There’s more than money at stake when it comes to a financial scam; consumers’ identities are also under attack. Opportunities that offer a large amount of money for minimal participation or investment are typically red flags, and there’s likely a criminal working to steal your money or personal information. Fraudsters pulling off imposter scams — attempting to earn your trust so you will send them money or personal information — can commit synthetic identity theft with just two pieces of your Personally Identifiable Information (PII), the kind of details often required to participate in “fast cash” or easy “work from home” jobs. Continue reading
Loyalty programs are big business for retailers and fraudsters alike. From airline miles to hotel stays to free coffee, consumers are extremely willing to share personal information with their favorite stores for rewards. Fraudsters are increasingly targeting these loyalty programs because consumers often don’t treat it like real money. The end result — $1 billion a year ends up in the pocket of these scammers. Continue reading
Breached Personal Information: The Shared Responsibility Between Consumers & Organizations
Our connected world has made us all more vulnerable to fraud and identity theft. With major security incidents from Equifax and Facebook compromising millions of consumers’ personally identifiable information (PII) – and now most recently Google+ – limited identity protection services for breach victims are staple items in organizations, big and small.
While reactive measures can help address and resolve identity crime after it occurs, the best way to address fraud and identity theft is by taking a proactive approach. It’s really a two-fold awareness strategy relying on both technology and human vigilance.
Here’s What You Need to Do When Identity Crime Strikes
From a single fraudulent transaction to complex identity theft, identity crime can cause confusion and incite panic and fear – especially when it happens to you.
Identity crime is often a result of multiple factors collectively working together: the exposure and misuse, then theft of personal and financial data. In fact, only two data points are needed for identity thieves to commit synthetic identity theft – a type of identity crime that doesn’t require your entire identity.
Today’s connected world calls for us to better understand the three key areas of identity crime with tips to help address threats within each.