Click here to close now.




















Welcome!

News Feed Item

Survey: Most People Concerned About Identify Theft, But Stop Short of Protection

New TransUnion National Survey Reveals Majority of Adults Don't Fully Understand Risk of Identity Theft, Rarely Check Credit Scores Regularly Throughout the Year

CHICAGO, IL -- (Marketwired) -- 06/26/14 -- Identity theft is America's fastest-growing crime, yet the majority of adults in the U.S. aren't taking steps to protect themselves and outsmart thieves, according to a recent TransUnion survey.

The national survey of men and women revealed that 80 percent of adults worry about becoming a victim of identity theft. However, although most people understand the concept of identity theft, very few fully know what puts them at risk and how they can beat identity thieves at their own game.

More than half of adults check their credit score once a year or less, and the majority don't understand they can fall prey to identify theft everywhere, including in stores, online and through social media, according to the survey.

The risk of identity theft is not new and the basic strategies for doing it have not changed in decades, yet few people have taken steps to make their identity more secure. Last year alone, more than 13 million Americans fell victim to fraud from identity theft, an increase of about half a million people from the prior year, according to a recent report from Javelin Strategy & Research.

"From the time we're born, everyone in the world has their own identity -- and the risk of having it stolen can come at any moment during your life and even after death," said Julie Springer, vice president at TransUnion. "With a new victim falling prey to identity theft every two seconds, it's more important than ever to take protective measures."

Despite high awareness of identity theft following recent security breaches at Target, Michaels and P.F. Chang's, behaviors haven't changed. When comparing their perceived levels of risk, only 34 percent believe using their debit or credit card at a retail store puts them at risk while 60 percent believe online shopping puts them at risk. When in fact, the data breaches have proven that shopping at a retail store holds a significant amount of risk for fraud. Additionally, more than one-quarter of adults surveyed said posting to social sites has the least risk of them falling prey to identity theft.

"Identity theft is happening everywhere, especially on social media where people are posting even more personal information and reusing the same passwords," Springer said. "Simple changes like adjusting privacy settings and strengthening your password can help ward off cyber thieves."

Even after news of the recent security breaches spread across the U.S., only one in five adults have purchased or used an identity theft protection service. However, 79 percent of people surveyed agreed that these kinds of services would be somewhat or very effective.

Services like TransUnion's Instant Alerts or Credit Lock, which allows members to lock and unlock their credit from their mobile device, helps people rest assured that they're protecting their families' identities by blocking access to their credit reports and receiving notifications for new applications for credit in their name.

TransUnion, a leader in identity theft and protection and credit management, offers the following simple tips to prevent identity theft:

  • Only carry essential documents with you. Don't carry extra credit cards, your Social Security card, birth certificate or passport with you outside the house.

  • Keep new checks out of the mail. When ordering new checks, pick them up at the bank instead of having them sent to your home. This makes it harder for your checks to be stolen, altered and cashed by identity thieves.

  • Be careful when giving out personal information over the phone. Identity thieves may call, posing as banks or government agencies. Don't give out personal information over the phone unless you initiated the call.

  • Stay on top of your credit. Make sure your credit reports are accurate and that you sign up for a credit monitoring service, like TransUnion's Instant Alert which can alert you by email to changes in your credit report -- a helpful way to prevent identity theft.

  • Follow your credit card billing cycles closely. Identity thieves can start by changing your billing address. Making sure you receive your credit card bill every month is an easy way to prevent identity theft.

  • Create passwords or PIN numbers out of a random mix of letters and numbers. Doing so makes it harder for identity thieves to discover these codes, and makes it easier for you to prevent fraud.

For more information on how to better protect yourself from identity theft or to begin safeguarding yourself from identity thieves, visit www.TransUnion.com

About the Survey
The survey was conducted online by TransUnion Interactive between June 13, 2014 and June 16, 2014, and included responses from 506 American consumers who had children of college age or younger.

About TransUnion
TransUnion Interactive, Inc. is a consumer subsidiary of TransUnion. As a global leader in credit and information management, TransUnion creates advantages for millions of people around the world by gathering, analyzing and delivering information. For businesses, TransUnion helps improve efficiency, manage risk, reduce costs and increase revenue by delivering comprehensive data and advanced analytics and decisioning. For consumers, TransUnion provides the tools, resources and education to help manage their credit health and achieve their financial goals. Through these and other efforts, TransUnion is working to build stronger economies worldwide. Founded in 1968 and headquartered in Chicago, TransUnion employs associates in more than 33 countries on five continents. www.transunion.com. Follow us on Facebook at http://www.facebook.com/TransUnion.

