{"id":1284,"date":"2024-02-26T06:44:59","date_gmt":"2024-02-26T12:44:59","guid":{"rendered":"https:\/\/grownuptech.com\/?p=1284"},"modified":"2024-08-12T18:52:30","modified_gmt":"2024-08-12T18:52:30","slug":"identity-theft-what-it-is-how-to-prevent-it-and-what-to-do-if-youre-a-victim-of-it","status":"publish","type":"post","link":"https:\/\/oakwoodexperience.com\/staging\/2633\/identity-theft-what-it-is-how-to-prevent-it-and-what-to-do-if-youre-a-victim-of-it\/","title":{"rendered":"IDENTITY THEFT &#8211; What it is, How to Prevent it, and What to do if You&#8217;re a Victim of it"},"content":{"rendered":"<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img data-recalc-dims=\"1\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/grownuptech.com\/wp-content\/uploads\/2024\/02\/identity-theft.jpg?w=1290&#038;ssl=1\" alt=\"\" class=\"wp-image-1285\" style=\"width:232px;height:auto\"\/><\/figure>\n<\/div>\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-4a172b7b102ed4c7025138f6430b043c\">This post is an excerpt from my upcoming book, <em>Your Data, Your Devices, and You: Easy-to-Follow Instructions to Reduce Your Risk of Data Loss, Device Infection, and Identity Theft<\/em><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What is Identity Theft?<\/h2>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-1f01afc0fda4ca03564e4c8459c75822\"><br>Identity theft is when someone uses your personal information for their own gain. In effect, they impersonate you. Nowadays, your identity can be compromised in a large number of ways, and you can&#8217;t infallibly protect against all of them. There are several ways a thief can gain access to the items that constitute your identity. Some you can control, and some you can\u2019t, so you want to put your strongest effort into what you can control, and then do your best to risk-shift what you can\u2019t control.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How Do Identity Thieves Work, and How Can I Protect Myself?<\/h2>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-1dc10e431c2c8cf814e8286cde879eea\"><br>How they work:<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-b3b4b9316596c678a994d56464e1f77f\">One way thieves learn about you is through \u201cdumpster-diving.\u201d Yes, they actually go through the garbage. You may be surprised at the information you toss in the trash and how it appears to someone who wants your identity. Each little piece of information about you is like a piece of a huge jigsaw puzzle with tiny pieces. The thief doesn\u2019t need to put the whole puzzle together in order to cause you trouble. Enough pieces of a horse, and he knows it\u2019s a horse. Enough pieces of a barn, and he knows it\u2019s a barn. Enough pieces of a race car, and he knows it\u2019s a race car. <\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-04c89c1ec527d6d8d46acb1665da8840\">How you can protect yourself:<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-0c7f91355f84ed5e609c84ab3e9df342\">There is one thing you can do to control some access to information. All sensitive information, when you\u2019re finished with it, shred it or burn it. Don\u2019t fool yourself that your credit card statement won\u2019t be attractive if it\u2019s covered in spoiled yogurt\u2014if it\u2019s readable, someone can use it and won\u2019t care what it smells like.<br><\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-ee7c5ad01ddb3edf4cfa5675bc119d22\">How they work: <\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-35925c419685cf589bf80e314325e121\">A second method of gaining access to your identity is stolen wallets and billfolds. You can\u2019t control the theft itself, but you can control some of the fallout. <\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-04c89c1ec527d6d8d46acb1665da8840\">How you can protect yourself:<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-d4e73580cac0c79213a1a43ca7567dc6\">Immediately freeze your credit inquiry access, so that nobody can make a \u201chard\u201d credit inquiry on your accounts. Most banks now allow you to freeze your debit and credit cards, and you can even do it from your phone or from the bank website. If not, or if you want to be absolutely certain that it happens quickly, call the customer service number and explain what happened. They\u2019ll know exactly what to do. If a checkbook gets stolen, call the bank so that they know to stop payment on the checks past the last one you legitimately issued. Of course, report it to the police, because even if you don\u2019t expect to see the wallet or its contents again, you need to report the loss of your driver\u2019s license. Contact the issuer of each credit card you use and report the theft.