So let’s go through the steps you’ll need to take to get your finances and credit back under your control. Step 4: Contact credit bureaus and businesses [Visual with 5 steps to take in case of being victim of ID theft: Think about it this way, you’re going to be your own best detective on the case.
So most victims have to be very proactive in getting their identity back under their control. Identity theft is becoming pretty common, but it’s still a hard crime for authorities to track. If you notice something wrong, the most important thing is to act quickly. By that point a lot of damage could have been done. The tip off could be a past due notice in the mail or a phone call from a collection agency about debt that isn’t theirs. In some cases, criminals are even filing tax returns in victim’s names and taking their tax refunds.Ī victim of identity theft could go months before they even notice that something strange is going on. When your identity is stolen, the criminal can use your Social Security number to get a job, rent an apartment, or even take out a loan. Identity theft isn’t just a case of account fraud where someone steals your credit card information.
#Privacy guard phone number password#
Create a strong password for each of your accounts, and never reuse the same password on multiple websites.Enable biometrics such as fingerprint sign-on, retina/facial recognition where available.Secure your devices and home Wi-Fi network with a unique password of at least eight characters.Keep all of your devices updated with the latest security patches and software.Discuss internet safety with your children, and prevent them from sharing information online without your permission.Don’t overshare on social media, and use privacy controls so that personal information is not made public.
Avoid carrying your Social Security Number in your wallet and give it out only when necessary.Shred any documents, such as tax forms, bank statements and medical bills that contain sensitive information.Never give out your personal information via email, text or to an unsolicited caller.