Fraud – iDefend https://www.idefendhome.com Ultimate Protection for Your Digital Life Mon, 03 Feb 2025 05:25:29 +0000 en-US hourly 1 https://wordpress.org/?v=6.8.1 https://www.idefendhome.com/wp-content/uploads/cropped-idefend-favicon-32x32.png Fraud – iDefend https://www.idefendhome.com 32 32 It’s Time for Black Friday Scams Again https://www.idefendhome.com/blog/scamwatch/blackfridayscams/ Wed, 27 Nov 2024 17:59:33 +0000 https://www.idefendhome.com/?p=9556 Black Friday is just around the corner, and alongside all those tasty deals comes a recipe for scams. Do you know how to spot the danger? Check out our top tips to keep you safe this holiday season.

The post It’s Time for Black Friday Scams Again first appeared on iDefend.

]]>
scamwatch_full_cover

What You Need to Know

Black Friday is just around the corner, and alongside all those tasty deals comes a recipe for scams. Crooks know that would-be deal-hunters will be scouring online storefronts for the lowest prices, and may not have their guard up. They’ll look to pounce on the unsuspecting shopper and serve them up a deal that’s too good to be true.

You may encounter pop-up ads, emails that appear to be legitimate, or even exclusive offers on social media, each one promising a deal that is guaranteed to blow your socks off (or your wallet anyway). Instead of clicking, make sure to do the following:

What You Should Do

  • Double-check the email address. Most scammers will try to imitate well-known sellers such as Amazon, Walmart, or Best Buy. However, these fake emails will be coming from slightly misspelled addresses (like arnazon, wal.mart, etc.).
  • If it sounds too good to be true, it probably is. Yes, even on Black Friday, the day infamous for some of the best deals of the year, this old adage still holds water. While some of these incredible deals may be legitimate, chances are much more likely that they’re not, so we recommend steering clear.
  • Pay attention to count-down timers. Time-sensitive tactics are often employed to make you want to act fast and buy now. Of course, sales like this are counting on you neglecting to think it through and just hoping you make a purchase on instinct. While not an immediate red-flag, timers are not very difficult to make, and are very easy for a scammer to implement.
  • Look for typos, misspelled words, and unusual sentence structure. This one is often a dead giveaway; any serious retailer will have had their Black Friday promos developed long in advance, and will have gone through rounds of proofreading, editing, and design work to flesh out the perfect product pitch. Almost no scammers take the time to go through their wording a second time, and many of them do not speak English natively. Mistakes like these should send you running for the “delete” button.

Think you are being scammed? Call our scam hotline or email us for help:
801-692-6200
[email protected]

The post It’s Time for Black Friday Scams Again first appeared on iDefend.

]]>
A.I. Can Copy Your Voice https://www.idefendhome.com/blog/onlineprivacy/aivoicecloningscams/ Thu, 02 May 2024 16:51:19 +0000 https://www.idefendhome.com/?p=3689 For several years now, AI has been employed to maliciously copy and replicate real people's voices in order to scam and trick loved ones and friends.

The post A.I. Can Copy Your Voice first appeared on iDefend.

]]>
ai-stockphoto
For several years now, AI has been employed to maliciously copy and replicate real people's voices in order to scam and trick loved ones and friends.

In this article

Scams aren’t going anywhere. The trouble is, they’ve morphed from the Nigerian Prince’s gold bouillon into a mysterious phone call from what sounds like your terrified daughter in the clutches of some vile kidnappers.

Voice cloning scams have already caused countless damage in financial losses, as well as other damaging experiences such as sextortion and blackmail. It’s sobering to think of how much more these will grow given a few years.

The unfortunate part is how easily these scammers can steal small clips of your voice and use AI software to extrapolate that into even full-blown conversations! With all the advancements in AI, gone are the days of simply recording you saying “Yes” and playing that behind a clip of someone asking for your permission to do something nefarious.

The good news is there are several things you can do to help prevent this from happening to you, as well as what things to be vigilant for if you encounter one of these scams in the wild.

How to Spot the Scam

By far the most common use of this scam is to solicit money from friends and family members. Because so much of our lives are accessible via a quick online search and on social media, it’s not difficult for a scammer to assemble a basic digital profile of a potential victim.

Because of this, you’ll want to be especially wary of any phone calls you receive that sound like someone you know asking you for unusual amounts of money.

Examine the phone number

This is one of the first things you should do when you get one of these calls, but take a look at the phone number. Chances are, you won’t have it saved in your phone, and it may even have the wrong area code. When in doubt hang up.

Verify with the real person

When this does happen, the best thing you can do is to immediately hang up and call that person directly yourself. Of course, if circumstances allow you could also pay them a quick visit in person. Simply ask them to confirm whether or not it was them that called you.