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-3d9b0d674960e737db53c0fccda22602\">How they work:<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-80ed3cfbd808966c1c236eeb99feb7eb\">Still another way a thief can take control of your identity is through a practice called \u201cphishing.\u201d (See sections on Phishing and Email later in this book.) It rhymes with \u201cfishing,\u201d and it builds on the same concept. The thief dangles some sort of bait in front of you and if you bite, it may cost you. Identity theft is only one of the things that can happen if you get caught in a phisherman\u2019s net, and none of those things are pleasant.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-04c89c1ec527d6d8d46acb1665da8840\">How you can protect yourself:<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-4960a872e178563aac980517d70e5b57\">Pay attention to people asking you questions. We tend to want to be helpful, but there&#8217;s nothing helpful about someone wanting your password, your bank account information, your social security number. Your bank won&#8217;t call you to ask you for your account number. They may call you and let you know they&#8217;ve taken a certain action, but if they initiate the call, they won&#8217;t ask you for account information. Only give bank account information to a bank if you&#8217;ve initiated the call, and only call the bank&#8217;s published phone numbers on documentation that your bank has sent you. If you call the main number, you can get your call routed to anywhere in the bank&#8217;s system. Government agencies rarely call, and the Internal Revenue Service never calls, they always send letters. If a government agency calls, they will never ask for personal information, and if you get a call from a government agency asking for personal or financial information, hang up.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-3d9b0d674960e737db53c0fccda22602\">How they work:<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-f30d07cb86afc9f37e075ca7ec137945\">The fourth way you can lose your identity is if your personal information is part of a breached data set. <\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-04c89c1ec527d6d8d46acb1665da8840\">How you can protect yourself:<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-55207c71401b2b054d27542e24148b50\">The unfortunate thing is that you don\u2019t have any control over how organizations secure the data they collect, so there\u2019s no way for you to guard against data breaches at other locations. Other than only giving out necessary information and only that when absolutely warranted, you can\u2019t protect your information that is stored by someone else.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-black-color has-text-color has-link-color wp-elements-27e34a8ad17303375cb7e9c1aa221b7d\">Before it Happens:<\/h2>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-2eb5f30d2543ba53dd540584eef4c2b0\">Make sure that you have a record of how to contact each credit card issuer, and your bank. Record the checks you write promptly so that you always have a record of the last check you issued. Record your driver\u2019s license number. These are records that are so much easier to keep up with than to try and figure out or remember when you\u2019re under the stress of the loss of your wallet. Under circumstances of theft, your bank will often be very helpful in helping you get some operating cash, as long as you are able to prove who you are. You can often do that by answering a few simple questions at the bank.<br>During the first round of edits on my book, one of my editors asked if I recommend making photocopies of the contents of your wallet (credit cards, etc.). My response is, not particularly. Your bank and credit card issuers have methods to identify you. At one time you needed to provide a credit card number in order to speak with someone, but that\u2019s just about the least reliable form of proof. If you have records, the photocopies won\u2019t add anything. It may be useful to keep the temporary copy of your driver\u2019s license, but it isn\u2019t a substitute for the real thing, just a record of the number. You will still have to get it replaced, and when you do, you\u2019ll get a new temporary copy. If your wallet gets stolen, getting a replacement driver\u2019s license is going to be one of the first things you will want to do.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-4a12a8b95da41fc281b38737b370b5bb\">Didn\u2019t mean to terrify you, but this is serious stuff, and although you can\u2019t always be the one in charge of the information that makes up your identity, forewarned is forearmed. If you are paying attention, you can ward off a lot of trouble just by catching things early.