All Top Banking

Women Hit Hardest by ID Theft

Posted by John B. Frank Tuesday, May 19, 2009

Amount of Money Lost by US Identity Theft Victims, by Gender, January-February 2009 (% of respondents)

Identity Theft Hits Women Hardest

Who is most affected by identity theft, who commits the crime and how can people protect themselves?  When it comes to the theft of personal information, women beware.  According to a study by Affinion Security Center, 17% percent of female identity theft victims have lost $1,000 or more due to the crime, versus only 10% of males.
In addition, more men (61%) avoided losing money than women (53%).
The good news is that most of the cases of identity theft were solved, although some were solved faster than others.
Forty-two percent of cases were closed in less than one week, 20% took between one week and one month and 13% took two months to six months.


Even so, if you are a victim of identity theft, chances are you will never know who did it.
A survey from the Identity Theft Assistance Center (ITAC) found that 72% of victims had no idea know who stole their personal information.
Of those that did, most cases (26.5%) were committed by friends, relatives or in-home employees who had access to personal information. Next came computer-related fraud (21.6%), lost or stolen wallets, checkbooks and credit card accounts (15.1%) and mail fraud (11.6%)


How can consumers protect themselves?

Amount of Time It Took to Get Their Identity Restored According to US Identity Theft Victims, by Gender, January-February 2009 (% of respondents)

Measures taken by respondents to the Affinion survey to keep their identities secure included:
  • Shredding documents before disposal
  • Monitoring credit card accounts
  • Keeping personal information locked in a safe
Anne Wallace, ITAC president, suggests keeping data in the home and workplace in secure locations, monitoring accounts for unusual activity, updating anti-virus software and upgrading browser and operating systems.
Protect your brand. Get the digital marketing and media information you need. Look into an eMarketer Total Access subscription today. 


3 comments

  1. Bernz Says:
  2. As a woman, I already feel vulnerable to predators knowing that I can't fully protect myself 'cause I'm not as strong as men. And now, I feel doubly vulnerable to identity thieves! Is it because women are easier to fool? Or is it because women have more money to steal?

     
  3. If women were more easier to fool they wouldn't have more money then men!

     
  4. Security is something that concerns us all, security not only at our homes and office but security of an all together different magnitude and proportion. Biometrics refers to the method of recognizing humans on the basis of the physical attributes and even behavioral conditions for access control or identity access management. Most of you would have seen such things in Hollywood movies. If you have watched ‘Mission Impossible’ or ‘Charlie’s Angels’ then you would recall that eye encryption or finger print impression were required to enter an unauthorized section of a building.

     

Post a Comment

Powered by Blogger.

Blog Archive

Search This Blog

Our Manufacturing Facility

Learn More About Us

Find out how our patented technology can empower your financial institution.

Our secure two-factor online banking authentication eliminates dangerous passwords and usernames and replicates the same trusted process used to access cash at ATM's. (Insert Bank Issued Card, Enter Bank Issued PIN)

There is an R.O.I. as FI's also earn recurring revenue from each transaction conducted using our PCI 2.0 Certified PIN Entry Device. Our technology also provides a unique real-time P2P "Instant-Transfer" which allows your online banking customer to transfer cash from ANY of their bankcards to ANY other bankcard...with the Swipe of a card.

Help your bank eliminate phishing and your customers avoid identity theft by providing them with the ability to stop typing and start swiping. There is no safer way to conduct financial transactions online than by 3DES DUKPT encrypting the cardholder details, which we do at the mag-head "inside the box/outside the browser."

Total Pageviews

SLIM for PC or SmartPhone

SLIM for PC or SmartPhone
Click to Inquire

Chip and PIN eCommerce and Mobile

Chip and PIN eCommerce and Mobile
Click to Inquire

Kapersky Calls for Mass Adoption of Card Readers

Kapersky Calls for Mass Adoption of Card Readers

Translate This Blog

BobCaps

Search ePayment News (example: NFC)

About Me

My photo
Named one of the best Payment Industry News Blogs 4 Years Running

Feedjit

My Zimbio