If they have no idea what you’re talking about, immediately block and report the number from which you received the phony call.

Pay attention to tells

If you are otherwise unable to contact your acquaintance and verify anything, pay attention to anything in their voice or speech patterns that sounds unusual. Sometimes, an AI clone will subtly give itself away.

How to Stop the Scam

The following are things you can do to safely limit your exposure to these scams. Remember that just because a scammer can copy someone’s voice doesn’t automatically earn them any money; someone has to fall for it first.

Don’t answer unknown calls

This one may be hard for some of us who grew up before smart phones and caller ID were widespread conveniences. Nowadays, sadly, it’s all too common for unknown numbers to be spam, robo, or scam calls.

The simplest way you can avoid most phone scams is to simply not answer calls from unknown numbers.

Get into the habit of following up with those you call

Put yourself on the other end of these calls for a minute. Let’s say you are dialing a new friend or acquaintance and they haven’t yet saved your number. If they, too, are following best practices, they should ignore your call and let it go to voice mail.

When this happens, you should leave them a quick message, but another thing you can do that’s often even faster is to send them a simple text message. Just let them know it was you who called and you’d like to speak with them when they’re available.

We know this step may seem innocuous or mundane, but it’s actually a great habit to get into since the vast majority of people will check a text message much sooner and faster than a voice mail.

Verify with the real person

Yes, this is the same suggestion as before, but it holds just as much weight being listed here as well. It’s always good to verify with the real person before sending them money.

Save numbers in your phone

For anyone you know and trust, save their number in your phone. This will spare you the trouble of having to play “phone tag” and will give you more peace of mind knowing that you are talking to the real person.

Be extra cautious

Even if you’ve saved someone’s number, always remember to be cautious and verify with them before sending money. Scammers steal billions of dollars every year, and this number will only increase as technology gets better, so please be cautious and safeguard your money.

The post A.I. Can Copy Your Voice first appeared on iDefend.

]]>
It’s the most wonderful time of the year: Tax Season! https://www.idefendhome.com/blog/identityandfinancial/taxseason2024/ Wed, 13 Mar 2024 20:38:43 +0000 https://www.idefendhome.com/?p=3556 Remember, the IRS will never text you, call you, or email you with requests or special instructions regarding your tax return. Scammers will.

The post It’s the most wonderful time of the year: Tax Season! first appeared on iDefend.

]]>
texes
Remember, the IRS will never text you, call you, or email you with requests or special instructions regarding your tax return. Scammers will.

In this article

That joyous occasion when the meticulous dance with receipts and deductions begins anew! Still, tax season is upon us and with that comes a wave of new scams to be mindful of.

Tax Scams are Evergreen

Each year, more and more people are getting their tax returns swiped out from under their noses. This scam is nothing new, and is certainly not going anywhere (barring some serious overhaul on the federal end of things).

Criminals want easy money

Cybercriminals everywhere are doing everything they can to take advantage of you while filing taxes to steal your return.

As long as they can get ahold of a few scraps of personal information—especially your Social Security Number—the criminals can easily submit tax returns on your behalf. If the IRS is ignorant enough to send them a check, then you can kiss your sweet tax return goodbye.

Protection is Paramount

Amidst the headlines of lawsuits against companies like Avast for breaches of trust, and the poignant discussions on the impact of social media on our youth’s mental well-being, one truth stands clear: protection is paramount.

So as you gather your W-2s and brave the tax landscape, remember to arm yourself not only with documents but with knowledge.

Don’t fall for it!

Remember, the IRS will never text you, call you, or email you with requests or special instructions regarding your tax return. Scammers will. The IRS only sends you written notices through snail mail. Safeguard your finances, protect your identity, and don’t fall victim to tax return ID theft!

The post It’s the most wonderful time of the year: Tax Season! first appeared on iDefend.

]]>
How to Safeguard Your Bank Accounts and Finances from Cyber Theft https://www.idefendhome.com/blog/identityandfinancial/safeguardyourbankaccounts/ Mon, 20 Jun 2022 22:58:36 +0000 https://www.idefendhome.com/?p=5679 Online banking and shopping are easy and convenient, but spending, managing, and investing your money online can put you at risk from hackers. Here's how to keep your bank accounts, investments, and cryptocurrency more secure against online threats.

The post How to Safeguard Your Bank Accounts and Finances from Cyber Theft first appeared on iDefend.

]]>
pexels-pixabay-164501
Online banking and shopping are easy and convenient, but spending, managing, and investing your money online can put you at risk from hackers. Here's how to keep your bank accounts, investments, and cryptocurrency more secure against online threats.

