{"rawMarkdownBody":"Learn about the different types of identity theft, how to protect yourself, and what to do if your identity is stolen."}},"body":{"body":"# What is identity theft?\nIdentity theft is a serious crime that involves unauthorized access and use ofIdentity theft is a serious crime that involves unauthorized access and use of another person's personal information to commit fraud or deception, typically for financial gain. This personal information can include, but is not limited to, someone's name, Social Security number, credit card numbers, and other financial account information.\n\nThe process of identity theft can vary in complexity and execution. For example, a thief might steal a wallet containing credit cards and identification cards to make unauthorized purchases. Alternatively, more sophisticated criminals might use phishing attacks to trick individuals into providing their personal information online. Once they have the necessary data, they can open new financial accounts in the victim's name, take over existing accounts, or even commit more extensive fraud, such as applying for loans, obtaining a new driver's license, or filing for government benefits.\n\n## How identity theft can turn your life upside down\nIdentity theft can really mess up your life. Here’s a closer look at what happens when someone steals your identity:\n\n- __Money trouble:__ Imagine finding out someone has been taking money right out of your bank account or shopping with your credit card. That’s what can happen, and it often leaves you with less cash and a mess of bank fees to sort out.\n\n- __Account headaches:__ If someone gets into your accounts, you’re stuck with the hassle of closing them and opening new ones. It’s like fixing a leak; it’s necessary but a real pain to deal with.\n\n- __Credit score hit:__ Your credit score tells lenders how trustworthy you are with money, and identity theft can make it take a dive. If a thief maxes out your credit cards or takes out loans in your name, it's your score that suffers. You might find it harder to get loans or good interest rates afterward.\n\n- __Privacy invasion:__ Fixing things like your passwords and securing new accounts doesn’t mean your personal info isn’t still floating around out there. Once it’s leaked, it’s hard to fully lock it back down.\n\n- __Stress and worry:__ Having your identity stolen is not just about money; it’s also really stressful. Knowing someone has been meddling with your personal info can make you feel unsafe and worried about what might happen next.\n\n- __Reputation repair:__ Cleaning up your reputation after identity theft means a lot of phone calls, paperwork, and time—things most of us would rather avoid. It’s a long road to proving you are who you say you are and fixing your credit history.\n\n- __Long-term effects:__ The fallout from identity theft can linger. It might be tougher to get loans, jobs, or insurance later on if your credit’s taken a hit.\n\n### What are the types of identity theft?\nIdentity theft isn’t just one thing—it comes in several sneaky forms that can mess up your day (or life) in a variety of ways. Here’s a rundown of some common types you should keep an eye out for:\n\n__Synthetic identity theft:__\nImagine someone taking your Social Security Number and mixing it up with a fake name and birthdate to create a brand-new identity. That’s what synthetic identity theft is all about. It’s like using a piece of you to create a whole new person who can apply for loans, credit cards, and more in your name.\n\n__New account theft:__\nHad your personal data leaked recently? That’s all a thief needs to start living it up under your credit. They use your stolen details—thanks to your good credit—to open new accounts for things like smartphones or credit cards. It's as if you're footing the bill for their shopping spree.\n\n__Financial identity theft:__\nThis one’s pretty straightforward and probably what you think of when you hear “identity theft.” Someone gets their hands on your credit card details or bank info and goes to town with your money, buying stuff or draining your accounts.\n\n__Child identity theft:__ is a type of fraud that can go unnoticed for years because let’s be honest, who’s checking their [kid’s credit score](https://guard.io/blog/protecting-your-childs-identity-what-you-need-to-know-about-child-identity) regularly? Thieves steal a child’s Social Security Number to open accounts and start building a credit history before they even learn to ride a bike.\n\n__Medical identity theft:__\nThen there’s medical identity theft, where someone steals your health insurance info to cover their medical treatments or prescriptions. Not only does this fraud cost you money, but it could also mess up your medical records. Imagine doctors making health decisions based on a health history that isn’t even yours!\n\n### Understanding how identity fraud can happen\nIdentity theft might seem like something out of a spy movie, but it’s a very real problem for everyday folks. Here are some of the most common ways criminals might get their hands on your personal details:\n\n- Lost device:Imagine losing your phone or laptop. If a thief gets their hands on it, they could hack into your stored information. Even if they don’t steal your identity, just losing your device is a major inconvenience.\n\n- Web hacking: Tech-savvy cybercriminals can break into websites where your personal info is stored. That's why beefing up security on your devices and browsers is crucial to keeping your online activities safe.