My identity has been stolen. What to do now?
Estimated Reading Time: 5 Minutes
If you have reasons to believe your Identity has been stolen, you should act quickly and try to mitigate the damage done as soon as possible. In this post, we will explain the main actions you should take if your accounts have been hacked, if your device has been stolen or if you are being blackmailed.
Follow the next steps and you will address most of the potential outcomes. If you are already going through this, we may not be able to jump in quickly enough, but we can help to protect your business against this threat in the future. Talk to us if you want to learn more.
This is part of our series of blog posts that cover the topic of identity theft. In our previous posts, we explained what is identity theft, how it happens and the key signs that would indicate you have been a victim of identity theft. If you want to read all this information in one place, download our Essential Guide on How to Avoid Identity Theft.
Steps to Take as Soon as Possible If Your Identity Has Been Stolen
Once your identity has been stolen, you must assume that the person who stole it has access to every one of your online accounts. They will also be able to take real-life criminal actions using your identity. However, it is the online accounts which can cause the most damage, in the shortest time. So, let’s deal with these first. But before you do anything else, make sure that the device that you are using is safe and clean of viruses, otherwise you may be giving the cyber criminal even more critical information!
- Secure your email account. Log in, change the password, change the security questions, and make sure your mobile number is correct.
- Log in to your online banking. Check your current bank statement and your credit card statements. Are there any suspicious transactions? If so, contact your bank immediately and have them cancel your credit/debit cards. Change your password and other security information.
- Log in to any payment gateways you use, like PayPal or similar. Check that there are no suspicious If there are, contact support straight away. Change your password, other security data, and remove any funding sources such as credit or debit cards. You can add them back later, but for now, removing them stops anyone making payments via the gateway using your identity.
- Log in to any online merchants that you often purchase goods from, that have your payment details stored. Change your password and security data. Remove any automated funding sources that would enable a person to make a purchase without knowing your card details.
Once you have covered these four issues, you have minimised the chance of an identity thief being able to use online transactions to commit a crime.
Later Steps to Take If Your Identity Has Been Stolen
Once you have taken the emergency procedures above, it is time to move on to the things you should do after, in order to stop an identity thief using your identity in real life to commit crimes.
- Report the theft of your identity to the Garda. This is a criminal act that you have been the victim of. Get the Garda involved as soon as possible.
- Inform your bank that you have been the victim of identity theft so that they can put a more stringent level of transaction monitoring in place. Most banks will be happy to do this, as it diminishes their own risk.
- Get hold of a copy of your current credit report. This report will help to highlight any fraudulent activity, such as taking out credit in your name.
- Visit each website that you use regularly, change all of your passwords and update your security information. Everything from Facebook to your personal blog.
- Start monitoring your bank and credit accounts closely, as well as online payment gateways, to ensure that no suspicious activity is still occurring.
Dealing with Ransom Emails after Identity Theft
Some cyber criminals have no intention of using your stolen identity to commit theft or fraud. Some are far more interested in blackmail. Why? Because this type of crime can be carried out without ever having to put themselves at risk. It is entirely anonymous and leaves no paper trail.
Sextortion is a common form of blackmail that identity thieves often try. It can take many forms. In its simplest form, the cybercriminal will threaten to send compromising pictures of yourself to everyone on your contact list, unless you send them a certain amount in Bitcoin or some other cryptocurrency. This video report found on BBC News shows more on how it happens and what you should do.
The best way to deal with this kind of blackmail is to contact the Garda. Often people will avoid this for fear of embarrassment, but please remember that this is a serious situation. There is likely to be an organised group of criminals behind the scenes, so the Garda will treat the case with its due seriousness and advise you on specific steps to collect evidence. However, there are a few things you can do to help yourself, while the Garda get up to speed.
- Change the password and security information for your email account.
- Stop communicating with the blackmailer – don’t reply to emails or any type of message.
- Capture screenshots of any chat conversations the blackmailer has with you.
It is important that you do not pay the ransom, as there have been cases in which the criminals continued to request higher amounts or simply released the threat anyway. If you are sure the blackmailer no longer has access to your email account, you can take the following steps:
- Consider sending an email to your contacts, informing them that you have been the victim of identity theft and that any suspicious email they receive from you, should be ignored.
- Consider posting on your social networking sites that you have been the victim of identity theft, to let people know they could receive suspicious emails from you in the coming days.
What You Need to Do If Your Smartphone Has Been Stolen or Lost
A lost or stolen smartphone is one of the most dangerous events regarding identity theft. Consider all of the information that could be stored somewhere on your smartphone. Site logins, transaction histories, important files from work, and many sources of precious information. If your smartphone has been lost or stolen, take the following steps:
- Try to find it – Apple, Android and Windows phones can all be tracked using online tools. Methods will vary depending on which type of phone you own.
- Change passwords – for your main accounts such as email, online banking, and all apps that you commonly use.
- Contact your phone carrier – and tell them the phone is lost or stolen. In some cases, they may be able to help locate the phone, but in all cases, you can stop the phone being used to make calls.
- Contact any affected parties – such as your employer, whose data may have been exposed to risk due to being stored on your phone.
- Remote wipe – Every smartphone using Apple iOS, Google Android and Microsoft Windows, can be remotely wiped. Methods will differ between phone operating systems.
Insurance against Identity Theft
Another way of protecting yourself is to hire a private insurance or protection service. Specialist companies, such as Lifelock and IDShield, can help you to monitor key warning signs of identity theft by providing automated alerts in the event of a detectable threat, and often provide financial aid to cover your expenses and losses should the worst occur.
Some offerings will be included in addition to your regular home, auto and traveller’s policies, and you may be assigned a case manager who will personally assist you with recovery and the next steps you need to take to be safe.
Not only do these services save you time and money, but they can provide you with peace of mind.
In Conclusion
Identity theft is a serious problem and one that cannot be fixed instantly. Undoing the damage that a cybercriminal has done could take weeks or even months in the worst cases. We hope that this blog post is able to help you if you are ever to become the victim of identity theft.
For more details on this topic and to learn how to avoid it, please take a look at the following suggested content:
- An Essential Guide on How to Avoid Identity Theft: our free downloadable PDF details the issue and offers the best tools an techniques to avoid it.
- The How, What and Why of Identity Theft: an introduction to the topic, explaining why cyber criminals find your information valuable.
- How Does Identity Theft Happen: what are the breaches Cyber Criminals will look for when trying to steal your identity.
- Are you Cybersafe? Assessing your personal risk of identity theft: Find out if your identity has been compromised and assess your level of risk.
If you need specific advice in a similar situation, feel free to contact us from Spector IT at 01 664 4190 and we’ll provide you with assistance.