Scams – iDefend https://www.idefendhome.com Ultimate Protection for Your Digital Life Thu, 06 Feb 2025 17:43:29 +0000 en-US hourly 1 https://wordpress.org/?v=6.8.1 https://www.idefendhome.com/wp-content/uploads/cropped-idefend-favicon-32x32.png Scams – iDefend https://www.idefendhome.com 32 32 Scams Created by AI are Fooling Over 50% of Their Targets https://www.idefendhome.com/blog/onlineprivacy/aiscamsfooling50percent/ Mon, 13 Jan 2025 18:26:50 +0000 https://www.idefendhome.com/?p=10026 Unsurprisingly, AI is being leveraged by cybercriminals to create cunning, convincing, and highly effective scams. They’re so effective that they’re fooling half of their intended victims. Here’s what to watch out for and how you can try to avoid falling for these sophisticated scams.

The post Scams Created by AI are Fooling Over 50% of Their Targets first appeared on iDefend.

]]>
AI_computer
Unsurprisingly, AI is being leveraged by cybercriminals to create cunning, convincing, and highly effective scams. They’re so effective that they’re fooling half of their intended victims. Here’s what to watch out for and how you can try to avoid falling for these sophisticated scams.

In this article

Back when AI models were becoming an everyday talking point, many experts and those in the cybersecurity industry predicted how scammers and criminals would begin commandeering these tools for their personal gain.

Unsurprisingly, this has proved increasingly true. This last year alone, studies have shown that over half of the criminals’ targets are falling for their AI-powered scams.

How Effective are These Scams?

According to a study conducted by Avant Research Group, when testing against their control group using traditional phishing emails, participants fell for nearly 54% of scams vs only 12%. This is an increase from 1 in 10 people to 5 in 10 people. 

That’s alarming.

Seeing as we’re still in the infancy of many of these AI tools and technologies, this means we’re likely to see even more sophisticated scams showing up over the next couple years. Who knows how high that number might get?

How Does This Affect You?

Based on the study’s findings, they ruled that the findings were useful (meaning we can rely on the numbers) in 88% of cases, and only had inaccurate results for 4% of the participants. This means that nearly 9 out of 10 times a potential victim will be seeing a scam that is so well developed that it has a 50% chance of convincing them.

These numbers should scare you, or at least draw your attention. How are you prepared to navigate a digital landscape where dangers like these exist, and are only going to keep getting better? How confident do you feel about landing in the 46% who didn’t fall for these scams vs the 54% who did?

Is There a Bright Side to All This?

Despite all this gloom and doom, there is some good news in the midst of this. AI models are also being trained by ethical hackers and cybersecurity professionals to recognize scams and flag or block them before they can become an issue.

Because of this, as long as you’re following good practices, common sense, and the usual tips when it comes to protecting yourself from scams, you’ll be alright in most cases. 

Make sure you’re doing the following

  1. Use some virus protection and active scanning, especially in your email accounts.
  2. Don’t click on emails you weren’t expecting.
  3. Don’t open attachments you don’t recognize.
  4. Never click on links in unsolicited emails.
  5. Always verify with the actual person instead of trusting them over email.
  6. If it sounds too good to be true, it probably is.

Falling for Scams? iDefend Can Help!

Fortunately, iDefend members enjoy access to an expert support team who are always happy to help you look at and review suspicious emails, help you adjust your antivirus and detection settings, and even recover from scams or cleaning up your devices if they get infected.

Learn more and get protected today! Try iDefend risk free and save 30%.

The post Scams Created by AI are Fooling Over 50% of Their Targets first appeared on iDefend.

]]>
Big Tech Companies Will Never Call You Directly https://www.idefendhome.com/blog/identityandfinancial/bigtechwillnevercallyou/ Wed, 08 May 2024 22:45:01 +0000 https://www.idefendhome.com/?p=5660 If the guy on the phone tells you he's from Microsoft, he's lying.

