Financial – iDefend https://www.idefendhome.com Ultimate Protection for Your Digital Life Wed, 28 Aug 2024 21:18:09 +0000 en-US hourly 1 https://wordpress.org/?v=6.8.1 https://www.idefendhome.com/wp-content/uploads/cropped-idefend-favicon-32x32.png Financial – iDefend https://www.idefendhome.com 32 32 A.I. Can Copy Your Voice https://www.idefendhome.com/blog/onlineprivacy/aivoicecloningscams/ Thu, 02 May 2024 16:51:19 +0000 https://www.idefendhome.com/?p=3689 For several years now, AI has been employed to maliciously copy and replicate real people's voices in order to scam and trick loved ones and friends.

The post A.I. Can Copy Your Voice first appeared on iDefend.

]]>
ai-stockphoto
For several years now, AI has been employed to maliciously copy and replicate real people's voices in order to scam and trick loved ones and friends.

In this article

Scams aren’t going anywhere. The trouble is, they’ve morphed from the Nigerian Prince’s gold bouillon into a mysterious phone call from what sounds like your terrified daughter in the clutches of some vile kidnappers.

Voice cloning scams have already caused countless damage in financial losses, as well as other damaging experiences such as sextortion and blackmail. It’s sobering to think of how much more these will grow given a few years.

The unfortunate part is how easily these scammers can steal small clips of your voice and use AI software to extrapolate that into even full-blown conversations! With all the advancements in AI, gone are the days of simply recording you saying “Yes” and playing that behind a clip of someone asking for your permission to do something nefarious.

The good news is there are several things you can do to help prevent this from happening to you, as well as what things to be vigilant for if you encounter one of these scams in the wild.

How to Spot the Scam

By far the most common use of this scam is to solicit money from friends and family members. Because so much of our lives are accessible via a quick online search and on social media, it’s not difficult for a scammer to assemble a basic digital profile of a potential victim.

Because of this, you’ll want to be especially wary of any phone calls you receive that sound like someone you know asking you for unusual amounts of money.

Examine the phone number

This is one of the first things you should do when you get one of these calls, but take a look at the phone number. Chances are, you won’t have it saved in your phone, and it may even have the wrong area code. When in doubt hang up.

Verify with the real person

When this does happen, the best thing you can do is to immediately hang up and call that person directly yourself. Of course, if circumstances allow you could also pay them a quick visit in person. Simply ask them to confirm whether or not it was them that called you.

If they have no idea what you’re talking about, immediately block and report the number from which you received the phony call.

Pay attention to tells

If you are otherwise unable to contact your acquaintance and verify anything, pay attention to anything in their voice or speech patterns that sounds unusual. Sometimes, an AI clone will subtly give itself away.

How to Stop the Scam

The following are things you can do to safely limit your exposure to these scams. Remember that just because a scammer can copy someone’s voice doesn’t automatically earn them any money; someone has to fall for it first.

Don’t answer unknown calls

This one may be hard for some of us who grew up before smart phones and caller ID were widespread conveniences. Nowadays, sadly, it’s all too common for unknown numbers to be spam, robo, or scam calls.

The simplest way you can avoid most phone scams is to simply not answer calls from unknown numbers.

Get into the habit of following up with those you call

Put yourself on the other end of these calls for a minute. Let’s say you are dialing a new friend or acquaintance and they haven’t yet saved your number. If they, too, are following best practices, they should ignore your call and let it go to voice mail.

When this happens, you should leave them a quick message, but another thing you can do that’s often even faster is to send them a simple text message. Just let them know it was you who called and you’d like to speak with them when they’re available.

We know this step may seem innocuous or mundane, but it’s actually a great habit to get into since the vast majority of people will check a text message much sooner and faster than a voice mail.

Verify with the real person

Yes, this is the same suggestion as before, but it holds just as much weight being listed here as well. It’s always good to verify with the real person before sending them money.

Save numbers in your phone

For anyone you know and trust, save their number in your phone. This will spare you the trouble of having to play “phone tag” and will give you more peace of mind knowing that you are talking to the real person.

Be extra cautious

Even if you’ve saved someone’s number, always remember to be cautious and verify with them before sending money. Scammers steal billions of dollars every year, and this number will only increase as technology gets better, so please be cautious and safeguard your money.

The post A.I. Can Copy Your Voice first appeared on iDefend.