Contact
John Branham
TransUnion Interactive
Email Contact
(512) 351-3512

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
With the proliferation of connected devices underpinning new Internet of Things systems, Brandon Schulz, Director of Luxoft IoT – Retail, will be looking at the transformation of the retail customer experience in brick and mortar stores in his session at @ThingsExpo. Questions he will address include: Will beacons drop to the wayside like QR codes, or be a proximity-based profit driver? How will the customer experience change in stores of all types when everything can be instrumented and a...
Red Hat is investing in Tesora, the number one contributor to OpenStack Trove Database as a Service (DBaaS) also ranked among the top 20 companies contributing to OpenStack overall. Tesora, the company bringing OpenStack Trove Database as a Service (DBaaS) to the enterprise, has announced that Red Hat and others have invested in the company as a part of Tesora's latest funding round. The funding agreement expands on the ongoing collaboration between Tesora and Red Hat, which dates back to Febr...
The Internet of Things (IoT) is about the digitization of physical assets including sensors, devices, machines, gateways, and the network. It creates possibilities for significant value creation and new revenue generating business models via data democratization and ubiquitous analytics across IoT networks. The explosion of data in all forms in IoT requires a more robust and broader lens in order to enable smarter timely actions and better outcomes. Business operations become the key driver of I...
In their Live Hack” presentation at 17th Cloud Expo, Stephen Coty and Paul Fletcher, Chief Security Evangelists at Alert Logic, will provide the audience with a chance to see a live demonstration of the common tools cyber attackers use to attack cloud and traditional IT systems. This “Live Hack” uses open source attack tools that are free and available for download by anybody. Attendees will learn where to find and how to operate these tools for the purpose of testing their own IT infrastructu...
SYS-CON Events announced today that DataClear Inc. will exhibit at the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. The DataClear ‘BlackBox’ is the only solution that moves your PC, browsing and data out of the United States and away from prying (and spying) eyes. Its solution automatically builds you a clean, on-demand, virus free, new virtual cloud based PC outside of the United States, and wipes it clean...
It’s been proven time and time again that in tech, diversity drives greater innovation, better team productivity and greater profits and market share. So what can we do in our DevOps teams to embrace diversity and help transform the culture of development and operations into a true “DevOps” team? In her session at DevOps Summit, Stefana Muller, Director, Product Management – Continuous Delivery at CA Technologies, answered that question citing examples, showing how to create opportunities for ...
SYS-CON Events announced today that IceWarp will exhibit at the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. IceWarp, the leader of cloud and on-premise messaging, delivers secured email, chat, documents, conferencing and collaboration to today's mobile workforce, all in one unified interface
Culture is the most important ingredient of DevOps. The challenge for most organizations is defining and communicating a vision of beneficial DevOps culture for their organizations, and then facilitating the changes needed to achieve that. Often this comes down to an ability to provide true leadership. As a CIO, are your direct reports IT managers or are they IT leaders? The hard truth is that many IT managers have risen through the ranks based on their technical skills, not their leadership ab...
A producer of the first smartphones and tablets, presenter Lee M. Williams will talk about how he is now applying his experience in mobile technology to the design and development of the next generation of Environmental and Sustainability Services at ETwater. In his session at @ThingsExpo, Lee Williams, COO of ETwater, will talk about how he is now applying his experience in mobile technology to the design and development of the next generation of Environmental and Sustainability Services at ET...
WebRTC has had a real tough three or four years, and so have those working with it. Only a few short years ago, the development world were excited about WebRTC and proclaiming how awesome it was. You might have played with the technology a couple of years ago, only to find the extra infrastructure requirements were painful to implement and poorly documented. This probably left a bitter taste in your mouth, especially when things went wrong.
Whether you like it or not, DevOps is on track for a remarkable alliance with security. The SEC didn’t approve the merger. And your boss hasn’t heard anything about it. Yet, this unruly triumvirate will soon dominate and deliver DevSecOps faster, cheaper, better, and on an unprecedented scale. In his session at DevOps Summit, Frank Bunger, VP of Customer Success at ScriptRock, will discuss how this cathartic moment will propel the DevOps movement from such stuff as dreams are made on to a prac...
Cloud and datacenter migration innovator AppZero has joined the Microsoft Enterprise Cloud Alliance Program. AppZero is a fast, flexible way to move Windows Server applications from any source machine – physical or virtual – to any destination server, in any cloud or datacenter, using its patented container technology. AppZero’s container is also called a Virtual Application Appliance (VAA). To facilitate Microsoft Azure onboarding, AppZero has two purpose-built offerings: AppZero SP for Azure,...
WSM International, the pioneer and leader in server migration services, has announced an agreement with WHOA.com, a leader in providing secure public, private and hybrid cloud computing services. Under terms of the agreement, WSM will provide migration services to WHOA.com customers to relocate some or all of their applications, digital assets, and other computing workloads to WHOA.com enterprise-class, secure cloud infrastructure. The migration services include detailed evaluation and planning...
This Enterprise Strategy Group lab validation report of the NEC Express5800/R320 server with Intel® Xeon® processor presents the benefits of 99.999% uptime NEC fault-tolerant servers that lower overall virtualized server total cost of ownership. This report also includes survey data on the significant costs associated with system outages impacting enterprise and web applications. Click Here to Download Report Now!
IBM’s Blue Box Cloud, powered by OpenStack, is now available in any of IBM’s globally integrated cloud data centers running SoftLayer infrastructure. Less than 90 days after its acquisition of Blue Box, IBM has integrated its Blue Box Cloud Dedicated private-cloud-as-a-service into its broader portfolio of OpenStack® based solutions. The announcement, made today at the OpenStack Silicon Valley event, further highlights IBM’s continued support to deliver OpenStack solutions across all cloud depl...