In this article

The FBI reports nearly $7 billion lost by US consumers to cybercrime in 2021. Of that whopping number, $1.5 billion was stolen from retirement plans, and $1.7 billion was stolen from cryptocurrency investments. In the first 3 months of 2022, $1.3 billion has already been stolen from crypto accounts!

Without taking proper steps to protect yourself, a cyber criminal can gain access to your accounts and steal your money by hijacking your computer or smart phone, or by simply stealing your username and password. Here are several tips for safeguarding your online financial accounts.

Don’t Fall for Phishing Attacks

One of the most common methods cyber criminals use to steal usernames and passwords for bank accounts is phishing attacks, where they’ll send an email — or an SMS text message — claiming to be from a bank or retailer.

Often, the attackers will design a fake version of the bank’s website. If the unlucky recipient of the fake message is tricked into entering their username and password, it is then in the hands of the attackers. Banks are not the only entities that can be impersonated in this way — it can also be retailers, government agencies or pretty much anyone else. The aim is to get access to your details by any means.

Pay attention to alerts from your bank

Banks and other services will often send alerts about suspicious activity on accounts. Users should be wary as cyber criminals also build their own versions of these alerts to trick people into providing information.

In the event it turns out you’ve fallen victim to a phishing attack, change your passwords immediately, and change the passwords on any accounts that might use that same password. If you’ve lost money in a cyber-attack, you should report it to your bank and to the police.

Keep Your Computer and Phone Clean

Beyond fake emails, texts and websites, hackers look to infect victim’s computers and mobile devices with viruses, spyware, and banking trojan malware which monitors your computer or device for activity with banks, investment, and crypto accounts. The malware captures and sends all the necessary information to hack your accounts back to the cyber criminals.

The key is to keep the bad guys off your computer and smart phone. Start with using a good antivirus and firewall. Keep your systems updated with all the latest security patches. Also watch for malicious apps hidden in popular app stores like Google Play.

Get regular security checkups

From time to time, it is a good idea to get a full security checkup and system cleanup on your computer and devices, This should be done by a trained and certified cybersecurity technician to check your security and ensure you don’t have any hidden viruses or malware that slipped past your antivirus software.

Tip: The iDefend protection plan from INVISUS includes these regular security checkups.

Use Good Online Cyber Hygiene

Practice good cyber hygiene across all your online accounts to keep them as secure as possible.

With your social media accounts, don’t click on suspicious links or posts. Limit the amount of personal information you share as that information could be exploited to help identify accounts you have, or to conduct personalized social-engineering attacks against you. Enable all security and privacy settings on your accounts.

Use strong passwords for your online accounts (10+ characters, capital letters, symbols). Don’t use the same password everywhere. Where available, turn on multi-factor authentication as an extra measure of protection when logging in. This will all make it much more difficult for attackers to breach accounts.

The post How to Safeguard Your Bank Accounts and Finances from Cyber Theft first appeared on iDefend.

]]>
Top 10 Bad Cybersecurity Habits to Break in 2022 https://www.idefendhome.com/blog/devicesecurity/10badhabitstobreakin2022/ Sat, 22 Jan 2022 17:22:57 +0000 https://www.idefendhome.com/?p=5841 We all have bad habits, and the new year is a great time to try (and usually fail) breaking them. Here are 10 simple things you can stop doing to have better cyber health.

The post Top 10 Bad Cybersecurity Habits to Break in 2022 first appeared on iDefend.

]]>
old_habits_new_habits-300x200-1
We all have bad habits, and the new year is a great time to try (and usually fail) breaking them. Here are 10 simple things you can stop doing to have better cyber health.

In this article

The new year is a great opportunity to evaluate many areas of your life. With cybercrime surging to all-time highs last year, improving your personal and home cyber protection has never been more important. Take better control of your online security and privacy this year by breaking a few bad cyber habits that may put you at risk.

2021 was a big year for cybercrime

Last year shaped up to be one of the worst years on record for cybercrime and losses from scams. In the first nine months of 2021 alone, 281.5 million people were impacted by data breaches and data leaks (ITRC). Hackers targeted people working from home, resulting in a 300% increase in data breaches with their employers (Verizon).

Over $80m scammed

During a nine month stretch last year, victims were scammed out of $80 million in cryptocurrency investment scams (FTC). And that’s only what’s been reported to the Federal Trade Commission. At the same time in 2021, the elderly in America lost over $1 billion in new cyber scams (IC3).

If by chance you’re not feeling the urgency to find new ways to protect your digital world, consider that more than a third of US identity theft victims last year said they didn’t have enough money to buy food or pay for utilities last year after suffering financial losses due to fraud (ITRC).

