Steps for Protecting Your Personally Identifiable Information at Home

The only reason you have not yet been the victim of an identity-related crime (and that includes credit card fraud) is that no one practiced in the art has had the opportunity to separate you from your available credit, health care, or other bankable soft assets—yet.

The figures on data compromises vary, but Risk Based Security estimates that just last year more than 4.2 billion sensitive records were compromised—information that opens the door to all kinds of identity-related malfeasance, including account takeover, credit draining, theft of health care, and even the commission of a crime in the victim’s name.

To put it bluntly, your chances of avoiding fraud are right up there with winning it big at a bingo convention in Florida—slim to none.

Hopefully this is not news to you. If it is, read on for tips on how to protect yourself against identity theft.

Familial Identity Theft

Unless you’ve been pulling double shifts in a pyramid guarding one of the lesser-known pharaohs, you already know the basics about protecting yourself against the threat of ID theft. You never answer the phone by saying “Yes,” no matter what the interlocutor says (thieves steal voiceprints to authenticate your accounts and take them over), you use two-factor authentication whenever it’s offered, and your long-and-strong passwords are never used to access more than one account.

Get everything you need to master your credit today.
Get started for free

But here’s a factor you may not be protecting yourself against: the various ways you are vulnerable to identity theft at home.

The Identity Theft Resource Center has provided a comprehensive guide for navigating the problem of familial identity theft—that is, when a friend or a family member steals your identity.

While no one can be completely protected from identity theft, there are things you can do to safeguard yourself against this particular approach. First, you can practice the three Ms that I first introduced in my book, “Swiped: How to Protect Yourself in a World Full of Scammers, Phishers, and Identity Thieves.”

  1. Minimize your exposure. Don’t authenticate yourself to anyone unless you are in control of the interaction, don’t overshare on social media, be a good steward of your passwords, safeguard any documents that can be used to hijack your identity, and consider freezing your credit.
  1. Monitor your accounts. Check your credit report regularly (you can check your credit report for free on com), keep track of your credit score, and review major accounts daily if possible. If you prefer a more laidback approach, sign up for free transaction alerts from financial services institutions and credit card companies or purchase a sophisticated credit- and identity-monitoring program.
  1. Manage the damage. Make sure you quickly get on top of any incursion into your identity and enroll in a program where professionals help you navigate and resolve identity compromises—oftentimes available for free, or at minimal cost, through insurance companies, financial services institutions, and HR departments.

Minimize Your Exposure to Identity Theft at Home

Regardless of your income and regardless of your likeability, someone you know is probably willing and able to steal your identity. To stave off that eventuality, you need to practice the first M: Minimize your exposure at home.

Consider what kind of personally identifiable information (PII) lives with you in your home—everything from tax returns to password cheat sheets. Now think about where these things are stored.

If you are like most people, your tax returns are at best kept in a locked filing cabinet with a key hidden in a not-too-paranoid spot nearby. For still more people, the above security measure has more in common with the protections at Fort Knox than the protections they’ve put in place themselves. Maybe it’s time to rethink that cardboard box.

The individuals who are regularly in and out of your house, and those who live in your house, are in a position to know what you have, where you have it, and the most opportune moments to steal it. It may be only a matter of time before they use that barely hidden key, or simply take that cardboard box.

Who are we talking about here? Literally anyone who can get in your house. And don’t think for a moment it matters if you’re at home, because the most sticky-fingered among us can rob us blind on a trip to the bathroom.

Our homes are not perfect sanctuaries, as much as we would like to think they are. Repair people come through, utility meters need to be read, we hire babysitters and housekeepers, friends and relatives come by to visit: all of them are potential ID thieves.

What You Can Do

There are a variety of things you can do to safeguard your PII in your home and minimize your attackable surface.

  • Miniaturize your data. Not only is a mountain of paperwork hard to store, it is also increasingly unnecessary. Get into the habit of scanning or even photographing your documents and then shredding the hard copies. Create two or three copies of the digital files—and make sure one of them is stored somewhere other than your house, since fires and other cataclysmic events do happen.
  • Use encrypted external storage. Whether you choose a thumb drive, a cloud server, or an external hard drive, store your PII digitally in an encrypted form. And it’s always better to choose a device that offers rich security features, like biometrics or two-factor authentication.
  • Invest in a safe. Once the exclusive equipment of rich folks, safes are now very affordable. They are a great place to store all that miniaturized data. Get one that is fireproof and has a biometric element (like a fingerprint scan) to further protect your information.
  • Employ two-factor data management. Store your data in more than one place. An encrypted drive can be left with the most untrustworthy relative. Just make sure that you have a backup somewhere. If you have a safety deposit box, that’s probably the best bet.

At the end of the day, you are the only one with access to the data points needed to figure out precisely how vulnerable you are to identity theft. If you think like a thief, you will be pointed in the right direction.

Image: shapecharge

You Might Also Like

A father and son smile at each other
Becoming an authorized user is a common tip for individuals tryin... Read More

September 13, 2021

Uncategorized

A woman shakes the hand of the man who interviewed her.
Long-term unemployment can really hurt—and not just financially... Read More

August 4, 2021

Uncategorized

A stock market graph, similar to the trajectory of GameStop stock, is displayed on a tablet. A blank piece of paper and a pen are next to the tablet, and all sit on a wooden tabletop.
GameStop, a dying video game retailer, has blown past epic propor... Read More

January 28, 2021

Uncategorized