Guest mode
Help
Getting Started
Support Center
Contact Support
Sign in
Reports
What is an identity breach
EN
Editor
Term map
Competitors
Integrations
Created
Oct 1, 2022
Last edited
Nov 8, 2022
Term used
Importance
Unused
Heading
hackers
personal data
health insurance
authentication
free credit
internal revenue service
credit files
warning signs
credit card information
signs of identity theft
police report
financial institution
types of fraud
fraudsters
identity theft victims
text messages
annualcreditreport.com
tax identity theft
major credit
credit card company
credit card accounts
identity theft protection services
credit monitoring services
lenders
personally identifiable information
dark web
new credit cards
identity theft
credit card
social security number
credit report
identity thieves
victim of identity theft
equifax
irs
tax return
credit bureaus
bank account
fraud alert
data breach
federal trade commission
ftc
identitytheft.gov
experian
credit card statements
transunion
law enforcement
credit score
scams
credit card number
new accounts
sensitive information
malware
withdrawals
phishing
account numbers
identity fraud
medical identity theft
recovery plan
id theft
debit card
debt collectors
child identity theft
types of identity theft
social media
Your working draft
www.experian.com/blogs/ask-experian/what-is-identity-theft/
#1 desktop
en.m.wikipedia.org/wiki/Identity_theft
#1 mobile
www.justice.gov/criminal-fraud/identity-theft/identity-theft-and-identity-fraud
#2 desktop
www.usa.gov/identity-theft
#3 desktop
www.investopedia.com/terms/i/identitytheft.asp
#4 desktop
www.texasattorneygeneral.gov/consumer-protection/identity-theft/what-identity-theft
#5 desktop
www.identitytheft.gov
#5 mobile
consumer.ftc.gov/articles/what-know-about-identity-theft
#7 desktop
www.usnews.com/360-reviews/privacy/identity-theft-protection/what-is-identity-theft
#8 desktop
en.wikipedia.org/wiki/Identity_theft
#9 desktop
consumer.ftc.gov/features/identity-theft
#9 mobile
www.malwarebytes.com/identity-theft
#10 desktop
www.ameriprise.com/privacy-security-fraud/protect-yourself/types-of-identity-theft
#11 desktop
lifelock.norton.com/learn/data-breaches/data-breaches-need-to-know
#12 desktop
www.equifax.com/personal/education/identity-theft/what-it-is-what-to-do/
#13 desktop
www.techtarget.com/searchsecurity/definition/identity-theft
#14 desktop
www.nerdwallet.com/article/finance/how-to-prevent-identity-theft
#15 desktop
www.equifax.com/personal/education/identity-theft/how-does-identity-theft-happen/
#15 mobile
www.fortinet.com/resources/cyberglossary/identity-theft
#16 desktop
us.norton.com/blog/id-theft/what-is-identity-theft
#16 mobile
www.ncsl.org/research/financial-services-and-commerce/identity-theft-state-statutes.aspx
#17 desktop
www.techtarget.com/searchsecurity/definition/identity-theft?amp=1
#17 mobile
www.irs.gov/identity-theft-fraud-scams/data-breach-information-for-taxpayers
#18 desktop
www.oaic.gov.au/privacy/data-breaches/identity-fraud
#19 desktop
www.sontiq.com/resources/what-is-a-data-breach/
#20 desktop
www.trendmicro.com/vinfo/us/security/definition/data-breach
#21 desktop
bjs.ojp.gov/topics/crime/identity-theft
#22 desktop
consumer.gov/scams-identity-theft/recovering-identity-theft
#23 desktop
www.forgerock.com/resources/2022-consumer-identity-breach-report
#24 desktop
www.consumerfinance.gov/ask-cfpb/what-is-identity-theft-en-1243/
#24 mobile
www.mcafee.com/en-us/identity-theft.html
#25 desktop
dos.ny.gov/identity-theft-prevention-and-mitigation-program
#26 desktop
www.ssa.gov/pubs/EN-05-10064.pdf
#26 mobile
ico.org.uk/your-data-matters/identity-theft/
#27 desktop
cca.hawaii.gov/identity-theft-information/
#28 desktop
www.trueidentity.com/identity-theft-resource/identity-theft-definition
#29 desktop
www.actionfraud.police.uk/a-z-of-fraud/identity-fraud-and-identity-theft
#30 desktop
www.mcafee.com/en-us/identity-theft/protection.html
#30 mobile
hackers
Typical: 1-3 (5)
personal data
Typical: 1-2 (2)
health insurance
Typical: 1-2 (2)
authentication
Typical: 2-4 (1)
free credit
