Are You a Victim of Identity Theft?

By: Paulwilcox
Identity theft is a popular crime today. But unlike other crimes, the victims of identity theft often are unaware that a crime has been committed until after the damage to their credit and their name has been done. Would you know before it is too late if your identity is stolen? Here is what to check for to stop identity theft in its tracks.

One of the most common way criminals use another person's identity is to apply for new credit cards or loans under a false name.

If you receive letters or phone calls from creditors stating that you have been approved or denied a credit card or loan you never applied for, you should contact the creditor right away and get to the bottom of the situation.

This is one of the first signs that something is wrong and can save you a lot of problems down the road if you investigate soon enough.

If you suddenly stop receiving bills or credit card statements, this is another indicator that you may be the victim of identity theft. Often a criminal assuming another person's identity will change the address on that person's bills so they are unaware that someone else is using their credit cards until it is too late.

Make sure you know when you are supposed to receive your bills each month and if they don't come on time call your credit card company and find out why it's late. Keeping an eye on your bills is a good way to thwart identity theft before it gets detrimental to you r credit.

A pretty obvious indicator that you are the victim of identity theft is seeing charges on your credit card bills that are not from you. Contact your credit card company and report the unauthorized use of your card.

While this is a very common indicator of identity theft it often goes overlooked if a person doesn't pay close attention to their bill so always review it as soon as it arrives. Paying close attention to your finances is the best way to stop identity theft before it gets out of hand.
Top Searches on
Security
 • 
 • 
 • 
 • 
 • 
 • 
 • 
 • 
 • 
 • 
 • 
 • 
 • 
 • 
 • 
 • 
 • 
 • 
 • 
 • 

» More on Security
 



Share this article :
Click to see more related articles