Identity Theft Protection

Superior Essays
Identity Theft Protection by IFSM 201
Feb 25, 2015

According to the Federal Bureau of Investigation (FBI) “… a stolen identity is a powerful cloak of anonymity for criminals and terrorists…and a danger to national security and private citizens alike…” (Identity Theft, 2010). Identity theft has been for many years the number one growing crime across America. According to the Bureau of Justice and Statistics (BJS) 16.6 million people were victims of Identity theft in 2012, with financial loses totaling somewhere in the neighborhood of $24.7 billion (McCarthy, 2013). The BJS defines identity theft as”the attempted or successful misuse of an existing account, such as a debit or credit card account, the misuse of personal information
…show more content…
Identity theft can be a tiring crime for the victim. The victim’s life will suddenly have been transformed, faced with tasks that may be confusing and situations they don 't know how to handle. All too quickly, they will find that in identity theft cases, the burden of proving innocence rests on the shoulders of the victim (Hoar, 2001). Many experts have referred to identity theft as, the crime of the new millennium, because it can be accomplished anonymously and effortlessly through a variety of methods resulting in devastating consequences for the victims. While it is extremely challenging to prevent identity theft, the best approach is to be proactive and take necessary steps to avoid becoming a victim. This paper will briefly discuss identity theft protection and prevention and what we need to do if we become victims of identity theft and where to start …show more content…
Keep all digital storage devices and media secured, updated and protected. Install anti-virus software, anti-spyware software, and firewalls on all computers and set preference to update these protections often. This will protect against intrusions and infections that can compromise computer files or passwords. Additionally install recommended manufacturer security patches on loaded operating system(s) and other software programs (Taking charge what, 2013). Keep home network secure and never leave WIFI network(s) unencrypted. This is like leaving the front door open and letting hackers and thieves make themselves at home, to take what they want from your computers. There are endless other recommendations out there such as sanitize the contents of garbage and recycling bins at home to ensure no PII information is in them, removing name(s) from a mailing list(s). But the most important of them all is ensuring we perform a periodic review of all 3 major credit reports from: Equifax, Trans Union and Experian credit bureaus. As a minimum it is recommended we do this at least once a year. The FBI recommends that when someone realizes or suspects they have become a victim of identity theft, they need to first contact the fraud department of the three major credit bureaus, second contact the accounts issuer(s) in

Related Documents

  • Improved Essays

    In the article Identity theft it talks about how vital protecting clients information private is, but there is often breaches that cannot be prevented (Kess, S., Grimaldi, J. R., & Revels, J. J. (2017). Identity Theft. CPA Journal, 87(1), 66-68.). The article also goes on to state that being prepared is the best cure for identity theft, even though it is now considered to be a fact of life there are many steps that can be taken along the road of recovery (Kess, S., Grimaldi, J. R., & Revels, J. J. (2017).…

    • 1549 Words
    • 7 Pages
    Improved Essays
  • Improved Essays

    IS3110 Lab Answers

    • 739 Words
    • 3 Pages

    What is Identity robbery? Fraud is a type of taking somebody's character in which somebody puts on a show to be you with a specific end goal to have entry to assets, for example, getting your bank data, Visa numbers, and passwords to get to your own data. 9. How is fraud done? Fraud is finished by utilizing a PC, experiencing somebody's waste, skimming gadgets, spyware and programmers utilize a savvy project to have admittance to your money related data.…

    • 739 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Macy's Research Paper

    • 141 Words
    • 1 Pages

    Data breach has been rising in the United States and in other countries as well, leaving customers vulnerable to identity theft. Customers also can get their credit history damaged. Thousands of people are affected by this situation more frequently when they make their purchases online as well as in the stores when using credit cards. Since the use of credit cards is the most convenient way to pay for a purchase for customers, scammers take advantage of it to commit their frauds.…

    • 141 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    The Michigan Incident Crime Reporting (MICR) Section has listed that Michigan’s auto thefts have risen 28% from 2015 to 2016. Reasons for current theft increases may include the following: 1. Anti-theft technologies have driven thieves to become more proficient in falsified paper crimes such as identity theft or false titles and documents used in the fraudulent purchases of an automobile. False identification is used in car rental companies where the thief acquires a vehicle and fails to return it. 2.…

    • 567 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    Dr. Wallace introduces the speaker, the director of the core text reader, states that it is used to enhance what were learning in class. Dr. Brad Busbee starts off by saying that we can learn a lot from a pre-modern case of identity theft. The big questions we wrestle with is “who are we” and “how do we know who we are”. People today know know who they are and what they look like because we have mirrors and pictures.…

    • 376 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Hackers/Crooks have put hard working people in hardship by ruining their credit causing them to be unable to buy a home or even getting hired on at a job. They have been known to steal credit card numbers from websites, breaking into homes or digging into the trash to retrieve personal information, and an employee you work with that takes a look at your personal file(Federal Trade, National and State, Consumer Sentinel, 2013).Though the internet is one of the main ways identities are stolen, they will pick-pocket you, steal your mail right out of the box, your tax information, and even obtaining medical services(Cassim, 2015).…

