Categories: Exclusive News

Identity Theft: Survivor Stories

Has your email or social networks ever been hacked before?

You may not think that having your identity stolen will happen to you, but a survey PSafe conducted shows that 2 out of 5 respondents have been a victim of identity theft.

Identity Theft Makes All of Us Vulnerable

The reality is the online actions of hackers has a real-life impact on YOU. Our survey uncovered some disturbing data.

The top 3 areas where people were affected fall under the main 3 things that people use every day, day and night.

Email accounts – 47% were hacked.
Phone number – 45% were stolen.
Social network logins – 43% had their accounts taken over.

Not to leave out other instances of identity theft, victims are deeply impacted financially as well.

31% had credit cards details taken and used to buy unauthorized goods or services. While 30% discovered their bank or debit card was compromised and fraudulent withdrawals took place.

Overall, this type of cybercrime is increasing at alarming rates. On a projected basis, there are 42MM victims of identity theft.

Why You Should Care

It’s easy to be complacent and feel confident you’ll never be a victim of identity theft. In fact, general assumptions are out there about this type of cybercrime, which lulls many into a false sense of untouchability.  

However, let’s dispel some myths about identity theft:

Myth #1 – Only people with weak passwords get hacked and taken advantage of.
Truth: Weaker passwords are more vulnerable, yes. However, some hackers do employ sophisticated methods to crack passwords, which is why it’s wise to change your passwords every few months, not once every 5 years.

Myth #2 – The problem is automatically solved by changing the password of the hacked account.
Truth: Information is like currency. Once a hacker gets a hold of an email login, that login is a potential to all of your personal information (full name, address, phone number, credit cards, social media accounts) which can be used to commit financial or identity fraud in your name.

Myth #3 – Only the older generation naively click on random links and falls prey to identity theft.
Truth: Crime does not discriminate! All ages and genders can be fooled. One method hackers use is taking over one of your logins, either an email or social media account, and impersonating you to launch a social engineering attack against your friends and family.

The survey PSafe conducted included survivor stories and the brutal reality is having your credit score or social security number tampered with has severe fallout, even lasting several years to clear your name or restore your credit standing.

Read some victims stories:

Fight Back With Identity Theft Monitoring

The above victims’ stories show that identity theft can happen to anyone; at any time. dfndr security is your preventative measure against this insidious crime.

Just as you would lock the front door of your house against physical thieves, dfndr security has a new feature called, Identity Theft Monitoring, solely designed to be your “lock” against online thieves.

Identity Theft Monitoring is your stop-gap for preventing identity theft. Activating its functions can help you stop a tidal wave of financial, emotional, and mental pain.

How Does Identity Theft Monitoring Work?

The Identity Theft Monitoring feature is a fully developed protector of your identity details. We alert you on data leaks, let you know if your accounts are affected, and offer help on what to do if one of your email accounts is compromised. Here is a complete breakdown:

24-Hour Monitoring
We monitor your credentials 24 hours a day, 7 days a week. To activate this, register your email accounts and whenever there is any suspicious activity concerning your personal data, you’ll immediately receive a notification by email.

Weekly Status Reports
Every week, you’ll receive a complete report on the security status of your registered accounts. This means you’ll have total control of your data on the internet.

Data Breach Alerts
If your data is violated and compromised, you’ll receive real-time alerts via email with the details of the leak and what to do to resolve the problem. We are always looking out for your personal information.

To use Identity Theft Monitoring and give yourself peace of mind from identity theft, subscribe to the Ultra Security plan. Get it here now:

You can also opt for our Pro Security plan which includes all that Ultra offers, but without the premium Identity Theft Monitoring feature. This plan includes an ads free experience, unlimited Identity Theft Reports, App Privacy Scan, Safe App Installer, and Anti-theft Protection. Choose that plan here:

READ about all our subscription plans here.

*Fictitious images were used to preserve the identity of victims.

Did you want to see all the survey results? Read them here.

Jeannie Mark

Recent Posts

Vulnerabilities in Cyber Security: what they are and how to fix them?

Learn all about one of the hackers' favorite breach method and keep your company safe…

1 year ago

3 ways to recover deleted photos on Android

Have you ever wondered how to recover deleted photos on Android? After all, the lack…

1 year ago

What is worm?

Digital worms are among the most serious threats in the wild kingdom of the Internet.

2 years ago

Spoofing: What’s it all about?

Spoofing is a fairly sophisticated virtual scam that can fool even the most cautious and…

2 years ago

Careful With That QR Code! Five Steps For QR Code Safety

Five Steps to Reduce QR Code Risk! Step one? Read this article…

2 years ago

Pharming: Phishing’s Nasty Big Brother

Pharming is creating a new, dangerous brand of impostor syndrome. Check how to avoid pharming…

2 years ago