Protect Your Identity

October 22, 2019

7 Ways You Can Keep Your Children Safe From Identity Theft this School Year

Are you doing all that you can to keep your children safe from identity theft? Learn tactics for protecting their identities this school year.

Children raising their hands within a classroom.

As our world gets ever more present online its important, now more than ever, to not only teach your children about the dangers that lurk online but also protect them until they can begin to protect themselves. 

Child Identity Theft

Child identity theft occurs just like most cases of identity theft does. However, children are one of the most at-risk groups when it comes to identity theft.

To a cybercriminal, obtaining a child’s information is like hitting the jackpot. Why? Well, there are two main reasons

  • They are a clean slate. A child has no past credit or debt. Obtaining this information allows the cybercriminal free reign.
  • The long game. When cybercriminals get their hands on a child’s information, they will have that information for years before it goes noticed.

A child drawing with crayons.

Because of these perks, during major data breaches, children are often impacted the most. During an average breach, 39% of fraud victims will be children whereas only 19% will be adults

When committing this fraud, criminals will steal double the amount they would steal from an adult. Due to this, families end up paying an average of $541 in out-of-pocket recovery fees compared to the average adult fraud victim who only pays an average of $104.

Clearly, child identity theft is a massive issue that needs to be addressed. To stay on top of identity theft threats, know the signs and situations that may put your child at risk.

A situation where a child is extremely vulnerable is while they are in school.

School and Identity Theft

For all of the reasons we mentioned above, schools are the perfect place for the cybercriminal to obtain a child’s personal information. And, by hacking into school systems, they can obtain the information of numerous children at the same time.

That being said, identity theft does not always result from a hack or a cybercriminal. In some cases, physical documents are raided and stolen by a criminal.

There is no way to tell if and when your child’s identity will be stolen. The best way to safeguard your child is by learning tactics to protect their personal information.

 

7 Ways to Protect Your Child’s Identity this School Year

#1 – Keep Their SSN Private

When enrolling your child in school, and for every school year after, you will have to fill out paperwork for your child. This paperwork typically asks standard questions. However, some will ask for very personal information, including your child’s Social Security Number. 

Asking for an S.S.N. will range from school district to school district. Most of the time, the S.S.N. is used as an identification number for the child. If they are asking for this number, the school must:

  1. Inform you and your child that providing it is voluntary and that refusing to provide it will not bar your child from enrolling in or attending school
  2. Explain for what purpose the number will be used

The outside of a school with bikes.

The school district can not turn you down for not providing the Social Security Number or require you provide it for your child to enroll.

If you do not want to provide your child’s Social, you do not have to. If you feel as though the school is pushy or will not accept the application without the S.S.N., that school may not be the right school for you.

#2 – Educate Your Child

The best way to prevent identity theft is through education. When it comes to children, they may not always know what kind of information they should and should not be sharing with their school friends or even strangers. 

Children are trusting by nature, so be sure that whether they are just starting school or are going back to school after a long summer, your child is keeping their personal information to themselves online and in class.

Some ways you can teach your child more about what identity theft is are…

 

  • Teach them what personal information is. A child may not know the things that they should not be sharing. Teach them that things like their full name, address, and Social Security number are not things to share with others.
  • Explain what identity theft is. Identity theft may be a hard concept for younger children to grasp. However, it is still important to explain to them why it is so harmful. Simplify the crime in your own words and include some things a cybercriminal can do with their personal information.
  • Provide ways to protect personal documents. Depending on the age of the child, they may be transporting personal documents 

 

#3 – Manage Copies of Personal Information

When enrolling your child in a new school, you may be asked to provide copies of things like your child’s birth certificate. If you are being asked to create these copies, be sure to manage the copies you create and ask the school what they will be doing with the copies. 

A collection of writing utensils that would be used at schools.

If you do not feel safe making copies of these documents, opt to bring in the original copy of the document for the school to view. Simply seeing the document should be enough for them to verify your child’s information.

#4 – Review Their Online Accounts

Children are creating social media accounts younger and younger. If your child is on social media, review their account to ensure that they are not leaving their identity unsecured.

When reviewing the online account, look for

  • A strong password. Children may not have the ability to create a secure password on their own. Create an account password that adds a variety of uppercase, lowercase, number, and symbols.
  • An anonymous username. We know that no username is fully anonymous. However, you can make sure that your child’s full name or personal information is not included in their username. 
  • Personal photos. If your child has any personal photos posted on social media, delete them. Personal photos revealing pets, street names, friends, and more can give more ammunition to a cybercriminal.
  • Public personal information. Be sure that no personal information is posted online or on their social media account. If there is a social account that requires some personal information, be sure that their privacy settings are up-to-date so that the information is not visible to the public.

We just wrote a whole blog about keeping your social media account secure. If you’d like more information on this topic, read How to Protect Your Identity on Social Media!

#5 – Protect Sensitive Information

Keeping sensitive information protected is very important. Depending on the age of your child, you will be protecting their information differently. 

Students raising their hands in an auditorium.

For children still living in your home, keep their information where you keep your own personal information so that you know exactly where it is. If, for some reason, they need to bring paperwork containing personal information to school, transfer the information in a sealed envelope and instruct them to deliver the information right away to eliminate the risk of it being lost.

For children living at college, buy them personal a lockbox or safe where they can keep sensitive documents in.

For children of any age, be sure that any devices are password or pin protected.

#6 – Opt-out of Child ID Kits

Have you ever heard of a Child ID Kit? This kit was created by the National Child Identification Program to help identify your child faster if they ever go missing. The completion of this kit is sometimes encouraged through your child’s school. 

This kit requires:

  • Inkless fingerprints
  • Cards for detailing your child’s physical descriptions including a body map for pointing out scars, birthmarks, and other identifying features
  • Current photos
  • An easy-to-use swab to take and store a small DNA sample

Now, this is not a kit that you send back to the FBI for them to store. This kit is stored in your home or your child’s school. This kit may seem like a good idea now, but, what if this information somehow falls into the wrong hands?

If a criminal somehow acquires this information, it can be used for malicious things. 

A report on a table

#7 –  Request a Child Credit Report

As we mentioned at the beginning of the blog, child identity theft may go unnoticed for years. One way you can check in on your child’s identity is by requesting a child credit report.

Much like credit reports for adults, this report will list any loans, debts, or accounts listed under your child’s name.

