Welcome!

News Feed Item

Survey: Most Seniors Concerned About Identify Theft, but Stop Short of Protection

New TransUnion National Survey Reveals Majority of Seniors Fearful of Becoming the Victim of ID Theft, Yet Fail to Take Steps to Protect Themselves

CHICAGO, IL -- (Marketwired) -- 07/22/14 -- Identity theft is America's fastest-growing crime, yet the majority of seniors in the U.S. aren't taking all possible steps to protect themselves and outsmart thieves, according to a recent TransUnion survey.

The national survey of men and women revealed that 78 percent of respondents are concerned or extremely concerned about identity theft yet 61 percent only check their credit score once a year or less. While these "retirement-ready adults" recognize the importance of identity theft prevention, they are not taking many proactive measures to prevent it. Just 13 percent of adults ages 61-90 use identity theft-prevention products and 17 percent subscribe to a credit-monitoring service.

In a time where data breaches have become a regular occurrence, it's important that consumers take proactive measures to safeguard their identity. One simple way to monitor credit is to subscribe to an identity theft protection product or monitoring service. In fact, 79 percent of respondents agree that these services would be somewhat effective (46 percent) or very effective (33 percent) in reducing their risk of identity theft.

All consumers, including seniors, should monitor and review their credit report annually. If they believe they have been a victim, they should consider placing a fraud alert or credit freeze on their credit report.

The Federal Bureau of Investigation explains that senior-aged individuals may make easier targets for identity thieves because:

  • Senior citizens are most likely to have a "nest egg," to own their home, and/or to have excellent credit -- all of which make them attractive to con artists.
  • People who grew up in the 1930s, 1940s, and 1950s were generally raised to be polite and trusting. Con artists exploit these traits, knowing that it is difficult or impossible for these individuals to say "no" or just hang up the telephone.
  • Older Americans are less likely to report a fraud because they don't know who to report it to, are too ashamed at having been scammed, or don't know they have been scammed.

TransUnion provides the following tips to help seniors better minimize their exposure to identity theft:

  • If your Medicare card has your Social Security number listed on it, make a photocopy of your Medicare card and use a permanent marker to black out the first five digits of your Social Security number on the photocopy of the card. Carry the photocopy of the card and keep your Medicare card in a secure place.
  • Do not carry your checkbook. Only carry the number of checks you will need and keep your checkbook in a secure place.
  • Keep all of your sensitive personal documents, including financial documents in a safe, secure, locked place.
  • Shred personal and financial records with a crosscut shredder before throwing them away.
  • Be mindful while using the internet. Install a virus-protection on your computer. Only visit trusted websites and do not respond to unsolicited requests for information.
  • A senior's Power of Attorney or Court Appointed-Guardian is able to exercise rights on behalf of the senior in order to clean up damage cause by identity theft.

Services like TransUnion's Instant Alerts or Credit Lock, which allows members to lock and unlock their credit from their mobile device, helps people rest assured that they're protecting their identities by blocking access to their credit reports and receiving notifications for new applications for credit in their name.

For more information on how seniors can better protect themselves from identity theft or to begin safeguarding yourself from identity thieves, visit www.TransUnion.com

About the Survey

The survey was conducted online by TransUnion Interactive, LLC on June 17-18, 2014. The results include responses from 503 U.S. residents over the age of 60.

About TransUnion

TransUnion Interactive, Inc. is a consumer subsidiary of TransUnion. As a global leader in credit and information management, TransUnion creates advantages for millions of people around the world by gathering, analyzing and delivering information. For businesses, TransUnion helps improve efficiency, manage risk, reduce costs and increase revenue by delivering comprehensive data and advanced analytics and decisioning. For consumers, TransUnion provides the tools, resources and education to help manage their credit health and achieve their financial goals. Through these and other efforts, TransUnion is working to build stronger economies worldwide. Founded in 1968 and headquartered in Chicago, TransUnion employs associates in more than 33 countries on five continents. www.transunion.com. Follow us on Facebook at http://www.facebook.com/TransUnion.