\n\n- Malware: Viruses and other malicious software can sneak onto your computer and give criminals a peek at your private data. Keeping your security software up to date is a must to guard against [malware](https://guard.io/dictionary/malware \"Guardio Dictionary - What's malware? \").\n\n- Lost credit card: Ever lost your wallet? Along with losing a bit of cash and having to replace your library card, losing your credit card can mean a thief might get ahold of it and start treating themselves—on your dime.\n\n- Phishing scams: Ever get an email that looks legit but asks for personal information? That’s [phishing](https://guard.io/blog/phishing-explained-everything-you-need-to-know-about-phishing-scams#how-can-i-protect-myself-from-phi10-paypal-scams-to-watch-outshing-emails \"Guardio Blog - Don't Take the Bait: Your Guide to Phishing Email Protection\"). Scammers mimic emails from real companies or even your job to trick you into handing over your details. Always double-check before clicking links or sharing info.\n\n- Data breaches: Sometimes, it's not just your info that's at risk. Large-scale [data breaches](https://guard.io/dictionary/data-breach \"Guardio Dictionary - What's a data breach?\") can leak personal details from thousands of people, putting everyone at risk of identity theft.\n\n- Dark web: If your personal details are stolen, they might end up on the [dark web](https://guard.io/dictionary/dark-web \"Guardio Dictionary - What's the dark web?\"), a hidden part of the internet where criminals buy and sell stolen information. It’s a shadowy marketplace for your personal data.\n\n### Warning signs that your identity might have been stolen\nNo matter how clever internet fraudsters might be, they often leave traces behind. Here are some clear warning signs that might indicate you’ve become a target of identity theft:\n\n__1. Missing mail?__\nExpecting a new credit card or bank statement that never arrives? It’s possible that a thief has intercepted your mail to get their hands on your financial information.\n\n__2. Mailbox overflowing?__\nIf you start receiving bills, subscriptions, or other items that don’t make sense, it could mean someone’s using your identity to open new accounts or make purchases.\n\n__3. Bank statements don’t add up?__\nAlways keep a close eye on your bank statements. If you notice charges or withdrawals that you don’t recognize, it’s time to investigate.\n\n__4. Caught up in a data breach?__\nIf an organization informs you that your data has been compromised in a breach, assume that your personal details could be in the hands of criminals.\n\n__5. Unexpected changes in your credit report?__\nA sudden drop in your credit score or a credit inquiry that you don’t recognize can be a major red flag that someone else is using your identity.\n\nRecognizing these signs early can help you act quickly to mitigate the damage. Report any fraudulent activity to the appropriate authorities, dispute any false claims, and take steps to secure your identity to prevent further issues.\n\n### How to protect yourself against identity theft\nProtecting yourself from identity theft involves more than just being careful; it requires proactive steps to secure your sensitive data. Here’s how you can keep your personal information safe and make it harder for criminals to make you their next target:\n\n__1. Monitor your financials closely:__ Keep an eye on your credit card reports, financial statements, and mailbox. These can often give you the first hint of suspicious activity.\n\n__2. Be cautious with your SSN:__ Use your Social Security Number sparingly and never carry it in your wallet.\n\n__3. Destroy sensitive information:__ Regularly shred outdated personal documents like bills, old receipts, credit card offers, and bank statements. Thieves often dig through trash to find such information.\n\n__4. Cut up old cards:__ Don’t just throw away expired credit cards or those you no longer use. Cut them up to prevent criminals from piecing them back together.\n\n__5. Use cybersecurity tools__: Fraud on the internet is a daily occurrence, spanning everything from scam attempts to malware infections, spyware, and more. Online threats lurk at every turn! While you can educate yourself on the various techniques used by identity thieves, it's nearly impossible to completely prevent cybercriminals from targeting your data on your own. However, with [Guardio’s](https://guard.io/plans \"Guardio Plans page\") security tools, you can significantly enhance your protection and stay a step ahead of the threats.\n\nJoin over 1.5 million Guardio users and enjoy a safer internet experience, free from the worries of identity theft and other cybersecurity threats. With [Guardio](https://guard.io/plans \"Guardio Plans page\"), you're not just informed—you're securely guarded against identity thieves.\n\n### What do I do when my identity has been stolen?\nDiscovering your identity has been stolen is daunting and resolving the issue involves more than just a quick phone call. Here's how you can start tackling the problem:\n\nReport to the FTC: The first step is to notify the Federal Trade Commission (FTC). You can file a report on their website at IdentityTheft.gov or by calling (1-877-438-4338). The FTC's website also guides you through the process of recovering your identity and tracks your case's progress.\n\nPlace a fraud alert: Contact the credit bureaus and request to place a seven-year fraud alert on your credit report. This alerts creditors to verify your identity before opening new accounts in your name.