Family Protection Category | IdentityIQ https://www.identityiq.com/category/family-protection/ Identity Theft Protection Tue, 30 Jan 2024 17:57:48 +0000 en-US hourly 1 https://wordpress.org/?v=6.4.3 https://www.identityiq.com/wp-content/uploads/2021/05/cropped-favicon-32x32.png Family Protection Category | IdentityIQ https://www.identityiq.com/category/family-protection/ 32 32 Synthetic Identity Theft: What It Is and How It Works https://www.identityiq.com/identity-theft/what-is-synthetic-identity-theft/ https://www.identityiq.com/identity-theft/what-is-synthetic-identity-theft/#respond Tue, 30 Jan 2024 12:00:54 +0000 https://identityiq.wpengine.com/?p=3719 Synthetic Identity Theft: What It Is and How It Works
IdentityIQ

You work hard to protect your identity. You're cautious about sharing personal information, you regularly change your passwords, and you keep an eye on your credit report. But despite your diligence, there's a form of identity theft that's becoming increasingly prevalent and is notoriously difficult to detect -- synthetic identity theft. Understanding this growing [...]

The post Synthetic Identity Theft: What It Is and How It Works appeared first on IdentityIQ written by Kristin Austin

]]>
Synthetic Identity Theft: What It Is and How It Works
IdentityIQ

You work hard to protect your identity. You’re cautious about sharing personal information, you regularly change your passwords, and you keep an eye on your credit report. But despite your diligence, there’s a form of identity theft that’s becoming increasingly prevalent and is notoriously difficult to detect — synthetic identity theft.

Understanding this growing threat can help protect your financial health and peace of mind. Here’s a comprehensive guide to help you grasp the ins and outs of synthetic identity theft so you can safeguard your future and that of your family.

What Is Synthetic Identity Theft?

Synthetic identity theft is an intricate form of financial fraud that blends stolen personal details with fabricated information to create a new, unique identity.

Unlike traditional identity theft where the criminal fully takes over someone’s identity, synthetic identity theft combines your real information, such as your Social Security number or date of birth, with other fake information to make it more difficult to trace.

The complexity of synthetic identity theft often allows it to go undetected for longer periods. By merging real and fabricated information, it becomes a monumental task to identify these fraudulent activities, often allowing criminals to continue to exploit the financial systems.

Their aim is to create a convincing identity that fools creditors, like banks and credit card companies, into extending loans and credit which are eventually defaulted on.

How Synthetic Identity Theft Works

1.   Gather Initial Information

The synthetic identity theft process begins with the acquisition of your personal details. Perpetrators may use various tactics such as phishing emails, which are designed to look like they come from trustworthy institutions, to lure you into revealing your data.

They can also hack into databases where your details might be stored — these can be databases of online retailers, healthcare providers, or even educational institutions. Some criminals might even resort to old-school methods like dumpster diving, where they scavenge for discarded documents that may contain your personal details.

2.   Craft the Synthetic Identity

After obtaining the necessary information, criminals enter the next phase which involves the careful blending of real and fake data.

This composite identity may use your Social Security number paired with a fictitious name, a different address, and even an altered date of birth. The aim here is to make this synthetic identity as realistic as possible while minimizing the risk of quick detection.

3.   Build Financial Credibility

Once the synthetic identity has been crafted, it’s time to give it financial life. Initially, criminals may apply for credit cards or smaller loans.

While these applications often get denied due to the lack of a credit history, they serve a hidden agenda: establishing a credit profile with credit bureaus. This initial interaction with the financial system is usually enough to create a thin credit file, helping give the synthetic identity some semblance of financial existence.

4.   Exploit Legitimate Accounts

With the credit profile set up, the fraudsters move to the next stage, “piggybacking.” This involves unauthorized association with existing, good-standing credit accounts.

They add the synthetic identity as an authorized user, thereby absorbing some of the primary account holder’s good credit attributes. This process can rapidly inflate the creditworthiness of the synthetic identity, helping make it appear more legitimate to creditors.

5.   Achieve the End Game

After successfully piggybacking and possibly obtaining small loans or credit lines, which they pay off diligently, the synthetic identity’s credit score begins to rise. Criminals may take this as a cue to aim higher, seeking out larger loans and more substantial lines of credit.

Once a significant credit limit is approved, they often max out the credit lines or withdraw large loan amounts, only to disappear, leaving the financial institution with losses and the real individuals whose details were stolen with a mess to clean up.

Synthetic vs. Traditional Identity Theft

The Intricacies of Synthetic Identity Theft

Synthetic identity theft involves a mix of real and made-up information, resulting in a new, distinct identity that can often bypass standard fraud detection measures. This makes it a long-term play for criminals.

The more they nurture this synthetic identity, the more complex and extensive the fraud can become. Because of the merged details, tracing these activities back to a single individual can become increasingly complicated, often allowing the criminals to evade capture for extended periods.

The Simplicity of Traditional Identity Theft

In contrast, traditional identity theft is typically relatively straightforward. Criminals steal an individual’s entire identity, often using it to make large purchases or withdraw funds as quickly as possible.

They aim to maximize their ill-gotten gains before the victim realizes what has happened and acts to stop further fraud. This immediacy often makes traditional identity theft easier to detect, but it can still be devastating for the victim.

Detecting Synthetic Identity Theft

Detecting synthetic identity theft can be challenging because the criminals are not merely hacking accounts but creating a façade of legitimate financial behavior. They typically nurture these fabricated identities by responsibly using the fraudulent account, making it appear as if a real person is just experiencing financial difficulties.

Children are particularly vulnerable targets for synthetic identity theft as they likely won’t be checking their credit reports for years, leaving ample time for criminals to exploit their Social Security numbers.

How to Help Protect Yourself Against Synthetic Identity Theft

Given its elusive nature and devastating impact, defending against synthetic identity theft often requires a more nuanced approach than traditional identity theft prevention. Here are some targeted strategies:

Protect your SSN

Your Social Security number is a golden ticket for fraudsters. In most cases, you should not carry your Social Security card with you. If you must disclose your SSN, make sure you’re in a private setting and try not to repeat it aloud within earshot of others.

Remember to discard documents containing your SSN carefully — shred them or black out the information.

Use Security Software

Deploy a multi-layered security software suite that provides comprehensive digital protection. Opt for a solution that offers real-time monitoring, identity theft insurance, and alerts for crimes committed in your name.

Understand Vulnerabilities

Knowledge is your first line of defense. Make it a point to understand the tactics fraudsters employ to steal your personal information. Once you know their tricks, you may be less likely to fall for them.

Monitor Your Credit

Regularly review your credit report for unauthorized activities. IdentityIQ identity and credit monitoring offers synthetic identity theft protection, alerting you to suspicious activities that could suggest your information is being used to create a synthetic identity

FAQs

What are the warning signs of synthetic identity theft?

Indicators of synthetic identity theft may include receiving unexpected bills, uninitiated credit inquiries, or accounts you did not open appearing on your credit report. You might also receive calls or letters from debt collectors about debts that aren’t yours.

Who’s most at risk of synthetic identity theft?

Anyone can fall victim to this form of identity theft, but certain groups are more vulnerable. This includes children, whose credit histories are clean slates, and the elderly, who may not be as digitally savvy. Others at high risk include individuals with limited or poor credit histories, military personnel, prison inmates, victims of data breaches, and those with high social activity or public records.

