Identity Theft by the Numbers

Identity theft is a growing concern that can have a devastating impact on individuals and families. Despite the prevalence of this crime, many people still don't fully understand what it is, how it happens, and what steps they can take to help protect themselves from becoming a victim. As life circumstances change, such as accumulating wealth or becoming a parent, it's more important than ever to stay informed about the Red Flags of Identity Theft. In this month's newsletter, we'll explore the basics of identity theft, its negative consequences, and some statistics that highlight the scale of the problem. We'll also examine some common ways that people become victims of identity theft and provide tips on how to avoid falling prey to this crime. Share this content with your account holders to inform them of this very real and very dangerous crime.

Newsletter Content

Identity Theft by the Numbers


Everyone has heard of identity theft. After all, it has been a prevalent topic for the last 20 years. But in those years did you ever stop to learn what it is and how it can impact you? Or, maybe you have become complacent and even fatigued by the topic to the point of no longer paying attention. Today, more than ever, we need to reawaken the need for families to understand and keep learning about scams that can dramatically impact financial wellness and lead to identity theft. 


Let’s consider that you may be in a very different situation than you were when you first heard about identity theft. Today, you may have accumulated more wealth, or your young children may now be entering their teen years or young adulthood. You may utilize more digital transaction methods and communications. You may now be retired and living on a fixed income. With all of these life changes, it is more important than ever to know the Red Flags of Identity Theft. Let’s begin with the basics and review what identity theft is and how it is perpetrated.


Identity theft is a type of crime where someone obtains another person's personal information without their permission or knowledge and uses that information to commit fraud or other illegal activities. The personal information that is commonly targeted includes names, addresses, birthdates, Social Security numbers, credit card numbers, and bank account information.


Identity theft can have a wide range of negative consequences for the victim, including financial loss, damage to credit scores, legal problems, and emotional distress. Identity thieves can use the stolen information to open new accounts, make unauthorized purchases, obtain loans, file fraudulent tax returns, and commit other forms of fraud. In some cases, the victim may not even be aware that their identity has been stolen until they are contacted by a creditor or law enforcement agency.


Identity theft is a growing problem globally, and statistics show that it is becoming more prevalent every year. Here are some statistics about identity theft:


Here are some common ways in which people can become victims of identity theft:

Phishing Scams

Phishing is a technique that involves sending fraudulent emails, texts, or other messages that appear to be from a reputable source, such as a bank or credit card company. The messages usually contain a link that directs the recipient to a fake website, where they are asked to enter their personal information. This information is then collected by the fraudster and used for identity theft.

Data Breaches

Data breaches occur when hackers gain unauthorized access to a company's computer system and steal sensitive data, such as Social Security numbers and credit card information. This stolen data can then be sold on the dark web, where it can be used for identity theft.

Skimming

Skimming is a technique that involves stealing credit or debit card information by using a small device called a skimmer that is placed on a card reader, such as an ATM or gas pump. The skimmer reads the card's magnetic strip and harvests and stores the information, which can then be used for identity theft.

Social Engineering

Social engineering involves tricking people into revealing their personal information by posing as a trusted individual or organization, such as a bank or government agency. This can be done through phone calls, emails, or even in person.

Physical Theft

Physical theft involves stealing personal information, such as wallets, mail, or documents, from a person's home or car. This information can then be used for identity theft.

Unsecured Wi-Fi Networks

Using unsecured Wi-Fi networks can make it easy for hackers to intercept sensitive information, such as login credentials and financial information.


Avoiding identity theft involves taking steps to help protect your personal information, such as using strong passwords, being cautious about giving out personal information online, regularly checking your credit reports and financial statements, and being alert to signs of identity theft. In the months ahead, we will be taking an in-depth look at each of the topics above to learn more about the different types of fraud that lead to identity theft and help you recognize the Red Flags that can be an early warning and what to do to help protect yourself and your family.


If you suspect that your identity has been stolen, it's important to take action immediately. As an <EMBEDDED ACCOUNT>  acount holder, should you feel your identity has been compromised, contact us - we have professional Identity Theft Recovery Advocates standing by, ready to assist. These Advocates are prepared to work on your behalf to help you recover from identity theft and to help you reverse damage it may have caused. Contact us or find out more about your benefits of <EMBEDDED ACCOUNT> by visiting our website.

Social Media Content


Use the social media posts below throughout the month to remind your account holders about the risks associated with identity theft, and how this crime continues to be an issue for families as thieves steal and use personal information in a variety of ways. 

Post #1: Here is your friendly reminder to be on the lookout for phishing scams! These fraudulent emails, texts, and messages can appear to be from reputable sources, but they're trying to trick you into giving away your personal information. Don't click on any suspicious links or provide any sensitive information unless you're certain it's a legitimate request. Stay safe out there! #PhishingScams #YourProtectionPartner

Post #2: Beware of data breaches! Hackers can steal sensitive data like Social Security numbers and credit card information from a company's computer system. The stolen data can then sold on the dark web which could result in identity theft. Protect yourself by using strong passwords, two-factor authentication, and monitoring your statements for suspicious activity. Stay safe online! #DataBreaches #CyberSecurity #YourProtectionPartner

Post #3: Don't fall prey to skimming scams! Skimming is a sneaky technique where thieves use a small device called a skimmer to steal your credit or debit card information when you swipe your card at places like ATMs or gas pumps. The skimmer reads your card's magnetic strip and harvests and stores the data for identity theft. So, be cautious while swiping your card, and always check for any tampering with card readers. Stay safe! #Skimming #IdentityTheft #YourProtectionPartner

Post #4: Beware of social engineering scams! Fraudsters posing as banks, government agencies, or trusted individuals try to trick you into revealing personal information through phone calls, emails, or even in person. It's important to always verify the identity of the person or organization before sharing sensitive information. Don't hesitate to ask for more information or to call back using a trusted number. #SocialEngineering #StaySafe #YourProtectionPartner

Post #5: Are you using unsecured Wi-Fi networks to access the Internet? Beware, as it can put you at risk! Hackers can easily intercept your login credentials and financial information when you use unsecured Wi-Fi. Always ensure that you use secure Wi-Fi networks or a VPN when you access sensitive information. #UnsecuredWiFi #StaySafe #YourProtectionPartner