Guest mode
Help
Getting Started
Support Center
Contact Support
Sign in
Reports
What is an identity breach
EN
Editor
Term map
Competitors
Integrations
Created
Oct 1, 2022
Last edited
Nov 8, 2022
Term used
Importance
Unused
Heading
hackers
personal data
health insurance
authentication
free credit
internal revenue service
credit files
warning signs
credit card information
signs of identity theft
police report
financial institution
types of fraud
fraudsters
identity theft victims
text messages
annualcreditreport.com
tax identity theft
major credit
credit card company
credit card accounts
identity theft protection services
credit monitoring services
lenders
personally identifiable information
dark web
new credit cards
identity theft
credit card
social security number
credit report
identity thieves
victim of identity theft
equifax
irs
tax return
credit bureaus
bank account
fraud alert
data breach
federal trade commission
ftc
identitytheft.gov
experian
credit card statements
transunion
law enforcement
credit score
scams
credit card number
new accounts
sensitive information
malware
withdrawals
phishing
account numbers
identity fraud
medical identity theft
recovery plan
id theft
debit card
debt collectors
child identity theft
types of identity theft
social media
Your working draft
www.experian.com/blogs/ask-experian/what-is-identity-theft/
#1 desktop
en.m.wikipedia.org/wiki/Identity_theft
#1 mobile
www.justice.gov/criminal-fraud/identity-theft/identity-theft-and-identity-fraud
#2 desktop
www.usa.gov/identity-theft
#3 desktop
www.investopedia.com/terms/i/identitytheft.asp
#4 desktop
www.texasattorneygeneral.gov/consumer-protection/identity-theft/what-identity-theft
#5 desktop
www.identitytheft.gov
#5 mobile
consumer.ftc.gov/articles/what-know-about-identity-theft
#7 desktop
www.usnews.com/360-reviews/privacy/identity-theft-protection/what-is-identity-theft
#8 desktop
en.wikipedia.org/wiki/Identity_theft
#9 desktop
consumer.ftc.gov/features/identity-theft
#9 mobile
www.malwarebytes.com/identity-theft
#10 desktop
www.ameriprise.com/privacy-security-fraud/protect-yourself/types-of-identity-theft
#11 desktop
lifelock.norton.com/learn/data-breaches/data-breaches-need-to-know
#12 desktop
www.equifax.com/personal/education/identity-theft/what-it-is-what-to-do/
#13 desktop
www.techtarget.com/searchsecurity/definition/identity-theft
#14 desktop
www.nerdwallet.com/article/finance/how-to-prevent-identity-theft
#15 desktop
www.equifax.com/personal/education/identity-theft/how-does-identity-theft-happen/
#15 mobile
www.fortinet.com/resources/cyberglossary/identity-theft
#16 desktop
us.norton.com/blog/id-theft/what-is-identity-theft
#16 mobile
www.ncsl.org/research/financial-services-and-commerce/identity-theft-state-statutes.aspx
#17 desktop
www.techtarget.com/searchsecurity/definition/identity-theft?amp=1
#17 mobile
www.irs.gov/identity-theft-fraud-scams/data-breach-information-for-taxpayers
#18 desktop
www.oaic.gov.au/privacy/data-breaches/identity-fraud
#19 desktop
www.sontiq.com/resources/what-is-a-data-breach/
#20 desktop
www.trendmicro.com/vinfo/us/security/definition/data-breach
#21 desktop
bjs.ojp.gov/topics/crime/identity-theft
#22 desktop
consumer.gov/scams-identity-theft/recovering-identity-theft
#23 desktop
www.forgerock.com/resources/2022-consumer-identity-breach-report
#24 desktop
www.consumerfinance.gov/ask-cfpb/what-is-identity-theft-en-1243/
#24 mobile
www.mcafee.com/en-us/identity-theft.html
#25 desktop
dos.ny.gov/identity-theft-prevention-and-mitigation-program
#26 desktop
www.ssa.gov/pubs/EN-05-10064.pdf
#26 mobile
ico.org.uk/your-data-matters/identity-theft/
#27 desktop
cca.hawaii.gov/identity-theft-information/
#28 desktop
www.trueidentity.com/identity-theft-resource/identity-theft-definition
#29 desktop