What can happen if you become a victim of synthetic identity theft?

  • Financial Damage: Scammers can open accounts in your name, racking up debt and negatively impacting your credit score.
  • Difficulty Borrowing: Your ability to secure loans and credit cards may diminish due to poor credit history.
  • Emotional Distress: Dealing with the fallout of identity theft can be stressful and anxiety-inducing.

What is an example of synthetic identity theft?

  • A thief steals a child’s unused Social Security number and creates a fake identity with a fictitious name and address. They use this identity to open credit cards and make purchases, leaving the child with a mountain of debt and a tarnished credit history.
  • A criminal obtains deceased individuals’ personal information and combines it with fabricated details to create new identities for themselves or others. They then use these fabricated identities to apply for benefits, commit tax fraud, or even obtain employment.

What are some warning signs of synthetic identity theft?

  • You receive credit reports or bills for accounts you never opened.
  • You see sudden unexplained changes in your credit score.
  • You are denied credit or loans for seemingly no reason.
  • You receive collections notices for debts you don’t recognize.
  • You see unfamiliar addresses or phone numbers listed on your credit report.

Key Takeaways and More Ways to Stay Protected

  1. Secure Your Social Security Number: Do not share it or leave it open on computers, cell phones, or tablets.
  2. Beware of Phishing Attempts: Be cautious of phishing attempts that may be aimed at tricking you into sharing your personal information.
  3. Freeze Your Credit Reports: If you feel you are being targeted with a synthetic identity theft scam, freezing your credit reports can help protect you. This action can help stop potential scammers from opening accounts in your name.
  4. Monitor Your Personal Information: Monitor your personal information with IdentityIQ identity theft protection services so you can be alerted if it falls into the wrong hands.
  5. Opt-Out of People Search Sites: Remove your name from people finder sites to help keep your identity protected.

Bottom Line

Synthetic identity theft is an evolving and dangerous threat that can wreak havoc on your financial well-being and peace of mind. Taking proactive steps is more important than ever, and that’s where IdentityIQ services offer significant value.

The comprehensive platform not only provides credit monitoring in real-time, but also alerts you to threats to your personal information. The IdentityIQ robust suite of features are designed to help protect you and your family against various forms of identity theft.

Signing up for IdentityIQ is a quick, straightforward (and affordable!) process. If possible suspicious activity is detected once you’re under the protection of IdentityIQ, you are alerted in real-time, empowering you to act swiftly.

The post Synthetic Identity Theft: What It Is and How It Works appeared first on IdentityIQ written by Kristin Austin

]]>
https://www.identityiq.com/identity-theft/what-is-synthetic-identity-theft/feed/ 0
7 Internet Safety Tips for Safer Internet Browsing https://www.identityiq.com/digital-security/7-simple-tips-for-safer-internet-browsing/ https://www.identityiq.com/digital-security/7-simple-tips-for-safer-internet-browsing/#respond Sat, 19 Aug 2023 07:00:46 +0000 https://identityiq.wpengine.com/?p=2990 7 Internet Safety Tips for Safer Internet Browsing
IdentityIQ

With the internet, we can access vast amounts of information with only a click or tap. This year, the total number of internet users worldwide reached 5.18 billion, nearly two-thirds of the world’s population. And as immense as the internet is, so are the risks. To make sure that your time spent online is enjoyable [...]

The post 7 Internet Safety Tips for Safer Internet Browsing appeared first on IdentityIQ written by Brian Acton

]]>
7 Internet Safety Tips for Safer Internet Browsing
IdentityIQ

With the internet, we can access vast amounts of information with only a click or tap. This year, the total number of internet users worldwide reached 5.18 billion, nearly two-thirds of the world’s population. And as immense as the internet is, so are the risks.

To make sure that your time spent online is enjoyable and risk-free, this article provides seven simple internet safety tips. But first, let’s take a look at what internet safety really entails.

Understanding the Basics of Internet Safety

Think of the internet as a vast, crowded city. Just as you’d be cautious in a crowded place, you need to show caution online. Many threats lurk in its corners.

What are these threats? Viruses, the most common ones, can harm your computer or steal data. Then there’s phishing, in which scammers trick you into disclosing personal information. Another threat is ransomware, which locks your files and asks for money to unlock them.

The global cost of cybercrime reached an astounding $8.44 trillion last year.

Learning about cyberthreats is the first step to defending against them. However, dangers evolve over time. Knowing about internet safety means being informed, paying attention, and making wise decisions. As we go further into specific online safety tips, keep in mind these basic principles.

#1 Use Anti-Virus and Anti-Malware Software

When you use the internet, your computer can become a target for harmful programs. These programs, known as malware, can hurt your computer, take your personal info, and even lock your files until you pay a ransom. So, how can you maintain safe internet browsing? The answer is simple: anti-virus and anti-malware software.

Anti-virus software works like a security guard for your computer. It checks everything that enters your system. When it spots a threat, it quickly acts to block or remove it. There are threats that can spread from one file to another, encrypt your files, or monitor what you do.

But in order for the software to function properly, it is necessary to update it regularly. Every day, cybercriminals find new ways to get sensitive info. When you update your antivirus software, you make sure it knows about the newest dangers, enabling it to protect your device.

IdentityIQ offers antivirus with Bitdefender® Total Security.

#2 Keep Your Browser Updated

You use your browser to navigate the vast digital landscape. Making sure it’s up to date is a critical step in ensuring your online safety.

Why are browser updates so important? First, every update often includes security enhancements. Developers continuously identify and fix vulnerabilities in their browsers. Updates provide these fixes and reduce your risk of malicious attacks.

Besides security reasons, an updated browser offers better functionality. Websites evolve, adopting new technologies to improve user experience. Older browsers may not support these changes, causing display issues or site restrictions.

So, how can you keep your browser updated? Here are some steps:

  1. Open your browser. This might seem basic, but it’s the starting point.
  2. Go to the settings or options menu. In the top right corner, a gear icon or three vertical dots typically represents it.
  3. Find the “About” or “Update” section. This is where you can view your current browser version and see if updates are available.
  4. Follow the prompts. If an update is available, there will often be clear instructions to guide you through the process.

#3: Make Sure Websites Are Secure

When you shop at a store, you probably look for signs that tell you it’s a reputable place. Similarly, when browsing online, it’s crucial to ensure the websites you visit have features that show they are secure.

  1. First, check the website’s URL. Secure sites begin with “https://”, not just “http://”. “S” stands for “secure” and indicates that data sent between your browser and the website is encrypted, making it harder for cybercriminals to intercept.
  2. Next, look for a padlock icon in the address bar. This icon assures that the website has a security certificate. Your credit card numbers or passwords are protected when entered on that site.
  3. Avoid entering any personal information on websites that lack these indicators. It takes a moment to check, but it can save you from many potential online threats.

Secure websites protect your data when shopping, banking, or connecting online. Always ensure websites you visit value your security as much as you do.

#4: Go Private on Public Wi-Fi

Public Wi-Fi spots in coffee shops, airports, and malls offer a convenient way to stay connected. But connecting to these open networks can make you vulnerable. Cybercriminals often target these unsecured networks to access personal data from unsuspecting users. How can you guard against these threats?

