Common Ways Identity Theft Occurs

Supported by an experienced team of researchers, analysts, consultants, and investigators, Edward Myers & Associates Inc., was established in 2003 to provide risk assessment consulting and investigative services. Today, the team at Edward Myers & Associates Inc., continues to assist public- and private sector-clients with a wide variety of needs, including prevention of and response to identity theft.

Over the last 10 years, the incidence of identity theft has risen by more than 150,000 cases, with nearly 400,000 cases reported in the United States in 2016. For high-profile business professionals, these thefts can put companies at significant financial risk. Individuals should be aware of some of the more common methods thieves use to steal personal information.

Technology has made it easier than ever for identity thieves. Information is easily stolen through tactics like skimming, which occurs when people implant data-recording devices into machines like ATMs and other card readers. Once a credit card is swiped, the information stored in the magnetic strip is recorded and then retained by the thief.

Another common form of identity theft occurs through phishing, in which an individual sends out fraudulent emails, voicemails, letters, or other form of message in an effort to trick an individual into giving up sensitive information. Identities are also stolen through malware programs that use key and screen loggers to learn a computer user’s passwords, giving thieves access to emails, bank accounts, and many other forms of personal online tools.