In order to obtain the report

From Experian, you can use Experian’s free Child ID Scan service or submit a written request via Experian’s website. Information you will need to include with the written request is:

  • A copy of your government-issued ID, such as a state ID card or driver’s license
  • A copy of a bank statement or utility bill for proof of address
  • A list of any previous addresses where you’ve lived in the past two years
  • A copy of your child’s birth certificate with his or her full name, including middle initial and suffix
  • A copy of your child’s Social Security card

From Equifax, you will need to contact the Minor Child Department. You will need to submit:

  • A letter of explanation detailing why you believe your child’s personal information was obtained or used fraudulently
  • A copy of your child’s birth certificate
  • Documentation of your child’s Social Security number
  • A copy of your driver’s license or state-issued ID as proof of your current address

From TransUnion, you can email childidtheft@transunion.com or use a secure online form to request the information.

 

Now that you’ve learned how and why it’s important to protect your children on line what step are you going to implement to make sure they stay safe?

Any questions or concerns? Leave them in the comments below!

July 24, 2019

7 Ways to Spot an Email Phishing Scam

Are you concerned about falling victim to an Email Phishing Scam? Read more to find out 7 ways to spot an Email Phishing Scam.

Email Phishing Scams

One of the most common tactics used by identity thieves is Phishing scams. Phishing scams not only affect individuals but large companies and organizations as well.

97% of all people who receive Phishing emails do not recognize the email as a scam and almost half of all people who receive Phishing emails fall for them.

Have you ever been a victim of a Phishing Email Scam? Are you worried about becoming one?

Read more below to find out what a Phishing Scam is, the types of Email Phishing Scams being used, and 7 ways to spot an Email Phishing Scam in your inbox.

 

What is an Email Phishing Scam?

Phishing occurs when a cybercriminal uses fraudulent tactics to obtain your personal information. 

They then use this information to commit fraud or even identity theft. These Phishing scams can come in the form of fake emails, fraudulent texts, copycat websites, and much more.

Hackers may also be using Phishing tactics to obtain access to your computer or internet network in order to install programs that will be harmful to you and your personal information.

Many people fall for Phishing email scams because the hacker creates a false sense of security or urgency in order to prey on their target.

 

Types of Email Phishing Scams

Email phishing scams come in a number of shapes and sizes. Some common phishing scams include:

Spear Phishing

During this Phishing tactic, the hacker targets specific individuals via email. In this approach, the hacker does extensive research on the person/organization they are targeting in order to make the scam more personalized and believable. Spear Phishing

Ransomware Phishing

During this attack, hackers use fake links, attachments, and “malvertising,” advertising containing scripts that download malware and unwanted content onto your computer. In this hack, cybercriminals will restrict access to personal information until a ransom is paid. This recently happened to the City of Baltimore. Read more about it on our blog!

Ransomware attacks

Link Manipulation

In this type of Phishing, the hacker will send include a link to a malicious website in the email. Once the link is clicked, the email’s receiver will be redirected to the hacker’s website instead of the website they thought they were going to.

malicious website links

Clone Phishing

Clone Phishing occurs when a hacker clones a previous piece of online communication to make it look identical. However, in this email, the hacker will attach malicious links or attachments in order to gain access to your information.

cloning emails

Whaling

This email Phishing tactic specifically targets senior executives in a company or high-profile employees within a business. This email will be personalized for their role and often includes documents such as subpoenas, legal content, or customer complaints.

whaling email scam

How to spot an Email Phishing Scam

Email Phishing scams may sound scary, but there are a number of precautions you can take to protect yourself. The biggest way to avoid falling for a phishing scam is to know the warning signs. Below are 7 ways to spot an email phishing scam tactic.

Emails from Unknown Senders

Before trusting any email you open, make sure that you recognize the sender. This isn’t always a perfect way of telling if the email has been faked or not, but this base check will act as a way to weave out potential Phishing emails. 

Even if you recognize the person name, confirm that the email address that the email is coming from belongs to them. Hackers will often spoof real emails or create emails that are similar to the real person’s email in order to get you to give up your personal information.

Bad Grammar and Typos

Any reputable company or business would not allow emails with bad grammar or spelling errors to go out. If there are numerous, jarring mistakes in the email, it is best to send it to your trash.

It is also important to be wary of how the email is addressed. Often times, emails using generic greetings such as “Dear Customer,” “Dear Member,” or they may use of your full email address such as “Dear JohnDoe@ABC.com

Asking for personal information

The main goal of any Phishing scam is to obtain your personal information. In Phishing emails, the hacker will often get you to input your information by requesting for you to “update” or “verify” the information for their system.

No company is going to ask for your personal information via email. If you receive an email asking for you to “verify” any login credentials, credit card numbers, bank account numbers, Social Security numbers, or other personal information, it is most likely a scam and should be deleted immediately. 

The use of urgency words or warning of an account threat

Hackers will take advantage of your anxiety about being hacked to gain access to your information. Emails containing urgency words or warning words like “Urgent Action Requested!” or “Your Account Has Been Closed!” are most likely scam emails

If you ever receive an email like this and you are suspicious, it is best to call the business that is emailing you in order to confirm the issue before you give out your personal information.

Unrecognized links or attachments

Often, hackers will include fraudulent links or attachments in a Phishing email in order to obtain your information. 

One tip to know to avoid clicking on potentially harmful things is to hover over the link to reveal the hyperlink. The hyperlink is the full website that the embedded link is leading you to. If the hyperlink looks shady, do not click it. 

Another helpful tip is to educate yourself on DNS, or Domain Name System. DNS structure is what you see within a website’s URL. Typically the structure will appear like this – Subtopic.Full Domain.com For example, docs.google.com is how a typical DNS will appear. A Phishing scam will likely have an unusual DNS structure with a malicious domain as the Full Domain name. 

Providing a specific reward

Some Phishing tactics involve the hacker claiming that you have won a prize such as money, a trip, or a car. If you click on the link in this email, you will oftentimes be asked to pay the shipping or processing fee in order to receive your prize. This is a way for the hacker to gain access to personal information such as credit/debit card numbers, full names, and billing addresses. Hackers will then use this information for their own gain.

If you have not entered any lotteries, sweepstakes, or prize drawings and get this type of email, delete it immediately.

Logos or Company Information is Incorrect

If an email is from a sender claiming to be from a legitimate company, make sure all logos and company information provided in the email is correct. The smallest detail, like the company’s logo colors, maybe off meaning that the email was spoofed.

Another warning sign is that the email is impersonal and has a generic signature that does not mention a real name. For example, if an email is signed “Amazon Team” or “Comcast Billing Department,” the email may be a Phishing scam.

 

Want more information on how to protect yourself and your email? Check out our previous blog all about 9 Steps to Protecting Your Email.

