This Is What Happens To Your Stolen Identity Information

We all know that identity theft can occur at many different levels, but how long after our information is stolen is it used? The U.S. Federal Trade Commission (FTC) did some research into what happens to stolen identity information that is made public, and the results of their investigation give us some better insight.

For their case, they created a database with 100 fake consumer profiles. This information included names, address, emails, phone numbers, and payment information types. The FTC then posted this database on hacker forums and sites where stolen data is usually published. It only took 9 minutes for hackers to try and use the data, and more than 1,200 attempts were made with this information.

Another example of the speed in which hackers access private information is shown in those who “hijack” local billboards, use platforms such as Craigslist or local buy and sell groups to access VIN numbers, run gas station scams, and countless other scandals.

It’s not just small businesses and individuals that are at risk for these types of attacks, either. Chipotle Mexican Grill investigated a payment card security incident in April of 2017, and published the results of their findings. According to the company, “malware designed to access payment card data from cards used on point-of-sale (POS) devices at certain Chipotle restaurants between March 24, 2017, and April 18, 2017. The malware searched for track data read from the magnetic stripe of a payment card as it was being routed through the POS device. There is no indication that other customer information was affected.”

Kmart is another large name brand that was hit by a credit card data breach earlier this year. While both companies have taken steps to ensure those affected by the breach were notified and have taken further preventive measures, it is still unsettling to know just how easily and quickly our information can be taken.

These examples are just some of thousands of reasons why it is imperative to ensure that your information is properly secured. With the help of password managers and companies like FORTR3SS, you can rest assured that your credentials and sensitive information are being secured with the most revolutionary high tech software.

IMAGE SOURCE: SALON

IMAGE SOURCE: SALON