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-black-color has-text-color has-link-color wp-elements-ab704dd16d600a16cb427f877a80419f\">HOW TO RESPOND TO SUSPECTED IDENTITY THEFT<\/h2>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-14aecda1eeaf1551110c52d21d924d83\">You should be monitoring your banking transactions regularly, whether you use your bank&#8217;s online services or not. The days are long gone when you could wait for your statement to come in and do a once-a-month reconciliation. Catching anomalies quickly is the key to resolving them. If you have even a slight suspicion that you may be a victim of identity theft, if something just doesn&#8217;t seem right in your financial world and you can&#8217;t identify any particular transaction, call the financial institution and tell them that you think you may be a victim of identity theft. Use those words. \u201cI think I may be a victim of identity theft.\u201d Every financial institution has a special department to work with identity theft, and that&#8217;s the department you need. Legitimate financial institutions take those words very seriously. Call or go see them immediately, as soon as you believe something may be wrong. Don\u2019t worry that you may be overreacting, because the longer you wait to get an investigation started, the greater the damage you can suffer.<br>You will need to contact law enforcement as well, but your financial institution may suggest that you wait until they can verify what happened. You may be advised to change your credit card accounts and accounts at other institutions as well, so that any information that was stolen is no longer valid. Keep notes of every conversation, retain all communication (including emails), document everything as closely as you can remember. Make a note of what it was that first raised your hackles.<br>If you aren\u2019t sure something is related to your suspected incident, but it just feels \u201coff\u201d, document it or save it in some form. You can toss what\u2019s irrelevant later, but you really won\u2019t know what is and isn\u2019t relevant until the situation is resolved. Keep it all together if possible. You don\u2019t have to print everything that you see digitally, but save it all in one folder on your computer or in your cloud account (iCloud, OneDrive, Google Drive, DropBox, etc). Keep all physical copies of what may be evidence in one file folder or envelope clearly labeled and easy to find.<br>There\u2019s also a website called IdentityTheft.gov that can help you create a plan for dealing with identity theft. It can be reassuring to have a step-by-step plan for your next actions, especially when you\u2019re already frazzled by the thought of what just happened, and sometimes by a sense of betrayal if you know the person who did it. It\u2019s a very useful resource, but your first call should still be to the bank where you do most of your business.<br>Change your login details everywhere you can think of that stores personal information, especially financial institutions. That would be banks, credit unions, brokerage accounts, retirement accounts, the IRS, and the Social Security Administration. If you\u2019ve never had an online account at the IRS and the Social Security Administration, it may be a good idea to establish one so that an identity thief can\u2019t do it pretending to be you. The Social Security Administration also has forms to help you minimize the damage. Just make sure you don\u2019t use a password there that you\u2019ve used somewhere else. <\/p>\n\n\n\n<h2 class=\"wp-block-heading has-black-color has-text-color has-link-color wp-elements-e363a182ed6b6ce8ab3993630592e74e\">HOW TO SURVIVE IDENTITY THEFT, OR POSSIBLE IDENTITY THEFT<\/h2>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-9a2ed392b9a9aeba6f4f7571b3c6c248\">It may be tempting to think that never using financial services online will keep you safe. Doing everything with cash and checks won\u2019t protect you. It will block a couple of avenues that identity thieves use, but there is simply no way to eliminate all possible risks. If you have a bank account, you&#8217;re vulnerable, because of the proliferation of electronic transactions between banks.<br>You\u2019ve heard that it\u2019s not a good idea to have all your eggs in one basket, and that\u2019s valid advice to survive an identity theft event. That is, make sure you have some sort of emergency fund at a separate institution from your main institution, or offline altogether. Before you experience identity theft, check with your bank to find out how they can be of service in the event it happens. Let the bank officer know that you\u2019re trying to be prepared without panicking, and you need to know ahead of time what you can count on, what documents you\u2019ll need to bring in, and what access you will have to any funds or services you typically use.