The post It’s Time for Black Friday Scams Again first appeared on iDefend.
]]>Black Friday is just around the corner, and alongside all those tasty deals comes a recipe for scams. Crooks know that would-be deal-hunters will be scouring online storefronts for the lowest prices, and may not have their guard up. They’ll look to pounce on the unsuspecting shopper and serve them up a deal that’s too good to be true.
You may encounter pop-up ads, emails that appear to be legitimate, or even exclusive offers on social media, each one promising a deal that is guaranteed to blow your socks off (or your wallet anyway). Instead of clicking, make sure to do the following:
Think you are being scammed? Call our scam hotline or email us for help:
801-692-6200
[email protected]
The post It’s Time for Black Friday Scams Again first appeared on iDefend.
]]>The post A.I. Can Copy Your Voice first appeared on iDefend.
]]>Scams aren’t going anywhere. The trouble is, they’ve morphed from the Nigerian Prince’s gold bouillon into a mysterious phone call from what sounds like your terrified daughter in the clutches of some vile kidnappers.
Voice cloning scams have already caused countless damage in financial losses, as well as other damaging experiences such as sextortion and blackmail. It’s sobering to think of how much more these will grow given a few years.
The unfortunate part is how easily these scammers can steal small clips of your voice and use AI software to extrapolate that into even full-blown conversations! With all the advancements in AI, gone are the days of simply recording you saying “Yes” and playing that behind a clip of someone asking for your permission to do something nefarious.
The good news is there are several things you can do to help prevent this from happening to you, as well as what things to be vigilant for if you encounter one of these scams in the wild.
By far the most common use of this scam is to solicit money from friends and family members. Because so much of our lives are accessible via a quick online search and on social media, it’s not difficult for a scammer to assemble a basic digital profile of a potential victim.
Because of this, you’ll want to be especially wary of any phone calls you receive that sound like someone you know asking you for unusual amounts of money.
This is one of the first things you should do when you get one of these calls, but take a look at the phone number. Chances are, you won’t have it saved in your phone, and it may even have the wrong area code. When in doubt hang up.
When this does happen, the best thing you can do is to immediately hang up and call that person directly yourself. Of course, if circumstances allow you could also pay them a quick visit in person. Simply ask them to confirm whether or not it was them that called you.
If they have no idea what you’re talking about, immediately block and report the number from which you received the phony call.
If you are otherwise unable to contact your acquaintance and verify anything, pay attention to anything in their voice or speech patterns that sounds unusual. Sometimes, an AI clone will subtly give itself away.
The following are things you can do to safely limit your exposure to these scams. Remember that just because a scammer can copy someone’s voice doesn’t automatically earn them any money; someone has to fall for it first.
This one may be hard for some of us who grew up before smart phones and caller ID were widespread conveniences. Nowadays, sadly, it’s all too common for unknown numbers to be spam, robo, or scam calls.
The simplest way you can avoid most phone scams is to simply not answer calls from unknown numbers.
Put yourself on the other end of these calls for a minute. Let’s say you are dialing a new friend or acquaintance and they haven’t yet saved your number. If they, too, are following best practices, they should ignore your call and let it go to voice mail.
When this happens, you should leave them a quick message, but another thing you can do that’s often even faster is to send them a simple text message. Just let them know it was you who called and you’d like to speak with them when they’re available.
We know this step may seem innocuous or mundane, but it’s actually a great habit to get into since the vast majority of people will check a text message much sooner and faster than a voice mail.
Yes, this is the same suggestion as before, but it holds just as much weight being listed here as well. It’s always good to verify with the real person before sending them money.
For anyone you know and trust, save their number in your phone. This will spare you the trouble of having to play “phone tag” and will give you more peace of mind knowing that you are talking to the real person.
Even if you’ve saved someone’s number, always remember to be cautious and verify with them before sending money. Scammers steal billions of dollars every year, and this number will only increase as technology gets better, so please be cautious and safeguard your money.
The post A.I. Can Copy Your Voice first appeared on iDefend.
]]>The post It’s the most wonderful time of the year: Tax Season! first appeared on iDefend.
]]>That joyous occasion when the meticulous dance with receipts and deductions begins anew! Still, tax season is upon us and with that comes a wave of new scams to be mindful of.
Each year, more and more people are getting their tax returns swiped out from under their noses. This scam is nothing new, and is certainly not going anywhere (barring some serious overhaul on the federal end of things).