]]>
It’s the most wonderful time of the year: Tax Season! https://www.idefendhome.com/blog/identityandfinancial/taxseason2024/ Wed, 13 Mar 2024 20:38:43 +0000 https://www.idefendhome.com/?p=3556 Remember, the IRS will never text you, call you, or email you with requests or special instructions regarding your tax return. Scammers will.

The post It’s the most wonderful time of the year: Tax Season! first appeared on iDefend.

]]>
texes
Remember, the IRS will never text you, call you, or email you with requests or special instructions regarding your tax return. Scammers will.

In this article

That joyous occasion when the meticulous dance with receipts and deductions begins anew! Still, tax season is upon us and with that comes a wave of new scams to be mindful of.

Tax Scams are Evergreen

Each year, more and more people are getting their tax returns swiped out from under their noses. This scam is nothing new, and is certainly not going anywhere (barring some serious overhaul on the federal end of things).

Criminals want easy money

Cybercriminals everywhere are doing everything they can to take advantage of you while filing taxes to steal your return.

As long as they can get ahold of a few scraps of personal information—especially your Social Security Number—the criminals can easily submit tax returns on your behalf. If the IRS is ignorant enough to send them a check, then you can kiss your sweet tax return goodbye.

Protection is Paramount

Amidst the headlines of lawsuits against companies like Avast for breaches of trust, and the poignant discussions on the impact of social media on our youth’s mental well-being, one truth stands clear: protection is paramount.

So as you gather your W-2s and brave the tax landscape, remember to arm yourself not only with documents but with knowledge.

Don’t fall for it!

Remember, the IRS will never text you, call you, or email you with requests or special instructions regarding your tax return. Scammers will. The IRS only sends you written notices through snail mail. Safeguard your finances, protect your identity, and don’t fall victim to tax return ID theft!

The post It’s the most wonderful time of the year: Tax Season! first appeared on iDefend.

]]>
Protect Your Crypto Investments https://www.idefendhome.com/blog/identityandfinancial/protect-your-crypto-investments/ Sun, 12 Nov 2023 22:49:45 +0000 https://www.idefendhome.com/?p=5670 Millions of people now invest in and hold cryptocurrency. At the same time, attackers have flocked to crypto to raid the accounts of new investors who don't have the proper safeguards in place to protect their investments and accounts.

The post Protect Your Crypto Investments first appeared on iDefend.

]]>
pexels-crypto-crow-643283-1447418
Millions of people now invest in and hold cryptocurrency. At the same time, attackers have flocked to crypto to raid the accounts of new investors who don't have the proper safeguards in place to protect their investments and accounts.

In this article

Much of the advice for keeping your online bank accounts secure also applies to cryptocurrency: use strong passwords, use multi-factor authentication and be wary of phishing emails and other scams. But there are additional measures that need to be considered.

About Using Crypto Exchange

Many opt to keep their cryptocurrency in a crypto exchange, allowing them to easily buy, sell and trade different cryptocurrencies. Having these exchanges (such as Coinbase, Crypto.com, Binance and others) that store and secure your cryptocurrency is easy and might seem like the best option at first, but there are also potential risks.

If you leave your cryptos in an exchange, it’s vitally important your device is as secure against attacks as possible. Consider isolating a computer or mobile device that’s only used for crypto. Get regular security checkups done on your computer or device from a trained professional.

Use Multi-factor Authentication

Multi-factor authentication should be applied to your accounts. Passwords should be complex enough to not be breached in brute-force attacks, and the same password should not be shared among different accounts.

Using Crypto Wallets

A better recommendation is to store your cryptocurrencies in a secure crypto wallet that you own and control. There are two types of wallets—a hot wallet and a cold storage wallet.

Hot wallets

A hot wallet is a cryptocurrency wallet (such as Metamask and Exodus) that’s always connected to the internet and linked to public and private keys which an individual can use to conveniently send and receive cryptocurrency. However, the always-on connection to the internet could potentially leave these wallets vulnerable to being hacked.

Cold wallets

A cold storage wallet is when you keep your cryptocurrencies offline on a hardware device that you plug in or sync to your computer or phone in order to send or receive. These cold wallets have physical keys, PINs and passwords that only you know in order to keep your crypto secure and offline. This second form of wallet is the more secure way to store cryptocurrency, although it is much less convenient.

The post Protect Your Crypto Investments first appeared on iDefend.