Contact
John Branham
Email Contact
(512) 351-3512

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
WebRTC is about the data channel as much as about video and audio conferencing. However, basically all commercial WebRTC applications have been built with a focus on audio and video. The handling of “data” has been limited to text chat and file download – all other data sharing seems to end with screensharing. What is holding back a more intensive use of peer-to-peer data? In her session at @ThingsExpo, Dr Silvia Pfeiffer, WebRTC Applications Team Lead at National ICT Australia, looked at differ...
With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo 2016 in New York. Learn what is going on, contribute to the discussions, and ensure that your enterprise is as "IoT-Ready" as it can be! Internet of @ThingsExpo, taking place June 6-8, 2017, at the Javits Center in New York City, New York, is co-located with 20th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry p...
IoT offers a value of almost $4 trillion to the manufacturing industry through platforms that can improve margins, optimize operations & drive high performance work teams. By using IoT technologies as a foundation, manufacturing customers are integrating worker safety with manufacturing systems, driving deep collaboration and utilizing analytics to exponentially increased per-unit margins. However, as Benoit Lheureux, the VP for Research at Gartner points out, “IoT project implementers often un...
SYS-CON Events announced today that Technologic Systems Inc., an embedded systems solutions company, will exhibit at SYS-CON's @ThingsExpo, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Technologic Systems is an embedded systems company with headquarters in Fountain Hills, Arizona. They have been in business for 32 years, helping more than 8,000 OEM customers and building over a hundred COTS products that have never been discontinued. Technologic Systems’ pr...
SYS-CON Events announced today that IoT Now has been named “Media Sponsor” of SYS-CON's 20th International Cloud Expo, which will take place on June 6–8, 2017, at the Javits Center in New York City, NY. IoT Now explores the evolving opportunities and challenges facing CSPs, and it passes on some lessons learned from those who have taken the first steps in next-gen IoT services.
SYS-CON Events announced today that WineSOFT will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Based in Seoul and Irvine, WineSOFT is an innovative software house focusing on internet infrastructure solutions. The venture started as a bootstrap start-up in 2010 by focusing on making the internet faster and more powerful. WineSOFT’s knowledge is based on the expertise of TCP/IP, VPN, SSL, peer-to-peer, mob...
Containers have changed the mind of IT in DevOps. They enable developers to work with dev, test, stage and production environments identically. Containers provide the right abstraction for microservices and many cloud platforms have integrated them into deployment pipelines. DevOps and containers together help companies achieve their business goals faster and more effectively. In his session at DevOps Summit, Ruslan Synytsky, CEO and Co-founder of Jelastic, reviewed the current landscape of Dev...
SYS-CON Events announced today that delaPlex will exhibit at SYS-CON's @CloudExpo, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. delaPlex pioneered Software Development as a Service (SDaaS), which provides scalable resources to build, test, and deploy software. It’s a fast and more reliable way to develop a new product or expand your in-house team.
The security needs of IoT environments require a strong, proven approach to maintain security, trust and privacy in their ecosystem. Assurance and protection of device identity, secure data encryption and authentication are the key security challenges organizations are trying to address when integrating IoT devices. This holds true for IoT applications in a wide range of industries, for example, healthcare, consumer devices, and manufacturing. In his session at @ThingsExpo, Lancen LaChance, vic...
With billions of sensors deployed worldwide, the amount of machine-generated data will soon exceed what our networks can handle. But consumers and businesses will expect seamless experiences and real-time responsiveness. What does this mean for IoT devices and the infrastructure that supports them? More of the data will need to be handled at - or closer to - the devices themselves.
You think you know what’s in your data. But do you? Most organizations are now aware of the business intelligence represented by their data. Data science stands to take this to a level you never thought of – literally. The techniques of data science, when used with the capabilities of Big Data technologies, can make connections you had not yet imagined, helping you discover new insights and ask new questions of your data. In his session at @ThingsExpo, Sarbjit Sarkaria, data science team lead ...
The Internet of Things can drive efficiency for airlines and airports. In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect with GE, and Sudip Majumder, senior director of development at Oracle, discussed the technical details of the connected airline baggage and related social media solutions. These IoT applications will enhance travelers' journey experience and drive efficiency for the airlines and the airports.
SYS-CON Events announced today that Dataloop.IO, an innovator in cloud IT-monitoring whose products help organizations save time and money, has been named “Bronze Sponsor” of SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Dataloop.IO is an emerging software company on the cutting edge of major IT-infrastructure trends including cloud computing and microservices. The company, founded in the UK but now based in San Fran...
Building a cross-cloud operational model can be a daunting task. Per-cloud silos are not the answer, but neither is a fully generic abstraction plane that strips out capabilities unique to a particular provider. In his session at 20th Cloud Expo, Chris Wolf, VP & Chief Technology Officer, Global Field & Industry at VMware, will discuss how successful organizations approach cloud operations and management, with insights into where operations should be centralized and when it’s best to decentraliz...
In the first article of this three-part series on hybrid cloud security, we discussed the Shared Responsibility Model and examined how the most common attack strategies persist, are amplified, or are mitigated as assets move from data centers to the cloud. Today, we’ll look at some of the unique security challenges that are introduced by public cloud environments. While cloud computing delivers many operational, cost-saving and security benefits, it takes place in a public, shared and on-demand ...