Lodinews.com

default avatar
Welcome to the site! Login or Signup below.
|
||
Logout|My Dashboard

Caught in a data breach? How to reclaim control of your credit and identity

Print
Font Size:
Default font size
Larger font size

Posted: Tuesday, April 22, 2014 10:00 pm | Updated: 1:39 am, Wed Jul 30, 2014.

(BPT) - By the end of the first quarter 2014, more than 200 data breaches compromised millions of consumer records, according to the Identity Theft Resource Center, which keeps track of reported data breaches. Stunned? Data breach stats are even more staggering if you’re among the millions of Americans caught up in one every year.

In addition to the potential monetary loss and identity theft risks, data breaches can also rob you of your sense of security and confidence. When you learn you’ve been involved in a data breach, it’s important to take steps to help protect your identity and financial accounts, and to rebuild your sense of security.

Often, breached organizations will offer affected customers some form of credit monitoring for a set period of time (usually one year) after the breach. While such services may go a long way toward making you feel more secure, be sure you understand exactly what the offered product can – and can’t – do to help you recover from the potential impact of a data breach.

Data breaches, credit monitoring and identity theft risks

Consumers whose personal or financial information is compromised in a data breach may be at greater risk of experiencing identity theft. In 2013, more than 13 million Americans experienced identity fraud, according to a study by Javelin Strategy.

Credit monitoring products aim to help minimize identity theft risks by keeping an eye on your credit accounts, where evidence of potential fraud and identity theft may first appear. Identifying such signs early may help mitigate some of the damages associated with identity theft.

While it’s true that consumers can do on their own virtually everything a credit monitoring product does, going it alone can sometimes be time-consuming and burdensome. Convenience is a significant benefit of a credit monitoring product. Not all credit monitoring products are alike, however, and if a company offers you this product in the wake of a data breach, don’t hesitate to carefully review the product and ask questions, including:

* Does the product provide daily monitoring of credit files?

* Will you receive timely alerts of key changes in your credit files?

* Does the product monitor your credit file at all three of the major credit reporting agencies, or only one? For example, Equifax Complete monitors information from all three bureaus.

* Are financial alerts included, and is it possible to link your bank and credit card accounts to the monitoring product? This allows you to be alerted when withdrawals from your bank account and/or charges to your credit card are processed, based on threshold amounts that you define.

* Is Internet scanning for your Social Security Number and credit card numbers included? This may help detect unauthorized posting of your Social Security number and credit card numbers on certain suspicious trading sites.

If a breached company cannot answer these questions, or you’re not satisfied that the credit monitoring product being offered is comprehensive enough for your needs, you may need to take additional steps. First, you should ask the breached company for a different product. Such companies are increasingly aware of the impact data breaches can have on their reputation, and may be more willing to engage with those customers who feel they’re not receiving an appropriate response in the wake of a data breach. If a company refuses to respond to your request, consider also subscribing to a more suitable product of your choice on your own – it can be a key step toward regaining some confidence and peace of mind when you’re a data breach victim.

Rules of Conduct

  • 1 Use your real name. You must register with your full first and last name before you can comment. (And don’t pretend you’re someone else.)
  • 2 Keep it clean. Please avoid obscene, vulgar, lewd, racist or sexually oriented language.
  • 3 Don’t threaten. Threats of harming another person will not be tolerated.
  • 4 Be truthful. Don't lie about anyone or anything. Don't post unsubstantiated allegations, rumors or gossip that could harm the reputation of a person, company or organization.
  • 5 Be nice. No racism, sexism or any sort of -ism that is degrading to another person.
  • 6 Stay on topic. Make sure your comments are about the story. Don’t insult each other.
  • 7 Tell us if the discussion is getting out of hand. Use the ‘Report’ link on each comment to let us know of abusive posts.
  • 8 Share what you know, and ask about what you don't.
  • 9 Don’t be a troll.
  • 10 Don’t reveal personal information about other commenters. You may reveal your own personal information, but we advise you not to do so.
  • 11 We reserve the right, at our discretion, to monitor, delete or choose not to post any comment. This may include removing or monitoring posts that we believe violate the spirit or letter of these rules, or that we otherwise determine at our discretion needs to be monitored, not posted, or deleted.

Welcome to the discussion.

Poll

Loading…

Your News

News for the community, by the community.

Mailing List

Subscribe to a mailing list to have daily news sent directly to your inbox.

  • Breaking News

    Would you like to receive breaking news alerts? Sign up now!

  • News Updates

    Would you like to receive our daily news headlines? Sign up now!

  • Sports Updates

    Would you like to receive our daily sports headlines? Sign up now!

Manage Your Lists