<br>You may hear a news report about a security breach where credit card information has been compromised. If you don&#8217;t do business with that organization, and never have, you have nothing to worry about. You may hear about personnel information having been compromised at an organization. If you aren&#8217;t an employee there, you&#8217;re fine. If you have done business with a company that experiences a breach, or if you work for a company that has its employee information compromised, then that company or organization will have steps in place to handle the onslaught of distress calls they get. You should contact the company&#8217;s designated department or your bank&#8217;s or credit card issuer&#8217;s fraud department and follow whatever instructions they give you.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-black-color has-text-color has-link-color wp-elements-6e744ab4fd8f12db046bcd7bf07b060e\">IDENTITY THEFT INSURANCE<\/h2>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-6c8a03187992fb6e2d6af8d38ca089de\">There are companies that offer protection against identity theft, but you need to read the fine print before you engage them. If you are going to purchase this protection, it must be purchased BEFORE the theft happens; afterward, it&#8217;s too late to get protection. It would be like buying car insurance after an accident and hoping you&#8217;re covered for that accident. Some companies only offer protection for the accounts with institutions they&#8217;ve partnered with, which really reduces the value of the protection if your accounts are not at those institutions. At a minimum, you should look for the amount of insurance coverage, credit monitoring with all three credit bureaus, \u201cdark web\u201d monitoring, a mobile app, a family plan, and round-the-clock support 365 days a year (although that last one could be waived if a service meets all your other criteria, and you feel standard business hours will serve you adequately). I\u2019ve compiled a really short list of five of them, but before you make a choice, do a lot more research and actually speak to someone at the companies you\u2019re interested in. Ask specific questions about \u201cwhat if,\u201d regarding the types of events you\u2019re most concerned about.<br>Identity Force<br>The cost in 2021 was $180\/year for an individual plan, and has an additional child identity theft protection, and offers plans for individuals and businesses.<br>Identity Guard<br>The cost in 2021 was $90\/year for an individual plan. At the time there was no 24-hour support, but there are plans for individuals, families, and businesses. This company uses IBM\u2019s Watson Artificial Intelligence to detect ID theft.<br>LifeLock<br>A product of Norton, the antivirus company. In 2021, a Basic plan was $150\/year. Every subscription includes a VPN (See section on VPNs in the WiFi segment), cloud storage for backup (See section on Backups later in the book), password manager (See section on Passwords later in the book), and several other tools.<br>ID Watchdog<br>A family plan includes up to 4 children, and cost $150\/year in 2021, with additional services available at added costs.<br>PrivacyGuard<br>There are too many price options to sift through and list here, but basic identity protection started at $10\/month in 2021, and they also offer a credit protection plan. They don\u2019t offer 24\/7 live support.<br><\/p>\n\n\n\n<h2 class=\"wp-block-heading has-black-color has-text-color has-link-color wp-elements-0cb607dfee8ec802a35b27e4a27e4c7e\">LIST OF WHOM TO CONTACT IN THE EVENT OF ID THEFT (in no particular order, just get them all)<\/h2>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-4fdd61592d217fbf20bbc76edfbfef6e\">Law Enforcement<br>Credit reporting agencies (Equifax, Experian, TransUnion) to freeze your credit file<br>ChexSystems (verifies customers requesting new bank accounts \u2014 you can put a security alert on your data)<br>Your banks<br>Your retirement accounts<br>Your pension plans<br>The social security administration<br>The IRS<br>The DMV<br>The USPS (and it may be a good idea to get a post office box at the local post office for a while)<br>Any service providers for communications<br>Any utility providers (utility bills are often used to establish identity and residency)<br>The National Consumer Telecom and Utilities Exchange (NCTUE, a sort of credit reporting organization for telecommunications and utilities service providers)<br>Credit reporting agencies can also monitor your children\u2019s identity to catch any accounts being opened in their names.