  1. You should first examine the network’s credibility. Before connecting, double-check that the network name matches the official name of the establishment. Cybercriminals will sometimes create networks with similar names in order to trick users.
  2. Prefer to use password-protected networks. This indicates that at least a basic level of security is in place.
  3. Make use of virtual private networks (VPNs). VPNs encrypt your data, making it more difficult to access for hackers. Turn on your VPN before connecting to public Wi-Fi.

While public Wi-Fi offers convenience, it’s essential to prioritize your safety. Taking a moment to secure internet browsing can prevent online threats. IdentityIQ offers secure browsing with Bitdefender® VPN.

#5: Be Wary of Links and Attachments

The internet is a hub of information, and often, this information reaches us in the form of links and attachments. Many are harmless and from trusted sources, but others can be traps from cybercriminals. It’s crucial to pause before you click.

Clicking on suspicious links can expose your device to threats. Some links can lead you to phishing sites. Others may initiate the download of harmful software without your knowledge.

Attachments in emails can be just as risky. When you open a document or image, you may unknowingly install malware.

To protect yourself, avoid clicking on links from unknown sources. If an email looks out of the ordinary, even if it’s from someone you know, be cautious.

You should also check the URL before you click. If it looks odd or misspelled, it might be a sign of a malicious site.

Don’t download attachments unless you’re expecting them, and always verify the source. A quick web search can often tell you if the company or person is legitimate.

#6: Use a Password Manager

Remembering a different, strong password for every account can be a hassle. This is where password managers come in.

A password manager stores all your passwords in a digital vault, accessible only by a master password. It saves you time by automatically filling in login details when visiting a website.

There are more perks to using a password manager. Many of them can generate random and strong passwords for you. Another advantage is that the stored passwords are encrypted. This means even if someone breaks into the vault, your passwords remain safe.

Choosing a password manager might seem daunting, but there are a few things to consider that can help. Look for one that offers two-factor authentication. This adds an extra layer of security. You should also check reviews and see if the password manager has a good track record.

#7: Be Careful What You Download

The internet offers an endless array of software, apps, and files for download. From fun games to helpful tools, there’s something for everyone. But not all downloads are safe. Cybercriminals often hide malware in appealing packages, hoping you’ll download it without thinking.

Have you ever seen a pop-up on a website offering a free tool or game? Sometimes, these are genuine offers, but other times they are traps. When downloading from such sources, you risk getting more than expected. Instead of a fun game, you might get malware that can steal your data or damage your device.

But what about drive-by downloads? These are sneakier. Some malicious websites try to install software on your computer without your knowledge. You might just be browsing, and behind the scenes the site attempts to put malware on your device.

Always be selective about what you download. Use trusted websites. Check reviews and do a quick search about the software or file you’re considering.

Bottom Line

Your device and personal data are valuable. It should be clear that awareness and action are the keys to enjoying the online world while avoiding its pitfalls. The internet safety tips we’ve discussed here are your tools. They are simple, straightforward, and effective.

Taking a few extra minutes to include them when browsing can save you a lot of trouble. If you use them consistently, you and your loved ones will be protected online. Always do your best to keep yourself safe, informed, and proactive.

Further safeguard yourself from potential threats with the assistance of IdentityIQ identity theft protection services. Benefit from cutting-edge identity theft monitoring and receive immediate alerts when suspicious activity is detected.

The post 7 Internet Safety Tips for Safer Internet Browsing appeared first on IdentityIQ written by Brian Acton

]]>
https://www.identityiq.com/digital-security/7-simple-tips-for-safer-internet-browsing/feed/ 0
How to Protect Your Social Security Number: 7 Tips to Secure Your SSN https://www.identityiq.com/identity-theft/6-tips-for-protecting-your-social-security-number/ https://www.identityiq.com/identity-theft/6-tips-for-protecting-your-social-security-number/#respond Fri, 30 Jun 2023 11:49:52 +0000 https://identityiq.wpengine.com/?p=2690 How to Protect Your Social Security Number: 7 Tips to Secure Your SSN
IdentityIQ

Understanding the Importance of Your Social Security Number Social Security Numbers (SSNs) are unique identifying numbers assigned to U.S. citizens and eligible residents. Your SSN is used to identify you with a wide variety of third-party organizations, from government agencies to businesses. Criminals who gain access to your SSN may use it to steal your [...]

The post How to Protect Your Social Security Number: 7 Tips to Secure Your SSN appeared first on IdentityIQ written by Brian Acton

]]>
How to Protect Your Social Security Number: 7 Tips to Secure Your SSN
IdentityIQ

Understanding the Importance of Your Social Security Number

Social Security Numbers (SSNs) are unique identifying numbers assigned to U.S. citizens and eligible residents. Your SSN is used to identify you with a wide variety of third-party organizations, from government agencies to businesses.

Criminals who gain access to your SSN may use it to steal your identity, damage your credit, and access your financial accounts.

When Is It Safe to Share My Social Security Number?

In some cases, it is reasonably safe to share your SSN:

  • When you apply for credit, the lender needs your SSN to check your credit.
  • When you file your tax returns.
  • When you open accounts with certain banks.
  • When you request services from government agencies like the Department of Labor.
  • When you request copies of your credit reports from Experian®, Equifax®, and TransUnion®.

7 Practical Tips to Protect Your Social Security Number

1. Don’t Send Your SSN in a Message via an Electronic Device

Don’t send your SSN in a message, such as an email, text, or instant message, from your electronic device. These messages could be intercepted or forwarded along to other third parties. If you must provide your SSN, it’s better to do it in person or using a secure system (such as a lender’s online application portal).

2. Don’t Give It Out to Strangers

Never share your SSN with a stranger who requests it over the phone. You should contact the organization directly through their official communication channels.

3. Monitor Your Bank and Credit Card Accounts

When someone has access to your SSN, they may be able to access your financial accounts. Monitor your accounts, read your monthly statements, and report any unauthorized transactions. You can also check if your bank has additional security features including:

  • Biometric logins that require facial or fingerprint recognition to access your mobile account.
  • Multifactor authentication that requires an additional verification step when logging into your account.
  • Alerts that notify you when your account is overdrawn, transactions exceed a certain amount, or if someone uses your SSN to access your account.

4. Consider an Identity Protection Service

Identity protection services look for signs of identity theft and warn you when your information is compromised. They can also help you lock down your SSN and protect your identity. With IdentityIQ identity theft protection services you get:

  • Regular copies of your credit report and credit scores.
  • Alerts when there are significant changes in your credit report.
  • Dark web monitoring.
  • Identity restoration services and identity theft insurance, underwritten by AIG.

5. Don’t Carry Your Social Security Card in Your Wallet

There are certain scenarios when you may need your physical Social Security card, such as when you start a new job, or you need to use it as a form of identification. But most of the time, you should not carry your Social Security card with you.

6. Don’t Forget to Protect Your Child’s SSN

Criminals can commit fraud using your child’s SSN and go undiscovered for years until the child applies for credit as an adult. Here are some tips to protect your child’s SSN:

  • Keep track of your child’s SSN and protect it like you would your own.
  • Pre-emptively freeze your child’s credit using their birth certificate.
  • Teach your child online safety and good data security habits.