Cybercriminals everywhere are doing everything they can to take advantage of you while filing taxes to steal your return.
As long as they can get ahold of a few scraps of personal information—especially your Social Security Number—the criminals can easily submit tax returns on your behalf. If the IRS is ignorant enough to send them a check, then you can kiss your sweet tax return goodbye.
Amidst the headlines of lawsuits against companies like Avast for breaches of trust, and the poignant discussions on the impact of social media on our youth’s mental well-being, one truth stands clear: protection is paramount.
So as you gather your W-2s and brave the tax landscape, remember to arm yourself not only with documents but with knowledge.
Remember, the IRS will never text you, call you, or email you with requests or special instructions regarding your tax return. Scammers will. The IRS only sends you written notices through snail mail. Safeguard your finances, protect your identity, and don’t fall victim to tax return ID theft!
The post It’s the most wonderful time of the year: Tax Season! first appeared on iDefend.
]]>The post How to Safeguard Your Bank Accounts and Finances from Cyber Theft first appeared on iDefend.
]]>The FBI reports nearly $7 billion lost by US consumers to cybercrime in 2021. Of that whopping number, $1.5 billion was stolen from retirement plans, and $1.7 billion was stolen from cryptocurrency investments. In the first 3 months of 2022, $1.3 billion has already been stolen from crypto accounts!
Without taking proper steps to protect yourself, a cyber criminal can gain access to your accounts and steal your money by hijacking your computer or smart phone, or by simply stealing your username and password. Here are several tips for safeguarding your online financial accounts.
One of the most common methods cyber criminals use to steal usernames and passwords for bank accounts is phishing attacks, where they’ll send an email — or an SMS text message — claiming to be from a bank or retailer.
Often, the attackers will design a fake version of the bank’s website. If the unlucky recipient of the fake message is tricked into entering their username and password, it is then in the hands of the attackers. Banks are not the only entities that can be impersonated in this way — it can also be retailers, government agencies or pretty much anyone else. The aim is to get access to your details by any means.
Banks and other services will often send alerts about suspicious activity on accounts. Users should be wary as cyber criminals also build their own versions of these alerts to trick people into providing information.
In the event it turns out you’ve fallen victim to a phishing attack, change your passwords immediately, and change the passwords on any accounts that might use that same password. If you’ve lost money in a cyber-attack, you should report it to your bank and to the police.
Beyond fake emails, texts and websites, hackers look to infect victim’s computers and mobile devices with viruses, spyware, and banking trojan malware which monitors your computer or device for activity with banks, investment, and crypto accounts. The malware captures and sends all the necessary information to hack your accounts back to the cyber criminals.
The key is to keep the bad guys off your computer and smart phone. Start with using a good antivirus and firewall. Keep your systems updated with all the latest security patches. Also watch for malicious apps hidden in popular app stores like Google Play.
From time to time, it is a good idea to get a full security checkup and system cleanup on your computer and devices, This should be done by a trained and certified cybersecurity technician to check your security and ensure you don’t have any hidden viruses or malware that slipped past your antivirus software.
Tip: The iDefend protection plan from INVISUS includes these regular security checkups.
Practice good cyber hygiene across all your online accounts to keep them as secure as possible.
With your social media accounts, don’t click on suspicious links or posts. Limit the amount of personal information you share as that information could be exploited to help identify accounts you have, or to conduct personalized social-engineering attacks against you. Enable all security and privacy settings on your accounts.
Use strong passwords for your online accounts (10+ characters, capital letters, symbols). Don’t use the same password everywhere. Where available, turn on multi-factor authentication as an extra measure of protection when logging in. This will all make it much more difficult for attackers to breach accounts.
The post How to Safeguard Your Bank Accounts and Finances from Cyber Theft first appeared on iDefend.
]]>The post Top 10 Bad Cybersecurity Habits to Break in 2022 first appeared on iDefend.
]]>The new year is a great opportunity to evaluate many areas of your life. With cybercrime surging to all-time highs last year, improving your personal and home cyber protection has never been more important. Take better control of your online security and privacy this year by breaking a few bad cyber habits that may put you at risk.
Last year shaped up to be one of the worst years on record for cybercrime and losses from scams. In the first nine months of 2021 alone, 281.5 million people were impacted by data breaches and data leaks (ITRC). Hackers targeted people working from home, resulting in a 300% increase in data breaches with their employers (Verizon).
