Types of Identity Theft

We live in a world where information is shared, transferred and often stolen as quick as the click of a mouse.  When it comes to protecting yourself from becoming a victim of identity theft, information is power.  Knowing when and how identity thieves are stealing your sensitive information the key to keeping your self  safe from these life altering crimes.  These are some of the more popular types of identity theft criminals are using to gain access to your bank accounts, credit cards, & personal information.

dumpster-diving
Secure Your Trash: Criminals don’t mind getting a little dirty to steal your credit card receipts, bank account statements and other sensitive information. Dumpster diving is an old school tactic that’s still being used today to commit identity theft. Learn More…
kids at risk
Child Identity Theft: Young children and students are extremely vulnerable to identity theft.  With little or no credit on file, they can be easy targets and unfortunately the damage caused by id theft may not be known for many years until they are old enough to apply for credit.  Learn More…
stolen-wallet
Stolen Wallet: You know that horrible feeling when you can’t find your wallet?  Well that feeling is 10x worse when your wallet is stolen and someone gains access to all of your credit cards, bank accounts and has your personal identification.  Learn More
shoulder-surfing
Shoulder Surfing: Identity thieves will often stand close enough to your person so they can listen in on your conversations.  In many cases they will use cell phone cameras or video to snap photos of your computer or cell phone screen, capturing sensitive information.  Learn More…
change-of-address
Change of Address: One of the oldest types of identity theft in the book.  Criminals will file a change of address form at the post office, diverting your mail and stealing your identity.Simple, yet effective and still being used to this day.  Learn More…
phishing
Phishing: Do you really know if that email from your bank is legitimate?  Or how about that message from the IRS stating that you owe a tax payment?  ID thieves are constantly coming up with new & clever ways to impersonate legitimate companies and websites, hoping you won’t spot them as fakes and give up your personal information.  Learn More…
dumpster-diving copy
Mail Theft: This is another id theft method that’s been around forever.  These old school id thieves scour your neighborhood looking for unlocked mailboxes.  They take your mail right from the curb and you’re non the wiser.  That is until they start using your credit card number or worse.  Learn More…
vishing phone
Vishing: Vishing is when criminals make voicealls to your home or cell phone and attempt to get you to share sensitive information such as credit card numbers, bank accounts and even social security numbers.  They often pose as legitimate businesses or as someone taking a survey. Learn More
atm skimming
ATM Skimmers: Today’s thieves are tech savvy.  They install fake card readers on ATM machines which record the information on your card when you innocently swipe it.  They can also collect your pin code and clone your card.  They then make withdrawals from your account.  Learn More…
atm overlay
Overlays: Criminals who use overlay devices will install a fake keypad over the original ATM keypad.  So when you enter your pin number, that information is transmitted to a nearby computer where it can be used to rob you blind.  These devices are normally used in conjunction with ATM Skimmers. Learn More…
data_breach_1NnoK
Data Breaches: Your personal financial data is digitally stored in many places.  Banks, retail stores and on your own computer.  When a data breach occurs, the criminals have hacked into these accounts and stolen personal information such as credit card and bank account information. Learn More…
sms-phishing
SMSishing: This is virtually the same technique as email phishing, except the criminals are sending fake text messages to your phone.  They impersonate legitimate companies asking you for personal information that they will steal and use for financial gain.  Learn More
file-sharing
P2P File Sharing: File sharing networks have become an excellent source for identity thieves to gain access to sensitive, personal information via accidental disclosure—from passwords, to social security numbers,tax returns, and banking information. All of these items stored on the file sharing program’s hard drive can mistakenly be made public.  Learn More…