7. Ask How and Why It Will Be Handled

When a medical provider, business, school, or other organization requests a SSN, make sure you ask the following questions:

  • Why do you need my SSN?
  • How will you protect my SSN?
  • Can I use an alternative method of identification?
  • Can you use the last four digits of my SSN instead of the entire number?

Just because someone asks for your SSN doesn’t mean you have to provide it. For example, you can leave the SSN field blank on many medical forms and still receive medical services without any issue.

Advanced Measures for SSN Protection

1. Encrypting Your Data

You can use a virtual private network (VPN) to encrypt your web traffic and route your online activity through a server belonging to the VPN provider. Your data is effectively hidden from third parties that wish to view it, including when you share your SSN online. Remember, even when using a VPN, you should never share your SSN when it isn’t absolutely necessary.

2. Blocking Electronic Access to Your SSN

If your SSN has been compromised, you can request the Social Security Administration to block electronic access by calling 800-772-1213. This stops all automated telephone and electronic access to your Social Security record.

3. Using Self Lock Features

Employment identity theft occurs when someone uses your SSN to gain employment. You can place a “Self Lock” to lock your SSN and prevent it from being used by E-Verify, a web-based system that employers use to confirm employment eligibility.

What to Do If Your Social Security Number is Compromised

If you discover that your SSN was stolen or compromised, take these steps to protect your identity:

  • Report the fraud to the FTC at IdentityTheft.gov or by calling 877-382-4357.
  • Place a fraud alert or credit freeze on your credit report with Experian, Equifax, and TransUnion.
  • Check your credit report and dispute inaccurate information with the major credit bureaus.
  • File a police report and provide a copy of your identity theft report from the FTC.
  • Continue to monitor your financial accounts and report unauthorized transactions.
  • Report fraud to the SSA and check your Social Security statements.
  • Contact the IRS if your SSN was used to file a fraudulent tax return or to gain employment.

Consider signing up for identity theft monitoring by IdentityIQ services that proactively monitors your SSN and warns you about signs of fraud. You gain identity theft protection, real-time fraud alerts, and assistance when you need to recover your identity.

The post How to Protect Your Social Security Number: 7 Tips to Secure Your SSN appeared first on IdentityIQ written by Brian Acton

]]>
https://www.identityiq.com/identity-theft/6-tips-for-protecting-your-social-security-number/feed/ 0
The Ultimate Guide to Child Identity Theft: Types, Warning Signs & Prevention Strategies https://www.identityiq.com/family-protection/protect-yourself-and-your-children-from-identity-theft/ https://www.identityiq.com/family-protection/protect-yourself-and-your-children-from-identity-theft/#respond Thu, 08 Jun 2023 17:33:33 +0000 https://identityiq.wpengine.com/?p=3870 The Ultimate Guide to Child Identity Theft: Types, Warning Signs & Prevention Strategies
IdentityIQ

Child identity theft is a significant problem in the US. A recent report by Javelin Strategy & Research, sponsored by AARP, found that 915,000 children, or 1 in 80, were victims of identity theft in the past year. Additionally, 1 in 43 children were affected by a data breach from July 2021 to [...]

The post The Ultimate Guide to Child Identity Theft: Types, Warning Signs & Prevention Strategies appeared first on IdentityIQ written by Kristin Austin

]]>
The Ultimate Guide to Child Identity Theft: Types, Warning Signs & Prevention Strategies
IdentityIQ

Child identity theft is a significant problem in the US. A recent report by Javelin Strategy & Research, sponsored by AARP, found that 915,000 children, or 1 in 80, were victims of identity theft in the past year.

Additionally, 1 in 43 children were affected by a data breach from July 2021 to July 2022. It’s crucial for parents to take action to protect the personal information of their children. In this guide, we provide you with simple and effective strategies to help safeguard your child’s financial future against identity theft.

What Is Child Identity Theft?

Child identity theft happens when someone uses your child’s personal information, such as their name and Social Security number, to commit fraud or obtain services or benefits. This type of theft can occur even if your child has no credit history.

Thieves can use your child’s information to open bank accounts, apply for loans, or obtain credit cards. This can cause severe consequences for your child’s future financial security.

Even worse, child identity theft often goes unnoticed for years, making it harder to fix the damage done. It’s essential to take steps to protect your child’s personal information and monitor their credit to prevent child identity theft.

Types of Child Identity Theft:

Phishing Scams

Scammers may try to obtain personal information by sending deceptive emails or making phone calls to trick you or your child.

Hacking

Cybercriminals are always seeking ways to access large systems to obtain user data. No company is exempt, and if your child has an account with a compromised company, their information may be exposed.

Theft in the Family

Unfortunately, some cases of child identity theft occur within the family. Family members may steal essential documents and use them to create accounts in children’s names.

Data Breaches

Companies that have your child’s Social Security number can be hacked, leaving your child’s personal information vulnerable. This information may be sold for a small sum of money on the dark web.

Account Hacking

Hackers may gain entry to your or your child’s device via unsecured Wi-Fi networks, password hacking, or malware. This can result in the theft of your child’s personal information.

Physical Theft

Sensitive information, such as your child’s Social Security number, can be stolen from mail or garbage. In some instances, criminals may bribe employees at schools or companies to get hold of confidential information.

Why Do Criminals Target Children for Identity Theft?

Criminals target children for identity theft for several reasons:

Clean Slate

Children usually have a clean credit history, which makes it easier for criminals to open new accounts or take out loans under their names without raising suspicion.

Lengthy Discovery Time

Child identity theft can go undetected for years since children typically don’t use their credit until they reach adulthood. This delay allows criminals to continue their fraudulent activities without being caught, causing more financial damage.

Unused Social Security Numbers

Children’s Social Security numbers are often unused, making them prime targets for identity thieves. It is easier for criminals to use their SSNs to create fake identities and open new accounts.

Limited Monitoring

Parents may not closely monitor their children’s personal information or credit reports, making it easier for identity thieves to operate undetected. Many parents are unaware of the need to check their child’s credit history or protect their personal information, leaving their children vulnerable to identity theft.

Warning Signs a Child Is a Victim of Identity Theft

Here are some warning signs that your child may be a victim of identity theft:

Credit Report in the Child’s Name

If a credit report exists in your child’s name, this could be a sign that someone has used their personal information to open a credit account. Parents should check their child’s credit report annually to ensure that no fraudulent accounts have been opened.

Calls from Collection Agencies

If your child starts receiving calls from collection agencies, this could indicate that someone has taken out a loan or credit card in their name and then failed to make payments on it.

Credit Cards or Pre-Approved Credit Card Offers

If your child starts receiving credit card offers or pre-approved credit offers in the mail, this could be a sign that someone has used their personal information to open a credit account.

Bills in the Child’s Name

If your child receives bills in their name, this could indicate that someone has used their personal information to open an account for services such as utilities or mobile phones.

Notice from the IRS

If you receive a notice from the IRS that your child’s name and/or SSN is already listed on another tax return, this could be a sign that someone has used their personal information to file a fraudulent tax return.

Prevention Strategies: How to Protect Your Child’s Personal Information

Ask Questions Before Giving Anyone Your Child’s Social Security Number

Before giving anyone your child’s Social Security number, ask why they need it, how they will protect it, and whether they can use a different identifier or just the last four digits of the Social Security number.

