Identity Crime Prevention
When it comes to identity crime prevention, do you know how to recognize common identity crime red flags? More importantly, do you know what to do if you are faced with a potential threat to your identity?
If you can catch fraud and identity theft in their early stages, you can often avoid many of the substantial damages that come with it. Prevention and education are always your best defense against criminals that want to misuse your personal information.
Are you an Identity Crime Prevention Beginner, Intermediate or Expert? Take the quiz to see where you stand!
T/F: A credit freeze simply flags your credit file so that others know you may have been a victim of fraud or identity theft.
A fraud alert flags your credit file to let others know you may have been a victim of fraud or identity theft. A credit freeze, on the other hand, completely restricts anyone access to your credit file and requires you to manually lift and place them.
A data breach has occurred, and your information was affected. Names, credit/debit cards and Social Security numbers were reportedly exposed. What should you do?
If your information is exposed in a data breach, prevention will be your best defense against identity crime. Reviewing your credit reports and financial statements can help you spot fraudulent activity and other signs that your information has been misused. Changing passwords will make it even harder for identity thieves to access your online accounts – even if your information has already been exposed.
Learn more about securing your information after a data breach by visiting our Data Breach Resource Page and our Identity Security FAQ page.
You review your credit report and find that some of your personal information in the header is incorrect. This can sometimes be a sign of _____________.
Your credit header contains personally identifiable information (PII) like your name, birth date, Social Security number and address. Errors in this section can point to sub-files associated to your credit report. While there are legitimate uses for these sub-files (like a legal name change), this can sometimes mean that your information was used as part of a synthetic identity.
Learn how your credit report can help you spot identity theft by reading Credit 101: Bureaus, Reports & ID Theft.
Which scams commonly follow a data breach event?
Sometimes data breaches only expose public information like your email address and phone number. Criminals can use this information to target you in email and social media scams, as well as phone scams – hoping to capture more sensitive information like your birth date, Social Security number and financial account numbers.
Learn how to recognize scams by visiting our Scams Resource Page.
Which of the following is NOT a guideline for creating strong passwords?
Avoid using common dictionary words as passwords so that it's harder for criminals to break into your online accounts. If you're having a hard time coming up with unique passwords for each of your accounts, consider using a password generator tool. (EZShield customers – Your Password Manager already has a built-in password generator tool!)
Learn more about the importance of strong passwords by reading Passwords: The Keys to Your Online Life.
Which of the following is NOT considered social engineering?
Social engineering refers to the manipulative tactics criminals use to convince their victims to fall for various types of scams. Criminals mainly focus on three areas of social engineering: familiarity, or presenting themselves as someone the victim knows; hostility, or using scare tactics to intimidate victims; detective work, or researching their victims (i.e. viewing social media profiles, dumpster diving, etc.) to piece stolen information together.
Read about major scams we've been following in the news that utilize various social engineering tactics by visiting our Scam News section.
The views and opinions expressed in this article are those of EZShield Inc. alone and do not necessarily reflect the opinions of any other person or entity, including specifically any person or entity affiliated with the distribution or display of this content.