Typical: 1-2 (3)
internal revenue service
Typical: 1-2 (1)
credit files
Typical: 1-2
warning signs
Typical: 1-2 (2)
credit card information
Typical: 1-3 (1)
signs of identity theft
H
Typical: 1-3
police report
Typical: 1-2 (1)
financial institution
Typical: 1-3 (1)
types of fraud
Typical: 1-2 (2)
fraudsters
Typical: 1-3 (2)
identity theft victims
Typical: 1-3 (1)
text messages
Typical: 1-2 (1)
annualcreditreport.com
Typical: 1-2
tax identity theft
Typical: 1-2 (1)
major credit
Typical: 1-2 (2)
credit card company
Typical: 1-2 (1)
credit card accounts
Typical: 1-2 (1)
identity theft protection services
Typical: 1-2 (2)
credit monitoring services
Typical: 1-3 (1)
lenders
Typical: 1-2
personally identifiable information
Typical: 1-3 (2)
dark web
Typical: 1-3 (1)
new credit cards
Typical: 1-2 (1)
identity theft
H
Typical: 11-33 (21)
credit card
Typical: 4-10 (5)
social security number
Typical: 2-4 (1)
credit report
Typical: 3-9 (1)
identity thieves
Typical: 2-4 (1)
victim of identity theft
Typical: 1-3 (2)
equifax
Typical: 1-3 (1)
irs
Typical: 1-2 (3)
tax return
Typical: 1-3 (3)
credit bureaus
Typical: 1-2 (2)
bank account
Typical: 1-3 (3)
fraud alert
Typical: 1-2 (1)
data breach
H
Typical: 2-6 (3)
federal trade commission
Typical: 1-2 (1)
ftc
Typical: 1-3 (3)
identitytheft.gov
Typical: 1-2 (1)
experian
Typical: 1-2 (1)
credit card statements
Typical: 1-2 (1)
transunion
Typical: 1-2 (1)
law enforcement
Typical: 1-3 (2)
credit score
Typical: 1-3 (3)
scams
Typical: 1-3 (1)
credit card number
Typical: 1-2 (1)
new accounts
Typical: 1-2 (2)
sensitive information
Typical: 1-2 (1)
malware
H
Typical: 2-4 (3)
withdrawals
Typical: 1-2 (3)
phishing
H
Typical: 1-3 (3)
account numbers
Typical: 1-2 (1)
identity fraud
Typical: 3-9 (5)
medical identity theft
H
Typical: 1-2 (3)
recovery plan
Typical: 1-2 (1)
id theft
H
Typical: 1-3 (1)
debit card
Typical: 1-2 (1)
debt collectors
Typical: 1-2
child identity theft
Typical: 1-2 (1)
types of identity theft
H
Typical: 2-4 (1)
social media
Typical: 1-3 (1)
hackers
hacker
Importance:
3
/10
Typical uses:
1-3
Current uses:
5
Examples
personal data
Importance:
3
/10
Typical uses:
1-2
Current uses:
2
Examples
health insurance
health insurer
Importance:
3
/10
Typical uses:
1-2
Current uses:
2
Examples
authentication
authenticators, authenticator
Importance:
3
/10
Typical uses:
2-4
Current uses:
1
Examples
free credit
Importance:
3
/10
Typical uses:
1-2
Current uses:
3
Examples
internal revenue service
Importance:
3
/10
Typical uses:
1-2
Current uses:
1
Examples
credit files
credit file
Importance:
3
/10
Typical uses:
1-2
Current uses:
–
Examples
warning signs
Importance:
3
/10
Typical uses:
1-2
Current uses:
2
Examples
credit card information
Importance:
3
/10
Typical uses:
1-3
Current uses:
1
Examples
signs of identity theft
sign of identity theft
Importance:
3
/10
Heading presence:
Low
Typical uses:
1-3
Current uses:
–
Examples
police report
police reports
Importance:
3
/10
Typical uses:
1-2
Current uses:
1
Examples
financial institution
financial institutions
Importance:
3
/10
Typical uses:
1-3
Current uses:
1
Examples
types of fraud
type of fraud
Importance:
3
/10
Typical uses:
1-2
Current uses:
2
Examples
fraudsters
fraudster
Importance:
3
/10
Typical uses:
1-3
Current uses:
2
Examples
identity theft victims
identity theft victim, identity theft victimization
Importance:
3
/10
Typical uses:
1-3
Current uses:
1
Examples
text messages
text message
Importance:
3
/10
Typical uses:
1-2
Current uses:
1
Examples
annualcreditreport.com
annualcreditreports.com
Importance:
3
/10
Typical uses:
1-2
Current uses:
–
Examples
tax identity theft
Importance:
3
/10
Typical uses:
1-2
Current uses:
1
Examples
major credit
Importance:
3
/10
Typical uses:
1-2
Current uses:
2
Examples
credit card company
credit card companies
Importance:
3
/10
Typical uses:
1-2
Current uses:
1
Examples
credit card accounts
credit card account
Importance:
3
/10
Typical uses:
1-2
Current uses:
1
Examples
identity theft protection services
identity theft protection service
Importance:
3
/10
Typical uses:
1-2