The post Big Tech Companies Will Never Call You Directly first appeared on iDefend.

]]>
pexels-moose-photos-170195-1587014
If the guy on the phone tells you he's from Microsoft, he's lying.

In this article

When your phone number is exposed online, you can expect multiple sources to begin calling you in an attempt to compromise personal information. With that comes the danger of random people impersonating companies and services in order to try trick you into giving out personal information.

One of the Most Common Phone Scams

Recently there has been an uptick in phone calls in regards to people calling out and impersonating well-known tech companies and services to gain your trust and allow them to connect onto your computer in order to “fix” the issues. This has become a much higher threat recently, including people claiming they are Apple or Microsoft, even providing realistic-looking identification numbers and saying that their techs have noticed suspicious activity on your computer.

But they say it will be so easy!

At that point, they will explain how your computer has been hacked, but how they can resolve the issue with a swift cleaning. Once you allow them into your computer, they can show you a number of fake sources to appear that there are much more serious problems while also stealing your personal information that is stored on your computer. These threats can appear legitimate and believable, but never allow them onto your computer.

Erroneous credit card charges

Another way they will try to compromise your information would be to inform you that there was a high cost charge on your card, and asking if you were the one who made the purchase. You’ll say no, and they will inform you of the fraud and ask to connect to your computer to show you where it happened and how to resolve it. The tricky thing here is, is that they attempt to use scare tactics to cause you to jump to action. The charge is fake, never existed, but because they said it was a $350 charge, and that they can help you fix it, it’s easy to allow them in.

What You Can Do

The best action to take at this point is to hang up and verify the information on your own. If it is a major corporation, find their direct number and reach out. If it was a legitimate problem, they will have a record of the outgoing call and assist you from there. If not, then you dodged a bigger issue here.

Otherwise, consider taking advantage of iDefend’s unlimited tech support service which can clean and discover any threats, if any, and ensure everything is in order.

Remember: big companies will never call you directly

It’s also worth noting that companies such as Microsoft, Apple, etc. will never call you directly about things like this. Think about it: they have millions (if not billions) of customers. There is no way they could have active monitoring on every single computer and call that person when they “discover” a threat. It’s just not realistic or feasible for these companies to do this, so don’t fall for it.

Compromised phone numbers are common

Also important to remember here is that having a compromised phone number is not itself a serious threat, and is actually pretty common. The risk comes, however, from the information you give out over the phone as this can quickly grow into a real problem. They can be asking for something as simple as confirming credit card information for a billing issue before your package ships or as serious as a person impersonating your bank asking you to give out your social security number. Always be wary of people asking for this information over the phone.

Monitor your information

Having your information monitored through an identity theft monitoring system can better inform you when your number is compromised. Remember, you are the greatest protector of your information. The spam calls will cease over time. Your private information is invaluable and nearly impossible to recover once you’ve given it out. Still, with the proper protection and safety measures set up, you can find that peace of mind.

The post Big Tech Companies Will Never Call You Directly first appeared on iDefend.

]]>
A.I. Can Copy Your Voice https://www.idefendhome.com/blog/onlineprivacy/aivoicecloningscams/ Thu, 02 May 2024 16:51:19 +0000 https://www.idefendhome.com/?p=3689 For several years now, AI has been employed to maliciously copy and replicate real people's voices in order to scam and trick loved ones and friends.

The post A.I. Can Copy Your Voice first appeared on iDefend.

]]>
ai-stockphoto
For several years now, AI has been employed to maliciously copy and replicate real people's voices in order to scam and trick loved ones and friends.

In this article

Scams aren’t going anywhere. The trouble is, they’ve morphed from the Nigerian Prince’s gold bouillon into a mysterious phone call from what sounds like your terrified daughter in the clutches of some vile kidnappers.

Voice cloning scams have already caused countless damage in financial losses, as well as other damaging experiences such as sextortion and blackmail. It’s sobering to think of how much more these will grow given a few years.