<br>IdentityTheft.gov<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-3ef48dc511950878df8f9b49d7cd90ed\"><br>Identity theft can be devastating, and in those first few hours when you realize it\u2019s happened, or happening, it can be hard to breathe, and even harder to think rationally. If you\u2019re reading this in a physical book, paper clip this section so you can get to it easily. If you\u2019re reading this in a digital copy, print out the list of whom to contact and put it where you can get to it easily, maybe carry a copy in your wallet or purse, keep a copy stashed in the console of your car so you can get to it when you need it. It\u2019s really reassuring to have a plan for what to do when things start falling apart, and even if you don\u2019t feel it\u2019s very likely to happen, it\u2019s amazing how your panic can subside when you realize that you do know exactly what to do.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-black-color has-text-color has-link-color wp-elements-cf9aec4c3ec217b964391e75c7358252\">SYNTHETIC IDENTITY FRAUD<\/h2>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-ce905ec8155886bde57e939258a3850e\">This is something relatively recent. Instead of a hacker posing as a real person other than himself, he pieces together a completely different identity and uses it to engage in fraudulent activity. It still requires theft of other people\u2019s credentials, but it is harder for you to become aware that the credentials have been stolen unless you\u2019re aware of a breach that involved your information.<br>The thieves start with a list of Social Security numbers, and they find some numbers that aren\u2019t associated with a lot of credit history. Combining these numbers with names and addresses of real people, and different birth dates, they have a whole new person. They can use this information to take out loans or obtain credit cards, but they can also apply for and receive government benefits, and get employment without legal documented status.<br>You might pick this up if you monitor your credit reports regularly, and putting a freeze on your credit can help prevent your information from being used in this kind of fraud.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-f4d5bc1a09ea01e074c5df243bea0c69\">I know this is a lot to digest, but if you take it step by step, you can keep yourself from being &#8220;low hanging fruit&#8221; for identity thieves. Also, copy the text of agencies to call in case of identity theft, and keep it handy. I have a plan to create a printable document for you to download, but I can&#8217;t make that happen right now. For now, just copy it and paste it into a Word document or Notepad, and print it out. That way you don&#8217;t have to panic, you can just go through the list methodically and minimize the damage. If you catch it soon enough, you might be able to limit the experience to inconvenience, but you absolutely must contact law enforcement &#8212; even if you suspect that the identity thief is a family member.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-bd2da7a9188b1575fe42cfd04ad1d5db\">Let me know in the comments below if you found this helpful, and if there are other topics like this you&#8217;d like me to cover, drop that in there as well.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Are you concerned that your identity might be stolen? In this post, you can find out where you&#8217;re most vulnerable, how to protect yourself, and how to deal with suspected identity theft.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"nf_dc_page":"","_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[10,9],"tags":[50,608,161,768,221,238],"class_list":["post-1284","post","type-post","status-publish","format-standard","hentry","category-commentary-and-consideration","category-basics","tag-computer","tag-identity-theft","tag-internet","tag-password","tag-security","tag-technology"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>IDENTITY THEFT - What it is, How to Prevent it, and What to do if You&#039;re a Victim of it - Oakwood Experience<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/oakwoodexperience.com\/identity-theft-what-it-is-how-to-prevent-it-and-what-to-do-if-youre-a-victim-of-it\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IDENTITY THEFT - What it is, How to Prevent it, and What to do if You&#039;re a Victim of it - Oakwood Experience\" \/>\n<meta property=\"og:description\" content=\"Are you concerned that your identity might be stolen? In this post, you can find out where you&#039;re most vulnerable, how to protect yourself, and how to deal with suspected identity theft.