\n\nNotify financial institutions: Inform your credit card issuers and any lenders where you hold accounts about the theft. This is crucial to prevent further fraudulent charges.\n\nContact government agencies: Reporting the theft to state or federal government agencies can also help, especially if documents like your driver's license or social security number were compromised.\n\nMonitor your credit: Regularly check your credit reports to spot any suspicious activity early. Keeping a close eye helps you respond quickly to any new instances of fraud.\n\nAdditionally, utilizing services like Guardio can provide an extra layer of protection. Guardio offers continuous monitoring and alerts you to any unusual activities or threats to your personal information. With [Guardio’s](https://guard.io/plans \"Guardio Plans page\") tools at your disposal, you can navigate the recovery process with more confidence and ensure your digital safety is maintained in the future.\n","childMarkdownRemark":{"htmlAst":{"type":"root","children":[{"type":"element","tagName":"h1","properties":{"id":"what-is-identity-theft","style":"position:relative;"},"children":[{"type":"text","value":"What is identity theft?"},{"type":"element","tagName":"a","properties":{"href":"#what-is-identity-theft","ariaLabel":"what is identity theft permalink","className":["anchor","after"]},"children":[{"type":"element","tagName":"svg","properties":{"ariaHidden":"true","focusable":"false","height":"16","version":"1.1","viewBox":"0 0 16 16","width":"16"},"children":[{"type":"element","tagName":"path","properties":{"fillRule":"evenodd","d":"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z"},"children":[]}]}]}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Identity theft is a serious crime that involves unauthorized access and use ofIdentity theft is a serious crime that involves unauthorized access and use of another person's personal information to commit fraud or deception, typically for financial gain. This personal information can include, but is not limited to, someone's name, Social Security number, credit card numbers, and other financial account information."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"The process of identity theft can vary in complexity and execution. For example, a thief might steal a wallet containing credit cards and identification cards to make unauthorized purchases. Alternatively, more sophisticated criminals might use phishing attacks to trick individuals into providing their personal information online. Once they have the necessary data, they can open new financial accounts in the victim's name, take over existing accounts, or even commit more extensive fraud, such as applying for loans, obtaining a new driver's license, or filing for government benefits."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"h2","properties":{"id":"how-identity-theft-can-turn-your-life-upside-down","style":"position:relative;"},"children":[{"type":"text","value":"How identity theft can turn your life upside down"},{"type":"element","tagName":"a","properties":{"href":"#how-identity-theft-can-turn-your-life-upside-down","ariaLabel":"how identity theft can turn your life upside down permalink","className":["anchor","after"]},"children":[{"type":"element","tagName":"svg","properties":{"ariaHidden":"true","focusable":"false","height":"16","version":"1.1","viewBox":"0 0 16 16","width":"16"},"children":[{"type":"element","tagName":"path","properties":{"fillRule":"evenodd","d":"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z"},"children":[]}]}]}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Identity theft can really mess up your life. Here’s a closer look at what happens when someone steals your identity:"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"ul","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"Money trouble:"}]},{"type":"text","value":" Imagine finding out someone has been taking money right out of your bank account or shopping with your credit card. That’s what can happen, and it often leaves you with less cash and a mess of bank fees to sort out."}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"Account headaches:"}]},{"type":"text","value":" If someone gets into your accounts, you’re stuck with the hassle of closing them and opening new ones. It’s like fixing a leak; it’s necessary but a real pain to deal with."}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"Credit score hit:"}]},{"type":"text","value":" Your credit score tells lenders how trustworthy you are with money, and identity theft can make it take a dive. If a thief maxes out your credit cards or takes out loans in your name, it's your score that suffers. You might find it harder to get loans or good interest rates afterward."}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"Privacy invasion:"}]},{"type":"text","value":" Fixing things like your passwords and securing new accounts doesn’t mean your personal info isn’t still floating around out there. Once it’s leaked, it’s hard to fully lock it back down."}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"Stress and worry:"}]},{"type":"text","value":" Having your identity stolen is not just about money; it’s also really stressful. Knowing someone has been meddling with your personal info can make you feel unsafe and worried about what might happen next."}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"Reputation repair:"}]},{"type":"text","value":" Cleaning up your reputation after identity theft means a lot of phone calls, paperwork, and time—things most of us would rather avoid. It’s a long road to proving you are who you say you are and fixing your credit history."