Don’t let identity theft catch you off guard

Learn more about identity theft, and the steps you can take to help better protect your personal and financial information.

How Identity Theft Happens

Identity theft protection begins by knowing how it can happen. There are any number of reasons thieves would want your personal information — from opening new accounts and credit lines they can use, to creating new identities. The damage of identity theft can affect your credit, your access to housing, and even your ability to get a new job.

Whether it’s rummaging through your trash for financial statements, sending you dangerous links through email or texts, or hacking into public Wi-Fi networks, identity thieves use various means to access your personal information.

Social media profiles are among the most common targets for scammers, hackers, and identity thieves. Fraudsters know that if they can hack your accounts, they can use them to scam your followers or find sensitive information about you that they can use to steal your identity.

Romance scammers create fake profiles on dating sites and apps or contact you through popular social media sites like Instagram or Facebook. The scammers strike up a relationship with you to build up trust, sometimes talking or chatting several times a day. Then, they make up a story and ask for money. They may also ask for your personal information, like your banking details or family history, so they can steal your identity.

Scammers target kids online, often by pretending to be another kid or teenager, to get their personal information. With a child’s personal information they can open up new lines of credit which can go undiscovered for years. Criminals have also found that kids can be a gateway to their parents’ personal information and are constantly looking for ways to expose your name, address, phone number, credit card info and Social Insurance Numbers.

Because your wallet usually has your bank and credit cards, as well as government-issued ID like your driver’s licence and health card, identity thieves can use that information to try to open new credit accounts in your name. You could be on the hook for someone else’s spending, and your credit scores could be seriously damaged, making it harder for you to get a new credit card or qualify for a new loan.

Known as skimming, thieves get payment information from an ATM, gas station pump, or other payment card reader using an electronic device that’s attached to the reader. The device allows them to steal the information stored on a credit or debit card’s magnetic strip to clone cards and make unauthorized purchases.

Known as phishing, attackers use emails or messages that appear to be from legitimate sources (e.g., banks, government agencies) to trick individuals into providing sensitive information. Using a more targeted form, spear phishing, attackers tailor their approach to specific individuals with personal details. Then there’s vishing, where scammers use phone calls to impersonate legitimate organizations or individuals to get your personal information.

Malware is a type of software designed to harm your computer or steal your personal information. It can spread through email attachments, infected websites, and malicious downloads. If you think your computer may be infected with malware, you should run a scan with a reputable antivirus program. Ransomware is a type of malware that holds your computer or files hostage until you pay a ransom to the attacker. It's like a digital kidnapper that demands a payment in exchange for the release of your data.

Fraudsters can use the bank and credit card statements that you throw away to get personal details or account information.

Large-scale breaches at companies, healthcare providers, or other organizations can expose vast amounts of personal information. This data can be used for identity theft or sold on the dark web.

On unsecured or public Wi-Fi networks, attackers can intercept data transmitted by users. Tools can capture login credentials, personal information, and other sensitive data.

Technological advances allow attackers to create convincing fake videos or audio recordings to impersonate individuals and trick others into revealing personal information or making fraudulent transactions.

Scammers convince your mobile carrier to transfer your phone number to a SIM card they control. This gives them access to your calls, texts, and any two-factor authentication codes sent to your phone, potentially leading to account takeovers and financial losses.

Some signs of identity theft include receiving unfamiliar bills or charges on your credit card for items you didn't buy. Other signs include calls from debt collectors about accounts you didn’t open, unexplained withdrawals from your bank account, notifications that more than one tax return was filed in your name, or a credit or loan application that was unexpectedly denied.

When reviewing your credit report, ask yourself the following questions to determine if you could be a victim of identity theft:

  • Are there unfamiliar credit accounts listed on your credit report?
  • Do you have an unfamiliar account that has late payments or is in collections?
  • Are there inquiries listed on your credit report from companies you don’t recognize?
  • Is there a phone number or address listed on your credit report that you don’t recognize?
How To Help Protect Yourself From Identity Theft

There are various tools you can use to help protect yourself from identity theft.

The dark web is a collection of websites, forums, and marketplaces that are only accessible using anonymous web browsers. It's where cybercriminals buy and sell stolen personal information, like credit card numbers, passwords, and email addresses. A dark web monitoring service can alert you if your personal or financial information is found on these sites so you can take action.

Social media profiles are among the most common targets for scammers, hackers, and identity thieves. A Social media monitoring service will alert you to suspicious activity on your social media accounts, like account impersonation, phishing campaigns, identity theft, and account takeovers.

Device protection provides protection against viruses, malware, ransomware and other harmful threats that can attack your devices (phones, tablets, computers), and steal your data and financial data.

Using simple passwords, or re-using a single complex password, can put your online accounts at risk. A password manager will generate complex, unique passwords for each of your online accounts to help stop fraudsters from hacking into them and stealing your personal information.

A virtual private network (VPN) gives you safe and private access to the internet. By encrypting your connection, a VPN changes your IP address and virtual location while protecting your online activity from spying eyes and keeping your data safer from cybercriminals. A VPN can also help protect you from Wi-Fi eavesdropping when you’re using a public wireless network.

Children are often unaware of online dangers and can unwittingly share personal information, making them easy targets for scammers who want to steal their personal information and yours. Parental controls allow you to automatically block certain platforms like chat and social networks, reducing the likelihood of them being scammed.

The Equifax Complete products all alert you to key changes to your Equifax credit report, like if someone tries to open a new credit card in your name or if a new phone number is added to your report. These alerts can help you spot ID fraud faster so you can take action. Some products also include WebScan to alert you if your personal information is on the dark web and Lost Wallet Assistance to help you cancel and reissue your bank and credit cards, as well as government-issued ID, if your wallet is lost or stolen. Our newest product, Equifax CompleteTM Protection, includes all of these features plus Social Media Monitoring, Device Protection, Parental Controls, Password Manager, and VPN.  

Dealing With Identity Theft

If you have an Equifax CompleteTM product, our Identity Restoration Specialists will guide you through the restoration process step by step. Call 1-800-871-3250, Monday to Friday 9 a.m. to 9 p.m. ET and Saturday and Sunday 9 a.m. to 6 p.m. ET, to begin the restoration process.

Not a subscriber? Here are some steps you can take to help restore your identity.

Find the right solution to spot fraud faster and help you protect your identity

NEW
MOST SECURITY FEATURES

Equifax CompleteTM
Protection

  • Social Media Monitoring, Device Protection, Parental Controls, VPN, & Password Manager
  • WebScan searches the dark web for your personal data
  • Credit alerts help you detect fraud faster
  • ID Restoration Specialists help you recover from ID theft
  • Up to $1 million in ID theft insurance1
MOST POPULAR

Equifax CompleteTM
Premier

  • WebScan searches the dark web for your personal data
  • Credit alerts help you detect fraud faster
  • ID Restoration Specialists help you recover from ID theft
  • Up to $1 million in ID theft insurance1
BEST VALUE

Equifax CompleteTM
Friends and Family

  • Add an extra adult at a value price
  • WebScan searches the dark web for your personal data
  • Credit alerts help you detect fraud faster
  • ID Restoration Specialists help you recover from ID theft
  • Up to $1 million in ID theft insurance1 and dedicated ID Restoration Specialists
Compare All Products