Posts

Identity Theft Services: Is ID Theft Monitoring Worth the $$$?

,

Product Review: Are identity theft monitoring services worth it?

Yes, identity theft services can be well worth the investment, especially if you ever become a victim. Imagine that your Social Security number is part of a national breach like Anthem or the Office of Personnel Management. Or it’s stolen out of your tax preparer’s office, scavenged from your trash or skimmed from your iPad as you surf on a free Wi-Fi connection. In most cases, you have no idea that your digital identity has fallen into unethical hands, usually those of organized crime, who replicate and resell it in seconds.

Next, your identity is used by an undocumented worker to get a job, and now you owe taxes on their earnings. A second user applies for credit in your name and skips town, leaving behind your decimated credit score. Another uses your SSN to drain your health insurance benefits and append the wrong blood type to your medical file. You have no idea that any of this is taking place behind the scenes until the day that the tax bill arrives in the mail, you are denied medical coverage and a collection agency shows up at your door. Because the discovery process doesn’t happen for an average of 18 months after the initial theft, your losses are substantial and your innocence difficult to prove. Obviously, I’ve combined many forms of ID theft here into a single scenario, but everyone of them is real and common.

If I told you that there are ways to automatically detect the exposure of  your SSN online (allowing you to request its removal), to prevent the trafficking of your ID on the dark side of the web and to be notified about even the smallest use of your credit profile by criminals, would you be interested?

Every one of these preventative measures is possible, and detecting the abuse of your identity is made much more convenient and less time consuming by identity theft services that monitor your ID online. Are they a perfect solution? There is no such thing as a perfect solution, and if someone says there is, they are working too hard to sell you something. The key to protecting your identity is to layer on many forms of prevention and detection, thus persuading the criminal to move on to another target. One key layer is provided by identity monitoring services.

Monitoring your identity is much like installing a burglar alarm to protect your home – it’s a no-brainer if you are willing to invest a little to attain much more peace of mind. The most common question I get asked after my speaking engagements is which service I use personally. I have to say, despite their clever marketing, I am not a huge fan of the most popular providers, because they promise too much and deliver fewer tools than some of the better options. The identity theft services provided by the credit card companies are even more limited and less effective. I recommend doing your homework and comparing the different features of the various services.

Here are some features you’ll want your identity theft service to include:

  1. Convenience: The identity theft monitoring service should email you any time a red flag appears (changes to your credit, mailing address, bank accounts, loans, etc.) , so that you don’t have to do any extra work to keep track of your identity.
  2. Depth of Monitoring: Utilize a company that monitors your credit report at all three credit reporting bureaus (a tri-bureau report), which is vital, because the bureaus often don’t share information as much as they claim to share.
  3. Cyber-Agent Scanning: If you are worried about your private information being circulated in criminal chat rooms, carding sites, newsgroups and other digital venues where cyber criminals buy, sell and trade your data, make sure your product scans known rogue sites and alerts you to problems.
  4. Breadth of Reporting: Your identity monitoring service should also scan non-credit loan applications in case someone is using your identity to run a pay-day loan scheme.
  5. Public Document Surveillance: Your service should monitor your public records on the internet (court documents, legal agency filings) in case your information is published for any reason by the government or your Social Security number is found in public records.
  6. Restoration Services: It is vital that the identity theft monitoring service you choose provides restoration and repair if your identity is stolen. In fact, this is probably the most useful and effective part of the monitoring services, as it makes it much easier to recover from ID theft if you are a victim.
  7. Dashboard Access: I like the services that provide one easy to monitor dashboard across all aspects of your identity – that way, if something is a threat, you see it with a big red warning sign.

If a company promises you identity theft services or credit monitoring for free, run the other direction. Like anything else, identity theft services are an investment, and paying nothing means you are getting nothing other than having your name and valuable information sold to other marketers. Remember, you are protecting a digital asset (your identity) that is worth more than all of your bank accounts, mortgages, investments and net worth combined. Spending a little to save a lot is like immunizing yourself against the disease of identity theft before it strikes.