}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"Long-term effects:"}]},{"type":"text","value":" The fallout from identity theft can linger. It might be tougher to get loans, jobs, or insurance later on if your credit’s taken a hit."}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"h3","properties":{"id":"what-are-the-types-of-identity-theft","style":"position:relative;"},"children":[{"type":"text","value":"What are the types of identity theft?"},{"type":"element","tagName":"a","properties":{"href":"#what-are-the-types-of-identity-theft","ariaLabel":"what are the types of identity theft permalink","className":["anchor","after"]},"children":[{"type":"element","tagName":"svg","properties":{"ariaHidden":"true","focusable":"false","height":"16","version":"1.1","viewBox":"0 0 16 16","width":"16"},"children":[{"type":"element","tagName":"path","properties":{"fillRule":"evenodd","d":"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z"},"children":[]}]}]}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Identity theft isn’t just one thing—it comes in several sneaky forms that can mess up your day (or life) in a variety of ways. Here’s a rundown of some common types you should keep an eye out for:"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"Synthetic identity theft:"}]},{"type":"text","value":"\nImagine someone taking your Social Security Number and mixing it up with a fake name and birthdate to create a brand-new identity. That’s what synthetic identity theft is all about. It’s like using a piece of you to create a whole new person who can apply for loans, credit cards, and more in your name."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"New account theft:"}]},{"type":"text","value":"\nHad your personal data leaked recently? That’s all a thief needs to start living it up under your credit. They use your stolen details—thanks to your good credit—to open new accounts for things like smartphones or credit cards. It's as if you're footing the bill for their shopping spree."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"Financial identity theft:"}]},{"type":"text","value":"\nThis one’s pretty straightforward and probably what you think of when you hear “identity theft.” Someone gets their hands on your credit card details or bank info and goes to town with your money, buying stuff or draining your accounts."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"Child identity theft:"}]},{"type":"text","value":" is a type of fraud that can go unnoticed for years because let’s be honest, who’s checking their "},{"type":"element","tagName":"a","properties":{"href":"https://guard.io/blog/protecting-your-childs-identity-what-you-need-to-know-about-child-identity"},"children":[{"type":"text","value":"kid’s credit score"}]},{"type":"text","value":" regularly? Thieves steal a child’s Social Security Number to open accounts and start building a credit history before they even learn to ride a bike."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"Medical identity theft:"}]},{"type":"text","value":"\nThen there’s medical identity theft, where someone steals your health insurance info to cover their medical treatments or prescriptions. Not only does this fraud cost you money, but it could also mess up your medical records. Imagine doctors making health decisions based on a health history that isn’t even yours!"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"h3","properties":{"id":"understanding-how-identity-fraud-can-happen","style":"position:relative;"},"children":[{"type":"text","value":"Understanding how identity fraud can happen"},{"type":"element","tagName":"a","properties":{"href":"#understanding-how-identity-fraud-can-happen","ariaLabel":"understanding how identity fraud can happen permalink","className":["anchor","after"]},"children":[{"type":"element","tagName":"svg","properties":{"ariaHidden":"true","focusable":"false","height":"16","version":"1.1","viewBox":"0 0 16 16","width":"16"},"children":[{"type":"element","tagName":"path","properties":{"fillRule":"evenodd","d":"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z"},"children":[]}]}]}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Identity theft might seem like something out of a spy movie, but it’s a very real problem for everyday folks. Here are some of the most common ways criminals might get their hands on your personal details:"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"ul","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Lost device:Imagine losing your phone or laptop. If a thief gets their hands on it, they could hack into your stored information. Even if they don’t steal your identity, just losing your device is a major inconvenience."}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Web hacking: Tech-savvy cybercriminals can break into websites where your personal info is stored. That's why beefing up security on your devices and browsers is crucial to keeping your online activities safe."}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Malware: Viruses and other malicious software can sneak onto your computer and give criminals a peek at your private data. Keeping your security software up to date is a must to guard against "},{"type":"element","tagName":"a","properties":{"href":"https://guard.io/dictionary/malware","title":"Guardio Dictionary - What's malware? "},"children":[{"type":"text","value":"malware"}]},{"type":"text","value":"."