{"id":4628,"date":"2013-04-16T19:27:00","date_gmt":"2013-04-16T19:27:00","guid":{"rendered":"https:\/\/leap.staging.ribbitt.com\/evs\/identity-theft-soon-to-surpass-traditional-theft\/"},"modified":"2013-04-16T19:27:00","modified_gmt":"2013-04-16T19:27:00","slug":"identity-theft-soon-to-surpass-traditional-theft","status":"publish","type":"post","link":"https:\/\/leap.staging.ribbitt.com\/evs\/insights\/identity-theft-soon-to-surpass-traditional-theft\/","title":{"rendered":"Identity Theft Soon to Surpass Traditional Theft"},"content":{"rendered":"<p>Identity theft is growing, and its growing fast. With the&#13;<br \/>\namount of business that is conducted online, there is no wonder why identity&#13;<br \/>\ntheft has become such a big business  yes, a business. <a href=\"http:\/\/www.usatoday.com\/story\/money\/personalfinance\/2013\/04\/14\/identity-theft-growing\/2082179\/\">Identity&#13;<br \/>\ntheft<\/a> has become so easy to conduct that it has become a business all on&#13;<br \/>\nits own. Monica Hamilton of McAfee, stated that millions of credit card numbers&#13;<br \/>\nare being put up for sale, anywhere from $10-$50. Hamilton estimated that the&#13;<br \/>\nnumber of programs written to steal personal information is around 130 million.&#13;<br \/>\nThats 130 million plus ways a hacker can take personal information and use it&#13;<br \/>\nfor fraudulent reasons. And consumers are not the only ones to lose here;&#13;<br \/>\nbusinesses can lose big as well. Even if the business itself does not incur any&#13;<br \/>\nlosses, there can be lose in lawsuits and resources used to reconcile the&#13;<br \/>\nissue. One of reasons why finding resources to help <a href=\"https:\/\/www.electronicverificationsystems.com\/resources\/\">prevent online&#13;<br \/>\nfraud<\/a> is so difficult is because online fraud is still a fairly new&#13;<br \/>\npractice and traditional security is\/was not trained to protect against it.&#13;<br \/>\nOnline fraud and identity theft are prevented very differently than traditional&#13;<br \/>\nsecurity and deserve separate precautions.<\/p>\n<p><!--StartFragment--><\/p>\n<p>Online identity theft, and all <a href=\"https:\/\/www.electronicverificationsystems.com\/Resources\/Blog\/Being-Aware-of-Online-Fraud.aspx\">online&#13;<br \/>\nfraud<\/a> for that matter, is often more difficult to detect than other forms&#13;<br \/>\nof fraud. And when companies do experience online fraud, they sometimes find it&#13;<br \/>\npricey and time consuming to investigate and sweep the issue under the rug.&#13;<br \/>\nCompanies will compensate appropriately and go about business per usual, and&#13;<br \/>\nthis then leaves the window open for the fraud to occur again. This is not&#13;<br \/>\ncompletely an act of negligence; its more often an act of being under&#13;<br \/>\neducated. Online fraud can range from a simple <a href=\"https:\/\/www.electronicverificationsystems.com\/Resources\/Blog\/Losing-Your-Company-s-Identity-Through-Social-Media.aspx\">social&#13;<br \/>\nmedia hacking<\/a> to total identity theft that is used to get a new job and&#13;<br \/>\nfile for a mortgage. Because this range it so great, its hard to be fully&#13;<br \/>\neducated on the risks and preventative measures. Companies need to take the&#13;<br \/>\ntime and use the resources needed to learn about online fraud prevention, a&#13;<br \/>\nsolution may be more affordable and feasible than a business may think. Taking&#13;<br \/>\nthe first step to learn more about <a href=\"https:\/\/www.electronicverificationsystems.com\/solutions\/identifraud\/\">online&#13;<br \/>\nfraud prevention<\/a> can save a company a lot of money and their reputation.<\/p>\n<\/p>\n<p>[Contributed by EVS marketing]<\/p>\n<p><!--EndFragment--><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Identity theft is growing, and its growing fast. With the amount of business that is conducted online, there is no wonder why identity theft has become such a big business  yes, a business. Identity theft has become so easy<\/p>\n","protected":false},"author":40,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[36],"tags":[],"class_list":["post-4628","post","type-post","status-publish","format-standard","hentry","category-identity-theft"],"acf":[],"_links":{"self":[{"href":"https:\/\/leap.staging.ribbitt.com\/evs\/wp-json\/wp\/v2\/posts\/4628","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/leap.staging.ribbitt.com\/evs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/leap.staging.ribbitt.com\/evs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/leap.staging.ribbitt.com\/evs\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/leap.staging.ribbitt.com\/evs\/wp-json\/wp\/v2\/comments?post=4628"}],"version-history":[{"count":0,"href":"https:\/\/leap.staging.ribbitt.com\/evs\/wp-json\/wp\/v2\/posts\/4628\/revisions"}],"wp:attachment":[{"href":"https:\/\/leap.staging.ribbitt.com\/evs\/wp-json\/wp\/v2\/media?parent=4628"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/leap.staging.ribbitt.com\/evs\/wp-json\/wp\/v2\/categories?post=4628"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/leap.staging.ribbitt.com\/evs\/wp-json\/wp\/v2\/tags?post=4628"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}