Click here to close now.




















Welcome!

News Feed Item

Survey: Most Seniors Concerned About Identify Theft, but Stop Short of Protection

New TransUnion National Survey Reveals Majority of Seniors Fearful of Becoming the Victim of ID Theft, Yet Fail to Take Steps to Protect Themselves

CHICAGO, IL -- (Marketwired) -- 07/22/14 -- Identity theft is America's fastest-growing crime, yet the majority of seniors in the U.S. aren't taking all possible steps to protect themselves and outsmart thieves, according to a recent TransUnion survey.

The national survey of men and women revealed that 78 percent of respondents are concerned or extremely concerned about identity theft yet 61 percent only check their credit score once a year or less. While these "retirement-ready adults" recognize the importance of identity theft prevention, they are not taking many proactive measures to prevent it. Just 13 percent of adults ages 61-90 use identity theft-prevention products and 17 percent subscribe to a credit-monitoring service.

In a time where data breaches have become a regular occurrence, it's important that consumers take proactive measures to safeguard their identity. One simple way to monitor credit is to subscribe to an identity theft protection product or monitoring service. In fact, 79 percent of respondents agree that these services would be somewhat effective (46 percent) or very effective (33 percent) in reducing their risk of identity theft.

All consumers, including seniors, should monitor and review their credit report annually. If they believe they have been a victim, they should consider placing a fraud alert or credit freeze on their credit report.

The Federal Bureau of Investigation explains that senior-aged individuals may make easier targets for identity thieves because:

  • Senior citizens are most likely to have a "nest egg," to own their home, and/or to have excellent credit -- all of which make them attractive to con artists.
  • People who grew up in the 1930s, 1940s, and 1950s were generally raised to be polite and trusting. Con artists exploit these traits, knowing that it is difficult or impossible for these individuals to say "no" or just hang up the telephone.
  • Older Americans are less likely to report a fraud because they don't know who to report it to, are too ashamed at having been scammed, or don't know they have been scammed.

TransUnion provides the following tips to help seniors better minimize their exposure to identity theft:

  • If your Medicare card has your Social Security number listed on it, make a photocopy of your Medicare card and use a permanent marker to black out the first five digits of your Social Security number on the photocopy of the card. Carry the photocopy of the card and keep your Medicare card in a secure place.
  • Do not carry your checkbook. Only carry the number of checks you will need and keep your checkbook in a secure place.
  • Keep all of your sensitive personal documents, including financial documents in a safe, secure, locked place.
  • Shred personal and financial records with a crosscut shredder before throwing them away.
  • Be mindful while using the internet. Install a virus-protection on your computer. Only visit trusted websites and do not respond to unsolicited requests for information.
  • A senior's Power of Attorney or Court Appointed-Guardian is able to exercise rights on behalf of the senior in order to clean up damage cause by identity theft.

Services like TransUnion's Instant Alerts or Credit Lock, which allows members to lock and unlock their credit from their mobile device, helps people rest assured that they're protecting their identities by blocking access to their credit reports and receiving notifications for new applications for credit in their name.

For more information on how seniors can better protect themselves from identity theft or to begin safeguarding yourself from identity thieves, visit www.TransUnion.com

About the Survey

The survey was conducted online by TransUnion Interactive, LLC on June 17-18, 2014. The results include responses from 503 U.S. residents over the age of 60.

About TransUnion

TransUnion Interactive, Inc. is a consumer subsidiary of TransUnion. As a global leader in credit and information management, TransUnion creates advantages for millions of people around the world by gathering, analyzing and delivering information. For businesses, TransUnion helps improve efficiency, manage risk, reduce costs and increase revenue by delivering comprehensive data and advanced analytics and decisioning. For consumers, TransUnion provides the tools, resources and education to help manage their credit health and achieve their financial goals. Through these and other efforts, TransUnion is working to build stronger economies worldwide. Founded in 1968 and headquartered in Chicago, TransUnion employs associates in more than 33 countries on five continents. www.transunion.com. Follow us on Facebook at http://www.facebook.com/TransUnion.