Current uses:
2
Examples
credit monitoring services
credit monitoring service
Importance:
3
/10
Typical uses:
1-3
Current uses:
1
Examples
lenders
lender
Importance:
3
/10
Typical uses:
1-2
Current uses:
–
Examples
personally identifiable information
personal identifying information
Importance:
3
/10
Typical uses:
1-3
Current uses:
2
Examples
dark web
Importance:
3
/10
Typical uses:
1-3
Current uses:
1
Examples
new credit cards
new credit card
Importance:
3
/10
Typical uses:
1-2
Current uses:
1
Examples
identity theft
identitytheft, identity-theft, identity theft
Importance:
10
/10
Heading presence:
High
Typical uses:
11-33
Current uses:
21
Examples
credit card
credit cards, creditcards, credit-card
Importance:
9
/10
Typical uses:
4-10
Current uses:
5
Examples
social security number
social security numbers
Importance:
7
/10
Typical uses:
2-4
Current uses:
1
Examples
credit report
credit reports, credit reporting, credit report(s
Importance:
7
/10
Typical uses:
3-9
Current uses:
1
Examples
identity thieves
identity thief
Importance:
7
/10
Typical uses:
2-4
Current uses:
1
Examples
victim of identity theft
victims of identity theft
Importance:
6
/10
Typical uses:
1-3
Current uses:
2
Examples
equifax
Importance:
6
/10
Typical uses:
1-3
Current uses:
1
Examples
irs
Importance:
6
/10
Typical uses:
1-2
Current uses:
3
Examples
tax return
tax returns
Importance:
6
/10
Typical uses:
1-3
Current uses:
3
Examples
credit bureaus
credit bureau
Importance:
6
/10
Typical uses:
1-2
Current uses:
2
Examples
bank account
bank accounts
Importance:
6
/10
Typical uses:
1-3
Current uses:
3
Examples
fraud alert
fraud alerts, fraudalert
Importance:
6
/10
Typical uses:
1-2
Current uses:
1
Examples
data breach
data breaches, data-breaches
Importance:
5
/10
Heading presence:
Moderate
Typical uses:
2-6
Current uses:
3
Examples
federal trade commission
Importance:
5
/10
Typical uses:
1-2
Current uses:
1
Examples
ftc
Importance:
5
/10
Typical uses:
1-3
Current uses:
3
Examples
identitytheft.gov
Importance:
5
/10
Typical uses:
1-2
Current uses:
1
Examples
experian
Importance:
5
/10
Typical uses:
1-2
Current uses:
1
Examples
credit card statements
credit card statement
Importance:
5
/10
Typical uses:
1-2
Current uses:
1
Examples
transunion
Importance:
5
/10
Typical uses:
1-2
Current uses:
1
Examples
law enforcement
law-enforcement
Importance:
5
/10
Typical uses:
1-3
Current uses:
2
Examples
credit score
credit scores
Importance:
5
/10
Typical uses:
1-3
Current uses:
3
Examples
scams
scam
Importance:
5
/10
Typical uses:
1-3
Current uses:
1
Examples
credit card number
credit card numbers, credit-card number
Importance:
4
/10
Typical uses:
1-2
Current uses:
1
Examples
new accounts
new account
Importance:
4
/10
Typical uses:
1-2
Current uses:
2
Examples
sensitive information
Importance:
4
/10
Typical uses:
1-2
Current uses:
1
Examples
malware
Importance:
4
/10
Heading presence:
Low
Typical uses:
2-4
Current uses:
3
Examples
withdrawals
withdrawal
Importance:
4
/10
Typical uses:
1-2
Current uses:
3
Examples
phishing
phish
Importance:
4
/10
Heading presence:
Low
Typical uses:
1-3
Current uses:
3
Examples
account numbers
account number
Importance:
4
/10
Typical uses:
1-2
Current uses:
1
Examples
identity fraud
Importance:
4
/10
Typical uses:
3-9
Current uses:
5
Examples
medical identity theft
Importance:
4
/10
Heading presence:
Low
Typical uses:
1-2
Current uses:
3
Examples
recovery plan
Importance:
4
/10
Typical uses:
1-2
Current uses:
1
Examples
id theft
idtheft, id.theft
Importance:
4
/10
Heading presence:
Low
Typical uses:
1-3
Current uses:
1
Examples
debit card
debit cards, debit-card
Importance:
4
/10
Typical uses:
1-2
Current uses:
1
Examples
debt collectors
debt collector
Importance:
3
/10
Typical uses:
1-2
Current uses:
–
Examples
child identity theft
Importance:
3
/10
Typical uses:
1-2
Current uses:
1
Examples
types of identity theft
type of identity theft
Importance:
3
/10
Heading presence:
Low
Typical uses:
2-4
Current uses:
1
Examples
social media
Importance:
3
/10
Typical uses:
1-3
Current uses:
1
Examples