Protect Documents with Personal Information

  • Store sensitive documents in a secure, locked location and shred them before discarding.
  • Be cautious when sharing personal information online or over the phone.
  • Limit access to your child’s personal documents.

Delete Personal Information Before Disposing of a Computer or Cell Phone

  • Perform a factory reset or use data erasure software to ensure complete deletion of personal information.
  • Remove SIM cards and external storage from devices before disposal.
  • Consider professional disposal services for secure data destruction.

Limit the Number of Accounts and Services Your Child Signs Up For

  • Discuss the importance of online privacy with your child and monitor their online activities and account creation.
  • Encourage the use of strong, unique passwords for each account and use parental control software to restrict access to certain websites and services.

Teach Your Kids Not to Overshare Online (and Don’t Do It Yourself)

  • Educate your child about online safety and responsible behavior.
  • Start early to develop good habits that will protect them through childhood and into adulthood.

Sign Up for Family Identity Theft Protection

Sign up for identity theft protection that covers the whole family. IdentityIQ monitors everyone’s credit and helps protect them against identity theft.

Get Involved in Your Child’s Online Activity

  • Be proactive in monitoring your child’s online activity to protect their personal information and identity.
  • If you suspect your child has been a victim of identity theft, report it to the proper authorities.

What to Do if Your Child’s Identity Has Been Stolen

If you suspect your child’s identity has been stolen, there are several steps you can take to protect them and minimize the damage:

  1. Contact the credit bureaus to request a credit freeze and check for any fraudulent accounts.
  2. Contact financial institutions to report any unauthorized accounts or charges.
  3. File a report with the Federal Trade Commission and local law enforcement.
  4. Keep detailed records of all communications and actions taken.
  5. Sign up for IdentityIQ to help protect your child’s identity and monitor for any unusual activity.
  6. Educate your child about online safety and the importance of protecting personal information.

The Bottom Line: Keep Your Children Safe from Scammers

Protecting your child’s personal information is crucial in preventing identity theft. When you’re aware of the warning signs and implement prevention strategies, you can minimize the risk of your child falling victim to this crime.

Stay vigilant and take proactive steps to safeguard your child’s identity.

FAQs

How Do You Check If Your Child’s Identity Has Been Stolen?

To check if your child’s identity has been stolen, you can request a copy of their credit report from the three major credit bureaus: Equifax®, Experian®, and TransUnion®. Look for any suspicious activity or accounts opened in their name.

What Are Two Things a Criminal May Do with a Stolen Child’s Identity?

Criminals may use a stolen child’s identity to open credit accounts or take out loans in the child’s name. They may also use the stolen identity for employment purposes, such as to obtain a job or government benefits.

Can You Put a Block on Your Child’s Social Security Number?

Putting a block on a child’s Social Security number is not possible.

How Do I Verify My Child’s Identity?

Verifying your child’s identity typically involves providing proof of their identity using documents such as a birth certificate, passport, or Social Security card. You may also need to provide other personal information, such as their full name, date of birth, and address.

The post The Ultimate Guide to Child Identity Theft: Types, Warning Signs & Prevention Strategies appeared first on IdentityIQ written by Kristin Austin

]]>
https://www.identityiq.com/family-protection/protect-yourself-and-your-children-from-identity-theft/feed/ 0
What to Do If My Email Is Found on The Dark Web? https://www.identityiq.com/digital-security/what-to-do-if-my-email-is-found-on-the-dark-web/ Wed, 13 Jul 2022 21:52:10 +0000 https://www.identityiq.com/?p=5586 What to Do If My Email Is Found on The Dark Web?
IdentityIQ

Pretty much everyone uses email. It’s part of your daily life. But what do you do if your email address is found on the dark web? People might be trying to access your accounts. Unfortunately, the dark web is where you can find a number of criminals and cybercriminals trying to break into your [...]

The post What to Do If My Email Is Found on The Dark Web? appeared first on IdentityIQ written by Kristin Austin

]]>
What to Do If My Email Is Found on The Dark Web?
IdentityIQ

Pretty much everyone uses email. It’s part of your daily life.

But what do you do if your email address is found on the dark web? People might be trying to access your accounts. Unfortunately, the dark web is where you can find a number of criminals and cybercriminals trying to break into your accounts and get access to your money, personal information, login details for other websites, and more.

If someone finds your email address on the dark web, they can try to access your account and see what they can get access to. Here’s what you should do if your email is found on the dark web: Do not panic. You need to take precautions now before anyone else finds out about it. Keep reading to learn more about how you can keep others from accessing your accounts again in the future.

What Does It Mean That My Email Is on the Dark Web?

When you receive an email that looks like it was sent from a dark web address, the email has been sent from a server with an IP address on the dark web.

There are numerous reasons why an email with a dark web address can appear in your inbox. Many hackers use compromised servers to send out phishing emails to gain access to sensitive information. Phishing emails look like they came from trusted sources, such as banks or social networks, but come from unknown servers. Never click on a link or open any attachments from an email address you don’t recognize.

How Do I Know if My Email Address is on the Dark Web?

There are many ways to find your email on the dark web. The easiest way to do this is by checking your online history. For example, you may be on the dark web if you have been sending emails for a long time and suddenly start receiving many emails from new unknown senders.

Another way to check if your email is on the dark web is by searching for it. Some websites can scan to see if your information has been breached.

What to Do if My Email Address is on the Dark Web?

You can start by contacting your email provider and ask if your email address has been compromised.

The best way to help protect yourself against these threats is to change your password and update all your software regularly.

There’s also the option of changing your email address altogether. This is especially recommended if you use an email service that has been flagged as a possible target for phishing attacks or malware.

And you can contact local law enforcement and file a report.

Why Do Hackers Want My Email Address?

Your email address is one of your most important and valuable pieces of information. It’s your access key to all your accounts, and hackers can use it to access your bank accounts, buy items on the internet or even get into your home.

Hackers who want to steal your email address may do so for two reasons: they want to send spam or harvest your mailbox. Malicious hackers want to steal your email address because it is a valuable commodity on the internet. They can try to use it to send spam messages to as many people as possible, hoping that at least one person is willing to reply.

Harvesting your mailbox is another reason why hackers might want your email address. They can try to read your emails to get a better picture of what you are up to in your personal and professional life as well as potentially access your bank and other accounts.

 How To Protect Your Email Address from The Dark Web?

There are many ways to help protect your email address from being disseminated on the dark web. The first step is to make sure that your credentials are never published in a public space. This means that you should not share your email address and password with anyone.

You can also use a password manager to keep your login credentials safe. Furthermore, you should take precautions when sending emails, such as creating complex passwords and using two-factor authentication. Finally, you should consider changing your email address if none of these options work.

When it comes to helping to protect your identity online, there are several options for keeping your email address safe from prying eyes. You should always use strong passwords and use two-factor authentication whenever possible. It is also essential to keep an eye out for phishing scams and ensure you are only communicating with people you know and trust.

It’s also essential to sign up for an identity theft protection plan. This helps keep your personal information monitored and you can be notified if your information is found on the dark web.

Learn how IdentityIQ can protect you today!