]]>
How to Safeguard Your Bank Accounts and Finances from Cyber Theft https://www.idefendhome.com/blog/identityandfinancial/safeguardyourbankaccounts/ Mon, 20 Jun 2022 22:58:36 +0000 https://www.idefendhome.com/?p=5679 Online banking and shopping are easy and convenient, but spending, managing, and investing your money online can put you at risk from hackers. Here's how to keep your bank accounts, investments, and cryptocurrency more secure against online threats.

The post How to Safeguard Your Bank Accounts and Finances from Cyber Theft first appeared on iDefend.

]]>
pexels-pixabay-164501
Online banking and shopping are easy and convenient, but spending, managing, and investing your money online can put you at risk from hackers. Here's how to keep your bank accounts, investments, and cryptocurrency more secure against online threats.

In this article

The FBI reports nearly $7 billion lost by US consumers to cybercrime in 2021. Of that whopping number, $1.5 billion was stolen from retirement plans, and $1.7 billion was stolen from cryptocurrency investments. In the first 3 months of 2022, $1.3 billion has already been stolen from crypto accounts!

Without taking proper steps to protect yourself, a cyber criminal can gain access to your accounts and steal your money by hijacking your computer or smart phone, or by simply stealing your username and password. Here are several tips for safeguarding your online financial accounts.

Don’t Fall for Phishing Attacks

One of the most common methods cyber criminals use to steal usernames and passwords for bank accounts is phishing attacks, where they’ll send an email — or an SMS text message — claiming to be from a bank or retailer.

Often, the attackers will design a fake version of the bank’s website. If the unlucky recipient of the fake message is tricked into entering their username and password, it is then in the hands of the attackers. Banks are not the only entities that can be impersonated in this way — it can also be retailers, government agencies or pretty much anyone else. The aim is to get access to your details by any means.

Pay attention to alerts from your bank

Banks and other services will often send alerts about suspicious activity on accounts. Users should be wary as cyber criminals also build their own versions of these alerts to trick people into providing information.

In the event it turns out you’ve fallen victim to a phishing attack, change your passwords immediately, and change the passwords on any accounts that might use that same password. If you’ve lost money in a cyber-attack, you should report it to your bank and to the police.

Keep Your Computer and Phone Clean

Beyond fake emails, texts and websites, hackers look to infect victim’s computers and mobile devices with viruses, spyware, and banking trojan malware which monitors your computer or device for activity with banks, investment, and crypto accounts. The malware captures and sends all the necessary information to hack your accounts back to the cyber criminals.

The key is to keep the bad guys off your computer and smart phone. Start with using a good antivirus and firewall. Keep your systems updated with all the latest security patches. Also watch for malicious apps hidden in popular app stores like Google Play.

Get regular security checkups

From time to time, it is a good idea to get a full security checkup and system cleanup on your computer and devices, This should be done by a trained and certified cybersecurity technician to check your security and ensure you don’t have any hidden viruses or malware that slipped past your antivirus software.

Tip: The iDefend protection plan from INVISUS includes these regular security checkups.

Use Good Online Cyber Hygiene

Practice good cyber hygiene across all your online accounts to keep them as secure as possible.

With your social media accounts, don’t click on suspicious links or posts. Limit the amount of personal information you share as that information could be exploited to help identify accounts you have, or to conduct personalized social-engineering attacks against you. Enable all security and privacy settings on your accounts.

Use strong passwords for your online accounts (10+ characters, capital letters, symbols). Don’t use the same password everywhere. Where available, turn on multi-factor authentication as an extra measure of protection when logging in. This will all make it much more difficult for attackers to breach accounts.

The post How to Safeguard Your Bank Accounts and Finances from Cyber Theft first appeared on iDefend.

]]>
Don’t Take the Free Crypto Money https://www.idefendhome.com/blog/identityandfinancial/donttakefreecrypto/ Mon, 15 Nov 2021 17:20:36 +0000 https://www.idefendhome.com/?p=5840 Free crypto? Sounds nice...until you realize the price is handing over your personal data and privacy.

The post Don’t Take the Free Crypto Money first appeared on iDefend.

]]>
worldcoinorb
Free crypto? Sounds nice...until you realize the price is handing over your personal data and privacy.

In this article

Beware of the Orb and its all-seeing eye! Worldcoin and its Orb recently emerged onto the cryptocurrency scene and are backed by some major players in the crypto investment market. The company is trying hard to position itself as a global, socially aware organization developing a common good for everyone on the planet. It’s developing a “collectively owned digital currency that will be distributed to as many people as possible.”