During a nine month stretch last year, victims were scammed out of $80 million in cryptocurrency investment scams (FTC). And that’s only what’s been reported to the Federal Trade Commission. At the same time in 2021, the elderly in America lost over $1 billion in new cyber scams (IC3).
If by chance you’re not feeling the urgency to find new ways to protect your digital world, consider that more than a third of US identity theft victims last year said they didn’t have enough money to buy food or pay for utilities last year after suffering financial losses due to fraud (ITRC).
While you can’t control things like data breaches with businesses, you can do your part. Here are 10 bad habits to break this year to better protect your privacy and your hard-earned money.
Stop doing these things now:
When your computer starts having problems – when applications don’t work, files go missing, or your computer and your internet becomes painfully slow, your computer might be infected with a virus, spyware, or other types of hacker tools. Do not ignore computer problems. Get a security check-up done right away from a trained professional when your computer starts acting up.
Don’t ignore security updates to your computer and smart devices. More than 50 new vulnerabilities in operating systems, browsers, and other software on computers and devices are discovered every day. Cybercriminals look for and use these vulnerabilities as a top method of attack. The good news is that by switching on automatic updates and clicking to update when prompted, you can easily keep your computer and your smart devices up to date and protected.
Scam emails, known as phishing emails, are possibly the most prolific cyber threats you’ll face today. Attackers try to trick their victims into clicking on malicious links or opening a virus-infected attachment in an email that appears to come from a legitimate company or person. The number one rule is to think before you click. If you weren’t expecting the email, be suspicious.
Using the same password for multiple accounts and easy-to-guess security questions gives hackers a massive advantage. Create strong passwords for your accounts. Try using long phrases you’ll remember as your passwords, the longer the better. Don’t use the same password everywhere. Consider using a password manager to remember your passwords and phrases. And be sure to switch on two-factor authentication (2FA) on any account that offers it.
Everyone knows you should have good anti-malware protection on your computers. Don’t forget to protect your smart phone and tablets too, especially if you have Android devices. Be sure to download and use highly recommended security apps from Google Play and the Apple App Store.
Start paying attention to the security of websites you visit. HTTPS sites use encryption to protect your connection to the site. It authenticates the site as genuine and that it’s not a phishing website. Look for the padlock symbol and the “S” in HTTPS at the beginning of the website URL.
With many of us spending more time working from home and maybe using personal devices for work too, the lines between personal and work on computers and devices have become blurred. Keep work and personal separate. Only use your personal email and passwords for consumer shopping, online banking, etc. Keep children and other family members off computers that you use for work.
Never give out personal information to someone who has called you. Scammers are getting good at convincing people to share their date of birth, account numbers, and other credentials over the phone. Legitimate businesses and government agencies will never ask you for private information by phone. Hang up, look up the company’s phone number yourself and then call them back.
Ransomware attacks continue to happen. Imagine if you were suddenly locked out of your computer with a message left by the hacker demanding $10,000 in bitcoin as a ransom payment to get your computer back. All the data on it, and potentially cloud storage, could be lost forever – including family photos and important work documents.
Be sure you have a cloud backup of all your files or that you regularly back up everything to a portable hard drive and store it separately in a secure location. Wiping your computer and reloading from a backup is often the only way to recover from a ransomware attack.
Nearly every home is outfitted with smart gadgets like voice assistants, smart TVs, and security cameras. But these smart devices are also becoming an attractive target for criminals. They can be used to infiltrate your home network, your computers and ultimately, your personal data.
Be sure to change the default passwords that come with the device – such as your home Wi-Fi router. Where possible, edit the privacy settings on devices (like a voice assistant) to not allow it to share your activity and information with the manufacturer (such as Google). Also, watch for software and firmware updates from the product manufacturer that fix potential security flaws as they are discovered. Think twice before purchasing new gadgets or toys that listen to things going on in your home, record video, or otherwise track you.
In many ways, we are all looking forward to a better year than last year. We have enough to worry about without stressing over attacks on our digital lives. To help make sure it’s a year full of good things, start by improving your personal cybersecurity and privacy today.
Staying current with all the right protections can be a daunting task. Fortunately, expert help is available for helping you establish a complete cyber defense plan for you and your loved ones. iDefend is a comprehensive identity theft and cybersecurity program for individuals and families that includes unlimited access to U.S. based cybersecurity experts and advisors to help you protect your digital life.
The post Top 10 Bad Cybersecurity Habits to Break in 2022 first appeared on iDefend.
