Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Scoring to Combat Identity Theft

By Jim Collins
August 15, 2008

There are two victims to identity theft: the person harmed and the enterprise that may be unknowingly involved.  ID scoring is a better approach that credit monitoring companies can offer the security service to their employees, too.




The , a non-profit organization dedicated exclusively to the understanding and prevention of identity theft, defines identity theft as “a crime in which an impostor obtains key pieces of personal identifying information such as Social Security numbers and driver’s license numbers and uses them for their own personal gain.

   
“It can start with lost or stolen wallets, pilfered mail, a data breach, computer virus, phishing, a scam or paper documents thrown out by an enterprise which result in ‘dumpster diving.’  The crime varies widely, and can include check fraud, credit card fraud, financial identity theft, criminal identity theft, governmental identity theft and identity fraud.” 

   
ccording to Javelin Strategy and Research, a firm dedicated to researching financial service areas, nearly 8.4 million people were victims of identity theft in 2007, totaling $49.3 billion in fraudulent charges with the average victim spending at least 25 hours trying to resolve the issue. Identity theft is one of the fastest-growing crimes in the nation, accounting for as much as 25 percent of all credit card fraud loss each year. Though victims may not be liable for charges made on fraudulent accounts, it can be extraordinarily difficult to improve credit reports. There’s no doubt that the theft of identity can leave an individual with a poor credit rating and a ruined reputation, which may take months or even years to correct.



DAMAGE TO AN ENTERPRISE’S REPUTATION

But it is also important to realize that some incidents of identity theft can create reputation-damaging headlines and lawsuits for enterprises ranging from government and healthcare to financial and college organizations.

To make the situation worse, thieves want more than just money. In 2007, the Federal Trade Commission reported that credit card fraud accounted for 23 percent of the reported identity theft cases. However, the non-financial types of fraud including employment fraud accounted for 14 percent and government documents/benefits fraud accounted for 11 percent. Non-financial types of identity theft include utilities and phone fraud, medical, criminal, employment and government benefits fraud and synthetic identity theft where the identity is fictional rather than stolen.

Criminals can readily obtain personal data without having to break into a person’s home. The United States Department of Justice reports that “in public places, for example, criminals may engage in ‘shoulder surfing,’ watching from a nearby location as a person punches in a telephone calling card number or credit card number or listen in on a conversation if a person gives a credit card number over the telephone to a hotel or rental car company.” Applications for pre-approved credit cards in the mail, that are discarded without shredding the enclosed materials, roll out the welcome mat to predators who may retrieve them and activate the cards for their use without the recipient’s knowledge. The World Wide Web has opened up a global village for criminals seeking to obtain identifying data, such as passwords or banking information, as many people respond to unsolicited official-looking spam.

Once the predator has enough identifying information, they can take over that person’s identity by falsely completing applications for loans and credit cards, making bank account withdrawals using the victim’s information, and other unscrupulous activities, and inflict substantial damage on the victim’s assets, credit and reputation.


THE ANSWER FOR ID THIEVERY?

People are bombarded by offers of free credit card monitoring that claim to reduce identity theft.

   
Enterprises that are compromised by data break-ins generally offer free credit report monitoring to potential victims.

   
Are there limitations to the protection from these free offers?  Unfortunately, there truly is no “free lunch.”  A study conducted by Gartner, the information technology research company, revealed that “identity scoring and monitoring is more effective than credit report monitoring to watch for potentially fraudulent activity.” According to the U.S. PIRG, the federation of state public interest research groups, 79 percent of credit reports contain some type of error.  With so many errors, credit monitoring is not a reliable solution for identity theft prevention.

   
Notebook computers filled with confidential employee information are stolen on a frequent basis, and data breaches and criminal accesses also occur at retailers, payment processors and other types of companies all the time. Following a compromise, affected enterprises generally offer potential victims free credit report monitoring from one of three major credit bureaus -- Experian, Equifax and TransUnion – implying that credit report monitoring will protect customers from criminal use of their identity records for subsequent crimes.

   
There are major deficiencies in relying on credit card monitoring for ID theft.

   
An ID theft victim with a stolen Social Security number that was used in concert with other data, such as a different address or date of birth, may not be alerted.  Potential victims are only contacted if their exact identity including full name, date of birth, etc. was used to apply for a new mortgage, credit or other loan. Most importantly, any credit monitoring report will arrive days after the criminal activity has transpired.  One has to hope that the criminal hasn’t done too much damage in those few days.  Credit card monitoring also does not catch the non-financial use of stolen identity and can, in fact, damage a credit rating even further while also damaging an enterprise also involved in the incident.



IDENTITY SCORING MAKES A HIT

With identity scoring, victims and companies also involved get an accurate and comprehensive picture of the complete credit-related activity. Identity score systems tap into a broad set of consumer data that judge a person’s authenticity. Identity score components used by identity scoring companies include government and public records, corporate data, credit records and predicted behavior patterns based on empirical data.

   

Gartner Research defines identity scoring as “scoring the behavior of an identity’s or a criminal ring’s activities over time and across enterprises. Suspect patterns of behavior that show up across different organizations would not necessarily appear if the activity within only one organization was being monitored.”

   
Credit report monitoring is not able to identify criminal activity or individual records linked by stolen data.  Identity scoring considers far more attributes that clearly define the individual and their behavior over a significant period of time. 


The basic identity score components a company uses in ID scoring include name and address components; Internet monitoring of personal information found online on Web sites, newsgroups and blogs; fraud information such as that found with stolen credit cards; behavioral pattern analysis; synthetic identity information which is the information used to create a fake identity; and predictive analytics which weighs behavioral data against earlier set patterns of behavior.

   
A Gartner Research report, “Limit ID Fraud: Use Identity Scoring, Not Credit Monitoring,” indicated that “identity scoring and monitoring was explicitly architected to look for identity theft-related fraud. Credit scores were designed to help lenders make good credit decisions. Direct-to-consumer credit reports and monitoring evolved several years ago when consumers wanted to know the content of their credit score. Consumer credit report monitoring further developed as a way for consumers to directly monitor inquiries about their credit reports to determine if such inquiries were made for either legitimate or potentially criminal purposes.”

   
Recovery after an identity is stolen is very important and very complex.  There are many calls to make and steps to take and unfortunately for the victims, identity theft is often much simpler, and quicker, than the recovery. It’s the same for the companies involved.



LOW COST EMPLOYEE BENEFIT

In today’s recessionary environment, and with medical insurance very expensive, not every business can afford to offer healthcare and disability insurance to their employees. More and more businesses are looking for lower cost, yet high value employee benefits that will give their workforce peace of mind.  As a security program, identity protection is a value added benefit that companies can offer to their employees as a low-cost addition to their benefit package.


For more information on identity theft, visit the links below.




Links

  • www.consumer.gov/idtheft
  • www.idtheftcenter.org
  • www.privacyrights.org/identity.htm

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jim Collins is president of HR Plus, www.hrplus.com, a provider of background screening and pre-employment services.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!