}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Lost credit card: Ever lost your wallet? Along with losing a bit of cash and having to replace your library card, losing your credit card can mean a thief might get ahold of it and start treating themselves—on your dime."}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Phishing scams: Ever get an email that looks legit but asks for personal information? That’s "},{"type":"element","tagName":"a","properties":{"href":"https://guard.io/blog/phishing-explained-everything-you-need-to-know-about-phishing-scams#how-can-i-protect-myself-from-phi10-paypal-scams-to-watch-outshing-emails","title":"Guardio Blog - Don't Take the Bait: Your Guide to Phishing Email Protection"},"children":[{"type":"text","value":"phishing"}]},{"type":"text","value":". Scammers mimic emails from real companies or even your job to trick you into handing over your details. Always double-check before clicking links or sharing info."}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Data breaches: Sometimes, it's not just your info that's at risk. Large-scale "},{"type":"element","tagName":"a","properties":{"href":"https://guard.io/dictionary/data-breach","title":"Guardio Dictionary - What's a data breach?"},"children":[{"type":"text","value":"data breaches"}]},{"type":"text","value":" can leak personal details from thousands of people, putting everyone at risk of identity theft."}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Dark web: If your personal details are stolen, they might end up on the "},{"type":"element","tagName":"a","properties":{"href":"https://guard.io/dictionary/dark-web","title":"Guardio Dictionary - What's the dark web?"},"children":[{"type":"text","value":"dark web"}]},{"type":"text","value":", a hidden part of the internet where criminals buy and sell stolen information. It’s a shadowy marketplace for your personal data."}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"h3","properties":{"id":"warning-signs-that-your-identity-might-have-been-stolen","style":"position:relative;"},"children":[{"type":"text","value":"Warning signs that your identity might have been stolen"},{"type":"element","tagName":"a","properties":{"href":"#warning-signs-that-your-identity-might-have-been-stolen","ariaLabel":"warning signs that your identity might have been stolen permalink","className":["anchor","after"]},"children":[{"type":"element","tagName":"svg","properties":{"ariaHidden":"true","focusable":"false","height":"16","version":"1.1","viewBox":"0 0 16 16","width":"16"},"children":[{"type":"element","tagName":"path","properties":{"fillRule":"evenodd","d":"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z"},"children":[]}]}]}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"No matter how clever internet fraudsters might be, they often leave traces behind. Here are some clear warning signs that might indicate you’ve become a target of identity theft:"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"1. Missing mail?"}]},{"type":"text","value":"\nExpecting a new credit card or bank statement that never arrives? It’s possible that a thief has intercepted your mail to get their hands on your financial information."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"2. Mailbox overflowing?"}]},{"type":"text","value":"\nIf you start receiving bills, subscriptions, or other items that don’t make sense, it could mean someone’s using your identity to open new accounts or make purchases."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"3. Bank statements don’t add up?"}]},{"type":"text","value":"\nAlways keep a close eye on your bank statements. If you notice charges or withdrawals that you don’t recognize, it’s time to investigate."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"4. Caught up in a data breach?"}]},{"type":"text","value":"\nIf an organization informs you that your data has been compromised in a breach, assume that your personal details could be in the hands of criminals."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"5. Unexpected changes in your credit report?"}]},{"type":"text","value":"\nA sudden drop in your credit score or a credit inquiry that you don’t recognize can be a major red flag that someone else is using your identity."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Recognizing these signs early can help you act quickly to mitigate the damage. Report any fraudulent activity to the appropriate authorities, dispute any false claims, and take steps to secure your identity to prevent further issues."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"h3","properties":{"id":"how-to-protect-yourself-against-identity-theft","style":"position:relative;"},"children":[{"type":"text","value":"How to protect yourself against identity theft"},{"type":"element","tagName":"a","properties":{"href":"#how-to-protect-yourself-against-identity-theft","ariaLabel":"how to protect yourself against identity theft permalink","className":["anchor","after"]},"children":[{"type":"element","tagName":"svg","properties":{"ariaHidden":"true","focusable":"false","height":"16","version":"1.1","viewBox":"0 0 16 16","width":"16"},"children":[{"type":"element","tagName":"path","properties":{"fillRule":"evenodd","d":"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z"},"children":[]}]}]}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Protecting yourself from identity theft involves more than just being careful; it requires proactive steps to secure your sensitive data. Here’s how you can keep your personal information safe and make it harder for criminals to make you their next target:"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"1. Monitor your financials closely:"}]},{"type":"text","value":" Keep an eye on your credit card reports, financial statements, and mailbox. These can often give you the first hint of suspicious activity."