]]>The post Don’t Take the Free Crypto Money first appeared on iDefend.
]]>Beware of the Orb and its all-seeing eye! Worldcoin and its Orb recently emerged onto the cryptocurrency scene and are backed by some major players in the crypto investment market. The company is trying hard to position itself as a global, socially aware organization developing a common good for everyone on the planet. It’s developing a “collectively owned digital currency that will be distributed to as many people as possible.”
Sounds nice, right?
Before WorldCoin and their offer of free crypto money reaches you, there are huge security and privacy risks you should be aware of. Here’s what you need to know: They’ve created a neat-looking, shiny sphere—called an Orb—with a camera in it. You stand in front of the Orb and allow it to scan your retina and your face. The Orb produces a unique identifier, a code, based on your retina. Once you have your personal identifier, you can use it to claim some “free” WorldCoin (WDC) cryptocurrency.
In the world of high tech (Google, Facebook, Twitter, etc), if it’s free, then YOU are the product. They are capturing data about you and selling it for profit. It couldn’t be clearer in this case.
WorldCoin wants to quickly ramp up and capture their first billion retinas and facial scans using the Orb. They are hiring “Orb Operators,” where you can “earn your share of Worldcoin by giving it away” to people in your community. How nice! And the coolest part is that you get to walk around with the Orb in your hands… Yikes.
The company says they’ve lined up manufacturing for more than 50,000 Orbs a year. Already more than 130,000 people have given up detailed mapping of their retinas and faces. The privacy implications are frightening.
So, what’s the play here? It’s pretty simple actually. They are literally printing a bunch of cryptocurrencies out of thin air and giving it away in exchange for scanning our retinas and our faces. In the process, they will collect the world’s largest database of retina and facial recognition data, along with your other personal information.
With that data, WorldCoin will be able to create one of the most powerful artificial intelligence (AI) facial recognition system on the planet. Combined with your crypto investments, they’ll be loaded with data worth billions. The company claims it will only keep our biometric data long enough to train its AI system and promises to keep all your information private.
We’ve heard that one before.
So, are you in? Would you take the “free” money?
Would you give up your identity and your biometric data to claim some free crypto?
Please don’t!
Technology is moving at lightning speed and will only evolve faster with the emergence of blockchain, AI and 5G. More and more companies and technologies will emerge that track our location, our purchasing habits, our investments, our bank accounts, our social lives, our entertainment and more. Worldcoin’s biometric data gathering Orb is just another example of what you should watch out for.
If you are looking to invest and speculate on cryptocurrencies, the number one rule you need to remember is to protect your data and your privacy. Do not fall for clever campaigns to give away free money or free cryptos in exchange for your personal information.
Avoid the Orb. Don’t give up your identity. Keep your retina and your face to yourself.
The post Don’t Take the Free Crypto Money first appeared on iDefend.
]]>The post Top 10 Ways to Prevent ID Theft first appeared on iDefend.
]]>The number of identity theft cases reported to the Federal Trade Commission (FTC) increased 100% in 2020, double the number from 2019. Statistically, you now have a 1 in 4 chance of becoming a victim of identity fraud and cybercrime each year.
The good news is, you can take control of your privacy and help prevent identity fraud with these simple protection tips.
Don’t carry your Social Security card in your wallet. Whenever you are asked to provide your Social Security number (or for your child), ask why a Social Security number is necessary and how the information will be protected once it’s been provided.
To make sure nobody has opened up new accounts under your name, you should check each of your credit reports at least yearly. You can get your free Experian, Transunion and Equifax credit reports at AnnualCreditReport.com. Better yet, subscribe to a 24/7 credit monitoring service like iDefend so you can be notified in real-time of any changes to your credit profile.
If you notice fraudulent credit activity, dispute it with the lender and the credit bureau. Also, consider requesting a fraud alert with the bureaus or freezing your credit reports if you’ve been victimized.
Fraudsters “phish” and catch victims by pretending to be a trustworthy bank, store or government agency. Most commonly, they do this over the phone, in e-mails, but can also use regular mail. Do not respond to any request to verify your account number or password. Legitimate companies do not request this kind of information by email or phone. Don’t be afraid to ask questions, and never give out your personal information unless you made the contact.
Like most people, you probably share personal information like name, birthday, job, school and hometown on your social media profiles. Unfortunately, if a cybercriminal wanted to collect information about you, social media is going to be their first stop. Try not to share any personal information, especially email addresses, birth dates, children’s full names and other data that can be used for identity theft.