The unfortunate part is how easily these scammers can steal small clips of your voice and use AI software to extrapolate that into even full-blown conversations! With all the advancements in AI, gone are the days of simply recording you saying “Yes” and playing that behind a clip of someone asking for your permission to do something nefarious.

The good news is there are several things you can do to help prevent this from happening to you, as well as what things to be vigilant for if you encounter one of these scams in the wild.

How to Spot the Scam

By far the most common use of this scam is to solicit money from friends and family members. Because so much of our lives are accessible via a quick online search and on social media, it’s not difficult for a scammer to assemble a basic digital profile of a potential victim.

Because of this, you’ll want to be especially wary of any phone calls you receive that sound like someone you know asking you for unusual amounts of money.

Examine the phone number

This is one of the first things you should do when you get one of these calls, but take a look at the phone number. Chances are, you won’t have it saved in your phone, and it may even have the wrong area code. When in doubt hang up.

Verify with the real person

When this does happen, the best thing you can do is to immediately hang up and call that person directly yourself. Of course, if circumstances allow you could also pay them a quick visit in person. Simply ask them to confirm whether or not it was them that called you.

If they have no idea what you’re talking about, immediately block and report the number from which you received the phony call.

Pay attention to tells

If you are otherwise unable to contact your acquaintance and verify anything, pay attention to anything in their voice or speech patterns that sounds unusual. Sometimes, an AI clone will subtly give itself away.

How to Stop the Scam

The following are things you can do to safely limit your exposure to these scams. Remember that just because a scammer can copy someone’s voice doesn’t automatically earn them any money; someone has to fall for it first.

Don’t answer unknown calls

This one may be hard for some of us who grew up before smart phones and caller ID were widespread conveniences. Nowadays, sadly, it’s all too common for unknown numbers to be spam, robo, or scam calls.

The simplest way you can avoid most phone scams is to simply not answer calls from unknown numbers.

Get into the habit of following up with those you call

Put yourself on the other end of these calls for a minute. Let’s say you are dialing a new friend or acquaintance and they haven’t yet saved your number. If they, too, are following best practices, they should ignore your call and let it go to voice mail.

When this happens, you should leave them a quick message, but another thing you can do that’s often even faster is to send them a simple text message. Just let them know it was you who called and you’d like to speak with them when they’re available.

We know this step may seem innocuous or mundane, but it’s actually a great habit to get into since the vast majority of people will check a text message much sooner and faster than a voice mail.

Verify with the real person

Yes, this is the same suggestion as before, but it holds just as much weight being listed here as well. It’s always good to verify with the real person before sending them money.

Save numbers in your phone

For anyone you know and trust, save their number in your phone. This will spare you the trouble of having to play “phone tag” and will give you more peace of mind knowing that you are talking to the real person.

Be extra cautious

Even if you’ve saved someone’s number, always remember to be cautious and verify with them before sending money. Scammers steal billions of dollars every year, and this number will only increase as technology gets better, so please be cautious and safeguard your money.

The post A.I. Can Copy Your Voice first appeared on iDefend.

]]>
It’s the most wonderful time of the year: Tax Season! https://www.idefendhome.com/blog/identityandfinancial/taxseason2024/ Wed, 13 Mar 2024 20:38:43 +0000 https://www.idefendhome.com/?p=3556 Remember, the IRS will never text you, call you, or email you with requests or special instructions regarding your tax return. Scammers will.

The post It’s the most wonderful time of the year: Tax Season! first appeared on iDefend.

]]>
texes
Remember, the IRS will never text you, call you, or email you with requests or special instructions regarding your tax return. Scammers will.

In this article

That joyous occasion when the meticulous dance with receipts and deductions begins anew! Still, tax season is upon us and with that comes a wave of new scams to be mindful of.