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/oakwoodexperience.com\/identity-theft-what-it-is-how-to-prevent-it-and-what-to-do-if-youre-a-victim-of-it\/\" \/>\n<meta property=\"og:site_name\" content=\"Oakwood Experience\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/profile.php?id=61563885192881\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-26T12:44:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-12T18:52:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/grownuptech.com\/wp-content\/uploads\/2024\/02\/identity-theft.jpg\" \/>\n<meta name=\"author\" content=\"Nancy Jones\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/x.com\/oakwood92297\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Nancy Jones\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"15 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/oakwoodexperience.com\\\/identity-theft-what-it-is-how-to-prevent-it-and-what-to-do-if-youre-a-victim-of-it\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/oakwoodexperience.com\\\/identity-theft-what-it-is-how-to-prevent-it-and-what-to-do-if-youre-a-victim-of-it\\\/\"},\"author\":{\"name\":\"Nancy Jones\",\"@id\":\"https:\\\/\\\/oakwoodexperience.com\\\/#\\\/schema\\\/person\\\/55a8ed6b0b18ff93e63bbba903d4dae3\"},\"headline\":\"IDENTITY THEFT &#8211; What it is, How to Prevent it, and What to do if You&#8217;re a Victim of it\",\"datePublished\":\"2024-02-26T12:44:59+00:00\",\"dateModified\":\"2024-08-12T18:52:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/oakwoodexperience.com\\\/identity-theft-what-it-is-how-to-prevent-it-and-what-to-do-if-youre-a-victim-of-it\\\/\"},\"wordCount\":3098,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/oakwoodexperience.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/oakwoodexperience.com\\\/identity-theft-what-it-is-how-to-prevent-it-and-what-to-do-if-youre-a-victim-of-it\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/grownuptech.com\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/identity-theft.jpg\",\"keywords\":[\"computer\",\"identity theft\",\"internet\",\"password\",\"security\",\"technology\"],\"articleSection\":[\"Tech Commentary and Consideration\",\"The Basics of How Things Work\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/oakwoodexperience.com\\\/identity-theft-what-it-is-how-to-prevent-it-and-what-to-do-if-youre-a-victim-of-it\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/oakwoodexperience.com\\\/identity-theft-what-it-is-how-to-prevent-it-and-what-to-do-if-youre-a-victim-of-it\\\/\",\"url\":\"https:\\\/\\\/oakwoodexperience.com\\\/identity-theft-what-it-is-how-to-prevent-it-and-what-to-do-if-youre-a-victim-of-it\\\/\",\"name\":\"IDENTITY THEFT - What it is, How to Prevent it, and What to do if You're a Victim of it - Oakwood Experience\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/oakwoodexperience.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/oakwoodexperience.com\\\/identity-theft-what-it-is-how-to-prevent-it-and-what-to-do-if-youre-a-victim-of-it\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/oakwoodexperience.com\\\/identity-theft-what-it-is-how-to-prevent-it-and-what-to-do-if-youre-a-victim-of-it\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/grownuptech.com\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/identity-theft.jpg\",\"datePublished\":\"2024-02-26T12:44:59+00:00\",\"dateModified\":\"2024-08-12T18:52:30+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/oakwoodexperience.com\\\/identity-theft-what-it-is-how-to-prevent-it-and-what-to-do-if-youre-a-victim-of-it\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/oakwoodexperience.com\\\/identity-theft-what-it-is-how-to-prevent-it-and-what-to-do-if-youre-a-victim-of-it\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/oakwoodexperience.com\\\/identity-theft-what-it-is-how-to-prevent-it-and-what-to-do-if-youre-a-victim-of-it\\\/#primaryimage\",\"url\":\"https:\\\/\\\/grownuptech.com\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/identity-theft.jpg\",\"contentUrl\":\"https:\\\/\\\/grownuptech.com\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/identity-theft.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/oakwoodexperience.com\\\/identity-theft-what-it-is-how-to-prevent-it-and-what-to-do-if-youre-a-victim-of-it\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/oakwoodexperience.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IDENTITY THEFT &#8211; What it is, How to Prevent it, and What to do if You&#8217;re a Victim of it\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/oakwoodexperience.com\\\/#website\",\"url\":\"https:\\\/\\\/oakwoodexperience.com\\\/\",\"name\":\"Oakwood Experience\",\"description\":\"Technology news, information, commentary, tutorials, and deep dives, and my photography journey.\",\"publisher\":{\"@id\":\"https:\\\/\\\/oakwoodexperience.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/oakwoodexperience.