John Sileo is an an award-winning author and keynote speaker on identity theft, internet privacy, fraud training & technology defense. John specializes in making security entertaining, so that it works. John is CEO of The Sileo Group, whose clients include the Pentagon, Visa, Homeland Security & Pfizer. John’s body of work includes appearances on 60 Minutes, Rachael Ray, Anderson Cooper & Fox Business. Contact him directly on 800.258.8076.

Identity Theft Product Reviews

The location of this page has been changed. Please bookmark https://192.241.219.145/category/product-reviews/ for future reference. This link will take you to a page of product reviews that help you prevent identity theft, data breach, hacking, phishing, password theft and other identity related crimes.

LifeLock's New Identity (Theft Monitoring)

identity-monitoringLifeLock has been the victim of identity theft, and it will ultimately improve their product.

Over the weekend, LifeLock, the identity theft prevention marketing machine, lost a piece of who they are (were) when a judge stripped them of their most fundamental prevention tool — automatic fraud alerts on consumer credit reports. The net result is that LifeLock is having to strengthen it’s underlying identity theft monitoring architecture to fill the marketing hole, moving its product closer to superior identity surveillance services such as CSIdentity Protector.

I have never been the strongest supporter of LifeLock. Why? Because most every protection they offered out of the gate were steps you could take for yourself, for free. For example:

  1. Place a Fraud Alert on your credit files. (A stronger solution is to Freeze Your Credit with Experian, Equifax and TransUnion.)
  2. Opt Out of financial junk mail.
  3. Get a copy of your Credit Report.

In addition, I disagree with their President, Todd Davis, and his constant publication of his Social Security Number for sensational marketing purposes. Mr. Davis is sending the wrong message to the average listener: that if you use LifeLock, your Social Security Number and identity are so safe that you can give them away to anyone. But Mr. Davis has been the victim of several cases of identity theft, not something he advertises on his traveling SSN van. No one solution solves identity theft. It takes a layered approach, much like the deadbolts, police forces, alarms, lights, dogs and neighborhood watch programs that protect our homes.

It is important to understand how LifeLock’s identity has changed. Last Friday, U.S. District Court Judge Andrew Guilford ruled that LifeLock’s practice of placing fraud alerts on behalf of their customers constituted an unfair business practice. Basically, LifeLock utilized a free consumer fraud alert established by the Fair Credit Reporting Act (FCRA) in order to alert retailers who touch our credit files to verify the person’s identity before extending them credit. It is a good thing to have a fraud alert on your credit file (not as good as Freezing, see above), because it makes it harder for an impostor to use your identity to fund their purchases. But Judge Guilford ruled that a corporation can’t place the alert on your behalf; we must only be able to place fraud alerts ourselves. I only hope that Judge Guilford doesn’t make us install our home alarm systems ourselves, because none of us will do that either.

LifeLock’s actions were not illegal, but considered to be anti-competitive (if everyone placed fraud alerts for their customers, we would all have fraud alerts on our credit files — actually, not such a bad idea to require proof of identity before extending credit). Over the weekend, LifeLock complied with the court order, ceased offering automatic fraud alerts for its customers, and unveiled new tools to detect identity theft in the earliest stage possible.

The strengthening of its core product with scientific modeling and data mining (which is what CSIdentity has offered for years) will ultimately make their customers safer, especially if their customers take a few minutes to place a fraud alert or credit freeze on their files for themselves. In fact, if they upgrade to a credit freeze, LifeLock customers will actually be safer than they were before the ruling.

To begin protecting your identity, follow these steps (in this order):

  1. Sign up for Identity Monitoring.
  2. Get your 3 free Annual Credit Reports, once every 3-4 months.
  3. Opt Out of financial junk mail.
  4. Freeze Your Credit.

John Sileo became America’s leading Identity Theft Speaker & Expert after he lost his business and more than $300,000 to identity theft and data breach. His clients include the Department of Defense, Pfizer and the FDIC. To bring John in for your next meeting or conference, please contact him directly on 1.800.258.8076.