How does identification theft happen? unless you’ve been influenced by it, friend may have never offered the question lot thought. And also guess what? even when you a victim, you might never know exactly how it happened. Whereby was the weak attach that allowed your an individual information to loss into the hand of an identification thief? to be it your fault? Or that of a organization that you entrusted with your information? and also was the stolen critical month—or 10 year ago?

When considering how identity theft happens, it helps to recognize what’s needed to steal her identity. Vital is personally i can identify information, or PII—data that could potentially be supplied to recognize an individual. This could be a full name, Social defense number, address, or driver’s license number. Every of these is considered PII. The an ext of it an identity thief has—linked to a specific person—the less complicated it might be because that the thief to steal that person’s identity. Learn much more about PII here.

You are watching: How can thieves steal an identity?

How do identification thieves put their hand on your personal information? There space any number of ways, native sophisticated technical attacks to merely being in ~ the right ar at the best time. Below are seven ways your PII have the right to land in the not correct hands, possibly leading to identification theft, and also a “best bet” that may assist protect your information:

Data breaches 
Data breaches often make headlines, so this is one method you’ve likely heard around before. Accidental or intentional, castle can reason problems—for the organizations that endure them and also the people whose info is exposed.An inadvertently data breach could occur as soon as an organization employee leaves a occupational computer—containing PII or a way to access it—in a breakable place, allowing someone come steal it. An intended breach usually involves criminals detect a means to access an organization’s computer system network so that they deserve to steal PII. The criminals can deploy a advanced technical assault or simply trick one employee into clicking a connect that creates an attack opening to it is in exploited. Regardless of exactly how it happens, a data breach can, in one fell swoop, disclose the PII of numerous unwitting victims.Best bet:
The much less you share your PII, the better. In this digital era, though, sharing your an individual information is a regular component of life. However you can try to be smart around it. If someone requests your Social security number, ask yourself if lock really need it and, if you decision they do, asking them just how they’ll safeguard it. As soon as shopping online, stick with familiar and also trusted companies rather 보다 ones you’ve never heard of. A well-known firm is an ext likely to invest in the security measures to protect its business and your data. The course, as we’ve seen, also respected entities can autumn short. And also once you provide your PII come a company, girlfriend can’t regularly be sure that agency won’t offer or share it through another. 
We mentioned above the act of tricking someone within an company into clicking a link. This is regularly the basis of a phishing attack. Criminals will send emails come folks inside the entity they want to attack. They desire a recipient to click on a attach or open an attachments that could give the criminals accessibility to the organization network, providing accessibility to PII.Why target employees? One industry official says criminals consider employees the low-hanging fruit the attackers can try to manipulate to gain into the system. But be aware that phishing strikes can additionally target individuals exterior a organization or government agency.Best bet: Before exhilaration on an e-mail link or attachment, inspection it completely to make certain it’s legitimate. If it shows up to be from a company with who you perform business, kind in the URL yourself. Making a fraudulent email look legit is what identification thieves do. 
Here’s one means of identification theft you may not think about. If she in an airport, coffee shop or other place that offers free public Wi-Fi, a criminal could be ~ above that exact same network, city hall what you’re doing online. And don’t think that a password-protected Wi-Fi network is lot safer. The criminal could easily have actually that exact same coffee-shop password, together well.Best bet: Experts advise no to perform anything on a windy Wi-Fi network that requires logging in to account or make purchases. Doing therefore could an outcome in you inadvertently handing over your log-in information and credit map number to a thief. If you can’t wait till you’re top top a network the you understand to it is in safe and secure—at home, for instance—use virtual private network (VPN) software to develop a certain “tunnel” through which your data have the right to travel. 
Even in this digital era, identity thieves stick with what works. And grabbing letter from one unsecured mailbox is a tried-and-true technique to steal someone’s PII. The one thing if castle grabbing only junk mail, but they could likewise grab financial institution or credit transaction card declaration or, worse yet, tax creates that incorporate your Social defense number.Best bet: If it’s not already, make sure your mailbox is locked or otherwise secure indigenous everyone other than you and also the mail carrier. 
Like mail theft, dumpster diving is a time-tested method criminals can put their hands top top PII. Identification thieves space not above digging through your trash to find financial statements, tax papers or other information that might help them steal your identity.Best bet: prior to discarding, shred papers containing necessary information the you don’t want others come see. 
Imagine losing your wallet through your Social protection card and also driver’s license. An identification thief who found it would have actually your complete name, address, birthdate and, that course, Social security number. You might as well have bound a ribbon about it through a card the said, “Please steal my identity!”Best bet: Don’t carry your Social protection card around with you. You seldom need it, and also given its importance to identification thieves, you want to keep the card—and any kind of documents that encompass your Social security number—safe and also secure. 

Data protection might sound favor a strictly digital term, however it has actually an analog counterpart. If girlfriend invite strangers—or near-strangers—into her home, you have to keep this in mind. Might an appliance fix person, housecleaner or dog pedestrian come across information the you favor to keep secret?Best bet: Make certain documents and other items containing personal information room safe and also secure, not easily easily accessible by any visitor to her home.

obtain identity Theft security 30 job FREE*

Criminals have the right to open brand-new accounts, get payday loans, and even paper tax return in her name. There to be a victim of identification theft every 3 seconds in 2019°, so nothing wait to obtain identity theft protection.

start your protection now. It only takes minutes to enroll.

Editorial note: ours articles administer educational details for you. offerings might not covering or protect versus every type of crime, fraud, or danger we compose about. Our score is to boost awareness about cyber safety. Please review complete Terms during enrollment or setup. Remember the no one deserve to prevent all identification theft or cybercrime, and that does not monitor every transactions at every businesses.


Stay informed around the latest identity theft news and also stories around what legislation enforcement and elected officials space doing to defend consumers from ending up being victims.

Stay informed about the latest identity theft news and stories about what law enforcement and elected officials room doing to safeguard consumers from coming to be victims.

Stay informed around the latest identity theft news and also stories around what legislation enforcement and also elected officials space doing to protect consumers from becoming victims.

See more: Hillary Clinton White House Correspondents Dinner


Stay informed around the latest identity theft news and stories about what legislation enforcement and elected officials are doing to defend consumers from coming to be victims.