{"id":20286,"date":"2022-02-23T02:11:00","date_gmt":"2022-02-23T07:11:00","guid":{"rendered":"https:\/\/www.psafe.com\/en\/blog\/?p=20286"},"modified":"2022-03-14T16:56:52","modified_gmt":"2022-03-14T20:56:52","slug":"identity-theft-survivor-stories","status":"publish","type":"post","link":"https:\/\/www.psafe.com\/en\/blog\/identity-theft-survivor-stories\/","title":{"rendered":"Identity Theft: Survivor Stories"},"content":{"rendered":"\n<p class=\"wp-block-paragraph\"><b>Has your email or social networks ever been hacked before? <\/b><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><span style=\"font-weight: 400;\">You may not think that having your identity stolen will happen to you, but a <a aria-label=\"recent survey PSafe conducted (opens in a new tab)\" href=\"https:\/\/www.psafe.com\/dfndr-lab\/identity-theft-survey-conducted-by-psafe\/\" target=\"_blank\" rel=\"noreferrer noopener\">survey PSafe conducted<\/a> shows that 2 out of 5 respondents have been a victim of identity theft. <\/span><\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"identity-theft-makes-all-of-us-vulnerable\"><b>Identity Theft Makes All of Us Vulnerable<\/b><\/h3>\n\n\n\n<p class=\"wp-block-paragraph\"><span style=\"font-weight: 400;\">The reality is the online actions of hackers has a real-life impact on YOU. Our survey uncovered some disturbing data. <\/span><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><span style=\"font-weight: 400;\">The top 3 areas where people were affected fall under the main 3 things that people use every day, day and night.<\/span><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><b>Email accounts<\/b><span style=\"font-weight: 400;\"> &#8211; 47% were hacked.<br><\/span><b>Phone number <\/b><span style=\"font-weight: 400;\">&#8211; 45% were stolen.<br><\/span><b>Social network login<\/b><span style=\"font-weight: 400;\">s &#8211; 43% had their accounts taken over.<\/span><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><span style=\"font-weight: 400;\">Not to leave out other instances of identity theft, victims are deeply impacted financially as well. <\/span><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><b>31% had credit cards details taken<\/b><span style=\"font-weight: 400;\"> and used to buy unauthorized goods or services. While <\/span><b>30% discovered their bank or debit card was compromised<\/b><span style=\"font-weight: 400;\"> and fraudulent withdrawals took place. <\/span><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><span style=\"font-weight: 400;\">Overall, this type of cybercrime is increasing at alarming rates. On a projected basis, there are 42MM victims of identity theft.<\/span><\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"why-you-should-care\"><b>Why You Should Care <\/b><\/h3>\n\n\n\n<p class=\"wp-block-paragraph\"><span style=\"font-weight: 400;\">It\u2019s easy to be complacent and feel confident you\u2019ll never be a victim of identity theft. In fact, general assumptions are out there about this type of cybercrime, which lulls many into a false sense of untouchability. &nbsp;<\/span><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><span style=\"font-weight: 400;\">However, let\u2019s dispel some myths about identity theft:<\/span><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><b>Myth #1<\/b><span style=\"font-weight: 400;\"> &#8211; Only people with weak passwords get hacked and taken advantage of.<\/span><span style=\"font-weight: 400;\"><br><\/span><b>Truth<\/b><span style=\"font-weight: 400;\">: Weaker passwords are more vulnerable, yes. However, some hackers do employ sophisticated methods to crack passwords, which is why it\u2019s wise to change your passwords every few months, not once every 5 years.<\/span><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><b>Myth #2<\/b><span style=\"font-weight: 400;\"> &#8211; The problem is automatically solved by changing the password of the hacked account.<br><\/span><b>Truth<\/b><span style=\"font-weight: 400;\">: Information is like currency. Once a hacker gets a hold of an email login, that login is a potential to all of your personal information (full name, address, phone number, credit cards, social media accounts) which can be used to commit financial or identity fraud in your name.<\/span><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><b>Myth #3<\/b><span style=\"font-weight: 400;\"> &#8211; Only the older generation naively click on random links and falls prey to identity theft.<br><\/span><b>Truth<\/b><span style=\"font-weight: 400;\">: Crime does not discriminate! All ages and genders can be fooled. One method hackers use is taking over one of your logins, either an email or social media account, and impersonating you to launch a social engineering attack against your friends and family.<\/span><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><span style=\"font-weight: 400;\">The survey PSafe conducted included survivor stories and the brutal reality is having your credit score or social security number tampered with has severe fallout, even lasting several years to clear your name or restore your credit standing. <\/span><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><span style=\"font-weight: 400;\">Read some victims stories:<\/span><a href=\"https:\/\/go.onelink.me\/app\/2745d243\" target=\"_blank\" rel=\"noreferrer noopener\"><img decoding=\"async\" class=\"wp-image-20321\" src=\"https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2019\/05\/BlogPost_1-1024x512.jpg\" alt=\"\"><\/a><a href=\"https:\/\/go.onelink.me\/app\/2745d243\" target=\"_blank\" rel=\"noreferrer noopener\"><img decoding=\"async\" class=\"wp-image-20323\" src=\"https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2019\/05\/BlogPost_3-1024x512.jpg\" alt=\"\"><\/a><\/p>\n\n\n\n\n\n<h3 class=\"wp-block-heading\" id=\"fight-back-with-identity-theft-monitoring\"><b>Fight Back With Identity Theft Monitoring<\/b><\/h3>\n\n\n\n<p class=\"wp-block-paragraph\"><span style=\"font-weight: 400;\">The above victims&#8217; stories show that identity theft can happen to anyone; at any time. dfndr security is your preventative measure against this insidious crime. <\/span><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><span style=\"font-weight: 400;\">Just as