Sounds nice, right?

How the orb works

Before WorldCoin and their offer of free crypto money reaches you, there are huge security and privacy risks you should be aware of. Here’s what you need to know: They’ve created a neat-looking, shiny sphere—called an Orb—with a camera in it. You stand in front of the Orb and allow it to scan your retina and your face. The Orb produces a unique identifier, a code, based on your retina. Once you have your personal identifier, you can use it to claim some “free” WorldCoin (WDC) cryptocurrency.

Any red flags going off for you yet?

In the world of high tech (Google, Facebook, Twitter, etc), if it’s free, then YOU are the product. They are capturing data about you and selling it for profit. It couldn’t be clearer in this case.

WorldCoin wants to quickly ramp up and capture their first billion retinas and facial scans using the Orb. They are hiring “Orb Operators,” where you can “earn your share of Worldcoin by giving it away” to people in your community. How nice! And the coolest part is that you get to walk around with the Orb in your hands… Yikes.

That’s a lot of orbs!

The company says they’ve lined up manufacturing for more than 50,000 Orbs a year. Already more than 130,000 people have given up detailed mapping of their retinas and faces. The privacy implications are frightening.

What’s the risk?

So, what’s the play here? It’s pretty simple actually. They are literally printing a bunch of cryptocurrencies out of thin air and giving it away in exchange for scanning our retinas and our faces. In the process, they will collect the world’s largest database of retina and facial recognition data, along with your other personal information.

With that data, WorldCoin will be able to create one of the most powerful artificial intelligence (AI) facial recognition system on the planet. Combined with your crypto investments, they’ll be loaded with data worth billions. The company claims it will only keep our biometric data long enough to train its AI system and promises to keep all your information private.

We’ve heard that one before.

Don’t take the free money

So, are you in? Would you take the “free” money?

Would you give up your identity and your biometric data to claim some free crypto?

Please don’t!

Technology keeps advancing

Technology is moving at lightning speed and will only evolve faster with the emergence of blockchain, AI and 5G. More and more companies and technologies will emerge that track our location, our purchasing habits, our investments, our bank accounts, our social lives, our entertainment and more. Worldcoin’s biometric data gathering Orb is just another example of what you should watch out for.

Always protect your data and privacy

If you are looking to invest and speculate on cryptocurrencies, the number one rule you need to remember is to protect your data and your privacy. Do not fall for clever campaigns to give away free money or free cryptos in exchange for your personal information.

Avoid the Orb. Don’t give up your identity. Keep your retina and your face to yourself.

The post Don’t Take the Free Crypto Money first appeared on iDefend.

]]>
Should I Be Worried About Home Title Theft? https://www.idefendhome.com/blog/identityandfinancial/hometitletheftworried/ Thu, 22 Apr 2021 17:10:37 +0000 https://www.idefendhome.com/?p=5429 Could an identity thief steal your house? The short answer is yes, but you should know the details first before you start worrying too much.

The post Should I Be Worried About Home Title Theft? first appeared on iDefend.

]]>
Home-Neighborhood-1024x683
Could an identity thief steal your house? The short answer is yes, but you should know the details first before you start worrying too much.

In this article

The idea that someone is trying to steal the title to your home is horrifying. Imagine a thief forging your signature and secretly taking over the deed to your residence, and then actually taking out a fraudulent home-equity loan – against your equity. To give you some peace of mind, here is what you should know about home title theft, the chances of it happening to you, and what you can do to protect yourself.

What is home title theft?

Home title theft, also known as title fraud, happens when a criminal scours publicly available electronic property records to find a home that has accrued equity. Most frequently, they track down ownership of a home that’s either empty, a second residence or one occupied by an elderly resident.

The thief creates a new identity with supporting documentation like fake ID, Social Security card, and other personal identifiers. This is followed by the criminal forging the homeowner’s signature onto a fraudulent bill of sale and transfers legal ownership of the house to themselves. Home title theft is a new type of identity theft that also involves more serious forgery, real estate and mortgage crimes punishable with up to 10 years or more of prison time.

What happens if I become a victim?

Once the home deed is in the criminal’s name, they can take out home equity loans and disappear with the money, leaving the homeowner with the bill. Unfortunately, most people don’t find out that title theft has occurred until they receive a foreclosure notice in the mail from the bank holding the bogus home loan.

