ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

How to Guard Yourself Against Identity Theft

Updated on November 10, 2013

A Growing Crime

Identity theft is one of the fastest growing crimes in the world and nobody is safe from this unpleasant criminal activity. In the US the Internal Revenue Service lists identity theft as one of the leading scams that has to be dealt with each year. Everyone should take precautions to prevent becoming a victim of this ruthless fraud.

The Threat of Identity Theft

Identity theft is one of the fastest growing crimes in the world and nobody is safe from this unpleasant criminal activity. Your identity can be used to run up debts in your name or to take money directly from your bank account and can have very unpleasant consequences. Prevention is the best cure and the more knowledge everyone has about identity thieves and their methods the more effective the precautions that can be taken. In the US, the Internal Revenue Service lists identity theft as one of the leading scams that has to be dealt with each year, posing serious problems to government agencies in doing their work and causing severe stress and loss to victims.

Some identity thieves aim to steal documents that can be used to obtain services in another person’s name. This can be done by stealing documents such as bank statements or utility bills from litter bins and posing as the person whose name appears on the document. Some identity thieves simply look over people’s shoulder in the bank or at the cash machine, obtaining useful information about card numbers and PIN numbers. People using their laptops in public places can be victims of these shoulder surfers who look at the information on the computer screen and use it for their own criminal purposes.

The use of false automatic telling machines (ATMs) has become a real threat. A fake machine may be set up or a device attached to an existing machine. In some cases the user’s debit card may be stolen and the password used with the card can be picked up by the software attached to the machine. To be safe from this form of theft it is advisable to use a cash machine inside the bank if possible and to be vigilant when using a machine out in the street.

Once a criminal has your personal details they can be used for purposes of theft or they can even be sold to other criminals for further use. Suddenly your personal details can become a commodity to be bought and sold in criminal circles. The result will be repeated instances of theft from the bank account or debts accumulated in the name of the victim.

Online Identity Theft

Online identity theft is a growing crime and everyone must take precautions when going online. You are at your most vulnerable when using a public Wi-Fi network. High tech identity thieves use sniffer software to steal information from you while you are using the laptop at a Wi-Fi hotpot in the public area of an airport or other public place. Criminals have also been known to set up fake Wi-Fi networks and use them to steal personal information.

You are not however safe from identity theft when using the computer in your own home. Criminals can use their technical knowledge and specialist software to break into your computer and steal personal details. They also use phishing emails to tempt their victims to reveal personal information about bank accounts, PIN numbers and credit cards. Some emails masquerade as official communications coming from a bank or telecoms company, asking for personal details. Criminals have also set up fake websites imitating those of banks or other companies in an effort to collect personal details from users.

How Identity Thieves Use the Information

Once your personal details are in their hands, the criminals may obtain your bank details and withdraw money from your account, or apply for a personal loan in your name that will add to your debts. They may apply for store cards or other credit cards and go on a spending spree at your expense. Although there is some legal consumer protection these criminals can cause you plenty of problems. The first thing you may know about this is a letter from a debt collector or lawyer threatening legal action. Your identity could also be used for purposes of illegally claiming benefits or refunds from the government, potentially landing you in embarrassing difficulties with the police that will require time and trouble to sort out

Preventing Identity Theft

It is very important not to give any details of bank accounts or credit cards over the phone in response to a cold call. In this situation you cannot check the identity of the caller and have no guarantee that the person calling is genuine. If you reply to a cold caller trying to sell something over the phone make a rule of never divulging any personal information. If you are drawn into a conversation against your will remember that you can end the call at any time. If it is totally against your character to put the phone down on anyone you can quickly thank the person for calling and then end the call.

In some ways fake emails are an even worse threat. Never give away any bank account details, PIN numbers or other personal information unless you are sure about the source of the email. Some phishing emails imitate institutions such as banks or telecom companies and ask you to confirm personal details such as account numbers, PIN numbers or passwords. In reality such institutions never send an email to ask for confirmation of such personal details. Some emails may also include links to enclosures containing spyware so it is best not to click on any links within suspicious emails.

To avoid personal documents being stolen and used to take over your identity make sure that all letters and bank statements thrown away are shredded before being put outside in the bin. Although many people are aware of the sensitive nature of bank statements they should also treat other letters as equally sensitive. A few utility bills in your name, falling into the wrong hands, could be useful to a criminal in trying to open an account or apply for a credit card in your name. Many paper documents such as bank statements and telecoms bills can be replaced by online notifications and this is a way of preventing this problem.

You should also be alert to the possibility of letters being diverted before they reach you. It is therefore important to quickly follow up any important letter that you should have received on a particular day but has not arrived. Any delay gives criminals time to make illegal use of the letters or of the information they contain. Once in a while something will go astray in the post and this should not be permitted to give any opportunity to anyone to steal your identity. In particular, if you are moving from one address to another make sure all the important institutions such as banks, insurance companies, telecoms companies and utilities are informed in advance, and if possible arrange for letters addressed to you at the old address to be sent on. There will always be one or two institutions that are informed of your change of address but do not alter their records in time.

In the case of a very important document such as a passport or a driving license it is important to act very quickly to inform the relevant authorities when these are lost. In most cases where such as document is missing it can be very difficult to pinpoint the exact time and place where it went missing. There is therefore always the possibility that it has been stolen. For this reason prompt action is necessary to report the loss and make sure the document is replaced. In the case of debit or credit cards, most people are aware of the need to immediately report and cancel any cards that are lost. This should be done as soon as the loss is discovered.

Prevention is the Best Cure

You should regularly check your bank statements to look for any suspicious looking items that may be a result of criminal activity. Online bank accounts should be reviewed regularly even if you have not performed any transactions. It is also wise to check your credit report at regular intervals to make sure that no criminals are accumulating debts in your name. The more checks you do and precautions you take the safer you become.

working

This website uses cookies

As a user in the EEA, your approval is needed on a few things. To provide a better website experience, hubpages.com uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at: https://corp.maven.io/privacy-policy

Show Details
Necessary
HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
LoginThis is necessary to sign in to the HubPages Service.
Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
AkismetThis is used to detect comment spam. (Privacy Policy)
HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the googleapis.com or gstatic.com domains, for performance and efficiency reasons. (Privacy Policy)
Features
Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
MavenThis supports the Maven widget and search functionality. (Privacy Policy)
Marketing
Google AdSenseThis is an ad network. (Privacy Policy)
Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
Index ExchangeThis is an ad network. (Privacy Policy)
SovrnThis is an ad network. (Privacy Policy)
Facebook AdsThis is an ad network. (Privacy Policy)
Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
AppNexusThis is an ad network. (Privacy Policy)
OpenxThis is an ad network. (Privacy Policy)
Rubicon ProjectThis is an ad network. (Privacy Policy)
TripleLiftThis is an ad network. (Privacy Policy)
Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
Statistics
Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)
ClickscoThis is a data management platform studying reader behavior (Privacy Policy)