{"id":1663,"date":"2021-03-15T09:38:39","date_gmt":"2021-03-15T14:38:39","guid":{"rendered":"http:\/\/blogs.luc.edu\/uiso\/?p=1663"},"modified":"2024-04-16T21:46:13","modified_gmt":"2024-04-16T21:46:13","slug":"ouch-newsletter-identity-theft","status":"publish","type":"post","link":"https:\/\/blogs.luc.edu\/uiso\/ouch-newsletter-identity-theft\/","title":{"rendered":"OUCH! Newsletter: Identity Theft"},"content":{"rendered":"<h3><strong>What is Identity Theft?<\/strong><\/h3>\n<p>Identity theft happens when a criminal steals information about you and uses that information to commit\u00a0fraud, such as requesting unemployment benefits, tax refunds, or a new loan or credit card in your name.\u00a0If you don\u2019t take precautions, you may end up paying for products or services that you didn\u2019t buy and\u00a0dealing with the stress and financial heartache that follows identity theft.<\/p>\n<p>Your personal information exists in numerous places all over the internet. Every time you browse or\u00a0purchase something online, watch a video, buy groceries, visit your doctor, or use an app on your\u00a0smartphone, information about you is being collected. That information is often legally sold or shared\u00a0with other companies. Even if just one of these gets hacked, the criminals can gain access to your personal\u00a0information. Assume that some information about you is already available to criminals and consider what\u00a0you can do to slow down or detect the use of your information for fraud.<\/p>\n<h3>How to detect it<\/h3>\n<ul>\n<li>Review your financial cards and other accounts regularly for any charges or payments you did not make. An easy way to do this is to sign up for email, text messages, or phone app notifications for\u00a0payments and other transactions. Monitor them for fraud.<\/li>\n<li>Investigate situations when merchants decline your credit or debit cards. Look into letters or\u00a0phone calls from debt collectors for overdue payments for credit cards, medical bills, or loans that\u00a0you know are not yours.<\/li>\n<li>Pay attention to letters that inform you about unemployment or other government benefit claims\u00a0for which you never applied.<\/li>\n<li>If available in your area, review your credit reports at least once a year. For example, in the United\u00a0States, you can request free reports from annualcreditreport.com.<\/li>\n<\/ul>\n<h3>What to do when it happens<\/h3>\n<ul>\n<li>Contact the organization that is involved in the fraud. For example, if a criminal opened a credit\u00a0card in your name, call that credit card company to notify it about the fraud. If someone filed for\u00a0a tax refund or unemployment benefits in your name, contact the corresponding government\u00a0organization.<\/li>\n<li>File a report with law enforcement to create an official record of identity theft. You can often do\u00a0this online. For example, in the United States you can report at\u00a0identitytheft.gov. Follow the site\u2019s\u00a0instructions for any additional steps you may need to take.<\/li>\n<li>When responding to fraud, keep records of your interactions with your financial institutions and\u00a0law enforcement, as well as the costs you incur due to identity theft in case these details will be\u00a0needed later.<\/li>\n<li>Notify your insurance company; you may have identity theft protection included in one of your\u00a0policies.<\/li>\n<\/ul>\n<h3>How to defend against it<\/h3>\n<p>Here are some simple steps you can take to decrease the chance of identity fraud happening:<\/p>\n<ul>\n<li>Limit how much information you share about yourself with online services and websites.<\/li>\n<li>Use a unique strong password for all of your online accounts and enable two-factor authentication\u00a0as additional protection for your most important accounts.<\/li>\n<li>If applicable in your location, restrict who can get access to your credit reports. For example, in the United States freeze your credit score so that anyone who tries to get a credit card or loan in your name has to first temporarily unfreeze it.<\/li>\n<li>Consider getting insurance coverage, either through a dedicated policy or as part of your existing\u00a0insurance plan, that covers the costs of dealing with identity theft.<\/li>\n<\/ul>\n<hr \/>\n<h3>Guest Editor<\/h3>\n<p>Lenny Zeltser is the CISO at Axonius, a cybersecurity asset management company. He also teaches malware combat and writing at the SANS Institute. Lenny is active on Twitter as\u00a0<a href=\"https:\/\/twitter.com\/lennyzeltser?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor\" target=\"_blank\" rel=\"noopener noreferrer\">@lennyzeltser<\/a>\u00a0and writes a security blog at\u00a0<a href=\"https:\/\/zeltser.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">zeltser.com<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>What is Identity Theft? Identity theft happens when a criminal steals information about you and uses that information to commit\u00a0fraud, such as requesting unemployment benefits, tax refunds, or a new loan or credit card in your name.\u00a0If you don\u2019t take precautions, you may end up paying for products or services that you didn\u2019t buy and\u00a0dealing [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2,7,1],"tags":[],"class_list":["post-1663","post","type-post","status-publish","format-standard","hentry","category-front-page","category-published","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/posts\/1663","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/comments?post=1663"}],"version-history":[{"count":1,"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/posts\/1663\/revisions"}],"predecessor-version":[{"id":2058,"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/posts\/1663\/revisions\/2058"}],"wp:attachment":[{"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/media?parent=1663"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/categories?post=1663"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/tags?post=1663"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}