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/oakwoodexperience.com\\\/#organization\",\"name\":\"Oakwood Experience\",\"url\":\"https:\\\/\\\/oakwoodexperience.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/oakwoodexperience.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/oakwoodexperience.com\\\/staging\\\/2633\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/Oakwood-Experience.png?fit=1000%2C885&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/oakwoodexperience.com\\\/staging\\\/2633\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/Oakwood-Experience.png?fit=1000%2C885&ssl=1\",\"width\":1000,\"height\":885,\"caption\":\"Oakwood Experience\"},\"image\":{\"@id\":\"https:\\\/\\\/oakwoodexperience.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/oakwoodexperience.com\\\/#\\\/schema\\\/person\\\/55a8ed6b0b18ff93e63bbba903d4dae3\",\"name\":\"Nancy Jones\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b844525c51c8c622b37a68f8239add25f67d81fdee39b2f3d9c6e80dfde4e31a?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b844525c51c8c622b37a68f8239add25f67d81fdee39b2f3d9c6e80dfde4e31a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b844525c51c8c622b37a68f8239add25f67d81fdee39b2f3d9c6e80dfde4e31a?s=96&d=mm&r=g\",\"caption\":\"Nancy Jones\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/profile.php?id=61563885192881\",\"https:\\\/\\\/www.instagram.com\\\/southernfriedyanqui\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/feed\\\/\",\"https:\\\/\\\/x.com\\\/https:\\\/\\\/x.com\\\/oakwood92297\",\"https:\\\/\\\/www.youtube.com\\\/@nancyjones6235\"],\"url\":\"https:\\\/\\\/oakwoodexperience.com\\\/staging\\\/2633\\\/author\\\/nancyjones36507\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IDENTITY THEFT - What it is, How to Prevent it, and What to do if You're a Victim of it - Oakwood Experience","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/oakwoodexperience.com\/identity-theft-what-it-is-how-to-prevent-it-and-what-to-do-if-youre-a-victim-of-it\/","og_locale":"en_US","og_type":"article","og_title":"IDENTITY THEFT - What it is, How to Prevent it, and What to do if You're a Victim of it - Oakwood Experience","og_description":"Are you concerned that your identity might be stolen? In this post, you can find out where you're most vulnerable, how to protect yourself, and how to deal with suspected identity theft.","og_url":"https:\/\/oakwoodexperience.com\/identity-theft-what-it-is-how-to-prevent-it-and-what-to-do-if-youre-a-victim-of-it\/","og_site_name":"Oakwood Experience","article_author":"https:\/\/www.facebook.com\/profile.php?id=61563885192881","article_published_time":"2024-02-26T12:44:59+00:00","article_modified_time":"2024-08-12T18:52:30+00:00","og_image":[{"url":"https:\/\/grownuptech.com\/wp-content\/uploads\/2024\/02\/identity-theft.jpg","type":"","width":"","height":""}],"author":"Nancy Jones","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/x.com\/oakwood92297","twitter_misc":{"Written by":"Nancy Jones","Est. reading time":"15 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/oakwoodexperience.com\/identity-theft-what-it-is-how-to-prevent-it-and-what-to-do-if-youre-a-victim-of-it\/#article","isPartOf":{"@id":"https:\/\/oakwoodexperience.com\/identity-theft-what-it-is-how-to-prevent-it-and-what-to-do-if-youre-a-victim-of-it\/"},"author":{"name":"Nancy Jones","@id":"https:\/\/oakwoodexperience.com\/#\/schema\/person\/55a8ed6b0b18ff93e63bbba903d4dae3"},"headline":"IDENTITY THEFT &#8211; What it is, How to Prevent it, and What to do if You&#8217;re a Victim of it","datePublished":"2024-02-26T12:44:59+00:00","dateModified":"2024-08-12T18:52:30+00:00","mainEntityOfPage":{"@id":"https:\/\/oakwoodexperience.com\/identity-theft-what-it-is-how-to-prevent-it-and-what-to-do-if-youre-a-victim-of-it\/"},"wordCount":3098,"commentCount":0,"publisher":{"@id":"https:\/\/oakwoodexperience.com\/#organization"},"image":{"@id":"https:\/\/oakwoodexperience.com\/identity-theft-what-it-is-how-to-prevent-it-and-what-to-do-if-youre-a-victim-of-it\/#primaryimage"},"thumbnailUrl":"https:\/\/grownuptech.com\/wp-content\/uploads\/2024\/02\/identity-theft.jpg","keywords":["computer","identity theft","internet","password","security","technology"],"articleSection":["Tech Commentary and Consideration","The Basics of How Things Work"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/oakwoodexperience.com\/identity-theft-what-it-is-how-to-prevent-it-and-what-to-do-if-youre-a-victim-of-it\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/oakwoodexperience.com\/identity-theft-what-it-is-how-to-prevent-it-and-what-to-do-if-youre-a-victim-of-it\/","url":"https:\/\/oakwoodexperience.com\/identity-theft-what-it-is-how-to-prevent-it-and-what-to-do-if-youre-a-victim-of-it\/","name":"IDENTITY THEFT - What it is, How to Prevent it, and What to do if You're a Victim of it - Oakwood Experience","isPartOf":{"@id":"https:\/\/oakwoodexperience.