What would you like to learn about next? Leave your suggestions in the comments below!

May 11, 2019

Was Your Favorite Restaurant Hacked? The Earl Enterprises Data Breach

In late March of 2019, Earl Enterprises announced that it had been a victim of a data breach. During this breach, customer credit card information was stolen. This is yet another major breach impacting consumers everywhere.

Earl Enterprises

Earl Enterprises is the parent company of many popular restaurant chains including Planet Hollywood, Buca di Beppo, and Bertucci’s.

 

Data breaches are nothing new. In fact, they are on the rise and cybercriminals seem to be going after larger and larger companies in order to obtain as much information as possible. Last year alone, 932 data breaches resulted in more than 47.2 million personal records being exposed.

 

So – how can you keep yourself safe?

 

Learn more about what a data breach is, which restaurants were impacted in the Earl Enterprises data breach, and what you can do if your data was breached.

 

What Is a Data Breach?

We talk about the term “data breach” more and more in today’s digital age. In fact, we have discussed in a previous blog some of the biggest data breaches in history.

Data Breach - American Identity Group

A data breach occurs when a cybercriminal utilizes an unauthorized entry point into a business’ database that allows them to obtain user data such as passwords, credit card information, Social Security numbers, driver’s license numbers, medical records and much more. Cybercriminals will then use this information to commit fraud or identity theft.

 

During a data breach, cybercriminals will usually take the same steps to carry out the breach successfully. These steps are:

Data Breach Research

Research

The cybercriminal will pick a business, company, or corporation to target. Once selected, they will do digging in order to figure out the company’s security weaknesses.

Attack

The cybercriminal makes initial contact in the form of a network or social attack.Cyber attack

  • Network Attack: occurs when a cybercriminal uses an infrastructure, system, or application weakness to enter into their target’s network.
  • Social Attack: occurs when a cybercriminal tricks or baits employees into giving them access to the company’s network.

Exfiltration

Once the cybercriminal gains access to the network, they will attack the network and extract all 

Cybercriminal exfiltration

confidential company data stored on the network. This information is used by the cybercriminal forpersonal gain, whether that means selling it on the Dark Web or threatening the company to release the information unless they pay a large fee to the hacker.

 

Most of the time, these hackers are not using advanced hacking techniques to carry out these data breaches. Data breaches most frequently occur from site vulnerabilities that allow hackers easy access.

 

Some of the most common types of site vulnerabilities that lead to hacking are:

  1. Outdated Security Systems
  2. Weak Passwords
  3. Malware and Viruses
  4. Unsecure URLs

 

You now know more about what a data breach is and how they occur. Now, let’s talk about the Earl Enterprises Data Breach.

Which Restaurants Were Impacted?

According to a statement released by the company, the Earl Enterprises Data Breach was realized after they were made aware of a potential data breach incident. Through internal investigations and the help of cybersecurity firms, Earl Enterprises was able to confirm that a data breach did, in fact, take place.

 

This data breach took place over a span of 10 months. In this breach, more than 2 million guests at Earl Enterprises chains had their credit card numbers, expiration dates, and cardholder names compromised.

 

The Earl Enterprises data breach occurred after cybercriminals installed malicious software onto point-of-sale systems at select locations of Earl Enterprises restaurants. Any guest who may have visited an Earl Enterprises restaurant location between May 23, 2018 – March 18, 2019 may have had their information stolen.

 

Of all of the restaurants under the Earl Enterprises brand, the restaurants that were potentially impacted are Buca di Beppo, Earl of Sandwich, Planet Hollywood, Chicken Guy!, Mixology and Tequila Taqueria.

Earl Enterprises Data Breach

What Should You Do Now?

If your personal information was compromised in a data breach, it is likely that you will get a written notification from your bank, or the company that was involved in the breach, informing you of the breach. Once they have confirmed that your information has been stolen, here are some steps you should take to keep yourself safe:

 

Change your password.

If you have an account with the business that has experienced a data breach, change your password immediately. It is likely that the cybercriminal was able to steal all login credentials, meaning your account is not unsecured.

Monitor your email.

Again, if your personal information was compromised, it is likely that your email has been stolen. If you receive a suspicious email from the company that was breached asking for personal information or for you to click a link, do not open the email and inform the company of the incident ASAP.

Obtain new debit/credit cards

If your debit or credit card number was stolen, call your card company to cancel the card. Request that a new card is sent to you. It would also be wise to change any pins you were using previously.

Place a fraud alert.

You should place a fraud alert on your account through one of the three major credit agencies. This alert is sent to all three agencies. It also notifies agency employees to be extra cautious with anyone trying to inquire about your account.

Sign up for Identity Theft protection

American Identity Group’s team of experts will constantly monitor your identity and alert you immediately if anything out of the ordinary is spotted. Sign up for a single plan or family plan protection package today!

 

 

 

Have you been to an Earl Enterprises location during the time of the data breach? If so, make sure you are taking the proper steps to recover your identity.

 

If you have any questions about identity theft, fraud, and keeping your information safe, don’t hesitate to reach out to us!

April 12, 2019

5 Common Identity Theft Scams to Avoid

Today, we will discuss 5 common identity theft scams you should avoid! Identity theft occurs when an individual or group takes your personal information without your consent. Identity thieves use a variety of scams to steal your information.

How to avoid scams - American Identity Theft

The sad truth is that many individuals have been affected by identity theft. In fact, 1 out of every 15 people experiences identity theft at least once in their lifetime! They say the truth shall set you free, I say the truth can stress you out. Won’t you agree that this number is a little stressful?

Identity thieves are notorious for creating scams and harming you and your family by stealing your personal and sensitive information. Unfortunately. Juvenile and senior identity theft are very common according to the 2018 Child Identity Fraud Study by Javelin Strategy & Research, more than 1 million children in the U.S. were IDT victims last year, resulting in losses of $2.67 billion.

As proud Americans, we believe in protecting our country and our families Identity! Let’s jump into the 5 common identity theft scams you should be on the lookout for.

 

Scam 1:

Phishing Scams

  • A phishing scam is defined as a fraudulent attempt to steal sensitive information such as usernames, passwords, social security numbers, and credit card details by disguising as a trustworthy entity in any form of electronic communication.
  • A great example of phishing scams is fraudulent emails. There are several known phishing scams using “fake” email addresses, such as xxxuniversity.edu, that mass-distribute scam emails to as many company employees as possible.
  • I, personally, have received fraudulent emails from fake email addresses. In the example below, the email claims that the user’s password is about to expire. Instructions are given to go to myuniversity.edu/renewal to renew their password within 24 hours.