Tax Scams are Evergreen

Each year, more and more people are getting their tax returns swiped out from under their noses. This scam is nothing new, and is certainly not going anywhere (barring some serious overhaul on the federal end of things).

Criminals want easy money

Cybercriminals everywhere are doing everything they can to take advantage of you while filing taxes to steal your return.

As long as they can get ahold of a few scraps of personal information—especially your Social Security Number—the criminals can easily submit tax returns on your behalf. If the IRS is ignorant enough to send them a check, then you can kiss your sweet tax return goodbye.

Protection is Paramount

Amidst the headlines of lawsuits against companies like Avast for breaches of trust, and the poignant discussions on the impact of social media on our youth’s mental well-being, one truth stands clear: protection is paramount.

So as you gather your W-2s and brave the tax landscape, remember to arm yourself not only with documents but with knowledge.

Don’t fall for it!

Remember, the IRS will never text you, call you, or email you with requests or special instructions regarding your tax return. Scammers will. The IRS only sends you written notices through snail mail. Safeguard your finances, protect your identity, and don’t fall victim to tax return ID theft!

The post It’s the most wonderful time of the year: Tax Season! first appeared on iDefend.

]]>
Top 10 Bad Cybersecurity Habits to Break in 2022 https://www.idefendhome.com/blog/devicesecurity/10badhabitstobreakin2022/ Sat, 22 Jan 2022 17:22:57 +0000 https://www.idefendhome.com/?p=5841 We all have bad habits, and the new year is a great time to try (and usually fail) breaking them. Here are 10 simple things you can stop doing to have better cyber health.

The post Top 10 Bad Cybersecurity Habits to Break in 2022 first appeared on iDefend.

]]>
old_habits_new_habits-300x200-1
We all have bad habits, and the new year is a great time to try (and usually fail) breaking them. Here are 10 simple things you can stop doing to have better cyber health.

In this article

The new year is a great opportunity to evaluate many areas of your life. With cybercrime surging to all-time highs last year, improving your personal and home cyber protection has never been more important. Take better control of your online security and privacy this year by breaking a few bad cyber habits that may put you at risk.

2021 was a big year for cybercrime

Last year shaped up to be one of the worst years on record for cybercrime and losses from scams. In the first nine months of 2021 alone, 281.5 million people were impacted by data breaches and data leaks (ITRC). Hackers targeted people working from home, resulting in a 300% increase in data breaches with their employers (Verizon).

Over $80m scammed

During a nine month stretch last year, victims were scammed out of $80 million in cryptocurrency investment scams (FTC). And that’s only what’s been reported to the Federal Trade Commission. At the same time in 2021, the elderly in America lost over $1 billion in new cyber scams (IC3).

If by chance you’re not feeling the urgency to find new ways to protect your digital world, consider that more than a third of US identity theft victims last year said they didn’t have enough money to buy food or pay for utilities last year after suffering financial losses due to fraud (ITRC).

Focus on things you can control

While you can’t control things like data breaches with businesses, you can do your part. Here are 10 bad habits to break this year to better protect your privacy and your hard-earned money.

Stop doing these things now:

1. Stop ignoring computer problems

When your computer starts having problems – when applications don’t work, files go missing, or your computer and your internet becomes painfully slow, your computer might be infected with a virus, spyware, or other types of hacker tools. Do not ignore computer problems. Get a security check-up done right away from a trained professional when your computer starts acting up.

2. Stop using outdated software

Don’t ignore security updates to your computer and smart devices. More than 50 new vulnerabilities in operating systems, browsers, and other software on computers and devices are discovered every day. Cybercriminals look for and use these vulnerabilities as a top method of attack. The good news is that by switching on automatic updates and clicking to update when prompted, you can easily keep your computer and your smart devices up to date and protected.

3. Stop not thinking before clicking

Scam emails, known as phishing emails, are possibly the most prolific cyber threats you’ll face today. Attackers try to trick their victims into clicking on malicious links or opening a virus-infected attachment in an email that appears to come from a legitimate company or person. The number one rule is to think before you click. If you weren’t expecting the email, be suspicious.