There are a few signs of potential title theft problems you can watch for including:

  • You stop receiving bills at your residence
  • Rising utility bills at vacant or second homes
  • You stop receiving tenant rent payments
  • Mortgage information from a lender you’ve never done business with
  • New loans or lines of credit in your name
  • Notice of foreclosure

 

If you suspect you have a home title theft problem, you’ll want to immediately call the mortgage lender and title company involved to identify and correct the problem. That will get the ball rolling.

Is home title theft a big problem?

You may hear blaring advertising on radio and TV telling you the home title and mortgage fraud is the fastest growing crime in America. It’s creative marketing, but at best this is very misleading as to the scope of the problem. There are very few statistics available for home title theft cases.

The FBI estimated a couple years back that 9,600 U.S. homeowners were victims of title fraud. That’s a microscopic percentage – slightly more than 0.0001% of the roughly 87 million U.S. homes owned. It was a cause of concern and gained attention because it was declared a new type of identity theft. To date, the Federal Trade Commission still does not report on home title theft cases.

So, does home title theft happen? Yes. Is it likely to happen to you? No. Is stealing a title and taking money from a fake home equity loan as easy as forging title documents on your home? No, because it involves obtaining and transferring a title or deed, deceiving a title company, plus county recorders of deeds as well as lenders, each of whom have several layers of protection in place.

All that said, home title theft is a new form of identity theft. Victims likely have larger identity fraud problems to deal with including compromised computers, email and social media accounts, legal battles, and a ruined credit profile.

Does home title insurance protect me?

Yes, but only if you’ve opted to purchase “owner’s title insurance” at your home closing. Owner’s title insurance is a one-time fee often included with closing costs when you buy your home. If you opted in on an owner’s policy title insurance, you’re covered.

Don’t confuse this with “lender’s title insurance” required by mortgage lenders at closing to assure them the property is free and clear of liens or claims before loan closing.

Do advertised “Title Lock” programs actually protect me?

Not really. You cannot technically “lock” your home title, and these programs are not title insurance policies. What they offer is periodic monitoring to alert you to after a change of deed has occurred – after your identity has been stolen and title fraud is already in full motion. They also talk of helping reclaim ownership of your home. The reality is, you never lost ownership of your home. A crime has been committed. You have an identity theft case, and a criminal legal battle to prove you did not sell your home and take out that loan.

You’ll need identity, credit and cybercrime fraud experts working on your behalf. Protecting against potential cases of home title fraud requires a much more comprehensive protection plan than the advertised title lock services.

What can I do to prevent this?

  • Check your home title records. In most counties, you can access the county property ownership records online free of charge. If available, register for your county’s consumer notification service, which signs you up for alerts any time a document is recorded on your property.
  • Use a licensed title agency. When purchasing a property, be sure to use a reputable, licensed title company.
  • Purchase “owner’s title insurance”. Consider purchasing this at closing to protect against any claims or liens against your property now and in the future.
  • Watch out for new or missing bills. When utility bills and other statements start disappearing or changing randomly, your identity and your home title could be at risk.
  • Monitor your credit. Look for mortgage or home equity loan inquiries or activity you don’t recognize. Sign up for a premium ID theft and credit monitoring service to ensure you are always on top of changes to your credit.
  • Evaluate your security practices. Home title theft is a digital crime. It’s a very good idea to make sure you are properly protected with your computers, mobile devices, passwords, financial accounts, and social media. If you aren’t super cyber-savvy, consider having security experts do a full cybersecurity checkup for you and your family.

The bottom line

There’s no need to pay additional or separately for a home title protection service. The best thing you can do to protect against this and all other forms of identity theft and cybercrime is to invest in a comprehensive personal and home cyber protection plan like iDefend that includes personalized, one-on-one expert service.

iDefend covers home title theft and all other forms of cybercrime and identity fraud. Discover a powerful new way to protect yourself and your family against all cybercrime, identity theft and online privacy risks in a single protection plan – with iDefend.

The post Should I Be Worried About Home Title Theft? first appeared on iDefend.

]]>
Tax Season or Open Season? https://www.idefendhome.com/blog/identityandfinancial/taxoropenseason/ Mon, 01 Feb 2021 19:01:36 +0000 https://www.idefendhome.com/?p=5120 Millions of Americans will likely not get their tax refunds this year — not because they don’t deserve them, but because identity thieves will have already filed tax returns under their names.

The post Tax Season or Open Season? first appeared on iDefend.

