Complete Credit & Identity Protection 24/7. Protection you can’t afford to pass up.
IdentityIQ will offer up to $1 million in identity theft insurance for the primary member and provide you with financial peace of mind, making you an informed and proactive consumer with a team of experts to support you.4 If you have out of pocket costs due to ID theft, you’re covered with up to $1 million in identity theft insurance.
When you see signs of identity theft, we are the experts who will be there when you need us most. If your identity is stolen, we are here to personally help you restore your identity. You will receive a dedicated case manager that is based in the United States. Your case manager will help you put together a plan of action and be with you every step of the way.
Whether you are looking for a 1-bureau credit report or a complete view of your credit report profile from each of the 3 credit bureaus (Experian, TransUnion, and Equifax), our products are designed to meet your needs.
Suspicious changes in your credit report are one of the first indications that your information may have been compromised. Take a look at your credit report and verify all of your information. We believe checking your report regularly is so important that you have access to 12 reports per year (on select plans), which is something our competition does not offer.
Daily credit monitoring offers insight when changes are made to your credit report profile. When your report is delivered, check it thoroughly for inaccuracies and a team of U.S.-based customer service professionals will assist you with your questions if anything looks suspicious. Regular credit checks combined with the power of credit monitoring empowers you to see changes and act quickly if something unexpected happens.
Enhanced credit monitoring effectively monitors your credit on a whole new level. With this benefit, you are alerted to changes when authorized users are added to your credit cards or when your TransUnion score changes by 10+ points. This feature puts you in the driver seat and enables you to see changes and take action if something doesn’t seem right. We want to give you the best, so we’ve gone above and beyond what others in the market offer and included this feature in select products.
Dark web monitoring, also known as internet or cyber monitoring, aids in identity theft prevention by keeping an eye out by scanning the dark web for information related to your identity. Through our global search, we scour the dark web for your SSN, name, mailing address, and other information you designate in over 25 languages. If we find anything suspicious, we notify you immediately.
When comparing similar-priced plans, IdentityIQ benefits go beyond with our tools and features.
Identity theft is the illegal use of someone else’s personal identifiable information (PII) with the intent to commit fraud or gain financial benefits in their name. If your identity or the identity of your child has been stolen, identity thieves may open new credit accounts, file fake tax returns, buy or rent property, or take out loans that wreak havoc on your financial health and credit score.
Personally Identifiable Information (PII) is any personal information about a person that is maintained by an agency. PII can include your name, place of birth, SSN, mother’s maiden name, biometric records, educational history, employment history, and more.
It’s important to understand that identity theft can happen to anyone at any time. What we call your identity is the total collection of your PII. This is the information thieves use when you experience a stolen identity. When they gain access to this information, they have the ability to, in essence, become you. If any of this information is stolen, we consider this a personal breach of your identity.
One of the first questions a victim of identity theft asks themselves is, “Why would someone want my identity?” For an identity thief, opening credit cards in your name, making fraudulent purchases, or using your personal information when being questioned by the police are just a part of a long list of what they are able to do with your stolen identity. They might:
It’s important to understand that identity theft can happen to anyone at any time. Your identity is built on multiple layers that include more than just your social security number. What we call your identity is the total collection of your personally identifiable information (PII). When they gain access to this information, they have the ability to, in essence, become you. If any of this information is stolen, we consider this a personal breach of your identity.
One study* by the FTC showed that criminals acted on stolen information within 9 minutes of getting the data. It is important to understand how identity theft can happen and act quickly when it does.
*Source: Federal Trade Commission
What’s the one thing we ask when we see a magician make something disappear? How did they do that? When you are watching a performer, you’re left confused by the sleight of hand, but in the end, it is fun and entertaining. The fun stops when the magician is an identity thief and we notice things in our life are disappearing. It may seem like magic when someone else mysteriously accesses your personally identifiable information, but knowing how identity theft happens removes the magic and puts the control back in your hands. So, how do thieves steal an identity? Here are a few of the most common ways identity theft happens:
Think about all the times you’ve been on the go, reading emails while in line at the coffee shop, or checking your bank account while waiting at the doctor’s office. Unless you were logged into a private Wi-Fi network that requires a password, any data transmitted during your online session could be vulnerable to eavesdropping by strangers using the same network.