4. Stop using bad passwords

Using the same password for multiple accounts and easy-to-guess security questions gives hackers a massive advantage. Create strong passwords for your accounts. Try using long phrases you’ll remember as your passwords, the longer the better. Don’t use the same password everywhere. Consider using a password manager to remember your passwords and phrases. And be sure to switch on two-factor authentication (2FA) on any account that offers it.

5. Stop not using security on all devices

Everyone knows you should have good anti-malware protection on your computers. Don’t forget to protect your smart phone and tablets too, especially if you have Android devices. Be sure to download and use highly recommended security apps from Google Play and the Apple App Store.

6. Stop using non-secure websites

Start paying attention to the security of websites you visit. HTTPS sites use encryption to protect your connection to the site. It authenticates the site as genuine and that it’s not a phishing website. Look for the padlock symbol and the “S” in HTTPS at the beginning of the website URL.

7. Stop sharing work and personal

With many of us spending more time working from home and maybe using personal devices for work too, the lines between personal and work on computers and devices have become blurred. Keep work and personal separate. Only use your personal email and passwords for consumer shopping, online banking, etc. Keep children and other family members off computers that you use for work.

8. Stop giving out personal information

Never give out personal information to someone who has called you. Scammers are getting good at convincing people to share their date of birth, account numbers, and other credentials over the phone. Legitimate businesses and government agencies will never ask you for private information by phone. Hang up, look up the company’s phone number yourself and then call them back.

9. Stop not backing up your files

Ransomware attacks continue to happen. Imagine if you were suddenly locked out of your computer with a message left by the hacker demanding $10,000 in bitcoin as a ransom payment to get your computer back. All the data on it, and potentially cloud storage, could be lost forever – including family photos and important work documents.

Be sure you have a cloud backup of all your files or that you regularly back up everything to a portable hard drive and store it separately in a secure location. Wiping your computer and reloading from a backup is often the only way to recover from a ransomware attack.

10. Stop not protecting your smart home

Nearly every home is outfitted with smart gadgets like voice assistants, smart TVs, and security cameras. But these smart devices are also becoming an attractive target for criminals. They can be used to infiltrate your home network, your computers and ultimately, your personal data.

Be sure to change the default passwords that come with the device – such as your home Wi-Fi router. Where possible, edit the privacy settings on devices (like a voice assistant) to not allow it to share your activity and information with the manufacturer (such as Google). Also, watch for software and firmware updates from the product manufacturer that fix potential security flaws as they are discovered. Think twice before purchasing new gadgets or toys that listen to things going on in your home, record video, or otherwise track you.

Here’s to a secure 2022!

In many ways, we are all looking forward to a better year than last year. We have enough to worry about without stressing over attacks on our digital lives. To help make sure it’s a year full of good things, start by improving your personal cybersecurity and privacy today.

 


Staying current with all the right protections can be a daunting task. Fortunately, expert help is available for helping you establish a complete cyber defense plan for you and your loved ones. iDefend is a comprehensive identity theft and cybersecurity program for individuals and families that includes unlimited access to U.S. based cybersecurity experts and advisors to help you protect your digital life.

The post Top 10 Bad Cybersecurity Habits to Break in 2022 first appeared on iDefend.

]]>
You Probably Use the Deep Web Every Day, But Not the Dark Web https://www.idefendhome.com/blog/identityandfinancial/deepwebeveryday/ Fri, 12 Feb 2021 16:37:42 +0000 https://www.idefendhome.com/?p=5326 You don’t need to know everything about the dark web to know the dangers it poses to you and your family. We'll give you the basics here.

The post You Probably Use the Deep Web Every Day, But Not the Dark Web first appeared on iDefend.

]]>
dark_web
You don’t need to know everything about the dark web to know the dangers it poses to you and your family. We'll give you the basics here.