you would lock the front door of your house against physical thieves, <\/span><b>dfndr security<\/b><span style=\"font-weight: 400;\"> has a new feature called, <\/span><b>Identity Theft Monitoring<\/b><span style=\"font-weight: 400;\">, solely designed to be your \u201clock\u201d against online thieves. <\/span><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><span style=\"font-weight: 400;\">Identity Theft Monitoring is your stop-gap for preventing identity theft. Activating its functions can help you stop a tidal wave of financial, emotional, and mental pain. <\/span><\/p>\n\n\n\n<div class=\"wp-block-image\">\r\n<figure class=\"aligncenter\"><a href=\"https:\/\/go.onelink.me\/app\/2745d243\" target=\"_blank\" rel=\"noreferrer noopener\"><img decoding=\"async\" class=\"wp-image-20312\" src=\"https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2019\/05\/Screen-Shot-01-e1559234376166.png\" alt=\"\" \/><\/a><b style=\"font-size: 22px;\">How Does Identity Theft Monitoring Work?<\/b><\/figure>\r\n<\/div>\n\n\n\n<p class=\"wp-block-paragraph\"><span style=\"font-weight: 400;\">T<\/span><span style=\"font-weight: 400;\">he <\/span><b>Identity Theft Monitoring feature<\/b><span style=\"font-weight: 400;\"> is a fully developed protector of your identity details. We alert you on data leaks, let you know if your accounts are affected, and offer help on what to do if one of your email accounts is compromised. <\/span><span style=\"font-weight: 400;\">Here is a complete breakdown:<\/span><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><b>24-Hour Monitoring<br><\/b><span style=\"font-weight: 400;\">We monitor your credentials 24 hours a day, 7 days a week. To activate this, register your email accounts and whenever there is any suspicious activity concerning your personal data, you\u2019ll immediately receive a notification by email.<\/span><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><b>Weekly Status Reports<br><\/b><span style=\"font-weight: 400;\">Every week, you\u2019ll receive a complete report on the security status of your registered accounts. This means you\u2019ll have total control of your data on the internet.<\/span><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><b>Data Breach Alerts<br><\/b><span style=\"font-weight: 400;\">If your data is violated and compromised, you\u2019ll receive real-time alerts via email with the details of the leak and what to do to resolve the problem. We are always looking out for your personal information.<\/span><\/p>\n\n\n\n\n\n<p class=\"wp-block-paragraph\"><span style=\"font-weight: 400;\">To use <strong>Identity Theft Monitoring<\/strong> and give yourself peace of mind from identity theft, subscribe to the <strong>Ultra Security plan<\/strong>. Get it here now:<\/span><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><a href=\"\/\/launch\/breach_report_subscription\" target=\"_blank\" rel=\"noreferrer noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"354\" height=\"66\" src=\"https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2019\/07\/PURCHASE-ULTRA-PLAN.png\" alt=\"\" class=\"wp-image-20394\" srcset=\"https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2019\/07\/PURCHASE-ULTRA-PLAN.png 354w, https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2019\/07\/PURCHASE-ULTRA-PLAN-300x56.png 300w\" sizes=\"auto, (max-width: 354px) 100vw, 354px\" \/><\/a><\/figure><\/div>\n\n\n\n<p class=\"wp-block-paragraph\">You can also opt for our <strong>Pro Security plan <\/strong>which includes all that Ultra offers, but without the premium Identity Theft Monitoring feature. This plan includes an <strong>ads free <\/strong>experience, unlimited<strong> Identity Theft Reports<\/strong>, <strong>App Privacy Scan<\/strong>, <strong>Safe App Installer<\/strong>, and <strong>Anti-theft Protection<\/strong>. Choose that plan here:<\/p>\n\n\n\n<div class=\"wp-block-image\">\r\n<figure class=\"aligncenter\"><a href=\"\/\/launch\/subscription_plans\" target=\"_blank\" rel=\"noreferrer noopener\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-20395\" src=\"https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2019\/07\/PURCHASE-PRO-PLAN.png\" alt=\"\" width=\"354\" height=\"66\" srcset=\"https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2019\/07\/PURCHASE-PRO-PLAN.png 354w, https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2019\/07\/PURCHASE-PRO-PLAN-300x56.png 300w\" sizes=\"auto, (max-width: 354px) 100vw, 354px\" \/><\/a><\/figure>\r\n<\/div>\n\n\n\n<p class=\"wp-block-paragraph\">READ about all our subscription plans <a href=\"https:\/\/www.psafe.com\/en\/blog\/peace-of-mind-with-a-plan-tailored-to-you\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"here (opens in a new tab)\">here<\/a>.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><em>*Fictitious images were used to preserve the identity of victims.<\/em><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Did you want to see all the survey results?<strong> Read them <a href=\"https:\/\/www.psafe.com\/dfndr-lab\/identity-theft-survey-conducted-by-psafe\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"here (opens in a new tab)\">here<\/a>.<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Learn about the devastating impact of having your identity stolen and what to do.<\/p>\n","protected":false},"author":40,"featured_media":20713,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","footnotes":""},"categories":[12301],"tags":[],"class_list":["post-20286","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-exclusive-news"],"_links":{"self":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/20286","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/comments?post=20286"}],"version-history":[{"count":46,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/20286\/revisions"}],"predecessor-version":[{"id":21186,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/20286\/revisions\/21186"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/media\/20713"}],"wp:attachment":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/media?parent=20286"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/categories?post=20286"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/tags?post=20286"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}