Be aware of phishing scams. Try and take caution when receiving emails, do not click on any links that seem suspicious.

 

Scam 2:

Debit Identity Theft Scams

  • Debit scams occur in many different ways. Perhaps the most common type of debt scams occurs with telemarketers.
  • What makes matters worse is there are no GDPR laws in America to protect consumers. Meaning anyone can easily access your information, such as your phone number without your consent.
  • For example, a number of calls that you have never seen as “private” could be trying to steal your money from your checking account. How? Simply by tricking you, or as we call it “scamming you,” into believing he or she is calling from the card company. Once the scammer has the information you’ve handed over to them over the phone, the scammer now has full access to your account. If a telemarketer or caller asks for your banking information, take caution. Don’t give out your information over the phone unless you know who you’re speaking with is absolutely trustworthy and is from an accredited company.

 

women facing debit fraud

Take the next step to protect your identity by signing up for our Single or Family Plans of Identity Protection! Get coverage now for only $1.00 down!

 

Scam 3:

Mail and Email Identity Theft Scams

  • Keep an eye on your mail! Especially if you’re leaving or going on vacation or for a long period of time. Anyone can steal your mail and gain access to important information. A great way to avoid this is by getting a secured mailbox with a key, that only you have a copy of. Or, even consider getting a P.O. Box where you can keep your mail secured from scammers.
  • Another thing to take into consideration in this category is “fake mail.” Scammers use look alike mail to trick individuals into believing that the mail they are receiving is real. However, when the individual opens the mail, there is normally some sort of demand and a call to action asking you to call a number or to email them specific information. Be very careful of shady demands.
  • These scams are known to intimidate or scare you into paying or providing your sensitive information. Never make payments via mail without first verifying the sender. As Americans, we have the freedom to speak our truths –  don’t be afraid to ask why your sensitive information is needed.

email and mail scams

One of the most important things to do if you think you receive scam mail is to report the issue. Report scams and fraud by contacting the U.S. Postal Inspection Service or reporting the incident online.

Scam 4:

Child Identity Theft Scams

  • In 2018, it was reported that more than 1 million children were victims of identity theft. According to NBC , “Data breaches are more of a risk for minors than they are for adults.”Pasquel says that last year, 11 percent of all U.S. households had at least one child affected by identity theft.
  • Children are more likely to become targets and become victims. Scammers who target children are likely to steal Social Security Numbers, which are considered more valuable for criminals.
  • Pascual tells NBC News that “Criminals can have a field day with a child’s identity information because it’s never been used before. When a bank or other company pulls a credit report, they’re not going to find anything, and so the criminal has a clean pallet to work on.”

This is the sad truth – even our children are becoming targets to identity thieves. Don’t fall victim!

child scams and children fraud

  • Keep your important documents secured, request your child credit records and keep track of their reports and your mail. What more information on how to protect your children from IDT? Read our previous blog all about the warning signs of children IDT.

 

Scam 5:

Senior Citizen Identity Theft Scams

  • Senior citizens are a target for many scammers, simply because seniors tend to be more vulnerable when receiving mail, emails and or telephone calls. Unfortunately, the personal information of senior citizens is extremely valuable to cybercriminals because seniors are typically not opening as many new accounts or applying for new credit, meaning it is less likely that the scammer will be caught.

The FTC reported that 37% of Americans who are 60 years or older made fraud complaints in 2016; 20% of those complaints were for ID theft. Seniors can easily fall victim to scammers if they trust the wrong person.

  • There are many reports where scammers develop a relationship over time with their target by preying on them over the phone or even by mail or email.

identity theft scams and hack

This is your life, your Identity. Don’t fall victim to Identity Theft Scam tactics.

Let American Identity Group protect your freedom and give you your voice back! Identity theft is a sad scary truth we face, but by knowing what scams to avoid, you can protect your information and take the proper steps needed in protecting you and your family.

 

american identity group logo

March 20, 2019

9 Warning Signs of Identity Theft

If you have been following us at any capacity, you should know by now how many people are actually impacted by identity theft. If you think you are safe from IDT, you are sadly mistaken.

Identity Theft - Warning Signs

Approximately 15.4 million people have been affected by Identity Theft. Total losses are up to $16 billion. In order to best protect yourself, you need to know what to look for in a potential Identity Theft situation.

 

Here are 9 Warning Signs of Identity Theft. If you match any of these signs, don’t panic! Read more to plan your steps to recovering your stolen identity.

 

Unexplained bank withdrawals

We can’t stress the importance of regularly monitoring your bank accounts. If you don’t have online banking alerts set up already, we suggest you sign up for them now. For those of you that already have alerts enabled, you will get alerts for any transactions in your accounts. This ensures that your accounts are protected from fraud.

IDT

If you see any unauthorized transactions happening on your accounts, this could mean that…

  1. Your debit or credit card was stolen and is being used by someone else
  2. Someone has skimmed your card number and now has access to your bank account

 

If you see any unauthorized transactions on your account, you should get in touch with your bank to make them aware of the situation. You should also dispute any charges to your account and request a new card. Afterward, it may be necessary to file a fraud or police report depending on the number of charges processed on your account.

 

 

Bills for services/products you did not receive

Similar to our previous point, if you receive bills for products you did not order or services you did not receive, it is possible that someone has been using your account for their purchases.

Medical Identity Theft

One common service that you may be billed for is a medical service. Medical identity theft is one of the most common forms of identity theft – in fact, 30% of people impacted by medical identity theft have no idea when the theft occurred. Some identity thieves go after your personal information to use it solely for medical services. Medical identity theft occurs when someone uses your name, insurance numbers, etc. to receive medical services.

 

To safeguard yourself from medical identity theft, be sure to review any medical bills you receive to look for discrepancies. If you see any names, dates, services, or medical provider information that is incorrect, make sure to contact your insurance company as soon as possible.

 

You stop receiving your mail

If you stop receiving bills or important documents via mail, it is possible that an identity thief has changed your mailing address. When someone gets ahold of your personal information, they have the key to your life. An identity thief can easily go to the Post Office and change your mailing address to reroute all mail to a fake address.Mail Identity Theft

 

If you notice that your mail is not coming as regularly as it once did or that it has stopped coming altogether, you should look into it. If you are missing bank or credit card statements only, contact your bank or credit card provider individually. However, if you notice that all of your mail is missing, contact your post office directly.