Focus on things you can control

While you can’t control things like data breaches with businesses, you can do your part. Here are 10 bad habits to break this year to better protect your privacy and your hard-earned money.

Stop doing these things now:

1. Stop ignoring computer problems

When your computer starts having problems – when applications don’t work, files go missing, or your computer and your internet becomes painfully slow, your computer might be infected with a virus, spyware, or other types of hacker tools. Do not ignore computer problems. Get a security check-up done right away from a trained professional when your computer starts acting up.

2. Stop using outdated software

Don’t ignore security updates to your computer and smart devices. More than 50 new vulnerabilities in operating systems, browsers, and other software on computers and devices are discovered every day. Cybercriminals look for and use these vulnerabilities as a top method of attack. The good news is that by switching on automatic updates and clicking to update when prompted, you can easily keep your computer and your smart devices up to date and protected.

3. Stop not thinking before clicking

Scam emails, known as phishing emails, are possibly the most prolific cyber threats you’ll face today. Attackers try to trick their victims into clicking on malicious links or opening a virus-infected attachment in an email that appears to come from a legitimate company or person. The number one rule is to think before you click. If you weren’t expecting the email, be suspicious.

4. Stop using bad passwords

Using the same password for multiple accounts and easy-to-guess security questions gives hackers a massive advantage. Create strong passwords for your accounts. Try using long phrases you’ll remember as your passwords, the longer the better. Don’t use the same password everywhere. Consider using a password manager to remember your passwords and phrases. And be sure to switch on two-factor authentication (2FA) on any account that offers it.

5. Stop not using security on all devices

Everyone knows you should have good anti-malware protection on your computers. Don’t forget to protect your smart phone and tablets too, especially if you have Android devices. Be sure to download and use highly recommended security apps from Google Play and the Apple App Store.

6. Stop using non-secure websites

Start paying attention to the security of websites you visit. HTTPS sites use encryption to protect your connection to the site. It authenticates the site as genuine and that it’s not a phishing website. Look for the padlock symbol and the “S” in HTTPS at the beginning of the website URL.

7. Stop sharing work and personal

With many of us spending more time working from home and maybe using personal devices for work too, the lines between personal and work on computers and devices have become blurred. Keep work and personal separate. Only use your personal email and passwords for consumer shopping, online banking, etc. Keep children and other family members off computers that you use for work.

8. Stop giving out personal information

Never give out personal information to someone who has called you. Scammers are getting good at convincing people to share their date of birth, account numbers, and other credentials over the phone. Legitimate businesses and government agencies will never ask you for private information by phone. Hang up, look up the company’s phone number yourself and then call them back.

9. Stop not backing up your files

Ransomware attacks continue to happen. Imagine if you were suddenly locked out of your computer with a message left by the hacker demanding $10,000 in bitcoin as a ransom payment to get your computer back. All the data on it, and potentially cloud storage, could be lost forever – including family photos and important work documents.

Be sure you have a cloud backup of all your files or that you regularly back up everything to a portable hard drive and store it separately in a secure location. Wiping your computer and reloading from a backup is often the only way to recover from a ransomware attack.

10. Stop not protecting your smart home

Nearly every home is outfitted with smart gadgets like voice assistants, smart TVs, and security cameras. But these smart devices are also becoming an attractive target for criminals. They can be used to infiltrate your home network, your computers and ultimately, your personal data.

Be sure to change the default passwords that come with the device – such as your home Wi-Fi router. Where possible, edit the privacy settings on devices (like a voice assistant) to not allow it to share your activity and information with the manufacturer (such as Google). Also, watch for software and firmware updates from the product manufacturer that fix potential security flaws as they are discovered. Think twice before purchasing new gadgets or toys that listen to things going on in your home, record video, or otherwise track you.

Here’s to a secure 2022!

In many ways, we are all looking forward to a better year than last year. We have enough to worry about without stressing over attacks on our digital lives. To help make sure it’s a year full of good things, start by improving your personal cybersecurity and privacy today.

 


Staying current with all the right protections can be a daunting task. Fortunately, expert help is available for helping you establish a complete cyber defense plan for you and your loved ones. iDefend is a comprehensive identity theft and cybersecurity program for individuals and families that includes unlimited access to U.S. based cybersecurity experts and advisors to help you protect your digital life.

The post Top 10 Bad Cybersecurity Habits to Break in 2022 first appeared on iDefend.

]]>
Don’t Take the Free Crypto Money https://www.idefendhome.com/blog/identityandfinancial/donttakefreecrypto/ Mon, 15 Nov 2021 17:20:36 +0000 https://www.idefendhome.com/?p=5840 Free crypto? Sounds nice...until you realize the price is handing over your personal data and privacy.

