How Does Identity Theft Protection Work?

  • By David Lukic
  • Published: Feb 26, 2021
  • Last Updated: Mar 18, 2022

 Identity theft is a very real concern for many Americans. It’s not just something that happens to the other person anymore. According to the Center for Victim Research, 7-10% of U.S. citizens become victims of identity theft each year. Twenty-one percent of those are repeat victims. Children and seniors are the largest target groups but also deceased individuals and military men and women who are deployed too. Social media is a treasure trove for identity thieves where they can get most of what they need to steal someone’s identity. Thankfully, there are tools to protect and monitor your identity to thwart these criminals.

How Does Identity Theft Protection Work

What is Identity Theft?

Identity theft is when someone steals your personally identifiable information like your name, address, date of birth, and social security number or perhaps your credit card details to open up new lines of credit in your name or steal from you in other ways. Identity theft can be devastating and ruin your credit and drain your bank accounts. Some of the ways that identity thieves steal your information are:

  • Through the trash or mail - they may pick through your garbage or mailbox and pull out bank or credit card statements to get your information.
  • Phishing emails - they send you a legitimate-looking email, but it’s fake, and they trick you into clicking a link that takes you to a spoofed website. You enter your login, and now the criminals have it. Sometimes those links you click infect your computer with a virus or malware that steals your information.
  • Malicious websites - if you visit hacked websites, you could also be infected by malware, and your details could be stolen.
  • Credit card skimming - as evidenced by the Home Depot and Target data breaches, identity thieves can steal your information using credit card skimmers or payment terminals and ATMs.

How Does Identity Theft Protection and Monitoring Work?

Identity protection services is where a professional company like IDStrong.com monitors your personal information on the internet, inside your credit report and public records to look for signs of identity theft and fraud. Some of these services may include things like:

  • Dark web monitoring.
  • Social media trolling.
  • Chat room monitoring.
  • Fraud protection. 
  • Public records database monitoring.
  • Virus protection and more.

Along with monitoring your personal information, identity monitoring also includes alerts and notifications. If anything changes with your credit report or seems “off,” you will receive an automatic alert via text, email, or phone (depending on your preferences). For example, if someone tries to open up a new bank account or credit card in your name using your social security number, you will get a notification. If your home address changes for any of your loan or credit card accounts, you will get an alert.

Additionally, if you are the victim of identity theft, identity protection companies have specialists who can help you recover and get things back on track. Most carry identity theft insurance that covers losses up to $1 million.

How to Benefit from Identity Protection

Monitoring your identity is of a great service, especially if you have previously been the victim of identity theft. However, there are also things you can do to help to protect your identity from anyone getting their hands on your personal information before the fact.

  • Get a copy of your credit report from all three credit bureaus (Equifax, TransUnion, and Experian). You are entitled to a free copy from each vendor every 12-months. You can get them from annualcreditreport.com. 
  • Regularly monitor your credit card and bank statements looking for any suspicious activity or unrecognized charges.
  • Consider a credit freeze to prevent anyone from opening new lines of credit or loans in your name.
  • Contact the credit reporting agencies if you are a victim of fraud or identity theft and put a fraud alert on your credit report. 
  • Consider a credit lock where you can lock or unlock your credit report with the click of a button on your mobile phone. 
  • You can also opt-out of pre-screened offers from financing and credit card companies. You can do this by calling 1-888-5-OPT-OUT.

Some other tips for identity protection are:

  • Never use the same passwords on different websites. Always use strong, long passwords with a complex combination of letters, numbers, and symbols.
  • Keep your computers and other devices updated with the latest security patches and antivirus software. Run deep scans often.
  • Watch out for phishing emails and never click links or download attachments.
  • Never enter personal information online on websites you don’t trust. 
  • Do not fall for spam calls and never give out personal details to strangers.
  • If you travel, suspend your mail service until you get home. 
  • Shred important documents before throwing them out.

protect your identity

What to Do if You Are a Victim of Identity Theft

Even with all your careful protection, if you do end up the victim of identity theft, there are some steps you need to take to mitigate the damage.

  • Contact the three credit agencies and report the fraud.
  • Contact the FTC and report the incident: online, or by phone (1-877-ID THEFT).
  • If thieves stole your mail, contact the USPS Inspection Service to file a complaint.
  • If your social security number was compromised, contact the Social Security Administration at 800-269-0271. You may be issued a new number.
  • Call your banks and credit card companies to report the theft and get new numbers.
  • Change all your passwords on your login accounts.
About the Author
IDStrong Logo

Related Articles

What is Mail Theft and How to Prevent It in 3 Simple Steps

One of the many ways that identity thieves get their hands on your personal information is through ... Read More

Credit Card Fraud: What Is It and How To Protect Yourself Against It

Credit card fraud is a fact of life, and most Americans have experienced it or know someone who ha ... Read More

Lost or Stolen Phone? Don’t Panic, Follow These Steps

Most of us are tethered to our smartphones like a lifeline. In these tiny little computers, we car ... Read More

Stolen or Lost Wallet: What to Do?

Anyone who has ever lost their wallet or purse, or had it stolen, knows that instant spark of pani ... Read More

7 Most Common Types of Identity Theft That Can Happen to You

Identity theft is a major concern for many Americans these days with data breaches, ransomware att ... Read More

Latest Articles

What is Single Sign-On: The Benefits and Importance of Implementing SSO

What is Single Sign-On: The Benefits and Importance of Implementing SSO

Every day, more people get online - most do it for leisure, but organizations are increasingly moving into the digital environment.

Personal vs Sensitive Personal Information (SPI): What’s the Difference

Personal vs Sensitive Personal Information (SPI): What’s the Difference

What is there to know about a person? Certainly, their name, but how about their affiliations, philosophical beliefs, or sexual orientation?

What Is An On-Path Attack and How Does It Work? 

What Is An On-Path Attack and How Does It Work? 

Suppose someone left their home, got in their car, and drove to the grocery store. Much like data packets that travel over Internet highways, the car will use various pathways to reach its destination; however, once the car gets to the store, a question remains: what happened between the generating point and the destination?

Featured Articles

How to Buy a House with Bad Credit

How to Buy a House with Bad Credit

Buying your own home is the American Dream, but it might seem out of reach to those with bad credit. However, the good news is, if your credit is less than perfect, you do still have options and in most cases, can still buy a home.

How Secure Is Your Password? Tips to Improve Your Password Security

How Secure Is Your Password? Tips to Improve Your Password Security

Any good IT article on computers and network security will address the importance of strong, secure passwords. However, the challenge of good passwords is that most people have a hard time remembering them, so they use simple or obvious ones that pose a security risk.

Top 10 Senior Scams and How to Prevent Them

Top 10 Senior Scams and How to Prevent Them

Senior scams are becoming a major epidemic for two reasons. First, seniors often have a lot of money in the bank from a life of working hard and saving.

Free Identity Exposure Scan
Instantly and Securely Check if Your Personal Information is Exposed on the Dark Web or Sold by Data Brokers
Please enter first name
Please enter last name
Please select a state
Close
Free Identity Threat Scan
Instantly Check if Your Personal Information is Exposed
All fields below are required
Please enter first name
Please enter last name
Please enter a city
Please select a state
Please enter an age
Please enter an email address
Close