    • 105 Words
    • 1 Pages
    Improved Essays
  • Decent Essays

    Describe Card Stacking

    • 401 Words
    • 2 Pages

    1. What is identity theft? Why is this a problem in society? identity theft is where someone get you ssn number or debit card and then say there you and buy stuff or do crimes. it is a problem because when someone take your identity you don’t know it and someone can take all your money and make you go broke and you have nothing.…

    • 401 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Critical Review #2: Identity crime and misuse in Australia: Results of the 2013 online survey Behind the article: Koubaridis (2014, n.p.), a crime news reporter for News Limited, states that ‘1 in 5 Australians have been victims of identity crime [due to] computer hacking, [and] online banking and shopping [are] to blame’. Koubaridis (2014) based the article’s research on a study conducted by the Australian Institute of Criminology. Russell G. Smith and Alice Hutchings from the Australian Institute of Criminology conducted this study in September 2013 (Smith and Hutchings 2014). Research data embedded within the article: Within the media article, there were five components that directly related back to the published research.…

    • 1370 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    You are buying milk from the grocery store. As you swipe your credit card, an ear-piercing beep sounds. You try again, but the same thing happens. The total was only $4.16, so you decide to just pay with cash but are still confused. A week later, you are at the airport getting ready to go to Paris.…

    • 474 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Yes, many victims of identity theft crimes are not even aware that the crime has occurred until sometime well after the theft has been completed. As technology has advanced so have the methods an identity thief uses to commit their crimes. The days of a thief going through garbage to find the necessary information they need have been replaced by such things as RF card scanners where the perpetrator just passes by the victim and the scanner steals the information directly from the victims card without any awareness of what is happening. The best defense against identity thefts is for every person to be vigilant in how they handle their personal information. Everyone needs to utilize RF blocking wallets, along with shredding all records instead…

    • 160 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Identity Theft Do you know what 343 million dollars looks like because that was how much money so many people lost from identity theft. Today I’m going to talk about how identity theft is bad thing by taking someone’s money to them just getting your house bills. Identity theft is one of the most corrupt crime in the us. Identity theft is the most growing problem in the usa. next couple of paragraph are going to be about how identity theft may not even be theft, how many people got targeted, and how much money was lost.…

    • 529 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Identity theft has become a prevalent and increasing problem here in the United States. When it comes to identity theft the thief only needs one thing and that'a a Social Security Number, and by having that they can decimate a victim's life and credit. Iidentity theft is described as, a crime in which an imposter obtains some key pieces of the victims personal information to impersonate them. With the information obtain the thief can obtain the thief can obtain credit, merchandise, and many services in the name of the victim. There's two types of identity theft, those are truename and account takeover.…

    • 347 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Cause Of Identity Theft

    • 252 Words
    • 2 Pages

    I believe that in order to avoid identity theft we must educate ourselves on the value of our personal data because only then we can learn the habits necessary for maintaining good credit. Not knowing the consequences of handling our personal data irresponsibly is the leading cause of identity theft. I have witnessed my father engaging in such irresponsible actions that led to his bad credit and significantly affected his life. My father has always been losing his wallet once every few years, he carried all of his cards in it, and he could notice that it was missing only in one or two days. He was always irresponsible in tracking his stuff and indifferent to comments on such behavior.…

    • 252 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Identity Theft

    • 1552 Words
    • 7 Pages

    For example, they can purchase goods, emptying the bank account or credit card of a victim; they can open a new line of credit or loan; and can even sell or buy a house without the knowledge of the owner. Due to these particular reasons all related to money, identity theft rate is increasing year by year. In fact, “The Information Security University of Virginia” states in their article that,” according to Javelin Strategies, a prominent research firm that often reports on identity theft, incidences of the crime increased by 11% from 2009 to 2010, altering the lives of eleven million Americans (“Identity Theft”). This article shows how in only one year identity theft has got to a higher level, distressing citizen’s lives. So, as some of the reasons of…

    • 1552 Words
    • 7 Pages
    Improved Essays
  • Improved Essays

    Identity theft What is identity theft? Identity theft is the fraudulent acquisition and use of a person 's private identifying information, usually for financial gain. The person whose identity has been stolen may be held responsible if they don 't take proper actions to get their identity back. The thief can use the person 's personal information such as their name, social security, or credit card number without their knowledge or permission to either buy something or commit crimes under someone else 's name. The first case of identity theft started in the bible in chapter 25 of Genesis, it starts off when Jacob covered his hands and neck with goat skins in order to trick his father into giving him the blessing of the firstborn which belonged to…

    • 820 Words
    • 4 Pages
    Improved Essays