The post Don’t Take the Free Crypto Money first appeared on iDefend.

]]>
worldcoinorb
Free crypto? Sounds nice...until you realize the price is handing over your personal data and privacy.

In this article

Beware of the Orb and its all-seeing eye! Worldcoin and its Orb recently emerged onto the cryptocurrency scene and are backed by some major players in the crypto investment market. The company is trying hard to position itself as a global, socially aware organization developing a common good for everyone on the planet. It’s developing a “collectively owned digital currency that will be distributed to as many people as possible.”

Sounds nice, right?

How the orb works

Before WorldCoin and their offer of free crypto money reaches you, there are huge security and privacy risks you should be aware of. Here’s what you need to know: They’ve created a neat-looking, shiny sphere—called an Orb—with a camera in it. You stand in front of the Orb and allow it to scan your retina and your face. The Orb produces a unique identifier, a code, based on your retina. Once you have your personal identifier, you can use it to claim some “free” WorldCoin (WDC) cryptocurrency.

Any red flags going off for you yet?

In the world of high tech (Google, Facebook, Twitter, etc), if it’s free, then YOU are the product. They are capturing data about you and selling it for profit. It couldn’t be clearer in this case.

WorldCoin wants to quickly ramp up and capture their first billion retinas and facial scans using the Orb. They are hiring “Orb Operators,” where you can “earn your share of Worldcoin by giving it away” to people in your community. How nice! And the coolest part is that you get to walk around with the Orb in your hands… Yikes.

That’s a lot of orbs!

The company says they’ve lined up manufacturing for more than 50,000 Orbs a year. Already more than 130,000 people have given up detailed mapping of their retinas and faces. The privacy implications are frightening.

What’s the risk?

So, what’s the play here? It’s pretty simple actually. They are literally printing a bunch of cryptocurrencies out of thin air and giving it away in exchange for scanning our retinas and our faces. In the process, they will collect the world’s largest database of retina and facial recognition data, along with your other personal information.

With that data, WorldCoin will be able to create one of the most powerful artificial intelligence (AI) facial recognition system on the planet. Combined with your crypto investments, they’ll be loaded with data worth billions. The company claims it will only keep our biometric data long enough to train its AI system and promises to keep all your information private.

We’ve heard that one before.

Don’t take the free money

So, are you in? Would you take the “free” money?

Would you give up your identity and your biometric data to claim some free crypto?

Please don’t!

Technology keeps advancing

Technology is moving at lightning speed and will only evolve faster with the emergence of blockchain, AI and 5G. More and more companies and technologies will emerge that track our location, our purchasing habits, our investments, our bank accounts, our social lives, our entertainment and more. Worldcoin’s biometric data gathering Orb is just another example of what you should watch out for.

Always protect your data and privacy

If you are looking to invest and speculate on cryptocurrencies, the number one rule you need to remember is to protect your data and your privacy. Do not fall for clever campaigns to give away free money or free cryptos in exchange for your personal information.

Avoid the Orb. Don’t give up your identity. Keep your retina and your face to yourself.

The post Don’t Take the Free Crypto Money first appeared on iDefend.

]]>
Top 10 Ways to Prevent ID Theft https://www.idefendhome.com/blog/identityandfinancial/10waystopreventidtheft/ Mon, 01 Feb 2021 20:09:06 +0000 https://www.idefendhome.com/?p=5142 If you aren’t concerned about ID theft and protecting your personal privacy, maybe you should be.

The post Top 10 Ways to Prevent ID Theft first appeared on iDefend.

]]>
014
If you aren’t concerned about ID theft and protecting your personal privacy, maybe you should be.

In this article

The number of identity theft cases reported to the Federal Trade Commission (FTC) increased 100% in 2020, double the number from 2019. Statistically, you now have a 1 in 4 chance of becoming a victim of identity fraud and cybercrime each year.

The good news is, you can take control of your privacy and help prevent identity fraud with these simple protection tips.

Our Top 10 Tips to Prevent ID Theft

1. Protect your social security number.

Don’t carry your Social Security card in your wallet. Whenever you are asked to provide your Social Security number (or for your child), ask why a Social Security number is necessary and how the information will be protected once it’s been provided.

2. Monitor your credit.

To make sure nobody has opened up new accounts under your name, you should check each of your credit reports at least yearly. You can get your free Experian, Transunion and Equifax credit reports at AnnualCreditReport.com. Better yet, subscribe to a 24/7 credit monitoring service like iDefend so you can be notified in real-time of any changes to your credit profile.

If you notice fraudulent credit activity, dispute it with the lender and the credit bureau. Also, consider requesting a fraud alert with the bureaus or freezing your credit reports if you’ve been victimized.

