Identity theft protection
How do I protect myself from identity theft and what do I do if it happens?
Projekt-Plan
{{whyLabel}}: This is the single most effective way to prevent identity thieves from opening new accounts in your name.
{{howLabel}}:
- Contact the three major credit bureaus (Equifax, Experian, and TransUnion) online.
- Request a 'Security Freeze' for your profile.
- Save the PINs or passwords provided in a secure location; you will need them to 'thaw' your credit later.
{{doneWhenLabel}}: You have received confirmation from all three bureaus that your credit is frozen.
{{whyLabel}}: Reusing passwords is a primary cause of identity theft; a manager allows for unique, complex keys for every site.
{{howLabel}}:
- Download a reputable open-source password manager like Bitwarden or KeePassXC.
- Create one strong 'Master Password' that you do not use anywhere else.
- Migrate your most important accounts (Email, Banking) to the manager first.
{{doneWhenLabel}}: The software is installed and your primary email account password is saved within it.
{{whyLabel}}: MFA adds a second layer of security, making a stolen password useless on its own.
{{howLabel}}:
- Go to security settings for your Email, Bank, and Mobile Provider.
- Select 'Authenticator App' (TOTP) rather than SMS/Text messages, as SMS can be intercepted via SIM swapping.
- Scan the QR codes using an app like Aegis (Android) or Raivo (iOS).
{{doneWhenLabel}}: Your email and primary bank account require a code from your app to log in.
{{whyLabel}}: This prevents 'SIM Swapping,' where a thief transfers your phone number to their device to bypass SMS security codes.
{{howLabel}}:
- Call your mobile service provider's customer service or log into your account portal.
- Request to add a 'Port-Out PIN' or 'Transfer PIN'.
- Ensure this PIN is different from your account password and stored in your password manager.
{{doneWhenLabel}}: Your mobile carrier confirms that no number transfers can occur without the specific PIN.
{{whyLabel}}: Physical mail is a goldmine for identity thieves looking for pre-approved credit offers and account numbers.
{{howLabel}}:
- Select a 'Cross-Cut' or 'Micro-Cut' shredder; avoid 'Strip-Cut' as they can be easily reconstructed.
- Place it near where you sort your mail to ensure immediate destruction of sensitive documents.
- Shred all documents containing names, addresses, or account details before recycling.
{{doneWhenLabel}}: A shredder is set up and all pending sensitive mail is destroyed.
{{whyLabel}}: Reducing the amount of sensitive mail you receive lowers the risk of mail theft.
{{howLabel}}:
- Visit the official industry website for credit offer opt-outs (e.g., OptOutPrescreen in the US).
- Choose the 'Permanent Opt-Out' option to stop receiving firm offers of credit or insurance.
- You may need to mail a signed form for the permanent version.
{{doneWhenLabel}}: You have completed the online opt-out process.
{{whyLabel}}: Early detection allows you to stop a thief before they drain your accounts.
{{howLabel}}:
- Log into your online banking and credit card portals.
- Navigate to 'Alerts' or 'Notifications'.
- Set alerts for: 'Transaction over $0.01', 'International Transaction', and 'Profile Change'.
{{doneWhenLabel}}: You receive a test notification or email for a small purchase.
{{whyLabel}}: These services scan data breaches to see if your email or passwords have been leaked.
{{howLabel}}:
- Use a reputable free tool like 'Have I Been Pwned' to check your current status.
- Enable the notification feature to be alerted of future breaches.
- Many password managers also include this feature natively; ensure it is toggled 'On'.
{{doneWhenLabel}}: You have checked your primary email and signed up for breach alerts.
{{whyLabel}}: Thieves may use your identity to gain employment or claim benefits, which will show up on your earnings record.
{{howLabel}}:
- Create or log into your account on your national social security website (e.g., 'my Social Security' in the US).
- Review the 'Earnings Record' for any years or amounts that look unfamiliar.
- Check for any active claims you did not initiate.
{{doneWhenLabel}}: You have verified that your reported earnings match your actual work history.
{{whyLabel}}: In a crisis, you need all your documentation in one place to prove your case to banks and police.
{{howLabel}}:
- Prepare a physical or encrypted digital folder.
- Include copies of your ID, a list of all bank/credit accounts with customer service numbers, and contact info for credit bureaus.
- Print out a blank 'Identity Theft Affidavit' (e.g., from IdentityTheft.gov) to have ready.
{{doneWhenLabel}}: The folder is organized and accessible in an emergency.
{{whyLabel}}: Speed is critical to limit financial liability and damage to your reputation.
{{howLabel}}:
- Step 1: Call the company where the fraud occurred and close the account.
- Step 2: Place a 'Fraud Alert' on your credit reports (this is different from a freeze).
- Step 3: Report the theft to your national authority (e.g., FTC in the US) to get an official recovery plan.
- Step 4: File a local police report to provide a legal paper trail.
{{doneWhenLabel}}: You have read and understood these steps and kept a summary in your recovery folder.
{{whyLabel}}: Even with a freeze, errors can occur or existing accounts can be compromised.
{{howLabel}}:
- Set a recurring calendar invite for every 4 months.
- Use 'AnnualCreditReport.com' (or your local equivalent) to get one free report from a different bureau each time.
- Look for: Accounts you don't recognize, inquiries you didn't make, or incorrect addresses.
{{doneWhenLabel}}: A recurring calendar event is set and the first report has been reviewed.
{{whyLabel}}: Thieves use 'oversharing' (birthdays, pet names, high schools) to guess security questions or craft phishing attacks.
{{howLabel}}:
- Set all profiles to 'Private' or 'Friends Only'.
- Remove your birth year, phone number, and home address from public view.
- Delete 'Friends' or 'Followers' you do not know personally.
{{doneWhenLabel}}: Your profiles are restricted and sensitive personal data is hidden from the public.
{{whyLabel}}: Outdated software often has security holes that allow malware to steal your credentials.
{{howLabel}}:
- Enable 'Automatic Updates' on your smartphone, computer, and router.
- Check for updates on your browser and its extensions.
- Restart your devices at least once a week to ensure patches are applied.
{{doneWhenLabel}}: All primary devices are running the latest available security versions.