 

 

Calls from debt collection for a debt you do not owe

Debt collection calls are one of the first signs of identity theft. If you are receiving calls from debt collectors, it means that…

Debt Collect Identity Theft

  1. An account has been successfully opened in your name
  2. An account has been open and collecting debt for some time

If you start receiving calls about a debt that you did not accumulate, make sure to inform the debt collector that the debt is not yours. Afterward, put a freeze on your credit to ensure that another card cannot be opened in your name. Be sure to file a fraud report with the FTC.

 

 

Misinformation on credit report

If you are not checking your credit report yearly, you should start. Monitoring your credit score and credit report can help you catch identity theft tactics before they become harmful. When looking at your credit report, it is important to check every aspect of the report for any discrepancies.Fraud

If you notice anything incorrect on the credit report, the best thing to do is to start making a list of errors. When disputing things on your credit report…

File all errors separately. This will ensure that each error is corrected. Filing multiple errors at once can leave more room for the CRA to miss correcting an error.

Send the dispute in a letter via mail. Creating a letter by hand makes the claim personalized. Sending the letter via mail
ensures that you will get a tracking number so that you can see when the letter is sent and received.

Contact other companies that are impacted. Include a letter to these individual companies as well and any records, fraud reports, or police reports you may have.

 

 

An IRS Letter Regarding Wage Discrepancies

IRS Logo

If someone has taken over your identity, it may come to light during tax season. If you receive a letter from the IRS stating that the wage amount on your Social Security statement doesn’t match what you filed on your tax return, someone may be using your identity.

This can also cause issues when filing taxes – if someone is using your personal information as theirs, you may get a notice that taxes have already been filed under your Social Security number. This can impact a number of things, but, most importantly, the status of your tax refund.

If you are concerned about tax fraud or think that someone may have filed their taxes using your information, read more about how to resolve tax fraud on our previous blog.

 

You are receiving 2-factor authentication alerts

2-factor authentication alerts give you peace of mind. The point of having a 2-factor authentication alert is to keep identity thieves out of your account. If you are receiving random alerts, it could mean that someone is trying to get into your accounts.

 

two-factor authentication

 

2-factor authentication is an added security measure that kicks in after you enter your username and password for your account. This second level can come in the form of…

 

  • A bonus password
  • A pin number
  • A text verification
  • A fingerprint/voice verification

 

Denial of a credit card or loan application

Fraud

If you know you have good credit and suddenly get denied for a credit card or loan, it could be because of something you are not seeing. If you have credit, you can get one copy of your credit score per year. Obtaining this copy will not alter your credit score in any way. However, there is a workaround to this so that you can check your credit report more frequently.

There are 3 big credit reporting firms – Equifax, Experian, and Transunion. You can request reports from the individual firms once a year as well. By spacing out your requests, you can get an updated credit report from one firm every few months.

 

Missing personal items

If your wallet, phone, credit card, Social Security card, or any other personal identification item goes missing, this could lead to identity theft. It is crucial to report any item that goes missing as soon as you notice that it is gone. Not only will this set an alert on this item, but it will help you to start the steps to recovery.

Identity Theft - Stolen Items

If you have lost or misplaced an item that can lead to identity theft, you should

  • Contact your bank. Alert them of the loss, cancel the account, and dispute any incorrect charges
  • Contact your credit card company. Credit card companies are usually on top of suspicious activity and will likely alert you to anything that seems irregular on your account. Informing the company will allow them to cancel the card and issue you a new one.
  • File a police report. Even if the police can’t do anything further to help in the situation, this will give you a record of the incident.

 

 

So, there you have it – 9 warning signs that your identity has been stolen!

 

Not seeing any of these warning signs but are still concerned about the safety of your identity? Check out our previous blog with tips on how to avoid Identity theft.

 

As always, let us know in the comments below if you have any questions! Give us a call at 855-200-6788 if you have specific concerns about your identity protection.

February 20, 2019

4 Steps for Tax Fraud Protection During the 2019 Tax Season

Looking for ways to increase your tax fraud protection? Look no further! We have put together 4 must-do steps to take to protect yourself against tax fraud during the 2019 tax season.

February 19, 2019

9 Simple Steps to Protect Your Email From Being Hacked

Want to learn how to protect your email from being hacked? Here are 9 steps that will help protect your online security.

prevent email hacking

How do you know when your email is hacked? (Notice I say when, not if, unfortunately, this happens more than you could imagine.) Is it a message from one of your friends, co-workers or family members asking ‘Did you mean to send me this link or why and what’s the purpose of you sending me this link?’

Maybe you received a call thanking you, or approving your new membership, loan approval, credit increase, or credit card application? Maybe you received an email stating you WON 10 million dollars, all they need is your routing number!

How to protect your identity

Either way, the truth of the matter is you’re a victim of Identity Fraud. So what happens now? How can you protect your email from being hacked? Bottom line is yes, you can protect your email, whether you’ve been a victim or not! The scary part is this occurs more often than you could imagine. In 2018, Google plus was hacked not once but twice. This occurred in a time span of only 2 months. As we all know Google plus is linked to your Google inbox…it doesn’t take a genius to know where I’m going with this!

How do you know if you’re a victim of email hacking and email fraud? How do you protect your email from being hacked? Is it necessary to change your email address (by creating a whole new email) for each site, that has been hacked?  What happens after your email is breached?  How do you report email hacking? How can I avoid email hacking from occurring in the future? These are just a few questions probably running through your mind. The good news is I am here to save the day, the bad news is you can not thank me in person 🙂

Okay, let’s dive in!

In this article, we will discuss 9 things you can do to protect your email from being hacked and what to do after your email is hacked.

How to Protect your email from being breached.

How do I know if my email has been Hacked?

Well, let’s start by discussing the obvious:

  1. Unusual activity
  2. Passwords changed
  3. Unusual email alerts
  4. Someone contacts you stating you sent them information or a link (when you know you didn’t)
  5. Follow your instincts!

True story:

Many moons ago, I worked for a billion-dollar telecommunications company (I won’t mention any names but this shouldn’t be too hard to piece together).  This billion dollar company was hacked. Guess how? Knowing the title of this blog, this should come as no surprise. Shockingly, the hacker was able to breach this company via email. Yes, you read correctly.  According to ABC and many other sources, The Hackers took over the company’s web portal leaving cryptic messages. This hack left many individuals concerned, worried, and questioning how can this happen? The hackers were basically able to hack the companies domain. According to the company, no private information was compromised.

How do I protect my email from being hacked?