3. Don’t take the phishing bait.

Fraudsters “phish” and catch victims by pretending to be a trustworthy bank, store or government agency. Most commonly, they do this over the phone, in e-mails, but can also use regular mail. Do not respond to any request to verify your account number or password. Legitimate companies do not request this kind of information by email or phone. Don’t be afraid to ask questions, and never give out your personal information unless you made the contact.

4. Safeguard your personal information online.

Like most people, you probably share personal information like name, birthday, job, school and hometown on your social media profiles. Unfortunately, if a cybercriminal wanted to collect information about you, social media is going to be their first stop. Try not to share any personal information, especially email addresses, birth dates, children’s full names and other data that can be used for identity theft.

Check your social media account privacy settings and make sure you are not publicly sharing too much information. You can lock down your profiles and safeguard your accounts from things like account takeovers.

Children under the age of 18 are often the target of child identity theft because their credit score is completely unmarked. Posting information about your children on social media, even if it’s just their full names and birthdays, is just as dangerous as posting your own.

5. Secure your computer and smartphone.

Cybercriminals look for easy prey – especially personal computers and mobile devices that are not well-secured. At a minimum, protect your computer and smartphone with good antivirus and spyware protection. Be sure you update this security software regularly. There are excellent free antivirus programs that will do a great job for you. You may want to use an antivirus app for your smartphone also, especially if you have an Android device.

Beware of fake apps and downloads. Download only from sites you know and trust. For your smartphone, stick with the Apple App Store and Google Play.

To protect your privacy while web browsing and shopping, consider doing your web surfing in incognito mode or with other tools to prevent tracking. Also consider using a web browser built for privacy protection such as DuckDuckGo.

Finally, update your phone or computer software when prompted. It’s an annoying fact of life, but hackers exploit security flaws in phone and computer operating systems in order to break in and steal personal and financial information.

6. Use strong passwords.

Scammers have gotten good at guessing passwords using publicly available information and social media profiles such as pets, children, etc. To help minimize the damage, create a unique, strong password for every online account.

The FBI and National Institute of Standards and Technology recommend creating passwords with at least 15 characters because these are more difficult for a computer program or hacker to crack. Mix it up with capital letters, numbers, and symbols. Because it’s almost impossible to remember all your passwords, you could use a password manager such as LastPass to securely store all of them.

If a website or app offers it, set up two-factor authentication. This requires you to provide a second piece of information to verify your identity when logging in such as a code sent to your mobile phone or email. If your password is ever stolen, a criminal can’t get into your account without your smartphone, voiceprint, or fingerprint.

As for account security questions, the FTC advises selecting questions that only you can answer, instead of information that could be available online like your ZIP code, birthplace, or mother’s maiden name. Also, don’t give generic responses, such as “cookies” as your favorite dessert.

7. Click with caution.

When shopping online, check the security of a website before entering your credit card number or other personal information. Do not sign up or order from sites that do not have a secure checkout process (“https” in the address bar and a padlock symbol at the bottom of the browser window.)

8. Review your accounts regularly.

Check your monthly bank and credit card statements for fraudulent activity. A thief with your card or bank account number often makes small charges to see if they can get away with it. These transactions easily slip through the cracks without financial institutions noticing them.

Also be sure to check medical bills or statement of benefits. If someone is using your healthcare information to commit medical identity theft and run up bills in your name, this is the only way you’ll be able to find out and prevent the damage from getting worse.

9. Opt-out of pre-screened credit offers.

Identity thieves can intercept pre-approved credit offers whether mailed or emailed to open new accounts in your name. Shred these offers when you receive them rather than throwing them in the trash.

The safest way to avoid identity theft exposure from pre-screened credit card offers is to opt out of receiving them through optoutprescreen.com, the official consumer credit reporting industry website for opting out.

10. Don’t fall for phone scams.

Con artists, posing as a legitimate business, government agency, law enforcement or charity, trick unsuspecting people into giving up personal information and hard-earned money with scam phone calls. Never give personal information over the phone unless absolutely necessary, and don’t ever give it out unless you initiated the phone call.

If someone contacts you and says they are calling from someplace like your bank, credit card company, Microsoft, or the IRS, ask for a number to call them back—and then make sure it’s really an official number.

Then look them up online and call the organization’s customer service number before you give any information. Also, ask how the information will be shared with others and request that the information be kept confidential.

Getting Expert Help

If you are unsure of how to best protect against ID theft or want the help of security experts to stay safe, consider subscribing to our iDefend service.

You’ll be protected with the latest in identity protection, cybersecurity and online privacy tools together with the help of our U.S. based cyber support team. We are dedicated not just to protecting you against identity theft but safeguarding you and your family against all of today’s cyber threats.

