Six Sources Thieves Use to Steal Your Identity

Hopefully you haven’t been a target of identity theft, but as many as ten million Americans a year estimated by the Federal Trade Commission have! I personally have not, but know friends who have been a victim as I’m sure you do. While attending a public workshop held by my local Sheriff’s Dept. in Spartanburg, SC recently, I learned some valuable information as to how thieves are able to steal our personal information. I want to share their sources with you in hopes that you will be made more aware of how to protect yourself.

Source #1 Thieves Target Your Mail and Trash

Your mailbox and mail is an ideal source for stealing your ID. Important documents such as bank statements, credit offers, tax information, and checks are delivered to mailboxes daily. It is important to remove your mail from the box as soon as possible. Leaving it lying in there will significantly increase the chances of something being stolen. After going through your mail, shred it before putting it in the trash, which is another source where thieves look for details of your personal information.

Source #2 Watch for Shoulder Surfers

Be aware at the checkout counter in stores and fast food places when you enter your pin codes. Make sure to turn the display window away from the one in line behind you, or use your hand to cover the display. If they have clear site of you entering your pin, they can easily memorize it and use it later. With cell phones used on a wide scale now, beware of using your cell phone and giving personal information while in stores, banks, malls, etc. Doing this makes it oh so easy for a thief close to you to listen in and hear anything you give out that is personal. Make such business calls in private, not out in the open public!

Source #3 Thieves May Get Personal Information from Insiders

Many people are desperate for money and will accept payment from someone in exchange for your personal information. For example, an inside employee who has access to your job application(s) or credit reports could be a place where thieves could pay for information. We don’t know how trustworthy the employees are in company.

Source #4 Skimming

Skimming is a fairly new term, but it is when the thief uses a special storage device to scan and remember your credit and debit numbers when you use your cards in places such as grocery stores, restaurants, or any other location you use them. I never use my debit card at these places. If you must use your credit card, make sure it doesn’t leave your sight when handing it over. If in a restaurant, the waiter has to leave the table to scan your card, you are better protected using your credit card should they skim and use your card, than if you give them your debit card.

Source #5 Phishing

We all get pop-ups advertisements and spam emails that try to encourage us to reveal some type of personal information, including banks and lotto companies. Legitimate companies will not ask for your personal information to be sent back by email. Never reveal your personal information in this way.

Source #6 Wallet or Purse

Snatching your wallet and purse is a more common way thieves can get all the information they need and more to steal your identity. Never leave your wallet or purse in your vehicle in plain sight or preferably not even in it at all! I learned that many people still leave their car doors unlocked with valuables in it. This is just saying to thieves, “I’ve given you easy access, just come on in and take what you want.” It is best to keep your doors locked and keep your wallet or purse on your person, close to your body. Never carry your Social Security Card in your purse or wallet, and always know exactly what was in your purse (credit cards, cash, etc…) in the event that it is stolen so you can report cards or cash that was taken.

With so many ways an identity thief can steal your personally identifying information, it is imperative that you learn how to protect yourself.


People also view

Leave a Reply

Your email address will not be published. Required fields are marked *