{"id":20083,"date":"2021-06-17T09:00:46","date_gmt":"2021-06-17T13:00:46","guid":{"rendered":"https:\/\/www.psafe.com\/en\/blog\/?p=20083"},"modified":"2022-03-14T16:56:55","modified_gmt":"2022-03-14T20:56:55","slug":"long-term-effects-of-identity-theft","status":"publish","type":"post","link":"https:\/\/www.psafe.com\/en\/blog\/long-term-effects-of-identity-theft\/","title":{"rendered":"The Long-Term Effects of Identity Theft"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Identity theft involves cybercriminals gaining access to financial information or credentials that can be used to establish credit or make purchases in your name. Regardless of how you are victimized, there can be<a href=\"https:\/\/medium.com\/@AxelUnlimited\/enough-is-enough-2018-has-seen-600-too-many-data-breaches-9e3e5cd8ff78\" target=\"_blank\" rel=\"noopener noreferrer\"> long-lasting consequences<\/a> of being a victim. Find out how identity theft can affect you and what you can do to discover if someone has fraudulently used your information.<\/span><\/p>\n<p><strong>Read More:\u00a0<a href=\"https:\/\/www.psafe.com\/en\/blog\/video-how-to-password-protect-facebook-whatsapp\/\" target=\"_blank\" rel=\"noopener noreferrer\">How to Password Protect Facebook and WhatsApp<\/a><\/strong><\/p>\n<p><b>Effect #1 &#8211; Financial Loss<\/b><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">The most severe consequence of identity theft is the loss of personal funds. Often times, fraudulent purchases made using stolen credit or debit card information is covered by the bank or company issuing the card. Sometimes, though, money that\u2019s stolen through other means such as wire fraud or bogus money orders or cashier\u2019s checks can be more difficult to recover and can be difficult to prove. Also, if time has passed and the victim doesn\u2019t notice the fraud in a timely manner, the odds of recovering the stolen money greatly decreases. In certain circumstances, the victim can be left financially devastated. Recovering lost funds could take years and in some cases, the money might never be recovered.<\/span><\/p>\n<p><b>Effect #2 &#8211; Employment Woes<br \/>\n<\/b><span style=\"font-weight: 400;\">Identity fraud doesn\u2019t only ruin credit scores affecting the ability for you to apply for credit cards, mortgages or get financing but also affect employment. Many employers not only drug test and check criminal history, but conduct a credit check as well. Those with bad credit scores have a much more difficult time finding a job.<\/span><\/p>\n<p><b>Effect #3 &#8211; Mental Stress<br \/>\n<\/b><span style=\"font-weight: 400;\">It can take hundreds of hours to clear up an identity theft case. In many instances, victims find that issues that they thought were resolved may pop up again years later leading to ongoing damage control that can take an emotional toll. The stress and fear of financial insecurity can have a lasting impact on mental health. \u00a0Many identity theft scams have cost families their vehicles, home, and life savings and left them penniless. The fear of losing everything can be emotionally crippling, cause anxiety and in extreme cases has lead to ending marriages, hospitalization, and even suicide. <\/span><\/p>\n<p><b>Avoid Becoming an Identity Theft Target<br \/>\n<\/b><span style=\"font-weight: 400;\">Fortunately, there are things you can do to protect yourself from becoming a victim and actions you can take if your identity is stolen.<\/span><\/p>\n<p><b>ONE<\/b><span style=\"font-weight: 400;\">, credit monitoring services help discover suspicious activity concerning your financial business and insure against loss if your identity is stolen. You can also manually check your bank account, credit card statements and credit reports for fraudulent activity.<\/span><\/p>\n<p><b>TWO<\/b><span style=\"font-weight: 400;\">, using <\/span><a href=\"https:\/\/app.appsflyer.com\/com.psafe.msuite?pid=MKT_BLOG_US&amp;c=fallout_identity_theft\" target=\"_blank\" rel=\"noopener noreferrer\"><b>dfndr security<\/b><\/a><span style=\"font-weight: 400;\"> can protect your mobile device from phishing attacks and the<em> Identity Theft Report feature<\/em> can help you find out if your email addresses have been leaked. Also, the<em> Identity Theft Monitoring feature<\/em> can be used to watch ALL your logins and will even alert you if any of your accounts are compromised. Try em&#8217; out!\u00a0<\/span><\/p>\n<p><b>THREE<\/b><span style=\"font-weight: 400;\">, if you receive credit card statements or banking statements in your inbox, be sure to archive those properly in a secure cloud service. This helps prevent hackers from having access to documents that lists your private information.<\/span><\/p>\n<p><b>FOUR<\/b><span style=\"font-weight: 400;\">, contact one or more of these agencies if your identity has been compromised:<\/span><\/p>\n<p><a href=\"https:\/\/www.consumer.gov\/idtheft\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">www.consumer.gov\/idtheft\/<\/span><\/a><span style=\"font-weight: 400;\"> (Federal Trade Commission).<\/span><\/p>\n<p><a href=\"https:\/\/www.privacyrights.org\/fs\/fs17a.htm\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">www.privacyrights.org\/fs\/fs17a.htm<\/span><\/a><span style=\"font-weight: 400;\"> (Identity Theft: What to Do if It Happens to You).<\/span><\/p>\n<p><a href=\"https:\/\/www.idtheftcenter.org\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">www.idtheftcenter.org<\/span><\/a><span style=\"font-weight: 400;\"> (For information on consumer focused items, click on \u201cconsumer resources\u201d on the left side of the page).<\/span><\/p>\n<p><a href=\"https:\/\/www.justice.gov\/archives\/stopfraud-archive\/report-financial-fraud\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">https:\/\/www.stopfraud.gov\/protect-identity.html<\/span><\/a><span style=\"font-weight: 400;\"> (Department of Justice).<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Learn about the lasting consequences of being a victim and what you can do.<\/p>\n","protected":false},"author":40,"featured_media":20536,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","footnotes":""},"categories":[5],"tags":[4495,12208],"class_list":["post-20083","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","tag-android-protection","tag-identity-theft"],"_links":{"self":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/20083","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/comments?post=20083"}],"version-history":[{"count":13,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/20083\/revisions"}],"predecessor-version":[{"id":20354,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/20083\/revisions\/20354"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/media\/20536"}],"wp:attachment":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/media?parent=20083"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/categories?post=20083"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/tags?post=20083"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}