Identity Protection Strategies – Are You Doing Enough To Keep Your Information Safe?

While businesses, law enforcement, and legislators contend with identity theft, some of the most effective methods to help manage your personal information are in your own hands. There are no-tech, low-tech, and high-tech ways to help address your vulnerabilities.
Identity Protection Strategies from Iron Mountain Financial Planning in Rapid City, South Dakota

There isn’t a week that goes by when you don’t read about some data breach. Safeguarding your personal information starts with understanding cybersecurity risks, knowing what to look for, and doing everything you can by following some of these Identity Protection Strategies to help protect yourself. 

Identity Theft: A growing problem

Last year, identity theft continued to grow, setting 2024 up as another year of ever-increasing cybersecurity issues. Here are a few statistics:1

  • In 2023, the Federal Trade Commission (FTC) received a total of 5.7 million fraud and identity theft reports.
  • Georgia, Maryland, Delaware, Nevada, and Florida were the five states reporting the most identity theft cases per capita. South Dakota had the lowest.
  • The median loss for victims of fraud cases is about $500.
  • Total losses are estimated to be $10.2 billion.
  • Every 22 seconds, identity fraud claims a new victim.
  • Nearly 33% of Americans have faced some kind of identity theft attempt.

As the chart below illustrates, the number of reports of identity theft and fraud to the FTC has risen steadily since 2001.1

Number of Identity Theft Reports from Iron Mountain Financial Planning in Rapid City, South Dakota

No-tech, low-tech, and high-tech identity theft vulnerabilities

While businesses, law enforcement, and legislators contend with identity theft, some of the most effective methods to help manage your personal information are in your own hands. There are no-tech, low-tech, and high-tech ways to help address your vulnerabilities.

No-tech, low-tech, and high-tech identity theft vulnerabilities

No-tech  

You might be surprised to learn that the FTC reports that over half of all identity theft comes from physical documents. You can help manage this risk by taking a few simple actions, such as the following:

  • Registering for United States Postal Service Informed Delivery so you know what mail to expect each day.
  • Buy a shredder and use it for any statements or other documents, including anything that may include any account numbers, etc.
  • Go paperless with as many companies as possible.
  • Avoid keeping sensitive information in your wallet or purse.

Low-Tech

Many “phishing” attacks come from scammers disguised as trustworthy sources. Here are some of the most common types of phishing:2

  • Email phishing is the most common, and tactics like phony hyperlinks lure email recipients to share their personal information.
  • Malware phishing involves planting malware disguised as a trustworthy attachment in an email. In some cases, opening a malware attachment can harm your system.
  • “Vishing” has attackers in fraudulent call centers attempting to trick people into providing sensitive information over the phone.


Here are a few ways to identify some types of phishing attempts:

  • Don’t trust email display names—click to see the sender’s full email address. Scammers often create logical display names over their actual addresses.
  • Check emails for typos and poor grammar.
  • Hover over hyperlinks before clicking.
  • Read the salutation; don’t open the email if it looks off.
  • Be wary if the email is addressed to “Valued Customer” instead of your name. It’s likely fraudulent.
  • Review the signature to ensure the contact information is in the email footer.
  • Beware of threats like “Your account has been suspended” via email or phone.
  • Be very wary if any sense of urgency is implied or information is requested.
  • Be skeptical of any text messages you receive from unknown senders.

High-tech

Some Smartphone apps collect details about you, including age, GPS data, and browsing habits. Make certain you understand if an app accesses your camera, tracks your location, records your audio, or reads your call logs and text messages. Check out the app privacy report occasionally to see which apps are accessing your data. You should be able to turn off data tracking with an app at any time.

Avoid using public phone chargers at airports or restaurants. They can contain malware that gives hackers access to your devices. Use a portable charger instead.

Wi-Fi can be risky, especially in public settings. While at home, you should consider password-protecting your network and keeping router and security software up to date. You might also consider using a virtual private network (VPN) when in public. If you are on a public network, look for sites marked HTTPS. If possible, avoid making financial transactions when using an unfamiliar internet connection.

Peer-to-peer (P2P) Payment Apps like Venmo have become popular for everything from paying babysitters to splitting the check at a restaurant, but they can have some hidden risks.

Top P2P scams include:3

  • Impersonation scams: Criminals persuade victims to send money by pretending to be someone they’re not, and thanks to artificial intelligence, by which scammers can now clone voices and faces, these scams are becoming even more challenging to detect.
  • Fake seller scams: Criminals advertise a phony product or service online, collect your money upfront, and disappear without delivering the goods.
  • Advance-fee scams: A scam where someone claims you’ve won a prize and offers to send your winnings in exchange for you sending them a service fee.
  • Venmo is owned by PayPal. Remember, any companies mentioned are for illustrative purposes only. It should not be considered a solicitation for the purchase or sale of securities.