The post Top 10 Ways to Prevent ID Theft first appeared on iDefend.

]]>
Tax Season or Open Season? https://www.idefendhome.com/blog/identityandfinancial/taxoropenseason/ Mon, 01 Feb 2021 19:01:36 +0000 https://www.idefendhome.com/?p=5120 Millions of Americans will likely not get their tax refunds this year — not because they don’t deserve them, but because identity thieves will have already filed tax returns under their names.

The post Tax Season or Open Season? first appeared on iDefend.

]]>
article_tax_1040-scaled
Millions of Americans will likely not get their tax refunds this year — not because they don’t deserve them, but because identity thieves will have already filed tax returns under their names.

In this article

Did you know all a scammer needs to steal your identity and your tax refund is your name and your Social Security Number? Did you know you could spend 5-8 months fighting the IRS over it and could be audited in the
process?

Yikes!

Our Tips For Tax Safety

Here are some tips to keep your tax refund in your bank account this year, hassle free.

  1. File your tax returns early. Tax refund fraud only works if the thief files a bogus tax return in your name before you submit your actual tax returns. By filing early, you can ensure the IRS sees your return before a thief sends the fake one.
  2. Look for IRS notices. Watch for a letter from the IRS stating that more than one tax return was filed with your SSN. Also watch for an IRS notice indicating you received wages from an employer unknown to you. Either of these notices could be a sign that a thief has attempted to file a fraudulent return in your name. (Remember, the IRS only sends notices by mail. If you receive a random email notice or phone call from the IRS, it’s likely a scam. Don’t click on links or open attachments in these types of scam emails!)
  3. Lock up your Social Security card. Tax-return theft always involves a stolen SSN. Keep it locked up in a safe place!
  4. Reduce credit card solicitations. Even if you aren’t interested in that credit card solicitation, a thief might be. He could plan to get a credit card in your name as a first step toward obtaining your SSN and date of birth. Be sure to shred unwanted credit solicitations and get your name off the marketing lists for pre-approved credit offers. (Instructions for getting off junk mail marketing lists are found in your online iDefend account.)
  5. Keep on top of data breach notices. Watch for letters or emails from companies and organizations notifying you that your personal information may have been compromised in a data breach incident. If you receive a notification like this, be sure to closely watch for identity theft or credit fraud alerts and other suspicious identity theft activity. Not every data breach involving your personal information will result in identity theft, but it’s vital that you stay vigilant.
  6. Shred bank and tax documents you no longer need. Thinking like a thief helps you reduce your risk of identity theft. Consider your tax documents, receipts and bank statements as potential trapdoors that allow entrance into your personal life. Lock up what you need to keep, and shred the rest.

How to Get Fraud Protection

If at any time you believe you may be a victim of federal or state tax return fraud, get help immediately. If you need a good ID theft protection service that covers tax return fraud, check out iDefend that include monitoring and expert support for this type of fraud and much more.

The post Tax Season or Open Season? first appeared on iDefend.

]]>
Medical Identity Theft: How to Protect Yourself https://www.idefendhome.com/blog/identityandfinancial/medicalidentitytheft/ Tue, 15 Oct 2019 19:02:24 +0000 https://www.idefendhome.com/?p=3609 Your medical information is a goldmine for cyber criminals and fraudsters. Unfortunately, medical identity theft affects millions of Americans every year, and it can wreak havoc on your finances and even your health.

The post Medical Identity Theft: How to Protect Yourself first appeared on iDefend.

]]>
pexels-rdne-stock-project-6129044
Your medical information is a goldmine for cyber criminals and fraudsters. Unfortunately, medical identity theft affects millions of Americans every year, and it can wreak havoc on your finances and even your health.

In this article

Your personal medical records may not be as safe as you might think. A quick internet search for “medical data breaches” will pull up dozens of sobering results. It seems like every year more and more firms succumb to their own folly as their inferior cybersecurity is inevitably breached by yet another hot-shot hacker.

Then, of course, the pilfered data is happily bought and sold on the dark web. You might wake up one day to a large medical bill for drugs you never purchased. Or you could rush your local clinic for a life-saving blood transfusion only to discover that your blood type has mysteriously changed to “O negative”.

Oh, that’s not your blood type? Well, actually it is… at least according to what it now says on your medical file, anyway.

How’s that sound for a Friday morning?

What is Medical ID Theft?

Medical identity theft happens when someone steals your personal information, electronic health records or insurance information and uses it to get medical treatment, equipment and prescription drugs in your name. This could leave you footing the medical bills and even mixing their health records with yours. In fact, according to a recent study from the Ponemon Institute, medical ID theft victims spend nearly $13,500 on average to deal with the problem, including paying off fraudulent medical bills.