There are many steps and several online tools that can help you determine whether your accounts are secure. Platforms have created ways to try and prevent email breaches. Online Platforms such as Google, Facebook, Amazon, Instagram and many more offer you the capability of choosing two – way verification security methods. This extra step helps secure your email from fraudulent activity.

email hackers alert
Here are a few of the best tools and tips to check whether your email accounts have been hacked:

American Identity Group offers a FREE data breach scan. Using this scan, American Identity Group crawls the dark web then uses our Early Warning System as an alarm-style detection and warning system to detect any form of potential identity theft.

The scan alerts you in what breaches your email has been a part of. How do we know if you’ve been breached?

We scan numerous data files on the dark web daily, weekly, bi-weekly, and monthly our system works around the clock searching for any suspicious activity or changes to your accounts. American Identity Group mission is to protect YOU & your FAMILY by warning you of any potential identity thefts in progress.

learn how to prevent email hacking.

 

  1. Let’s begin with my favorite, The obvious -PROTECT Your Identity!  Sign up for AMERICAN IDENTITY GROUP $1.00 DOWN Plan.
  2. You can never go wrong with Two-way verifications.
    • Be sure to enable your Two-way verifications for all the platforms you use. This step is considered “extra protection for your email accounts.” A Two-Factor verification is an authentication process. The process requires users using the platforms to put a specific code that was sent to the account holders phone or email address. Do you have your 2-way verification on? If not here’s a brief explanation on how you can turn on the two-factor authentication for the following platforms:
      1. Yahoo, Google, and Outlook:
      2. Yahoo reviews this page at help.yahoo.com.
      3. Gmail, review this page at support.google.com
      4. Outlook.com mail, review this page at windows.microsoft.com. You can never go wrong with Two-way verifications.
  3. CREATE STRONG PASSWORDS:
    • When creating a password choose a “strong password” meaning, make the password difficult for hackers, by using passwords that mean nothing to you. For example. Your last 4 digits of your social security card. When creating your passwords use a mix of numbers, symbols, and both lower and upper case letters.
    • If you’re anything like me and forget your passwords then you should try LastPass This platform comes in two different stages – free or premium. This digital vault helps you store your passwords.
  4. DON’T FOLLOW THE LEADER!
    • Use different passwords for all email address and platforms in general. Think of it this way, Why in the world would you make it easy for a hacker to steal your information? Well news flash people, if you are using the same password for all your platforms, then once the hacker has uncovered one platform it’s all downhill from there.
  5. Who Are YOU RESPONDING To?
    • DO NOT respond to any unexpected email, SMS messages or websites that ask you for personal login credentials. If you didn’t request any new passwords or if you didn’t contact the company requesting the information, then ignore the email as it could be considered fraudulent email, contact the company and follow their next steps.
  6. Secure YOUR Devices!
    • DOWNLOAD Internet security (that includes anti-spyware), be sure to update the software as needed.
    • There are a ton of options for spyware platforms you can choose from. The best part is some are a few free ones!
  7. TRY to Be PRIVATE, Not PUBLIC.
    • Do not use Public WIFI. Public Wifi connections are unsecured internet access. Read more about public wifi here
  8. HTTPS, why you can’t, live without it?
    • Try to stay away from Internet browsers that do not contain HTTPS on the browser. Read more here, about the importance of HTTPS and how to keep your Identity protected.
  9. STALKING IS OKAY:
    • Regularly monitor your email accounts. When you find yourself with a few extra minutes of downtime log on, review your emails and all your email folders, if you see something that was not sent from you, or looks malicious, contact the platforms help desk or support center.
    • Or you can make life easier and have American Identity Group monitor your Identity for only $1.00!
Learn ways to protect your identity

 

Okay, so you read my blog a little to late, As your email has been hacked; don’t worry its not the end of the world, you can breathe now.

Email hacking and breaches are more common than you know, believe it or not, According to CNN, Google says hackers steal almost 250,000 web logins each week in 2017.

The sad part is we have all this information easily accessible online. Today, different tools and platforms make it easy to find information quickly. However, people are still falling as victims of Identity theft, and email hacking. Our goal at American Identity Group is to avoid you becoming a victim of any sort by securing your data.

 

There are a few steps we can take to get your email back and running and protect your email in the future from hackers.

Let’s start with the obvious! ACT FAST, at this point hackers are on the move, looking for their next victim. If you have been a victim of Identity theft and or your emails have been hacked try the following 5 steps:

  • Report identity (ID) theft to the Federal Trade Commission (FTC) online at IdentityTheft.gov or by phone at 1-877-438-4338
  • Pay ONLY $1.00 for data, and identity protection from American Identity Group and receive real-time monitoring and alerts.
  • Change your passwords, with a STRONG password and Limit the apps that have access to your personal information.
  • Secure your platforms and devices, activate your 2-way authorization,  be sure to use your private wifi.
  • Check the forwarding address on your inbox and add the secondary forwarding address you would like that platform to use. Last, but not least, advise anyone who received an email from you that you were hacked.

 

Wallah! Just like magic – You’re done! By following these 9 steps, you can protect and improve the security of your email and reduced the risk of being hacked.

any questions about identity theft
Give us a ring at
1- 855- 200 6788
January 31, 2019

Are Your Children Safe From Identity Theft?

Child Identity Theft

Child Identity Theft is on the rise. Children are one of the most at-risk groups when it comes to identity theft. Protect your children today from identity theft. To a cybercriminal, children are the key to their success. Obtaining the personal information, such as a social security number, of a child as young a few days old allows the criminal to apply for credit cards, rent a home and much more.

Because “that child is not going to enter the credit world for at least 13 years, a thief can keep that social security number going for years before someone is going to look at it” says John Kerbs, the Identity Theft Program Manager at the FTC.

More than 1 million children were victims of identity theft and fraud last year alone. It’s up to you, their parents, loved ones, and guardians, to protect your children’s identities while they can’t. Our team has compiled some of the best tips on how to protect your child’s identity. In this blog, you will learn..

How to know if your child’s identity has been stolen

The steps needed to regain your child’s identity if stolen

And, overall, how to keep your children safe from identity theft criminals.

Know the warning signs

Child Identity Theft

There are a few different ways a parent or guardian can learn of a potential identity theft situation. The best thing you can do is to be vigilant about the notices you receive in the mail – read everything.  Some of the main ways you can find out if your children’s identity has already been compromised are…

Turned down from government benefits. The benefits could be going to someone that has obtained your child’s Social Security number and personal information.

Notice of nonpayment of income taxes. If you receive a notice that your child did not pay income taxes or any other type of taxes, it means that your child’s Social Security Number was used on someone else’s tax return forms.

Collection calls and bills. Receiving calls about products or services you or your child did not receive or order could be an indicator of identity theft.

You may be asking – how can this happen so easily? The framework of our Social Security system is to blame.

