Podcast
Questions and Answers
Which of the following is NOT a common way that identity thieves get hold of your data?
Which of the following is NOT a common way that identity thieves get hold of your data?
What kind of information can be stolen in identity theft?
What kind of information can be stolen in identity theft?
What is a data breach?
What is a data breach?
Which of the following is NOT a recommended action to protect your information when shopping online?
Which of the following is NOT a recommended action to protect your information when shopping online?
Signup and view all the answers
What should you do if you suspect identity fraud?
What should you do if you suspect identity fraud?
Signup and view all the answers
Which of the following is NOT a recommended action to protect your information at home?
Which of the following is NOT a recommended action to protect your information at home?
Signup and view all the answers
What is the purpose of placing a fraud alert on your credit reports?
What is the purpose of placing a fraud alert on your credit reports?
Signup and view all the answers
Which of the following is NOT a method used by identity thieves to steal personal information?
Which of the following is NOT a method used by identity thieves to steal personal information?
Signup and view all the answers
What is one potential consequence of identity fraud?
What is one potential consequence of identity fraud?
Signup and view all the answers
Which of the following is NOT a way to protect your personal information and lower your risk of identity theft?
Which of the following is NOT a way to protect your personal information and lower your risk of identity theft?
Signup and view all the answers
What can an identity thief do if they gain access to your credit card information?
What can an identity thief do if they gain access to your credit card information?
Signup and view all the answers
Which of the following is NOT a common type of information stolen in data breaches?
Which of the following is NOT a common type of information stolen in data breaches?
Signup and view all the answers
What is one potential consequence of identity fraud?
What is one potential consequence of identity fraud?
Signup and view all the answers
What is the purpose of placing a fraud alert on your credit reports?
What is the purpose of placing a fraud alert on your credit reports?
Signup and view all the answers
What is one potential consequence of credit card theft?
What is one potential consequence of credit card theft?
Signup and view all the answers
Which of the following is NOT a method used by identity thieves to steal personal information?
Which of the following is NOT a method used by identity thieves to steal personal information?
Signup and view all the answers
What is a skimming device used for by identity thieves?
What is a skimming device used for by identity thieves?
Signup and view all the answers
What can an identity thief do if they gain access to your personal information?
What can an identity thief do if they gain access to your personal information?
Signup and view all the answers
Which of the following is NOT a recommended action to protect your information when shopping online?
Which of the following is NOT a recommended action to protect your information when shopping online?
Signup and view all the answers
What is one potential consequence of identity fraud?
What is one potential consequence of identity fraud?
Signup and view all the answers
What is the purpose of placing a fraud alert on your credit reports?
What is the purpose of placing a fraud alert on your credit reports?
Signup and view all the answers
What should you do if you suspect identity fraud?
What should you do if you suspect identity fraud?
Signup and view all the answers