In this article

We’ve all heard of the dark web, but what is it really? What can you find there and is it all bad? We’ll explore the difference between the dark web and the deep web, what you will find in each and what you need to know.

Deep Web or Dark Web?

You’ll sometimes hear people refer to the “dark web” and the “deep web” as the same place, but that’s not true. The deep web (also referred to as “hidden web” or “invisible web”) refers to places on the internet that can only be accessed through a login. That would include your online banking, Netflix, Ancestry.com, and any other membership site.

The deep web = login + password

If you need to login to see it, that’s the deep web. You’ve been using the deep web for years and didn’t even know it. Because it’s behind a paywall or a membership login, these parts of the internet are not indexed, so you won’t find them from a Google search.

The dark web is the bad one

The dark web isn’t indexed by search engines either, but that’s because of the illegal and dangerous nature of its content. We’ve all heard stories and read headlines of the illicit activities that take place there. It’s all true. This is a place where you can buy everything from illegally harvested organs to hacked bank account information.

It’s a truly malicious marketplace.

Cyber Criminals Love the Dark Web

You see, some cyber criminals are great at stealing personal information with malware or through hacking, but they don’t want to get caught using it. They then post listings for this information on the dark web and allow other users to purchase it.

A hacker is less likely to get caught if they are selling your information to other criminals rather than using the information for fraud.

Stolen information is the dark web’s currency

Because of this, information is one of the main items bought and sold on the dark web, and you’re caught right in the middle of it. This is where dark web monitoring comes into play.

Dark Web Monitoring

With dark web monitoring, you’ll receive notifications when your information has been compromised and is available to criminals. This could include your bank account login and password, your social security number and place of employment, or even your birth date and home address.

Any single piece of information is harmless enough—it’s easy to guess a random social security number. The trouble is when they get more than that. When multiple pieces of information are combined, it allows the criminal to commit a wide range of crimes from unemployment fraud, credit card fraud, home title theft and more.

How dark web monitoring works

Dark web monitoring will notify you when your private information is posted online. This gives you the opportunity to update passwords, change details and even pause your credit. This is the closest thing to fortune telling and it could save you from becoming a victim.

Make sure you’ve protected yourself with an identity theft recovery service, but upgrading to a dark web monitoring is the ounce of prevention that will save you from a deep dark headache.

The post You Probably Use the Deep Web Every Day, But Not the Dark Web first appeared on iDefend.

]]>
Tax Season or Open Season? https://www.idefendhome.com/blog/identityandfinancial/taxoropenseason/ Mon, 01 Feb 2021 19:01:36 +0000 https://www.idefendhome.com/?p=5120 Millions of Americans will likely not get their tax refunds this year — not because they don’t deserve them, but because identity thieves will have already filed tax returns under their names.

The post Tax Season or Open Season? first appeared on iDefend.

]]>
article_tax_1040-scaled
Millions of Americans will likely not get their tax refunds this year — not because they don’t deserve them, but because identity thieves will have already filed tax returns under their names.

In this article

Did you know all a scammer needs to steal your identity and your tax refund is your name and your Social Security Number? Did you know you could spend 5-8 months fighting the IRS over it and could be audited in the
process?

Yikes!

Our Tips For Tax Safety

Here are some tips to keep your tax refund in your bank account this year, hassle free.