]]>
article_tax_1040-scaled
Millions of Americans will likely not get their tax refunds this year — not because they don’t deserve them, but because identity thieves will have already filed tax returns under their names.

In this article

Did you know all a scammer needs to steal your identity and your tax refund is your name and your Social Security Number? Did you know you could spend 5-8 months fighting the IRS over it and could be audited in the
process?

Yikes!

Our Tips For Tax Safety

Here are some tips to keep your tax refund in your bank account this year, hassle free.

  1. File your tax returns early. Tax refund fraud only works if the thief files a bogus tax return in your name before you submit your actual tax returns. By filing early, you can ensure the IRS sees your return before a thief sends the fake one.
  2. Look for IRS notices. Watch for a letter from the IRS stating that more than one tax return was filed with your SSN. Also watch for an IRS notice indicating you received wages from an employer unknown to you. Either of these notices could be a sign that a thief has attempted to file a fraudulent return in your name. (Remember, the IRS only sends notices by mail. If you receive a random email notice or phone call from the IRS, it’s likely a scam. Don’t click on links or open attachments in these types of scam emails!)
  3. Lock up your Social Security card. Tax-return theft always involves a stolen SSN. Keep it locked up in a safe place!
  4. Reduce credit card solicitations. Even if you aren’t interested in that credit card solicitation, a thief might be. He could plan to get a credit card in your name as a first step toward obtaining your SSN and date of birth. Be sure to shred unwanted credit solicitations and get your name off the marketing lists for pre-approved credit offers. (Instructions for getting off junk mail marketing lists are found in your online iDefend account.)
  5. Keep on top of data breach notices. Watch for letters or emails from companies and organizations notifying you that your personal information may have been compromised in a data breach incident. If you receive a notification like this, be sure to closely watch for identity theft or credit fraud alerts and other suspicious identity theft activity. Not every data breach involving your personal information will result in identity theft, but it’s vital that you stay vigilant.
  6. Shred bank and tax documents you no longer need. Thinking like a thief helps you reduce your risk of identity theft. Consider your tax documents, receipts and bank statements as potential trapdoors that allow entrance into your personal life. Lock up what you need to keep, and shred the rest.

How to Get Fraud Protection

If at any time you believe you may be a victim of federal or state tax return fraud, get help immediately. If you need a good ID theft protection service that covers tax return fraud, check out iDefend that include monitoring and expert support for this type of fraud and much more.

The post Tax Season or Open Season? first appeared on iDefend.

]]>
Medical Identity Theft: How to Protect Yourself https://www.idefendhome.com/blog/identityandfinancial/medicalidentitytheft/ Tue, 15 Oct 2019 19:02:24 +0000 https://www.idefendhome.com/?p=3609 Your medical information is a goldmine for cyber criminals and fraudsters. Unfortunately, medical identity theft affects millions of Americans every year, and it can wreak havoc on your finances and even your health.

The post Medical Identity Theft: How to Protect Yourself first appeared on iDefend.

]]>
pexels-rdne-stock-project-6129044
Your medical information is a goldmine for cyber criminals and fraudsters. Unfortunately, medical identity theft affects millions of Americans every year, and it can wreak havoc on your finances and even your health.

In this article

Your personal medical records may not be as safe as you might think. A quick internet search for “medical data breaches” will pull up dozens of sobering results. It seems like every year more and more firms succumb to their own folly as their inferior cybersecurity is inevitably breached by yet another hot-shot hacker.

Then, of course, the pilfered data is happily bought and sold on the dark web. You might wake up one day to a large medical bill for drugs you never purchased. Or you could rush your local clinic for a life-saving blood transfusion only to discover that your blood type has mysteriously changed to “O negative”.

Oh, that’s not your blood type? Well, actually it is… at least according to what it now says on your medical file, anyway.

How’s that sound for a Friday morning?

What is Medical ID Theft?

Medical identity theft happens when someone steals your personal information, electronic health records or insurance information and uses it to get medical treatment, equipment and prescription drugs in your name. This could leave you footing the medical bills and even mixing their health records with yours. In fact, according to a recent study from the Ponemon Institute, medical ID theft victims spend nearly $13,500 on average to deal with the problem, including paying off fraudulent medical bills.

With continual cyber-attacks and data breaches among both healthcare providers and health insurers, medical identity theft will most certainly claim millions more victims. Here’s what you need to know to protect yourself and your loved ones.