The post What to Do If My Email Is Found on The Dark Web? appeared first on IdentityIQ written by Kristin Austin

]]>
Are College Students Targeted by Identity Thieves? https://www.identityiq.com/identity-theft/are-college-students-targeted-by-identity-thieves/ Wed, 04 May 2022 14:59:11 +0000 https://www.identityiq.com/?p=5423 Are College Students Targeted by Identity Thieves?
IdentityIQ

When it comes to identity theft, young adults are a primary target. Students are four times more likely to be targets of fraud that can go undetected for years compared to other consumers. In fact, 15% of students deal with severe or moderate impacts from fraud, according to a report from Tulane University. Criminals [...]

The post Are College Students Targeted by Identity Thieves? appeared first on IdentityIQ written by Kristin Austin

]]>
Are College Students Targeted by Identity Thieves?
IdentityIQ

When it comes to identity theft, young adults are a primary target. Students are four times more likely to be targets of fraud that can go undetected for years compared to other consumers. In fact, 15% of students deal with severe or moderate impacts from fraud, according to a report from Tulane University.

Criminals can use students’ identities to commit fraud, like taking out loans and opening credit cards, while the victim has no clue what is happening.

Students can be at risk if they use public Wi-Fi networks or fall victim to phishing emails. If this sounds all too familiar, then there are some practical ways to help keep that from happening. Here is how college students can get help get protected from identity theft.

What Should College Students Do to Help Avoid Identity Theft?

In today’s digital era, there are all sorts of ways scammers can get a hold of your personal information. But, when you take extra precautions, you can establish that safety net where you no longer appear an easy target for identity theft.

You can do that by:

Not oversharing information on social media.

Don’t overshare personal details that might be related to the accounts and passwords you are using. Ideally, you should make more complex passwords that don’t contain any of your personal information.

Keep your security information on a hard drive instead of a device.

When you keep sensitive documents stored away, you can feel at ease. So, if your phone or laptop gets stolen, you won’t have to worry about the thief using your identity.

Frequently changing passwords.

You might feel tempted to use the same password repeatedly. But this isn’t a good idea. Use different ones to better safeguard your personal information.

Recognizing phishing scams.

Many criminals use fake loan listings and fake scholarships to get college students to share their private information. Make sure you only share that information with a reputable institution.

Be careful when using public Wi-Fi.

Public networks are not secure. You can stay safe if you don’t access your financial or personal information on a public network. In fact, the FTC recommends paying attention to the web browser alerts you are getting.

If you are using a public Wi-Fi, you should enable a VPN that keeps your information encrypted.

Where Can College Students Report Identity Theft?

Wondering who you should contact in case your identity has been stolen? Here are a couple of options that can help.

FTC (Federal Trade Commission)

As a college student, you can report a loan identity theft to the FTC. You are asked a couple of questions, after which you can get the necessary recovery plan.

CFPB (Consumer Financial Protection Bureau)

If there is a complaint you want to file about student loans regarding financial companies, the CFPB can help.

ICCC (Internal Crime Complaint Center)

A student who has been a victim of internet crime can file a complaint at the ICCC.

How To Recover from Identity Theft as a College Student

If someone has taken your identity without your consent, then it’s vital to take a steps so that you can recover from that damage. Start by taking inventory of the damage. Assess your current accounts and see if there are any unauthorized charges. Next, freeze your credit reports and place them on fraud alerts.

You should also sign up for identity theft protection. This service can help protect your personal information and credit, making you less likely to fall victim to identity theft.

The post Are College Students Targeted by Identity Thieves? appeared first on IdentityIQ written by Kristin Austin

]]>
How Oversharing About Your Kids on Social Media Can Lead to Identity Theft https://www.identityiq.com/identity-theft/how-oversharing-about-your-kids-on-social-media-can-lead-to-identity-theft/ https://www.identityiq.com/identity-theft/how-oversharing-about-your-kids-on-social-media-can-lead-to-identity-theft/#respond Mon, 21 Dec 2020 19:52:50 +0000 https://identityiq.wpengine.com/?p=4358 How Oversharing About Your Kids on Social Media Can Lead to Identity Theft
IdentityIQ

Every day, criminals scour the internet for personal information they can use to commit fraud and identity theft. In this digital age, individuals need to take steps to protect their privacy and information from fraudsters. This is as true for children as it is for adults, as kids can be victims of identity theft well [...]

The post How Oversharing About Your Kids on Social Media Can Lead to Identity Theft appeared first on IdentityIQ written by Brian Acton

]]>
How Oversharing About Your Kids on Social Media Can Lead to Identity Theft
IdentityIQ

Every day, criminals scour the internet for personal information they can use to commit fraud and identity theft. In this digital age, individuals need to take steps to protect their privacy and information from fraudsters.

This is as true for children as it is for adults, as kids can be victims of identity theft well before they reach adulthood. Social media can be a valuable trove of information for identity thieves looking to assume the identity of children.

Sharing too much information about your kids on social media platforms can actually leave them more vulnerable.

How Thieves Can Use Social Media to Gain Information

Proud parents who came of age using social media may not think twice about sharing comments or photos of their kids. It’s a convenient way to keep friends and family up to date, no matter where they are.

But when you share information about your kids, you are creating an online footprint that your child has little to no control over. And some of the information you share can be valuable to identity thieves.

Your child’s name, age and birth date are three key pieces of information that can be used for fraud. Identity thieves can troll social media platforms for public posts that give them clues to these pieces of information. Even restricted posts could be used or sold by an unscrupulous friend or family member.

For example, a post about your newborn baby could clue an identity thief onto your child’s name and birth date.

The Consequences of Identity Theft for a Child

Most forms of identity theft require a Social Security number. But if a criminal has already accessed your child’s SSN, they can fill in the rest of the pieces from social media to open fraudulent accounts in your child’s name. With synthetic identity theft, thieves may combine certain bits of information about your child with falsified information to create a fake identity using your child’s SSN.

Identity theft of a child can go undetected for years. Most parents don’t think to check their child’s SSN, and the child can’t apply for credit until they’re 18. Once your child has a credit check for a loan, credit card or apartment lease they may discover his or her SSN has been compromised.

While the victim won’t be held legally responsible for financial losses caused by identity theft, they may need to spend months or even years cleaning up the mess and regaining control of his or her SSN. This can involve a lot of red tape and even out-of-pocket expenses.

How to Avoid Oversharing on Social Media

Be mindful when posting pictures or talking about your kids online, especially in public social media forums. Keep in mind that even if your posts are private, friends and family can potentially use your child’s information.

Check and customize the privacy policies and settings of any website you use. You may be able to keep photos restricted only to specific individuals, for example. But in general, you may want to consider the implications of sharing photos and information about your children before they can consent.

It’s a good idea to hold back from sharing too much information about your child, including their full name and birth date. Even a happy birthday post could clue an identity thief onto your child’s birth date.

Always know what information is collected by the websites you use. Under federal law, websites must get a parent’s permission before they collect data from children under the age of 13.

Monitor Their Online Behavior and Teach Best Practices

Once your child is online, it’s a good idea to be aware of their online habits and help kids avoid sharing private information or visiting dangerous websites. You can act as a copilot as your child learns to navigate the web and use software to monitor their online activity.

Make sure to teach your kids good privacy habits, including:

  • Avoiding sharing names, phone numbers, addresses, passwords and other personal information
  • Avoiding clicking links or opening attachments from unverified sources
  • And never message with strangers.

Remember, the information your children share online can come back to haunt them even if it doesn’t lead to identity theft. Pictures or comments can be tied to your child’s name and reputation forever. Make sure your child understands the information they share online has real life consequences.