With continual cyber-attacks and data breaches among both healthcare providers and health insurers, medical identity theft will most certainly claim millions more victims. Here’s what you need to know to protect yourself and your loved ones.

The Real Dangers of Medical ID Theft

Victims of medical identity theft have similar outcomes to other types of identity theft, such as ruined credit, but can suffer even more devastating consequences. Victims can have medical insurance claims denied, lose access to their insurance, and be forced to pay to restore their insurance coverage. If thieves max out benefit thresholds on an insurance policy, policyholders could find themselves unable to get timely coverage for urgent treatments.

Increased insurance prices

An affected individual might see the cost of their insurance increase or may be denied coverage altogether if the fraudulent treatment included care for things like diabetes, osteoarthritis, or cancer. They may be unable to access their own medical records. ID theft victims could end up with a flag in the system triggering regulators or even law enforcement to track them down over charges they’d illegally purchased prescription drugs.

Incorrect data records

When medical identity theft results in erroneous medical records, the consequences can even be life threatening. Drug allergy warnings or other special medical conditions may be deleted. Previous medical procedures can be erased. Blood types can be changed in the patient’s medical records, endangering the life of the ID theft victim should they need a blood transfusion. These potential health risks alone are reason enough for consumers to be vigilant and get protected.

A foot in the door for criminals

Of course, the theft of medical records also gives thieves access to your other personal and financial information including Social Security number, date of birth, and bank or credit accounts. Victims of medical identity fraud often find themselves also fighting other types of identity theft including credit fraud, Social Security fraud, tax return fraud and more.

Look Out for Red Flags

There’s a lot you can do to keep an eye out for signs of medical identity theft. Here are a few red flags you should watch for:

  • A bill for medical services or equipment you don’t recognize
  • Double billing charges on a medical bill
  • Mistakes on your medical history
  • A call from a collection agency about a medical bill you don’t owe
  • Denial of insurance due to a medical condition you don’t have
  • A letter from your health insurer notifying that you have reached your benefit limit

Friendly Fraud

While many thieves obtain the victim’s medical information in the typical pattern of hacking, phishing, stealing mail or copying your records at a clinic or other facility, about half of all medical identity theft happens among family members.

Ponemon study

The Ponemon study revealed that 24% of medical identity theft victims said a family member took their medical credentials and used them without permission. Another 23% said they willingly shared their health insurance information to help a family member or friend obtain medical care.

In the study, most of the people who shared medical info did not consider it a crime, but it’s still considered fraud against medical insurers and health care providers. Sharing Medicare or Medicaid information with someone else to help them obtain coverage is also a state and federal crime.

5 Tips for Protecting Yourself

While it can be difficult to protect your information from being exposed in a data breach, there are ways to lower your risk.

  1. Ask about security practices. Inquire how your doctor’s office, hospital and insurance company protect your personal information. They are required to safeguard your data – and you have the right encourage privacy by asking how they protect you.
  2. Secure your copies. Store any paper and electronic copies of your medical and health insurance records in a safe place. Shred or burn health forms, insurance and prescription papers.
  3. Be suspicious. Don’t fall for online or phone scams for things like “free” medical quotes, products or services. Don’t share personal or medical information online or over the phone unless you initiate the conversation.
  4. Review your medical records. Carefully read through your insurance statements and medical records for anything you don’t recognize.
  5. Monitor for ID theft. Many medical ID theft cases are first detected with identity theft and credit monitoring where you’ll be notified of collection notices for unpaid medical bills and other signs of ID theft.

Get Expert Help

If you know that your medical identity has been stolen, you can start taking steps on your own to work through it. Those steps can include requesting copies of your medical records, which might require paying a fee, and asking medical providers to correct false information. The Federal Trade Commission offers a helpful checklist of steps to take when working through medical identity theft on your own.

Protection plans exist

However, expert help is available to monitor for medical identity theft – and recover from it with minimal damages and downtime. You may choose to enroll in a trusted identity theft protection plan to help monitor for suspicious activity, including medical ID theft. These plans also include professional recovery and restoration services to rely on in the event you ever suspect you might have a medical ID theft problem.

How iDefend can have your back

Of course, what kind of company would we be without tooting our own horn a little? Our iDefend Advisor team is trained to assist with all types of identity theft, including medical identity theft. Learn more about our identity theft protection and recovery.

Keeping watch over your medical information, credit report, financial statements and insurance statements may not prevent all cases of medical identity theft, but staying vigilant and proactively monitoring for problems can help you notice fraud faster and take action quickly to correct it.

The post Medical Identity Theft: How to Protect Yourself first appeared on iDefend.

]]>