Physical Address

304 North Cardinal St.
Dorchester Center, MA 02124

How Identity Thieves Steal and Use Your Information

“`html

What Is Personally Identifiable Information?

Personally identifiable information (PII) is data that distinguishes you from others. This includes your Social Security number (SSN), address, date of birth, email addresses, and phone number. You use this information to identify yourself to governments, banks, creditors, and other businesses. For instance, when you confirm your date of birth at a pharmacy to pick up medications, you’re using identifying information.

Unfortunately, if identity thieves get hold of your personal information, they can impersonate you. They might steal your money, open accounts in your name, and cause significant damage to your finances, credit, and reputation.

Sensitive vs. Non-Sensitive PII

PII can be categorized as sensitive or non-sensitive. Non-sensitive information is public knowledge, such as your name, birthday, or gender. Sensitive PII includes data that could cause personal damage, like financial losses, if compromised. Examples of sensitive PII include:

  • Social Security number
  • Bank account routing and account numbers
  • Credit and debit card numbers
  • Passwords
  • Passport numbers
  • Biometric information
  • Date of birth
  • Mother’s maiden name
  • Birthplace
  • Employer Identification number
  • Medical information

Even non-sensitive information can be combined with sensitive information to commit identity theft and fraud. The distinction between these types of PII ultimately depends on the context.

How Do Identity Thieves Steal Your Information?

Identity thieves use various methods to steal your personal information. Sometimes, people inadvertently give their information to criminals, such as through scam calls. Other times, cybercriminals use viruses or hacking to access your data. Here are some common methods:

Phishing

Phishing involves tricking you into revealing your sensitive information. Examples include fake websites and scam calls from people posing as government officials or your bank. A common phishing scam is an email that looks like a purchase confirmation from a trusted retailer, asking you to log in through a link that leads to a fake site.

Smishing

Smishing is similar to phishing but uses text messages. For example, you might receive a text claiming to be from a shipping service with a link to track a package. Clicking the link could lead to a malicious site that infects your device or asks for sensitive information.

Social Engineering

Social engineering exploits human psychology to trick you into giving up information. Fraudsters might send an email pretending to be a system administrator asking for your password. They may also pose as someone on social media to gain your trust and then ask for money or information.

Unsecure Internet Activity

Using unsecured Wi-Fi networks can expose your data to hackers. For example, if you do online banking or log into social media on public Wi-Fi, your sensitive data could be intercepted.

Document or Mail Theft

Identity thieves can steal your mail or sift through your trash to find documents with sensitive information. Always shred documents with identifying information before discarding them.

What Do Identity Thieves Do With Your Information?

Identity thieves use your PII to commit fraud. They might impersonate you, steal your money, or take out credit in your name. Sometimes, all they need is one piece of information, like your credit card number. Other times, they use a combination of sensitive and non-sensitive information to impersonate you. They can open new credit cards, withdraw funds from your bank account, or file a tax return in your name.

How to Keep Your PII Safe

While you can’t control everything, there are steps you can take to protect your PII:

  • Password-protect your devices and change compromised passwords immediately.
  • Shred documents with identifying information before discarding them.
  • Recognize phishing attempts and avoid giving information to unsolicited callers.
  • Set social media accounts to private and be cautious about sharing personal information.
  • Use a password manager to create strong, unique passwords for each site and application.
  • Sign up for free credit monitoring to get alerts about changes to your credit report.

Keep Sensitive Information Private

Everyone generates and uses PII regularly. From internet cookies to W-2s, medical records, and credit card transactions, your data leaves a trail. Protecting your PII involves limiting your vulnerability and understanding what information is sensitive. Additionally, know what information about you is already out there. Run a free dark web scan to see if any of your PII is being traded by criminals.

For any mortgage service needs, call O1ne Mortgage at 213-732-3074. We are here to help you with all your mortgage requirements.

“`

Leave a Reply

Your email address will not be published. Required fields are marked *