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/oakwoodexperience.com\/identity-theft-what-it-is-how-to-prevent-it-and-what-to-do-if-youre-a-victim-of-it\/#primaryimage"},"image":{"@id":"https:\/\/oakwoodexperience.com\/identity-theft-what-it-is-how-to-prevent-it-and-what-to-do-if-youre-a-victim-of-it\/#primaryimage"},"thumbnailUrl":"https:\/\/grownuptech.com\/wp-content\/uploads\/2024\/02\/identity-theft.jpg","datePublished":"2024-02-26T12:44:59+00:00","dateModified":"2024-08-12T18:52:30+00:00","breadcrumb":{"@id":"https:\/\/oakwoodexperience.com\/identity-theft-what-it-is-how-to-prevent-it-and-what-to-do-if-youre-a-victim-of-it\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/oakwoodexperience.com\/identity-theft-what-it-is-how-to-prevent-it-and-what-to-do-if-youre-a-victim-of-it\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/oakwoodexperience.com\/identity-theft-what-it-is-how-to-prevent-it-and-what-to-do-if-youre-a-victim-of-it\/#primaryimage","url":"https:\/\/grownuptech.com\/wp-content\/uploads\/2024\/02\/identity-theft.jpg","contentUrl":"https:\/\/grownuptech.com\/wp-content\/uploads\/2024\/02\/identity-theft.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/oakwoodexperience.com\/identity-theft-what-it-is-how-to-prevent-it-and-what-to-do-if-youre-a-victim-of-it\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/oakwoodexperience.com\/"},{"@type":"ListItem","position":2,"name":"IDENTITY THEFT &#8211; What it is, How to Prevent it, and What to do if You&#8217;re a Victim of it"}]},{"@type":"WebSite","@id":"https:\/\/oakwoodexperience.com\/#website","url":"https:\/\/oakwoodexperience.com\/","name":"Oakwood Experience","description":"Technology news, information, commentary, tutorials, and deep dives, and my photography journey.","publisher":{"@id":"https:\/\/oakwoodexperience.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/oakwoodexperience.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/oakwoodexperience.com\/#organization","name":"Oakwood Experience","url":"https:\/\/oakwoodexperience.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/oakwoodexperience.com\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/oakwoodexperience.com\/staging\/2633\/wp-content\/uploads\/2024\/07\/Oakwood-Experience.png?fit=1000%2C885&ssl=1","contentUrl":"https:\/\/i0.wp.com\/oakwoodexperience.com\/staging\/2633\/wp-content\/uploads\/2024\/07\/Oakwood-Experience.png?fit=1000%2C885&ssl=1","width":1000,"height":885,"caption":"Oakwood Experience"},"image":{"@id":"https:\/\/oakwoodexperience.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/oakwoodexperience.com\/#\/schema\/person\/55a8ed6b0b18ff93e63bbba903d4dae3","name":"Nancy Jones","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/b844525c51c8c622b37a68f8239add25f67d81fdee39b2f3d9c6e80dfde4e31a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b844525c51c8c622b37a68f8239add25f67d81fdee39b2f3d9c6e80dfde4e31a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b844525c51c8c622b37a68f8239add25f67d81fdee39b2f3d9c6e80dfde4e31a?s=96&d=mm&r=g","caption":"Nancy Jones"},"sameAs":["https:\/\/www.facebook.com\/profile.php?id=61563885192881","https:\/\/www.instagram.com\/southernfriedyanqui\/","https:\/\/www.linkedin.com\/feed\/","https:\/\/x.com\/https:\/\/x.com\/oakwood92297","https:\/\/www.youtube.com\/@nancyjones6235"],"url":"https:\/\/oakwoodexperience.com\/staging\/2633\/author\/nancyjones36507\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/oakwoodexperience.com\/staging\/2633\/wp-json\/wp\/v2\/posts\/1284","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/oakwoodexperience.com\/staging\/2633\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/oakwoodexperience.com\/staging\/2633\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/oakwoodexperience.com\/staging\/2633\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/oakwoodexperience.com\/staging\/2633\/wp-json\/wp\/v2\/comments?post=1284"}],"version-history":[{"count":1,"href":"https:\/\/oakwoodexperience.com\/staging\/2633\/wp-json\/wp\/v2\/posts\/1284\/revisions"}],"predecessor-version":[{"id":1614,"href":"https:\/\/oakwoodexperience.com\/staging\/2633\/wp-json\/wp\/v2\/posts\/1284\/revisions\/1614"}],"wp:attachment":[{"href":"https:\/\/oakwoodexperience.com\/staging\/2633\/wp-json\/wp\/v2\/media?parent=1284"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/oakwoodexperience.com\/staging\/2633\/wp-json\/wp\/v2\/categories?post=1284"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/oakwoodexperience.com\/staging\/2633\/wp-json\/wp\/v2\/tags?post=1284"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}