{"id":18218,"date":"2018-06-06T13:00:51","date_gmt":"2018-06-06T17:00:51","guid":{"rendered":"https:\/\/www.psafe.com\/en\/blog\/?p=18218"},"modified":"2022-04-27T15:15:57","modified_gmt":"2022-04-27T19:15:57","slug":"how-to-protect-your-child-from-identity-theft","status":"publish","type":"post","link":"https:\/\/www.psafe.com\/en\/blog\/how-to-protect-your-child-from-identity-theft\/","title":{"rendered":"How to Protect Your Child From Identity Theft"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">One of the scariest forms of cybercrime is identity theft, and children are falling prey to these scams in higher numbers than ever before. While identity theft is inflicted upon adults by familiar players, like a disgruntled friend or co-worker, this is rarely the case with a child whose identity is stolen by a faceless hacker. Anyone with a social security number and mobile data can be victimized by identity theft nowadays.<\/span><\/p>\n<p><b>Read More: <\/b><a href=\"https:\/\/www.psafe.com\/en\/blog\/how-to-prevent-identity-theft-online\/\"><b>How to Prevent Identity Theft When You\u2019re Online<\/b><\/a><\/p>\n<p><span style=\"font-weight: 400;\">As a parent, you should ensure that your children are protected from cybercrime. If they use your Android device frequently to play games, install antivirus software on your phone, like <\/span><a href=\"https:\/\/app.appsflyer.com\/com.psafe.msuite?pid=MKT_BLOG_US&amp;c=protect_your_child_identity_theft\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">dfndr security<\/span><\/a><span style=\"font-weight: 400;\">. This AV-TEST approved app has a full virus scan feature that checks your mobile device for any malware or potential threats, eliminating them instantly. If your child is older and you\u2019ve generously granted him or her with an Android, be sure they have dfndr security installed and have activated the full virus scan feature. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">It can feel helpless on how to protect what\u2019s most important to you, but knowing how this faceless enemy operates gives you the power to support your children as they grow up in the digital age.<\/span><\/p>\n<p><b>The Stats on Child Identity Theft<br \/>\n<\/b><span style=\"font-weight: 400;\">Listen to these sobering stats. In 2017 alone, there were <\/span><a href=\"https:\/\/www.cbsnews.com\/news\/yes-your-child-could-be-a-victim-of-identity-theft\/\"><span style=\"font-weight: 400;\">more than 1 million children<\/span><\/a><span style=\"font-weight: 400;\"> targeted by cybercriminals. The stolen information was commonly used to extort money from parents. $2.6 billion in losses were caused by hackers who stole the data of children, regardless of age. Out of that $2.6 billion, families endured losses of approximately $540 million, while the rest was spent by the authorities and government.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">While 60% of adults who fall prey to identity theft likely knows the perpetrator (a vengeful ex-partner or cousin, for example), only 7% of children were found to be connected to a perpetrator. Another shocking stat is that 11% of households in the U.S. reported that at least one child had personal information compromised in 2017. It\u2019s also easier for criminals to target children because their parents are unlikely to check their child\u2019s credit report.<\/span><\/p>\n<p><b>The Tell-Tale Signs<br \/>\n<\/b><span style=\"font-weight: 400;\">The <\/span><a href=\"https:\/\/www.consumer.ftc.gov\/articles\/0040-child-identity-theft\"><span style=\"font-weight: 400;\">Federal Trade Commission<\/span><\/a><span style=\"font-weight: 400;\"> outlines some ways your child\u2019s identity may have been stolen. First, if your child is rejected for benefits because an account was already opened elsewhere, that\u2019s a huge clue. Another example is if the IRS sends a notice claiming your child should have paid income taxes but didn\u2019t, or you discover your child\u2019s Social Security number appeared on another tax form &#8212; these are both red flags to pay attention to. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Additionally, if debt collectors begin calling regarding unpaid products and services that your child never purchased or used, this could be identity theft.<\/span><\/p>\n<p><b>Don\u2019t Feel Paralyzed; Get Proactive<br \/>\n<\/b><span style=\"font-weight: 400;\">Monitor your child\u2019s phone or your own phone to ensure apps are locked down with parental controls, so only certain apps can be opened. It\u2019s also important to have a conversation with your child about being prudent when sharing photos, videos, or any sensitive data with friends. Having an open, honest dialogue means your children are more likely to admit sharing the wrong information or experiencing oddities when using apps.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>More than 1 million children were victims of identity theft in 2017 alone.<\/p>\n","protected":false},"author":83,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","footnotes":""},"categories":[5],"tags":[252,195,218,358,545,249,67],"class_list":["post-18218","post","type-post","status-publish","format-standard","hentry","category-security","tag-app1","tag-app5","tag-privacy","tag-protection","tag-safety","tag-security","tag-smartphone"],"_links":{"self":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/18218","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/users\/83"}],"replies":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/comments?post=18218"}],"version-history":[{"count":5,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/18218\/revisions"}],"predecessor-version":[{"id":18915,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/18218\/revisions\/18915"}],"wp:attachment":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/media?parent=18218"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/categories?post=18218"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/tags?post=18218"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}