The post How Oversharing About Your Kids on Social Media Can Lead to Identity Theft appeared first on IdentityIQ written by Brian Acton

]]>
https://www.identityiq.com/identity-theft/how-oversharing-about-your-kids-on-social-media-can-lead-to-identity-theft/feed/ 0
How to Help Protect Minor Children from Synthetic Identity Theft https://www.identityiq.com/identity-theft/how-to-help-protect-minor-children-from-synthetic-identity-theft/ https://www.identityiq.com/identity-theft/how-to-help-protect-minor-children-from-synthetic-identity-theft/#respond Wed, 21 Oct 2020 18:21:14 +0000 https://identityiq.wpengine.com/?p=4305 How to Help Protect Minor Children from Synthetic Identity Theft
IdentityIQ

According to the Federal Reserve, synthetic identity theft is one of the fastest growing forms of identity theft in the country. Synthetic identity theft occurs when a criminal uses a combination of real and falsified data to create a fictional identity for financial gain and other fraud. Children are particularly appealing victims for synthetic [...]

The post How to Help Protect Minor Children from Synthetic Identity Theft appeared first on IdentityIQ written by Brian Acton

]]>
How to Help Protect Minor Children from Synthetic Identity Theft
IdentityIQ

According to the Federal Reserve, synthetic identity theft is one of the fastest growing forms of identity theft in the country. Synthetic identity theft occurs when a criminal uses a combination of real and falsified data to create a fictional identity for financial gain and other fraud.

Children are particularly appealing victims for synthetic identity thieves. Here’s how synthetic identity theft targets children, and how you can help protect your kids.

How Synthetic Identity Theft Works

Synthetic identity thieves use a combination of real and false information to create a fake person, or synthetic identity. These false identities can be used for financial gain, to create fake accounts, to commit medical identity theft and more.

All criminals need is access to a legitimate Social Security number (SSN), which can be gained from a data breach, phishing attempt or other scam. The SSN, combined with falsified information, such as a fake name and address, can be used to commit fraud.

Criminals may even spend time building the credit of the fictional person, so they can commit greater financial fraud in the future.

Why Children are Vulnerable

Anyone can be a victim of identity theft, but children are especially appealing to synthetic identity thieves for a few reasons.

  • Children have no credit history, so criminals can work with a blank slate.
  • Many families may not become aware of identity theft until the child turns 18 and tries to open a line of credit.
  • Starting in 2011, the process of creating SSNs was randomized instead of based on geography and age. While this randomization makes it more difficult for criminals to reconstruct a person’s SSN based on public records, it makes it impossible for financial institutions to verify a person’s SSN using his or her location or date of birth.

The Cost of Synthetic Identity Theft

Luckily, the victims of synthetic identity theft are not responsible for any losses if they can prove they weren’t involved. Financial institutions typically bear the brunt of the cost of synthetic identity theft.

But children who have had their identities stolen have an uphill battle reclaiming their SSNs, especially if the fraud occurred over a number of years or the criminal racked up a lot of debt. This is because credit bureaus and financial institutions usually assume that the first person to establish credit under an SSN is the legitimate owner.

This means that the victim has to prove his or her identity and take steps to clean up his or her credit. While financial liability is limited, these efforts can involve out-of-pocket expenses.

How to Protect Your Child

While there’s no way you can guarantee your child’s identity can never be stolen, you can take some steps to help prevent that from happening.

The post How to Help Protect Minor Children from Synthetic Identity Theft appeared first on IdentityIQ written by Brian Acton

]]>
https://www.identityiq.com/identity-theft/how-to-help-protect-minor-children-from-synthetic-identity-theft/feed/ 0
Child Identity Theft: Prevention & Protection Guide https://www.identityiq.com/family-protection/child-identity-theft-prevention-protection-guide/ https://www.identityiq.com/family-protection/child-identity-theft-prevention-protection-guide/#respond Mon, 08 Apr 2019 20:27:14 +0000 https://identityiq.wpengine.com/?p=3006 Child Identity Theft: Prevention & Protection Guide
IdentityIQ

Child identity theft is becoming a serious and costly problem that can affect families long after their children become adults. In fact, more than a million children were affected by identity theft and it cost families more than $540 million out of pocket in 2017 alone. Do you feel confident spotting the signs of child [...]

The post Child Identity Theft: Prevention & Protection Guide appeared first on IdentityIQ written by Michael Scheumack

]]>
Child Identity Theft: Prevention & Protection Guide
IdentityIQ

Child identity theft is becoming a serious and costly problem that can affect families long after their children become adults. In fact, more than a million children were affected by identity theft and it cost families more than $540 million out of pocket in 2017 alone.

Do you feel confident spotting the signs of child identity theft before it’s too late for your family? Here’s what every parent needs to know.

Why Child Identity Theft Happens

According to that same study by Javelin Strategy, two-thirds of the victims were 7 years old or younger and 6 in 10 of the victims knew the fraudster personally. Children aged 6-11 were the most vulnerable group.

A child’s stolen information can be used to:

    • Open new lines of credit
    • Open new bank accounts
    • Apply for jobs and loans
    • List the child as a dependent on a fraudulent tax return
    • Give false information to law enforcement

If an identity thief obtains a child’s information and uses it to commit fraud, it could go unnoticed for years if the child’s credit is not being actively monitored. The child’s personal Identifiable information could then be sold on the black market at a premium because child identity theft is so much more likely to go unnoticed until the child begins applying for housing, student loans, jobs, and credit cards as an adult.

The longer your child’s identity has been compromised, the longer it takes to recover their credit.

3 Tips to Prevent Child Identity Theft

Fortunately, there are steps you can take to protect the identity of your child. While nobody is safe from external threats like data breaches or skimming, there are ways to monitor your child’s credit in case something happens and prevent information from falling into the wrong hands.

1. Keep track of your child’s personally identifiable information (PII):

This information could include:

Think of all the places that may store your child’s sensitive information. It could be stored at their doctor’s offices, schools, daycares, and even your accountant’s office. It may be stored either digitally or physically. Even a school picture with your child’s name attached could be used to identify them on social media and then used to steal their identity.

Make sure that forms or any papers containing sensitive information are kept in a safe place and shredded before disposal.

Never give out your child’s information without ensuring that there are security measures in place to protect it. Ask the following questions of any organization that keeps track of sensitive personal data:

  • Where are the forms and papers stored physically? Are all papers shredded before disposal?
  • Where is my child’s information stored digitally? What kind of online security protocols are in place to deter hackers from accessing it?
  • Who else has access to my child’s personal information?
  • When my child is no longer a patient/student/etc., what happens to their personal information?

2. Consider freezing your child’s credit

You can choose to pre-emptively place a freeze on your child’s credit with all three of the major credit bureaus – Equifax®, Experian®, and TransUnion® – to ensure that no fraudulent lines of credit will be opened in their name until the freeze is lifted.

You’ll need the same kind of documentation you’d need to freeze your own credit. You’ll also need a birth certificate and proof that you have the authority to freeze their credit. You’ll also need to request the freeze from each bureau separately:

  • Equifax freeze request form for minors Experian only allows freezes on minors 14 years or older Transunion fraud alert and freeze forms for minors

If you choose to freeze your child’s credit, be very careful! You’re required to supply a specific PIN number to lift or ‘thaw’ the credit freeze once your child becomes an adult, which could mean keeping track of a pin number for a decade or longer. If you’re worried about keeping track of a PIN, consider a family identity theft protection policy instead.

