All data is continually at rest or in motion in many locations. It exists on home and mobile devices, in apps and in transit across networks, and in online repositories. All along the way, you need to protect the privacy of the data - when you set your devices up; when you download and install your apps; when you receive or send it in emails, messages, or via banking apps; and when you agree to store it with the hospitals, government agencies, and private companies you conduct your business with. The likelihood that your personal identification is in the hands of criminals increases with every new data breach. Data breach information goes way beyond just login credentials and credit card numbers.
Identity data (PII)
Email, SSN, name, DOB, mother's maiden name, family, relatives, driver's license, Real I.D., passport, address, phone, IP address, company info, social media, biometric files, credit history, work history, and professional licenses.
Types of crimes committed with your data:- New account fraud, ACH fraud
- Identity fraud, filing fraudulent tax returns, applying for loans, etc.
- Create counterfeit cards, pay bills, transfer money
- P2P, authorized push payment fraud
- Email compromise, Wire fraud, Phishing
- Phone porting, IP spoofing
Financial Data
Banking information, investments, billing accounts, and insurance.
Types of crimes committed with your data:- Identity fraud
- Fraudulent tax returns
- Loan applications
- Withdraw funds, ACH fraud, create counterfeit checks, pay bills, transfer money
Payment Data
Credit card and debit card information.
Types of crimes committed with your data:- Make fraudulent online purchases
- Create counterfeit cards
Credential Data
Email, phone, usernames, and passwords for online accounts.
- Account takeover of online banking, eCommerce, email, etc.
- Triangulation Fraud
Health Data
Hospital records, medical info, health history, and medical insurance.
- Account takeover
- New account fraud
- Fraudulent insurance claims
- Buy prescription medicine
Data breaches may not play out for a really long time as hackers might not use stolen data right away. The following suggestions should become habits that last well into the future. This way if hackers are sitting on your information to use it in the future, you'll know.