  1. File your tax returns early. Tax refund fraud only works if the thief files a bogus tax return in your name before you submit your actual tax returns. By filing early, you can ensure the IRS sees your return before a thief sends the fake one.
  2. Look for IRS notices. Watch for a letter from the IRS stating that more than one tax return was filed with your SSN. Also watch for an IRS notice indicating you received wages from an employer unknown to you. Either of these notices could be a sign that a thief has attempted to file a fraudulent return in your name. (Remember, the IRS only sends notices by mail. If you receive a random email notice or phone call from the IRS, it’s likely a scam. Don’t click on links or open attachments in these types of scam emails!)
  3. Lock up your Social Security card. Tax-return theft always involves a stolen SSN. Keep it locked up in a safe place!
  4. Reduce credit card solicitations. Even if you aren’t interested in that credit card solicitation, a thief might be. He could plan to get a credit card in your name as a first step toward obtaining your SSN and date of birth. Be sure to shred unwanted credit solicitations and get your name off the marketing lists for pre-approved credit offers. (Instructions for getting off junk mail marketing lists are found in your online iDefend account.)
  5. Keep on top of data breach notices. Watch for letters or emails from companies and organizations notifying you that your personal information may have been compromised in a data breach incident. If you receive a notification like this, be sure to closely watch for identity theft or credit fraud alerts and other suspicious identity theft activity. Not every data breach involving your personal information will result in identity theft, but it’s vital that you stay vigilant.
  6. Shred bank and tax documents you no longer need. Thinking like a thief helps you reduce your risk of identity theft. Consider your tax documents, receipts and bank statements as potential trapdoors that allow entrance into your personal life. Lock up what you need to keep, and shred the rest.

How to Get Fraud Protection

If at any time you believe you may be a victim of federal or state tax return fraud, get help immediately. If you need a good ID theft protection service that covers tax return fraud, check out iDefend that include monitoring and expert support for this type of fraud and much more.

The post Tax Season or Open Season? first appeared on iDefend.

]]>
Medical Identity Theft: How to Protect Yourself https://www.idefendhome.com/blog/identityandfinancial/medicalidentitytheft/ Tue, 15 Oct 2019 19:02:24 +0000 https://www.idefendhome.com/?p=3609 Your medical information is a goldmine for cyber criminals and fraudsters. Unfortunately, medical identity theft affects millions of Americans every year, and it can wreak havoc on your finances and even your health.

The post Medical Identity Theft: How to Protect Yourself first appeared on iDefend.

]]>
pexels-rdne-stock-project-6129044
Your medical information is a goldmine for cyber criminals and fraudsters. Unfortunately, medical identity theft affects millions of Americans every year, and it can wreak havoc on your finances and even your health.

In this article

Your personal medical records may not be as safe as you might think. A quick internet search for “medical data breaches” will pull up dozens of sobering results. It seems like every year more and more firms succumb to their own folly as their inferior cybersecurity is inevitably breached by yet another hot-shot hacker.

Then, of course, the pilfered data is happily bought and sold on the dark web. You might wake up one day to a large medical bill for drugs you never purchased. Or you could rush your local clinic for a life-saving blood transfusion only to discover that your blood type has mysteriously changed to “O negative”.

Oh, that’s not your blood type? Well, actually it is… at least according to what it now says on your medical file, anyway.

How’s that sound for a Friday morning?

What is Medical ID Theft?

Medical identity theft happens when someone steals your personal information, electronic health records or insurance information and uses it to get medical treatment, equipment and prescription drugs in your name. This could leave you footing the medical bills and even mixing their health records with yours. In fact, according to a recent study from the Ponemon Institute, medical ID theft victims spend nearly $13,500 on average to deal with the problem, including paying off fraudulent medical bills.

With continual cyber-attacks and data breaches among both healthcare providers and health insurers, medical identity theft will most certainly claim millions more victims. Here’s what you need to know to protect yourself and your loved ones.

The Real Dangers of Medical ID Theft

Victims of medical identity theft have similar outcomes to other types of identity theft, such as ruined credit, but can suffer even more devastating consequences. Victims can have medical insurance claims denied, lose access to their insurance, and be forced to pay to restore their insurance coverage. If thieves max out benefit thresholds on an insurance policy, policyholders could find themselves unable to get timely coverage for urgent treatments.

