Tag Archives: identity monitoring

Why Credit Monitoring Isn’t Enough

Having credit monitoring instead of identity monitoring is like putting a security system in the elevator but not in the whole office building. The scope of security is limited and leaves the workforce vulnerable. Thus, understanding how monitoring programs differ, how they work and why it matters is critical for safeguarding your identity.

Why should you care?

Victims of identity theft deal with increased stress, hours of work rebuilding their reputation and recovering from major financial losses; all of which have major consequences in other areas of life – like decreased productivity and performance on the job.

Given the statistics, if you haven’t dealt with the crime in some capacity, it’s only a matter of time.

The good news is that arming yourself with credit monitoring and identity monitoring gives you a better chance of stopping identity theft before it gets out of hand, thereby diminishing the negative effects that follow.

What is credit monitoring? How does it work?

There’s a broad range of credit monitoring services available in today’s market, and each program varies. Credit monitoring is a reactive approach to identity theft that involves checking credit reports for fraudulent activity. Because a credit report shows past activity, it will only reveal fraud or theft that has already affected the victim. That’s why it’s like only having security in the elevator: Once you realize the culprit is there, he has already infiltrated the building.

Credit monitoring programs will pull a member’s report, often quarterly or annually, from any number of the three major credit bureaus and make it visible to the member. On top of that, programs watch credit reports, transactions and activity for changes that could be criminal.

Another aspect of credit monitoring is resolution and recovery assistance, but, again, the levels of assistance vary from product to product. For instance, credit monitoring services will alert a member if they find fraudulent activity on the credit report(s), but some services don’t inform the credit bureaus on behalf of the member.

What is identity monitoring? How does it work?

Identity monitoring takes a more active approach. It not only focuses on credit reports but broadens the security sweep to account for name, birth date, address, email, driver’s license, Social Security number and more. Think of it as a security system for the whole office building, with security officers at every door and window.

Top-notch identity monitoring programs will check national databases for suspicious activity, watch out for questionable transactions and ultimately try to keep the member informed with real-time alerts about a data breach or fraudulent act. Touch points could even include scanning criminal record databases, sex offender registries and public records.

Identity monitoring can also give people peace of mind about their biggest worries: More than 70% of consumers are concerned about their Social Security number, credit card, insurance and driver’s license number, while less than 60% are concerned about their credit score and transaction history. People want more protection than what’s offered by credit monitoring alone, and identity monitoring is the answer.

What is the difference?

One major difference between identity monitoring and credit monitoring is accuracy. The all-inclusive nature of identity monitoring allows for a more accurate assessment of susceptibility to identity theft. For example, credit monitoring may not detect problems like tax fraud or medical identity theft because credit reports don’t necessarily show those types of information. Because identity monitoring is more robust, it can discover anomalies and provide protection for more than the financial aspects covered by credit monitoring.

Simply put, identity monitoring provides more coverage than credit monitoring.

For more information, visit clcidprotect.com.

Identity Theft Services Explained

As thieves discover more and more ways to steal personal information, it is critical that people use identity theft protection services that involve a wide security sweep of all personal identifiable information and high-risk activity. The marketplace for identity theft protection now includes all kinds of monitoring services and features. Make the best choice by understanding each feature available, how they differ from each other and their capacity for sustaining protection.

Credit Monitoring

Credit monitoring is the process of reviewing a consumer’s credit activity with the credit bureau. It monitors the activity and changes to a credit report, including inquiries made by a creditor to request a copy of a report. Monitoring provides an alert system for potential fraudulent activity or accounts being established. Credit monitoring provides an alert system to activity affecting your credit report and credit score. Monitoring enables you to stay on top of fraudulent activity so that you can address the inaccuracies immediately. It also reduces the financial impact that identity theft can cause, by reporting the fraud earlier and reducing potential out-of-pocket losses.

Identity Monitoring

Identity monitoring looks at more than just credit information; it encompasses all personal identifiable information: name, birth date, address, email, phone number, Social Security number, etc. This could include monitoring the Internet, national databases, credit files, public records and more. If thieves have your personal identifiable information, it’s the perfect cover for their crimes because everything will point to you, not them. Even kids can become victims of identity theft: Each year, more than 140,000 identity theft cases involve children.