To protect yourself from P2P scams, one of the best Identity Protection Strategies is to only use these payment apps with people you know and trust, such as friends, family, or local businesses. Consider using a credit card if you’re transacting with someone new or unseen. Credit card providers may offer some level of fraud protection as part of their value proposition.

Identity Protection Strategies: The best defense is a good offense.

steps to defend against identity theft and fraud from Iron Mountain Financial Planning in Rapid City, South Dakota

You can take proactive steps to defend against identity theft and fraud, such as strong passwords, multi-factor authentication (MFA), and credit monitoring.

Create, manage, and store strong passwords4

  • Consider using a password manager.
  •  Password managers store and organize your passwords with secure digital encryption and multi-factor authentication.
  •  Certain password managers are designed to connect your login information across multiple devices, websites, and apps.
  •  Some browsers have built-in password managers that can help.
  •  There are many password managers you can subscribe to with a variety of features and benefits. Here are some of the most popular, according to a 2024 report from Cybernews.com.5
      1. NordPass
      2. 1Password
      3. RoboForm
      4. Keeper
      5. Bitdefender

If you are not using a password manager, you should focus on password strength. As a general guideline, strong passwords:

  •  It should be at least 12 characters long, but 14 or more is better.
  •  It is a combination of uppercase letters, lowercase letters, numbers, and symbols.
  • These are not words found in a dictionary or personal names, characters, products, or organizations.
  • Are significantly different from your previous passwords.
  • It should be easy for you to remember but difficult for others to guess.

Once you’ve created a strong password, keep it secure:

  • Never send a password by email, instant message, or any other means of communication that is not reliably secure.
  • Consider using a unique password for each website.
  • You can write your passwords down, but keep them in a safe location.
  •  Change your password immediately if you suspect an account is compromised.
  • Get in the habit of changing your passwords periodically.

Use online providers that employ multi-factor authentication (MFA).

If you don’t know the term “multi-factor authentication,” you may have seen it in action. If you’ve ever tried to log into an account and received a text with a code you need to enter, or you are asked a series of questions like “Who is your high school best friend,” or “What was your first car,” you have used multi-factor authentication (MFA).

MFA is an identity verification method in which users must supply at least two pieces of evidence to prove their identities. It may be annoying, but it’s worth it. MFA blocks 99.9% of modern automated cyberattacks.6

Monitor and/or freeze your credit.

Monitor and/or freeze your credit for Identity Protection from Iron Mountain Financial Planning in Rapid City, South Dakota

You can monitor your credit using the three main credit service providers. You can also take the additional step of placing a freeze on your credit. Freezing your credit may help prevent fraud because it prevents new lines of credit from being opened without your permission. The cost is free, but keep in mind that the freeze remains in place until you remove it.

Contact the national credit bureaus to request fraud alerts, security freezes, and opt-outs from prescreened credit offers. Each firm has its own guidelines, so ensure you understand the rules before placing restrictions on your account.

While security systems have been put in place by most companies to monitor and fight large-scale cyber threats, it is important that you stay vigilant regarding your own cybersecurity, passwords, and identity. Your day-to-day routines are the first line of defense.

As a financial professional, I am here to help you navigate these challenges and provide guidance tailored to your unique circumstances. Please don’t hesitate to reach out if you have any questions. We may have additional resources that can help.

  1. IdentityTheft.org, January 2024.
  2. Microsoft.com, February 2024
  3. AARP.org, January 2024
  4. Microsoft.com, February 2024
  5. Cybernews.com, February 2024. Any companies mentioned are for illustrative purposes only. It should not be considered a solicitation for the purchase or sale of the securities. Any investment should be consistent with your objectives, timeframe, and risk tolerance.
  6. Zippia.com, February 2023
Brian Bickett, CFP at Iron Mountain Financial Planning, LLC

Brian Bickett, CFP®

Brian Bickett is a fee-based CERTIFIED FINANCIAL PLANNER™ professional located in Rapid City, SD and serving clients across the country. His financial advisor approach provides him deep understanding of your retirement goals and allows him to connect your money to your life in a way that feels right to you.

Get Our Financial News
Direct to Your Inbox

 

Subscribe to Brian’s Financial Insights and automatically receive his perspective on current Financial News

Additional Articles