How your data can be used by criminals

   read  

  Decrease Text Size Increase Text Size

All data is continually at rest or in motion in many locations. It exists on home and mobile devices, in apps and in transit across networks, and in online repositories. All along the way, you need to protect the privacy of the data - when you set your devices up; when you download and install your apps; when you receive or send it in emails, messages, or via banking apps; and when you agree to store it with the hospitals, government agencies, and private companies you conduct your business with. The likelihood that your personal identification is in the hands of criminals increases with every new data breach.  Data breach information goes way beyond just login credentials and credit card numbers. 

Here are the types of data that can be stolen:
    Identity data (PII) - Email, SSN, name​, DOB​, mother's maiden name​, family, relatives, driver's license​, Real I.D., passport, address​, phone​, IP address, company info​, social media, biometric files, credit history, work history and professional licenses.​
      Types of crimes committed with your data:
        • New account fraud, ACH fraud
        • Identity fraud, file fraudulent tax returns, apply loans, etc.
        • Create counterfeit cards, pay bills, transfer money
        • P2P, authorized push payment fraud
        • Email compromise, Wire fraud, Phishing
        • Phone porting, IP spoofing
                  Financial Data - Banking information, investments, billing accounts and insurance.
                      Types of crimes committed with your data:
                      • Identity fraud
                      • Fraudulent tax returns
                      • Loan applications
                      • Withdraw funds, ACH fraud, create counterfeit checks, pay bills, transfer money
                        Payment data - Credit card and debit card information.
                          Types of crimes committed with your data:
                          • Make fraudulent online purchases
                          • Create counterfeit cards
                            Credential Data - Email, phone, usernames, passwords for online accounts.
                            • Account takeover of online banking, eCommerce, email, etc.
                            • Triangulation Fraud
                              Health Data - Hospital records, medical info​, health history, and medical insurance.
                              • Account takeover
                              • New account fraud
                              • Fraudulent insurance claims
                              • Buy prescription medicine
                              Data breaches may not play out for a really long time as hackers might not use stolen data right away.  The following suggestions should become habits that last well into the future.  This way if hackers are sitting on your information to use it in the future, you'll know.

                              What else you can do: Order specialty free reports outside of the big three credit reporting agencies.  Specialty reporting companies may disclose information that can help prevent fraudulent accounts and other identity theft crimes:











                              eFraud Prevention™, LLC