Social Security Number Monitoring

It’s exactly how it sounds – protection for one of the most important pieces of information that a person has. This type involves monitoring hundreds of millions of records for unauthorized use of a Social Security number (SSN). 70% of people are worried about the safety of their SSN. Monitoring an SSN is particularly important for children because thieves have plenty of time to use the child’s information for their own gain before the child finds out by applying for an account or a line of credit and is denied because of the thieves’ damage.

Data Sweeps

Unlike previous monitoring services that focus on particular data or activities, data sweeps encompass a plethora of touch points and personal information. Data sweeps monitor the Internet for instances of criminals using stolen phone numbers, addresses, birth dates and more. How many data points are included and how often the data sweeps occur vary from plan to plan. Data sweeps cover the information that consumers are worried about, like mailing addresses (50%) and phone numbers (60%). It can also help a person feel more secure about online presence because data sweeps can lead to removing exposed personal information on the web.

Credit Card Monitoring

The lending institutions that issue credit and debit cards will usually monitor transactions and notify cardholders of suspicious activity. Credit card monitoring, as offered through an identity monitoring service, will monitor the Internet for fraudulent activity involving credit card and debit account numbers, PIN numbers and other personal information in Internet hacker chat rooms and the dark web. Credit card monitoring looks at activity outside of the credit report and outside of activity monitored by the cardholder’s bank or issuing institution. As a result, it can detect fraud that may or may not make it to a credit report or be captured by the bank.

Recovery Assistance

Most services will not only keep you informed but help you resolve any suspicious activity. Features could include assistance from a credentialed professional. Some assistance features may only provide victims with next steps or resources, while others may actually take on some of the activities a victim must complete to rebuild his or her reputation. 47% of victims who spent 6-plus months fixing the issue(s) felt severe emotional distress vs. the 4% of victims who felt that way after resolving issues within 24 hours. Victims can limit the health and financial costs of recovery by using a protection plan that includes assistance from professionals who know how to get quick results.

Lost Purse or Wallet Assistance

Whether you misplace your wallet or it actually gets stolen, most identity theft protection services will help you contact the correct institutions and minimize the damage if a thief tries to use your stolen information. Despite the growing threat of malware and hacking, physical theft is still a problem, and 43% of physical theft happens at work.

Service Guarantee

Most companies have a service agreement that provides some sort of refund for customers if there’s a defect in the company’s service. New technological advances are made every day for security and thievery, so you need to make sure that a company will help you if its protection services can’t keep up with thieves’ new tricks.

Some identity theft protection services go above and beyond with the layers of security and assistance they offer, in addition to the commonly included products listed above. Some of those extra special features are:

Additional Databases

While most services monitor your personal identifiable information online or on credit reports, not all of them will monitor databases like criminal records and sex offender registries. Some companies charge extra for monitoring these additional databases. Thieves don’t just use your personal information to empty your bank account. Thieves will steal reputable citizens’ identities and use them as aliases when committing crimes.

Medical Fraud Assistance

Monitoring for medical fraud involves protecting insurance records from criminal use and assisting victims when a thief tampers with a victim’s medical history or racks up medical debt. The crime rate for medical identity theft increases by 32% each year, and more than $12.3 billion in out-of-pocket expenses were spent in the past year because of medical identity theft.

Tax Fraud Assistance

Products include giving victims an action plan and providing forms and contact information for working with the IRS. Services that actually do recovery work for victims must have certified tax specialists who are approved for working with the IRS on behalf of the victims. In 2014, the FTC’s 1.5 million fraud-related complaints revealed that consumers have paid a total of $1.7 billion because of fraud, and a third of those complaints were tax-related. Tax fraud could include IRS phishing schemes, phone scams and stealing taxpayers’ information to file phony tax returns and get their refunds.

Family Coverage

Protection plans may allow members to add family members to their plan; however, adding family members often comes with additional charges. When family members share accounts (e.g. bank, music, email), passwords, etc., everyone feels the consequences if one of them becomes a victim.

Other

Other pieces of your personal information that may or may not be included in the common types of monitoring: loan/lease information, driver’s license, computer security, bank account information, passports, etc. Thieves’ use of hacking, malware and social media have skyrocketed over the past few years. As fraudsters improve their tactics, they gain access to more and more information.

Each type of monitoring covers important information that could lead to serious damage if taken into the hands of a fraudster, and no one type covers everything. Likewise, each feature has importance, but they’re most effective when working together because they create sustainable, comprehensive coverage.

People need to make sure that their identity theft protection plan includes all the necessary data points with multiple types of monitoring, assistance and recovery features, so their information stays secure.