Social Security Numbers are unique to you. The government determines your number this by the date that the number was issued not by date of birth. This process makes it impossible to tell if the number belongs to a child or to an adult. The Social Security number brakes down into 3 indicating categories.

  • The first three numbers of the SSN indicates where it was issued.
  • The second two numbers indicate the particular batch of SSNs given during a period of time.
  • The last four numbers are a unique SSN pin.
Child Identity Theft

Regaining your child’s identity

If you think that your child’s identity has been compromised, you can check their credit by contacting all three of the major credit bureaus – Experian, TransUnion, and Equifax. When you contact them, you will want to ask for a manual search of your child’s file. In order to do this, the bureau may require:

The child’s birth/adoption certificate

The child’s Social Security card

The parent/guardian’s government-issued identification card as well as documents proving the legal guardianship of the child

Proof of address

Once provided, the credit bureau searches its databases for all files relating to/matching the child’s name and Social Security number, and files containing just the social security number.

If your child’s identity was in fact compromised, you can repair the damage of the identity theft by:

Contact the companies where your child’s information was used. Ask to speak to the fraud department to report the fraud. They may ask for things to confirm your child’s identity such as a birth certificate.

Contacting credit bureaus. Ask the bureaus to clear your child’s credit report of all fraudulent activity and accounts.

Freeze your child’s credit until they are older. This restricts access to your child’s credit files, making it harder for thieves to open.

Report the theft to the FTC. You can do this by going to their website.

Protecting your child from further identity theft

Child Identity Theft

Once you have regained your child’s identity, there are a few ways you can ensure their identity does not make it into the wrong hands again. These ways are:

Keep all of your children’s files in a safe and secure location.

Don’t share any personal identifying information with people or businesses you don’t trust.

Shed all documents containing your child’s personal information

Be wary of any events that may put your child’s identity at risk – ex – a break in to your home or a data breach at your child’s school

Sign up for an identity theft protection and prevention plan

At American Identity Group, we are passionate about protecting your entire family. That is why we have created a identity theft prevention family plan. American Identity Group does 24/7 checks and identity monitoring to ensure that you and your family members are safe and secure. We will send you instant alerts to any possible identity breaches or threats.

Child Identity Theft

American Identity Group will help if your identity is every compromised. They will match you with an identity recovery specialist. The recovery specialist works with you to restore your identity to how it was before the breach. American Identity Group reimburses all funds that were compromised during the breach.

$2.67 billion was lost in 2017 due to child identity theft. Two-thirds of those victims were younger than seven years old. Families have enough to worry about.

Let American Identity Group give you some peace of mind. Visit our website today to discover more information about our family plans.

Have any questions? Please call us at 855-200-6788.

December 20, 2018

9 Tips for Safe Cyber Monday Shopping

Learn how to keep yourself safe while doing your online holiday shopping this Cyber Monday. Today we will discuss 9 Tips For Safe Cyber Monday Online Shopping!

The holidays are right around the corner! ‘Tis the season to be jolly – and hacked. All of the bargain hunters out there will know that Black Friday and Cyber Monday offer the best shopping opportunities. Cyber Monday is great for finding the lowest costs. However, it is also a prime time for identity thieves to get ahold of your valuable information.

Over 147 million Americans shopped during the days between Thanksgiving and Cyber Monday last year. This number is expected to rise this year, specifically on the online shopping end. Protect yourself and your family this Cyber Monday with these helpful tips on keeping your identity safe and secure online:

9 Tips for Safe Cyber Monday Shopping:

1. Don’t use public Wi-Fi for your Cyber Monday shopping
Cyber Monday

Cybercriminals dwell in places like coffee shops, restaurants, and public shopping centers. This gives them to best opportunity to gain access to your personal information. When a cybercriminal hacks into a public Wi-Fi signal, they can see any personal information you enter online. This information can include things like your email address, financial data, and even your home address. Hackers can then use the information they gather to plug into your identity and take control. You can prevent this from happening by only doing your Cyber Monday shopping at home, on a trusted device, and on your personal secured Wi-Fi connection. Along with this, you must make sure that the website you are on has HTTPS secure SSL enabled. To check if SSL is enabled and secure, you can look at the URL bar which will have a lock icon followed by “https://”.

2. Avoid Search Engine Phishing

While Cyber Monday shopping, be cafe of what you are searching. Typing the name of the store or product you are looking for into a search engine then selecting a page of the results is dangerous. In fact, a lot can go wrong when you do this. Using this process instead of going straight to the company’s website, can lead you to an unsecure or look-alike website. This new trend is called Search Engine Phishing.

Cybercriminals make these phishing sites hard to distinguish between secure websites and scam websites. One indicator that a site may not be secure is if the site asks for your full banking account information at checkout. For the holiday season, Search Engine Phishing scams can appear in the form of:

  • Discounts/Giveaways – retailer look-alikes will offer special products or promotional rates. These sites will allow you to make the purchase, but the products will never receive.
  • Low Interest/Interest-Free Credit Cards – be wary of impossibly low rates offered by unknown banking sources.

Be sure to always check that you are on the official company website while shopping this Cyber Monday. Shopping on the official website will ensure that the deals offered are correct, accurate, and real.

3. Don’t Click on Any Ad Pop-ups on Online Shopping Website
Cyber Monday

We all get occasional pop-ups. These pop-ups are usually offering free shipping or half off your first order while shopping online, especially on Cyber Monday. If they are pop-ups from the site you are shopping on, they are completely harmless. However, if you see them elsewhere, these headlines can be used as clickbait for cybercriminals. Don’t fall for the promise of a deal!

Shady pop-up ads that are not affiliated with the site you are browsing this Cyber Monday are dangerous. These ads will either open another window with an unsecured site or redirect to a 3rd party site to shop. These pop-ups could even allow 3rd party sites to enroll you in programs that you did not sign up for. Shady sites could hold your computer hostage by installing spyware on your device to collect your secure passwords and information

Next time a pop-up appears out of nowhere while you are online shopping, make sure that you close it out. Clicking the “X” in the upper right-hand corner will safely remove it from your screen. Depending on your web browser, you can also stop, block, or limit pop-ups from appearing on your screen.