Increased insurance prices

An affected individual might see the cost of their insurance increase or may be denied coverage altogether if the fraudulent treatment included care for things like diabetes, osteoarthritis, or cancer. They may be unable to access their own medical records. ID theft victims could end up with a flag in the system triggering regulators or even law enforcement to track them down over charges they’d illegally purchased prescription drugs.

Incorrect data records

When medical identity theft results in erroneous medical records, the consequences can even be life threatening. Drug allergy warnings or other special medical conditions may be deleted. Previous medical procedures can be erased. Blood types can be changed in the patient’s medical records, endangering the life of the ID theft victim should they need a blood transfusion. These potential health risks alone are reason enough for consumers to be vigilant and get protected.

A foot in the door for criminals

Of course, the theft of medical records also gives thieves access to your other personal and financial information including Social Security number, date of birth, and bank or credit accounts. Victims of medical identity fraud often find themselves also fighting other types of identity theft including credit fraud, Social Security fraud, tax return fraud and more.

Look Out for Red Flags

There’s a lot you can do to keep an eye out for signs of medical identity theft. Here are a few red flags you should watch for:

  • A bill for medical services or equipment you don’t recognize
  • Double billing charges on a medical bill
  • Mistakes on your medical history
  • A call from a collection agency about a medical bill you don’t owe
  • Denial of insurance due to a medical condition you don’t have
  • A letter from your health insurer notifying that you have reached your benefit limit

Friendly Fraud

While many thieves obtain the victim’s medical information in the typical pattern of hacking, phishing, stealing mail or copying your records at a clinic or other facility, about half of all medical identity theft happens among family members.

Ponemon study

The Ponemon study revealed that 24% of medical identity theft victims said a family member took their medical credentials and used them without permission. Another 23% said they willingly shared their health insurance information to help a family member or friend obtain medical care.

In the study, most of the people who shared medical info did not consider it a crime, but it’s still considered fraud against medical insurers and health care providers. Sharing Medicare or Medicaid information with someone else to help them obtain coverage is also a state and federal crime.

5 Tips for Protecting Yourself

While it can be difficult to protect your information from being exposed in a data breach, there are ways to lower your risk.

  1. Ask about security practices. Inquire how your doctor’s office, hospital and insurance company protect your personal information. They are required to safeguard your data – and you have the right encourage privacy by asking how they protect you.
  2. Secure your copies. Store any paper and electronic copies of your medical and health insurance records in a safe place. Shred or burn health forms, insurance and prescription papers.
  3. Be suspicious. Don’t fall for online or phone scams for things like “free” medical quotes, products or services. Don’t share personal or medical information online or over the phone unless you initiate the conversation.
  4. Review your medical records. Carefully read through your insurance statements and medical records for anything you don’t recognize.
  5. Monitor for ID theft. Many medical ID theft cases are first detected with identity theft and credit monitoring where you’ll be notified of collection notices for unpaid medical bills and other signs of ID theft.

Get Expert Help

If you know that your medical identity has been stolen, you can start taking steps on your own to work through it. Those steps can include requesting copies of your medical records, which might require paying a fee, and asking medical providers to correct false information. The Federal Trade Commission offers a helpful checklist of steps to take when working through medical identity theft on your own.

Protection plans exist

However, expert help is available to monitor for medical identity theft – and recover from it with minimal damages and downtime. You may choose to enroll in a trusted identity theft protection plan to help monitor for suspicious activity, including medical ID theft. These plans also include professional recovery and restoration services to rely on in the event you ever suspect you might have a medical ID theft problem.

How iDefend can have your back

Of course, what kind of company would we be without tooting our own horn a little? Our iDefend Advisor team is trained to assist with all types of identity theft, including medical identity theft. Learn more about our identity theft protection and recovery.

Keeping watch over your medical information, credit report, financial statements and insurance statements may not prevent all cases of medical identity theft, but staying vigilant and proactively monitoring for problems can help you notice fraud faster and take action quickly to correct it.

The post Medical Identity Theft: How to Protect Yourself first appeared on iDefend.

]]>