3. Talk with your child about the importance of online safety

Make sure that your child is aware of the importance of online safety. The more they understand the dangers of sharing sensitive information online, the safer they’ll be.

Talk with your children about:

  • Interacting with strangers online
  • Filling out online contact forms
  • Creating accounts on websites
  • Signing up for certain services or online shopping

Monitor their internet usage and ensure they are steering clear of dangerous sites and other internet users who might cause them harm.

Warning Signs of Child Identity Theft

The following could signal that your child’s identity is under attack:

  • Unpaid fine notices: If your child receives notices about unpaid fines when they apply for their driver’s license, this could mean they are already a victim of identity theft.
  • Credit card mail offers: If you receive mail addressed to your child about credit cards that they’ve pre-qualified for, a card may have already be open in their name. Rather than ignoring it because you think it’s a mistake or technical error, take steps to ensure that no fraud has occurred.
  • Being denied government benefits: If your child is denied for government benefits like food stamps or health care, or you are unable to claim them as a dependent on your taxes, it’s possible that someone has already used their social security number for these purposes.
  • IRS notices addressed to your child: If an IRS notice states that your child hasn’t paid required income taxes or that their SSN has been used on a tax return, it’s time to investigate for identity theft.
  • Collection calls and bills in their name: If you’re getting calls about money owed or you receive bills in the name of your child, their information may have been used fraudulently to make purchases.

What to do if Your Child’s Identity is Stolen

If you’re suspicious that your child is a victim of identity theft, contact the three major credit bureaus. Reach out to all three separately when taking these steps. Here’s what to cover:

  • Request a manual search of your child’s file: A manual search will examine all files associated with both their name and social security number and files with only their social security number.
  • Request to remove information associated with your child: You can then request that each credit bureau remove all information that is associated with your child’s name or social security number upon providing them with a copy of the Uniform Minor’s Status Declaration, which proves that your child is indeed a minor.
  • Request a fraud alert: For this step, you only need to call one of the three major bureaus because they’ll contact the other two. Place a fraud alert on your child’s credit report to be notified whenever their Social Security number is used.
  • Contact the business where fraud occurred: Let them know that your child is a minor and that the account activity was fraudulent. Request that they close the account and do not hold your child liable for any purchases.
  • Consider a credit freeze: If your child was a victim of identity theft, it’s a good idea to freeze their report to ensure the thief cannot continue to use their information. This step is absolutely critical until their identity is secure again.
  • Report any suspicious activity: Report identity theft to the FTC by calling 877-438-4338, or visiting IdentityTheft.gov.
  • Consider identity theft protection: It can quickly identify signs of identity theft while providing 24/7 credit report monitoring.

The post Child Identity Theft: Prevention & Protection Guide appeared first on IdentityIQ written by Michael Scheumack

]]>
https://www.identityiq.com/family-protection/child-identity-theft-prevention-protection-guide/feed/ 0
5 Strategies for Protecting Your Child’s Privacy Online https://www.identityiq.com/family-protection/five-strategies-for-protecting-your-childs-privacy-online/ https://www.identityiq.com/family-protection/five-strategies-for-protecting-your-childs-privacy-online/#respond Fri, 08 Mar 2019 18:07:29 +0000 https://identityiq.wpengine.com/?p=2979 5 Strategies for Protecting Your Child’s Privacy Online
IdentityIQ

The internet is an amazing source of information, but it also contains many unique threats. One important concern in the digital age is online privacy; thieves, hackers, and other criminals may be trying to access your data and information for their own personal gain. Kids are just as vulnerable as adults (if not more so), [...]

The post 5 Strategies for Protecting Your Child’s Privacy Online appeared first on IdentityIQ written by Brian Acton

]]>
5 Strategies for Protecting Your Child’s Privacy Online
IdentityIQ

The internet is an amazing source of information, but it also contains many unique threats. One important concern in the digital age is online privacy; thieves, hackers, and other criminals may be trying to access your data and information for their own personal gain.

Kids are just as vulnerable as adults (if not more so), as they can be targeted for identity theft, scams, and other predatory behavior before they’ve developed the skills to protect themselves. Just as you take steps to guard your children in the physical world, you should try to keep them safe on the internet.

Here are five strategies for protecting your child’s privacy online.

   1. Don’t Overshare Information

When you’re a proud parent, you may be naturally inclined to share photos and information about your children online. But you should be careful about the information you share and be aware of the privacy settings on the websites and apps you use.

Be careful when posting pictures of your kids online, especially in public forums that can be accessed by anyone. Before you do share photos, check the privacy policies and settings of the website – you may be able to keep photos visible only to those individuals you approve (or at least, only to those you’ve added to your friends list).

It’s also a good idea to hold back from sharing too much information about your child. Sharing information about you and your child’s location leaves you vulnerable to a number of criminal activities, and even sharing your child’s full name could increase the risk of child identity theft.

Always know what information the websites you use collect about you and your children. Under federal law, websites must have a parent’s permission before they collect information from children under the age of 13.

   2. Watch Your Child’s Online Habits

It’s a good idea to be aware of your child’s online habits to help them avoid sharing private information or visiting dangerous websites. Keeping computers out in the open, rather than in more private areas such as bedrooms, can help you monitor your child’s online activity. Young children could benefit from an adult copilot as they learn to use technology and navigate the web.

You may also want to monitor internet activity using browser history or more robust computer monitoring tools. Software programs can help you monitor internet usage and block unsafe or adult websites.

These methods can apply to tablets, phones, and other mobile devices as well.

   3. Set Enforceable Rules

As the parent, you can set rules around your child’s online time. You may want to set time limits for internet use and restrict which websites your child can visit. A list of enforceable house rules – along with consequences for breaking them – can be posted by the computer or attached to the family tablet.

Any rule list should include restrictions on the information children share about themselves and others, which leads to the next strategy:

   4. Teach Good Privacy Habits

You can teach your kids to protect their personal information online. Make sure they understand good privacy practices, including:

  • Never sharing names, phone numbers, email addresses, passwords, school information, or pictures of themselves, friends, or family members without your permission.
  • Never clicking links or opening attachments in emails from people or sources they can’t verify.
  • Never messaging with strangers.
  • Never meeting up in person with anyone they meet online.

Remember, even if your child isn’t risking their privacy, the information they share online could come back to haunt them. An inappropriate picture, mean comments, or online rants are all easy mistakes for children and young adults to fall into – but those actions can have real life consequences. Make sure your child understands that the information they share online can be permanently attached to their name.

   5. Practice Good Habits Yourself

You can teach your kids by example. Make sure to follow good online security habits and protect your personal data and privacy as well. Be careful about the information you share on social media, make sure to use websites you can trust, and protect your personal data from thieves. A good rule of thumb? Avoid sharing any information online that you wouldn’t volunteer to a stranger.

The post 5 Strategies for Protecting Your Child’s Privacy Online appeared first on IdentityIQ written by Brian Acton

]]>
https://www.identityiq.com/family-protection/five-strategies-for-protecting-your-childs-privacy-online/feed/ 0