  • For Internet Explorer users, go to your tools tab, then internet options, and then privacy. From here, you can select “Turn on Pop-up blocker.”
  • For Google Chrome users, go to the three dots in the upper left-hand corner of your browser. Select settings, advanced, and then “privacy and security.” Under this section, there is an option for content and settings. Click on “pop-ups and redirects.” From here, select “blocked.”
  • For Safari users, go to Safari’s security tab in Safari preferences. Then go to the extensions tab to make sure the pop-ups are turned off.
  • For Firefox users, go to “menu” and then “preferences.” Select privacy & security, permissions, and then check the box next to block pop-up windows.
4. Don’t Give more Personal Information than You Need To

When shopping online on Cyber Monday, only fill out the required fields. Online shopping websites will NEVER ask for information like your social security number, private passwords, or personal identification answers. If something seems out of the ordinary, cancel the order. From here, you can try a different, more secure website.

5. Create Strong Passwords

Today, everyone has a million different accounts online. When doing your Cyber Monday shopping, you will be prompted to make an account on the website you’re ordering from. This account can be used to track your orders or change them after completion. It’s hard to keep track of all of our login information, so what do we tend to do? Use the same password over and over again.

Relying on the same password is like leaving your front door open and unlocked in the middle of the night – it’s welcoming anyone into your most private space. If cybercriminals get into your accounts, they get access other personal information that may be stored on your account profile. This information can include things such as your shipping/billing address, payment information or even the answers to your security questions.

In order to combat this, you can……

  • Use a combination of lowercase, uppercase, numbers, figures, and symbols.
  • Use dynamic information. Do not use names, numbers, or combinations that can be easily guessed by a hacker like the name of your pet, your hometown, or your birthday.
  • Use a long string of words – this makes your password less readable to computer programs that test different common passwords and password combinations.
  • Use a password manager platform, like 1Password and LastPass. These programs are a convenient way to manage and keep track of a large about of unique passwords.
6. Shop with Brands you Know and Trust

When doing your Cyber Monday holiday shopping, make sure it is with brands you know and trust. If you have visited the store in person or shopped online with the brand before, you know that they are trustworthy and actually have inventory to sell. On big shopping days, like Cyber Monday, new websites may pop up that are selling products at lower prices than usual.

If you are doing your shopping on a new site for the first time, here are some warning signs to look out for:

  • Prices, benefits or features that are too good to be true. You should be careful of this even on major shopping days like Cyber Monday. This could mean that the product doesn’t actually exist or that there is a catch to the purchase.
  • The website insists on an unusual payment method like wire transfer. A reputable brand or online retail store will accept all of the usual methods of payment and not ask for anything out of the ordinary or super personal at checkout.
  • A store that is new and has limited information posted on their website. This could mean that they do not have a reliable delivery method, solid store policies, or any return policies.
  • The online store has no contact information or customer support team. This could lead to you receiving the incorrect product or never receiving your order at all. With no way to contact the store after putting in your order, you are more susceptible to getting scammed.
7. Don’t use a Debit Card or Personal Banking information when doing your Online Shopping
Cyber Monday

Debit card information is one of the easiest things for a cybercriminal to obtain. Protect your banking account and personal information by using a credit card instead when online shopping this Cyber Monday. If someone does get a hold of your credit card information, you receive more liability protection with a credit card company than you do when using your debit card. There is also the option to sign up for a payment alternative, like PayPal, to use for your Cyber Monday shopping.

Using a service like PayPal ensures that your purchases are safe and secure because these providers do not sure sensitive information with the online shopping website. This process keeps you and your finances safe and secure.

For holiday shopping in stores on Cyber Monday, keep an eye out for card skimmers. Card Skimmers are devices that hackers insert onto card readers. These devices steal your debit/credit card information when you make purchases. Skimmers are inserted on card readers in retail stores or ATM machines.

These devices are often hard to spot, but you can keep an eye out for card readers that stick out past the panel, card readers that jiggle or are looser than usual, and pin pads that are thicker than usual to indicate if there is a card skimmer in use.

8. Check your Online Banking Activity and Bank Statements

After making online purchases on Cyber Monday, check your bank statements to ensure that you were charged the correct amount by the correct vendor. If you are doing a lot of online shopping this holiday season, check your statements daily or at least once a week. It would be smart to enable account alerts – via text or email – about any charges or changes that take place on your account. If you find an incorrect or unauthorized change on your account…

  • Contact your bank. They can provide more information about the purchase and the steps you can take moving forward.
  • Dispute the charge. You can either do this with an online form or by going into your bank’s branch.
  • File a fraud or police report. This shows your bank that you did not make the purchases and helps to clear your account of any incorrect charges.
9. Get a Free Dark Web Scan
Cyber Monday

Theft prevention companies are passionate about keeping you and your identity safe. They will even scan for your identity on the dark web for free! The Dark Web is any website that is not indexed by search engines. When cybercriminals steal big amounts of personal data, they may post it for sale on the Dark Web. If your information is stolen and placed on the Dark Web, hackers can use it without you knowing. Taking advantage of a free Dark Web scan can prevent hackers and identity thefts from taking over your identity.

Dark Web scans will make sure that your personal information is safe and secure, and, once complete, will alert you to any potential threats or matches to your personal information on the Dark Web. Companies that offer Dark Web scans scan through hundreds of databases to make sure you are 100% covered and safe. Again, these services are completely FREE, so take advantage!

Cyber Monday


Have any questions? Please call us at 855-200-6788.

Scroll to top

Medicare Supplement Breach Alert!

MedicareSupplement.com has exposed the records of 5 million Americans 🔓

Call 855-717-4608 TODAY to see if your identity is AT RISK of being stolen!

 

American Identity Group

AT&T Breach Alert!

AT&T employees have planted malware on the company’s internal systems to unlock cell phones 📱

Illegal hardware was installed within the network to help hackers gain remote access and unlock millions of smartphones.

Call 855-717-4608 TODAY to see if your information is SAFE!

American Identity Group

State Farm Breach Alert!

STATE FARM has suffered from a Credential Stuffing data breach 🔓💰

A list of user IDs and passwords were obtained from the dark web in to attempt to access to STATE FARM online accounts.

If you have a STATE FARM account, your information may be in the WRONG hands!

Give us a CALL NOW at 855-717-4608 to find out.

American Identity Group

Capital One Data Breach Alert!

A hacker has gained access to the accounts of 100 million Capital One customers 🔓If you use Capital One, your information may be in the WRONG hands!

Find out if your Identity has been compromised!

CALL NOW at 855-717-4608 to find out.

verified by American Identity Group

Google Home Speaker Data Breach Alert!

Your GOOGLE HOME SPEAKER may be recording your conversations and leaking your information without your knowledge 📢

Google regularly records and listens to private conversations via the GOOGLE HOME SPEAKER when you aren’t using the speaker or asking it a question.

Give us a CALL NOW at 855-717-4608 to protect yourself today.

verified by American Identity Group