The Real Dangers of Medical ID Theft

Victims of medical identity theft have similar outcomes to other types of identity theft, such as ruined credit, but can suffer even more devastating consequences. Victims can have medical insurance claims denied, lose access to their insurance, and be forced to pay to restore their insurance coverage. If thieves max out benefit thresholds on an insurance policy, policyholders could find themselves unable to get timely coverage for urgent treatments.

Increased insurance prices

An affected individual might see the cost of their insurance increase or may be denied coverage altogether if the fraudulent treatment included care for things like diabetes, osteoarthritis, or cancer. They may be unable to access their own medical records. ID theft victims could end up with a flag in the system triggering regulators or even law enforcement to track them down over charges they’d illegally purchased prescription drugs.

Incorrect data records

When medical identity theft results in erroneous medical records, the consequences can even be life threatening. Drug allergy warnings or other special medical conditions may be deleted. Previous medical procedures can be erased. Blood types can be changed in the patient’s medical records, endangering the life of the ID theft victim should they need a blood transfusion. These potential health risks alone are reason enough for consumers to be vigilant and get protected.

A foot in the door for criminals

Of course, the theft of medical records also gives thieves access to your other personal and financial information including Social Security number, date of birth, and bank or credit accounts. Victims of medical identity fraud often find themselves also fighting other types of identity theft including credit fraud, Social Security fraud, tax return fraud and more.

Look Out for Red Flags

There’s a lot you can do to keep an eye out for signs of medical identity theft. Here are a few red flags you should watch for:

  • A bill for medical services or equipment you don’t recognize
  • Double billing charges on a medical bill
  • Mistakes on your medical history
  • A call from a collection agency about a medical bill you don’t owe
  • Denial of insurance due to a medical condition you don’t have
  • A letter from your health insurer notifying that you have reached your benefit limit

Friendly Fraud

While many thieves obtain the victim’s medical information in the typical pattern of hacking, phishing, stealing mail or copying your records at a clinic or other facility, about half of all medical identity theft happens among family members.

Ponemon study

The Ponemon study revealed that 24% of medical identity theft victims said a family member took their medical credentials and used them without permission. Another 23% said they willingly shared their health insurance information to help a family member or friend obtain medical care.

In the study, most of the people who shared medical info did not consider it a crime, but it’s still considered fraud against medical insurers and health care providers. Sharing Medicare or Medicaid information with someone else to help them obtain coverage is also a state and federal crime.

5 Tips for Protecting Yourself

While it can be difficult to protect your information from being exposed in a data breach, there are ways to lower your risk.

  1. Ask about security practices. Inquire how your doctor’s office, hospital and insurance company protect your personal information. They are required to safeguard your data – and you have the right encourage privacy by asking how they protect you.
  2. Secure your copies. Store any paper and electronic copies of your medical and health insurance records in a safe place. Shred or burn health forms, insurance and prescription papers.
  3. Be suspicious. Don’t fall for online or phone scams for things like “free” medical quotes, products or services. Don’t share personal or medical information online or over the phone unless you initiate the conversation.
  4. Review your medical records. Carefully read through your insurance statements and medical records for anything you don’t recognize.
  5. Monitor for ID theft. Many medical ID theft cases are first detected with identity theft and credit monitoring where you’ll be notified of collection notices for unpaid medical bills and other signs of ID theft.

Get Expert Help

If you know that your medical identity has been stolen, you can start taking steps on your own to work through it. Those steps can include requesting copies of your medical records, which might require paying a fee, and asking medical providers to correct false information. The Federal Trade Commission offers a helpful checklist of steps to take when working through medical identity theft on your own.

Protection plans exist

However, expert help is available to monitor for medical identity theft – and recover from it with minimal damages and downtime. You may choose to enroll in a trusted identity theft protection plan to help monitor for suspicious activity, including medical ID theft. These plans also include professional recovery and restoration services to rely on in the event you ever suspect you might have a medical ID theft problem.

How iDefend can have your back

Of course, what kind of company would we be without tooting our own horn a little? Our iDefend Advisor team is trained to assist with all types of identity theft, including medical identity theft. Learn more about our identity theft protection and recovery.

Keeping watch over your medical information, credit report, financial statements and insurance statements may not prevent all cases of medical identity theft, but staying vigilant and proactively monitoring for problems can help you notice fraud faster and take action quickly to correct it.

The post Medical Identity Theft: How to Protect Yourself first appeared on iDefend.

]]>