Contact
John Branham
Email Contact
(512) 351-3512

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
With the proliferation of connected devices underpinning new Internet of Things systems, Brandon Schulz, Director of Luxoft IoT – Retail, will be looking at the transformation of the retail customer experience in brick and mortar stores in his session at @ThingsExpo. Questions he will address include: Will beacons drop to the wayside like QR codes, or be a proximity-based profit driver? How will the customer experience change in stores of all types when everything can be instrumented and a...
It’s been proven time and time again that in tech, diversity drives greater innovation, better team productivity and greater profits and market share. So what can we do in our DevOps teams to embrace diversity and help transform the culture of development and operations into a true “DevOps” team? In her session at DevOps Summit, Stefana Muller, Director, Product Management – Continuous Delivery at CA Technologies, answered that question citing examples, showing how to create opportunities for ...
As more and more data is generated from a variety of connected devices, the need to get insights from this data and predict future behavior and trends is increasingly essential for businesses. Real-time stream processing is needed in a variety of different industries such as Manufacturing, Oil and Gas, Automobile, Finance, Online Retail, Smart Grids, and Healthcare. Azure Stream Analytics is a fully managed distributed stream computation service that provides low latency, scalable processing of ...
Everyone talks about continuous integration and continuous delivery but those are just two ends of the pipeline. In the middle of DevOps is continuous testing (CT), and many organizations are struggling to implement continuous testing effectively. After all, without continuous testing there is no delivery. And Lab-As-A-Service (LaaS) enhances the CT with dynamic on-demand self-serve test topologies. CT together with LAAS make a powerful combination that perfectly serves complex software developm...
Skeuomorphism usually means retaining existing design cues in something new that doesn’t actually need them. However, the concept of skeuomorphism can be thought of as relating more broadly to applying existing patterns to new technologies that, in fact, cry out for new approaches. In his session at DevOps Summit, Gordon Haff, Senior Cloud Strategy Marketing and Evangelism Manager at Red Hat, discussed why containers should be paired with new architectural practices such as microservices rathe...
WebRTC has had a real tough three or four years, and so have those working with it. Only a few short years ago, the development world were excited about WebRTC and proclaiming how awesome it was. You might have played with the technology a couple of years ago, only to find the extra infrastructure requirements were painful to implement and poorly documented. This probably left a bitter taste in your mouth, especially when things went wrong.
Any Ops team trying to support a company in today’s cloud-connected world knows that a new way of thinking is required – one just as dramatic than the shift from Ops to DevOps. The diversity of modern operations requires teams to focus their impact on breadth vs. depth. In his session at DevOps Summit, Adam Serediuk, Director of Operations at xMatters, Inc., will discuss the strategic requirements of evolving from Ops to DevOps, and why modern Operations has begun leveraging the “NoOps” approa...
As more intelligent IoT applications shift into gear, they’re merging into the ever-increasing traffic flow of the Internet. It won’t be long before we experience bottlenecks, as IoT traffic peaks during rush hours. Organizations that are unprepared will find themselves by the side of the road unable to cross back into the fast lane. As billions of new devices begin to communicate and exchange data – will your infrastructure be scalable enough to handle this new interconnected world?
In today's digital world, change is the one constant. Disruptive innovations like cloud, mobility, social media, and the Internet of Things have reshaped the market and set new standards in customer expectations. To remain competitive, businesses must tap the potential of emerging technologies and markets through the rapid release of new products and services. However, the rigid and siloed structures of traditional IT platforms and processes are slowing them down – resulting in lengthy delivery ...
In their Live Hack” presentation at 17th Cloud Expo, Stephen Coty and Paul Fletcher, Chief Security Evangelists at Alert Logic, will provide the audience with a chance to see a live demonstration of the common tools cyber attackers use to attack cloud and traditional IT systems. This “Live Hack” uses open source attack tools that are free and available for download by anybody. Attendees will learn where to find and how to operate these tools for the purpose of testing their own IT infrastructu...
SYS-CON Events announced today that IceWarp will exhibit at the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. IceWarp, the leader of cloud and on-premise messaging, delivers secured email, chat, documents, conferencing and collaboration to today's mobile workforce, all in one unified interface
Whether you like it or not, DevOps is on track for a remarkable alliance with security. The SEC didn’t approve the merger. And your boss hasn’t heard anything about it. Yet, this unruly triumvirate will soon dominate and deliver DevSecOps faster, cheaper, better, and on an unprecedented scale. In his session at DevOps Summit, Frank Bunger, VP of Customer Success at ScriptRock, will discuss how this cathartic moment will propel the DevOps movement from such stuff as dreams are made on to a prac...
Too often with compelling new technologies market participants become overly enamored with that attractiveness of the technology and neglect underlying business drivers. This tendency, what some call the “newest shiny object syndrome,” is understandable given that virtually all of us are heavily engaged in technology. But it is also mistaken. Without concrete business cases driving its deployment, IoT, like many other technologies before it, will fade into obscurity.
SYS-CON Events announced today that G2G3 will exhibit at SYS-CON's @DevOpsSummit Silicon Valley, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Based on a collective appreciation for user experience, design, and technology, G2G3 is uniquely qualified and motivated to redefine how organizations and people engage in an increasingly digital world.
Consumer IoT applications provide data about the user that just doesn’t exist in traditional PC or mobile web applications. This rich data, or “context,” enables the highly personalized consumer experiences that characterize many consumer IoT apps. This same data is also providing brands with unprecedented insight into how their connected products are being used, while, at the same time, powering highly targeted engagement and marketing opportunities. In his session at @ThingsExpo, Nathan Trel...