Check your social media account privacy settings and make sure you are not publicly sharing too much information. You can lock down your profiles and safeguard your accounts from things like account takeovers.
Children under the age of 18 are often the target of child identity theft because their credit score is completely unmarked. Posting information about your children on social media, even if it’s just their full names and birthdays, is just as dangerous as posting your own.
Cybercriminals look for easy prey – especially personal computers and mobile devices that are not well-secured. At a minimum, protect your computer and smartphone with good antivirus and spyware protection. Be sure you update this security software regularly. There are excellent free antivirus programs that will do a great job for you. You may want to use an antivirus app for your smartphone also, especially if you have an Android device.
Beware of fake apps and downloads. Download only from sites you know and trust. For your smartphone, stick with the Apple App Store and Google Play.
To protect your privacy while web browsing and shopping, consider doing your web surfing in incognito mode or with other tools to prevent tracking. Also consider using a web browser built for privacy protection such as DuckDuckGo.
Finally, update your phone or computer software when prompted. It’s an annoying fact of life, but hackers exploit security flaws in phone and computer operating systems in order to break in and steal personal and financial information.
Scammers have gotten good at guessing passwords using publicly available information and social media profiles such as pets, children, etc. To help minimize the damage, create a unique, strong password for every online account.
The FBI and National Institute of Standards and Technology recommend creating passwords with at least 15 characters because these are more difficult for a computer program or hacker to crack. Mix it up with capital letters, numbers, and symbols. Because it’s almost impossible to remember all your passwords, you could use a password manager such as LastPass to securely store all of them.
If a website or app offers it, set up two-factor authentication. This requires you to provide a second piece of information to verify your identity when logging in such as a code sent to your mobile phone or email. If your password is ever stolen, a criminal can’t get into your account without your smartphone, voiceprint, or fingerprint.
As for account security questions, the FTC advises selecting questions that only you can answer, instead of information that could be available online like your ZIP code, birthplace, or mother’s maiden name. Also, don’t give generic responses, such as “cookies” as your favorite dessert.
When shopping online, check the security of a website before entering your credit card number or other personal information. Do not sign up or order from sites that do not have a secure checkout process (“https” in the address bar and a padlock symbol at the bottom of the browser window.)
Check your monthly bank and credit card statements for fraudulent activity. A thief with your card or bank account number often makes small charges to see if they can get away with it. These transactions easily slip through the cracks without financial institutions noticing them.
Also be sure to check medical bills or statement of benefits. If someone is using your healthcare information to commit medical identity theft and run up bills in your name, this is the only way you’ll be able to find out and prevent the damage from getting worse.
Identity thieves can intercept pre-approved credit offers whether mailed or emailed to open new accounts in your name. Shred these offers when you receive them rather than throwing them in the trash.
The safest way to avoid identity theft exposure from pre-screened credit card offers is to opt out of receiving them through optoutprescreen.com, the official consumer credit reporting industry website for opting out.
Con artists, posing as a legitimate business, government agency, law enforcement or charity, trick unsuspecting people into giving up personal information and hard-earned money with scam phone calls. Never give personal information over the phone unless absolutely necessary, and don’t ever give it out unless you initiated the phone call.
If someone contacts you and says they are calling from someplace like your bank, credit card company, Microsoft, or the IRS, ask for a number to call them back—and then make sure it’s really an official number.
Then look them up online and call the organization’s customer service number before you give any information. Also, ask how the information will be shared with others and request that the information be kept confidential.
If you are unsure of how to best protect against ID theft or want the help of security experts to stay safe, consider subscribing to our iDefend service.
You’ll be protected with the latest in identity protection, cybersecurity and online privacy tools together with the help of our U.S. based cyber support team. We are dedicated not just to protecting you against identity theft but safeguarding you and your family against all of today’s cyber threats.
The post Top 10 Ways to Prevent ID Theft first appeared on iDefend.
]]>The post Tax Season or Open Season? first appeared on iDefend.
]]>Did you know all a scammer needs to steal your identity and your tax refund is your name and your Social Security Number? Did you know you could spend 5-8 months fighting the IRS over it and could be audited in the
process?
Yikes!
Here are some tips to keep your tax refund in your bank account this year, hassle free.
If at any time you believe you may be a victim of federal or state tax return fraud, get help immediately. If you need a good ID theft protection service that covers tax return fraud, check out iDefend that include monitoring and expert support for this type of fraud and much more.