Thieves rummage through trash looking for receipts, credit card bills, utility bills, medical insurance, bank statements, and other items with your personal information on them. When they find enough information, they have the basis for what they need to build a basic profile of the identity they want to steal. One easy step you can take today to protect yourself against a dumpster diving thief is to shred anything with your personal information on it using a cross-cut paper shredder.
In some circumstances, thieves will reroute your mail by submitting a change of address to the post office. Unfortunately, this allows thieves one more point of access to open accounts in your name without your knowledge. Other companies claiming to offer change of address protection are providing you with a basic service that monitors the credit bureaus for a change of address within your credit report file. The issue with this is, the credit bureau has to acknowledge the change of address as being suspicious in order to alert you of a change.
Have you ever received a call and been asked to verify your security information? It may sound something like, *Mrs. Smith, I have important information about your account, but before I can tell you I will need to verify your address and date of birth.” This is a technique used by thieves to gather the personal information they need to infiltrate your identity. Unfortunately, thieves using this technique have just enough information about you to make you feel secure and lead you to believe the information they have is truly valuable.
The best thing to do in this kind of situation is to ask what company the representative is calling from, hang up, and then call the number listed on your bill or the company website. A situation like this is never fun and leaves victims feeling vulnerable and taken advantage of.
As the Internet is becoming more accessible, thieves are becoming more resourceful. Hackers can connect to public or unsecure home WIFI networks to gain personal information. Once in, the perpetrators have access to install keyloggers that track websites you visit and passwords you enter. This includes banking institutions and social media. You can stay protected by ensuring your home network is protected and by never logging into accounts on an unsecure public WIFI network.
Credit and debit card fraud is awful. Too many of us have received a call from the bank informing us a purchase has been made that we were not aware of. We experience an immediate feeling of violation and are flooded with questions about how someone got our account information.
A popular method among thieves is to get your credit card info with a card skimmer. This type of theft occurs when a thief installs a device onto an ATM or credit card reader to read your credit card information. The device can read your card number and pin, allowing the thief to have full access to your account. Other ways thieves get your information include hacking, data breaches, and unsecure websites.
Whichever method the thief uses, once a criminal has your credit or debit card, they can use it within minutes to steal from you. If the incident isn’t flagged by the bank, you may not know what happened until the next time you see your statement.
From banks to health care institutions, our information is being stored electronically. As our information is distributed and stored digitally, it becomes vulnerable to computer savvy thieves. Hackers have become proficient in hacking into some of the most secure institutions and gaining access to our personal information. Data breaches are becoming commonplace and the consumer has little power to prevent their information from being abused.
Malware is an umbrella term used to describe any malicious software designed to harm, exploit, or extract sensitive data from a system, device, or network. Cybercriminals use malicious software to access sensitive information they can use for financial gain. Stolen data can include anything from your payment details, to your medical records, passwords, and more.
The mailbox is sometimes an easy target for a thief. Mail is dropped off, usually before anyone is at home, often leaving bills and documents with your personal information unsecure. Thieves use this as an opportunity to remove important documents to gain insight into your personal life and to gather sensitive information. At a minimum, we recommend using a locking mailbox if possible.
With your ID, credit cards, or social security card in hand, a thief can wreak all kinds of havoc in your life and leave you trying to unravel the mess they caused. Canceling your credit cards is usually the first thing that comes to mind when something like this happens. Unfortunately, most people don’t understand what a thief is capable of with a state-issued ID. The next time you have your background checked, you could potentially find criminal activity on your record. Your social security card can be used to steal your retirement benefits, obtain employment that later messes with your taxes, and access your bank and credit card accounts. This is one of the most serious and impactful types of identity fraud.
This computer scheme is one of the most common types of identity theft. Phishing asks you to enter personal information like your credit card, account information, or social security number. They claim this information is to verify a purchase or to warn you about a security-related event.
Like pretexting, phishing convinces you to reveal personal information that allows a thief to steal from you. Virus and malware programs are great but are never foolproof. So, what do you do? If something like this were to happen, actively monitoring for changes and abuse is the best way to stay protected.
here is an opportunity for this type of theft anytime you enter your pin or account information at a public location. Without any technology involved, a thief invades your space and watches you enter your pin. This happens at ATM and payment machines and is a crime of opportunity. Always be aware of your surroundings and if someone is standing too close.
As technology advances, we all become more willing to place our payment information online. Unfortunately, not every website is secure and encrypted. This opens up the opportunity for a thief to intercept your personal information once submitted. Always ensure that any site you place your personal information shows proof of encryption with the https identifier in the website address.