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"2. Be cautious with your SSN:"}]},{"type":"text","value":" Use your Social Security Number sparingly and never carry it in your wallet."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"3. Destroy sensitive information:"}]},{"type":"text","value":" Regularly shred outdated personal documents like bills, old receipts, credit card offers, and bank statements. Thieves often dig through trash to find such information."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"4. Cut up old cards:"}]},{"type":"text","value":" Don’t just throw away expired credit cards or those you no longer use. Cut them up to prevent criminals from piecing them back together."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"5. Use cybersecurity tools"}]},{"type":"text","value":": Fraud on the internet is a daily occurrence, spanning everything from scam attempts to malware infections, spyware, and more. Online threats lurk at every turn! While you can educate yourself on the various techniques used by identity thieves, it's nearly impossible to completely prevent cybercriminals from targeting your data on your own. However, with "},{"type":"element","tagName":"a","properties":{"href":"https://guard.io/plans","title":"Guardio Plans page"},"children":[{"type":"text","value":"Guardio’s"}]},{"type":"text","value":" security tools, you can significantly enhance your protection and stay a step ahead of the threats."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Join over 1.5 million Guardio users and enjoy a safer internet experience, free from the worries of identity theft and other cybersecurity threats. With "},{"type":"element","tagName":"a","properties":{"href":"https://guard.io/plans","title":"Guardio Plans page"},"children":[{"type":"text","value":"Guardio"}]},{"type":"text","value":", you're not just informed—you're securely guarded against identity thieves."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"h3","properties":{"id":"what-do-i-do-when-my-identity-has-been-stolen","style":"position:relative;"},"children":[{"type":"text","value":"What do I do when my identity has been stolen?"},{"type":"element","tagName":"a","properties":{"href":"#what-do-i-do-when-my-identity-has-been-stolen","ariaLabel":"what do i do when my identity has been stolen permalink","className":["anchor","after"]},"children":[{"type":"element","tagName":"svg","properties":{"ariaHidden":"true","focusable":"false","height":"16","version":"1.1","viewBox":"0 0 16 16","width":"16"},"children":[{"type":"element","tagName":"path","properties":{"fillRule":"evenodd","d":"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z"},"children":[]}]}]}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Discovering your identity has been stolen is daunting and resolving the issue involves more than just a quick phone call. Here's how you can start tackling the problem:"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Report to the FTC: The first step is to notify the Federal Trade Commission (FTC). You can file a report on their website at IdentityTheft.gov or by calling (1-877-438-4338). The FTC's website also guides you through the process of recovering your identity and tracks your case's progress."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Place a fraud alert: Contact the credit bureaus and request to place a seven-year fraud alert on your credit report. This alerts creditors to verify your identity before opening new accounts in your name."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Notify financial institutions: Inform your credit card issuers and any lenders where you hold accounts about the theft. This is crucial to prevent further fraudulent charges."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Contact government agencies: Reporting the theft to state or federal government agencies can also help, especially if documents like your driver's license or social security number were compromised."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Monitor your credit: Regularly check your credit reports to spot any suspicious activity early. Keeping a close eye helps you respond quickly to any new instances of fraud."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Additionally, utilizing services like Guardio can provide an extra layer of protection. Guardio offers continuous monitoring and alerts you to any unusual activities or threats to your personal information. With "},{"type":"element","tagName":"a","properties":{"href":"https://guard.io/plans","title":"Guardio Plans page"},"children":[{"type":"text","value":"Guardio’s"}]},{"type":"text","value":" tools at your disposal, you can navigate the recovery process with more confidence and ensure your digital safety is maintained in the future."}]}],"data":{"quirksMode":false}}}}}},"pageContext":{"title":"Identity Theft","slug":"identity-theft","keepLearning":[{"title":"Incident Handling","slug":"incident-handling"},{"title":"Infostealers","slug":"infostealers"},{"title":"Internet Worm","slug":"internet-worm"}],"breadcrumb":{"location":"/dictionary/identity-theft","crumbs":[{"pathname":"/","crumbLabel":"Homepage"},{"pathname":"/dictionary","crumbLabel":"dictionary"},{"pathname":"/dictionary/identity-theft","crumbLabel":"identity-theft"}]}}},"staticQueryHashes":["1614255152"]}