The post Tax Season or Open Season? first appeared on iDefend.
]]>The post Medical Identity Theft: How to Protect Yourself first appeared on iDefend.
]]>Your personal medical records may not be as safe as you might think. A quick internet search for “medical data breaches” will pull up dozens of sobering results. It seems like every year more and more firms succumb to their own folly as their inferior cybersecurity is inevitably breached by yet another hot-shot hacker.
Then, of course, the pilfered data is happily bought and sold on the dark web. You might wake up one day to a large medical bill for drugs you never purchased. Or you could rush your local clinic for a life-saving blood transfusion only to discover that your blood type has mysteriously changed to “O negative”.
Oh, that’s not your blood type? Well, actually it is… at least according to what it now says on your medical file, anyway.
How’s that sound for a Friday morning?
Medical identity theft happens when someone steals your personal information, electronic health records or insurance information and uses it to get medical treatment, equipment and prescription drugs in your name. This could leave you footing the medical bills and even mixing their health records with yours. In fact, according to a recent study from the Ponemon Institute, medical ID theft victims spend nearly $13,500 on average to deal with the problem, including paying off fraudulent medical bills.
With continual cyber-attacks and data breaches among both healthcare providers and health insurers, medical identity theft will most certainly claim millions more victims. Here’s what you need to know to protect yourself and your loved ones.
Victims of medical identity theft have similar outcomes to other types of identity theft, such as ruined credit, but can suffer even more devastating consequences. Victims can have medical insurance claims denied, lose access to their insurance, and be forced to pay to restore their insurance coverage. If thieves max out benefit thresholds on an insurance policy, policyholders could find themselves unable to get timely coverage for urgent treatments.
An affected individual might see the cost of their insurance increase or may be denied coverage altogether if the fraudulent treatment included care for things like diabetes, osteoarthritis, or cancer. They may be unable to access their own medical records. ID theft victims could end up with a flag in the system triggering regulators or even law enforcement to track them down over charges they’d illegally purchased prescription drugs.
When medical identity theft results in erroneous medical records, the consequences can even be life threatening. Drug allergy warnings or other special medical conditions may be deleted. Previous medical procedures can be erased. Blood types can be changed in the patient’s medical records, endangering the life of the ID theft victim should they need a blood transfusion. These potential health risks alone are reason enough for consumers to be vigilant and get protected.
Of course, the theft of medical records also gives thieves access to your other personal and financial information including Social Security number, date of birth, and bank or credit accounts. Victims of medical identity fraud often find themselves also fighting other types of identity theft including credit fraud, Social Security fraud, tax return fraud and more.
There’s a lot you can do to keep an eye out for signs of medical identity theft. Here are a few red flags you should watch for:
While many thieves obtain the victim’s medical information in the typical pattern of hacking, phishing, stealing mail or copying your records at a clinic or other facility, about half of all medical identity theft happens among family members.
The Ponemon study revealed that 24% of medical identity theft victims said a family member took their medical credentials and used them without permission. Another 23% said they willingly shared their health insurance information to help a family member or friend obtain medical care.
In the study, most of the people who shared medical info did not consider it a crime, but it’s still considered fraud against medical insurers and health care providers. Sharing Medicare or Medicaid information with someone else to help them obtain coverage is also a state and federal crime.
While it can be difficult to protect your information from being exposed in a data breach, there are ways to lower your risk.
If you know that your medical identity has been stolen, you can start taking steps on your own to work through it. Those steps can include requesting copies of your medical records, which might require paying a fee, and asking medical providers to correct false information. The Federal Trade Commission offers a helpful checklist of steps to take when working through medical identity theft on your own.
However, expert help is available to monitor for medical identity theft – and recover from it with minimal damages and downtime. You may choose to enroll in a trusted identity theft protection plan to help monitor for suspicious activity, including medical ID theft. These plans also include professional recovery and restoration services to rely on in the event you ever suspect you might have a medical ID theft problem.
Of course, what kind of company would we be without tooting our own horn a little? Our iDefend Advisor team is trained to assist with all types of identity theft, including medical identity theft. Learn more about our identity theft protection and recovery.
Keeping watch over your medical information, credit report, financial statements and insurance statements may not prevent all cases of medical identity theft, but staying vigilant and proactively monitoring for problems can help you notice fraud faster and take action quickly to correct it.
The post Medical Identity Theft: How to Protect Yourself first appeared on iDefend.
]]>