www.actionfraud.police.uk/a-z-of-fraud/identity-fraud-and-identity-theft
#30 desktop
www.mcafee.com/en-us/identity-theft/protection.html
#30 mobile
hackers
Typical: 1-3 (5)
hackers
hacker
Importance:
3
/10
Typical uses:
1-3
Current uses:
5
Examples
personal data
Typical: 1-2 (2)
personal data
Importance:
3
/10
Typical uses:
1-2
Current uses:
2
Examples
health insurance
Typical: 1-2 (2)
health insurance
health insurer
Importance:
3
/10
Typical uses:
1-2
Current uses:
2
Examples
authentication
Typical: 2-4 (1)
authentication
authenticators, authenticator
Importance:
3
/10
Typical uses:
2-4
Current uses:
1
Examples
free credit
Typical: 1-2 (3)
free credit
Importance:
3
/10
Typical uses:
1-2
Current uses:
3
Examples
internal revenue service
Typical: 1-2 (1)
internal revenue service
Importance:
3
/10
Typical uses:
1-2
Current uses:
1
Examples
credit files
Typical: 1-2
credit files
credit file
Importance:
3
/10
Typical uses:
1-2
Current uses:
โ
Examples
warning signs
Typical: 1-2 (2)
warning signs
Importance:
3
/10
Typical uses:
1-2
Current uses:
2
Examples
credit card information
Typical: 1-3 (1)
credit card information
Importance:
3
/10
Typical uses:
1-3
Current uses:
1
Examples
signs of identity theft
H
Typical: 1-3
signs of identity theft
sign of identity theft
Importance:
3
/10
Heading presence:
Low
Typical uses:
1-3
Current uses:
โ
Examples
police report
Typical: 1-2 (1)
police report
police reports
Importance:
3
/10
Typical uses:
1-2
Current uses:
1
Examples
financial institution
Typical: 1-3 (1)
financial institution
financial institutions
Importance:
3
/10
Typical uses:
1-3
Current uses:
1
Examples
types of fraud
Typical: 1-2 (2)
types of fraud
type of fraud
Importance:
3
/10
Typical uses:
1-2
Current uses:
2
Examples
fraudsters
Typical: 1-3 (2)
fraudsters
fraudster
Importance:
3
/10
Typical uses:
1-3
Current uses:
2
Examples
identity theft victims
Typical: 1-3 (1)
identity theft victims
identity theft victim, identity theft victimization
Importance:
3
/10
Typical uses:
1-3
Current uses:
1
Examples
text messages
Typical: 1-2 (1)
text messages
text message
Importance:
3
/10
Typical uses:
1-2
Current uses:
1
Examples
annualcreditreport.com
Typical: 1-2
annualcreditreport.com
annualcreditreports.com
Importance:
3
/10
Typical uses:
1-2
Current uses:
โ
Examples
tax identity theft
Typical: 1-2 (1)
tax identity theft
Importance:
3
/10
Typical uses:
1-2
Current uses:
1
Examples
major credit
Typical: 1-2 (2)
major credit
Importance:
3
/10
Typical uses:
1-2
Current uses:
2
Examples
credit card company
Typical: 1-2 (1)
credit card company
credit card companies
Importance:
3
/10
Typical uses:
1-2
Current uses:
1
Examples
credit card accounts
Typical: 1-2 (1)
credit card accounts
credit card account
Importance:
3
/10
Typical uses:
1-2
Current uses:
1
Examples
identity theft protection services
Typical: 1-2 (2)
identity theft protection services
identity theft protection service
Importance:
3
/10
Typical uses:
1-2
Current uses:
2
Examples
credit monitoring services
Typical: 1-3 (1)
credit monitoring services
credit monitoring service
Importance:
3
/10
Typical uses:
1-3
Current uses:
1
Examples
lenders
Typical: 1-2
lenders
lender
Importance:
3
/10
Typical uses:
1-2
Current uses:
โ
Examples
personally identifiable information
Typical: 1-3 (2)
personally identifiable information
personal identifying information
Importance:
3
/10
Typical uses:
1-3
Current uses:
2
Examples
dark web
Typical: 1-3 (1)
dark web
Importance:
3
/10
Typical uses:
1-3
Current uses:
1
Examples
new credit cards
Typical: 1-2 (1)
new credit cards
new credit card
Importance:
3
/10
Typical uses:
1-2
Current uses:
1
Examples
identity theft
H
Typical: 11-33 (21)
identity theft
identitytheft, identity-theft, idenยญtiยญty theft
Importance:
10
/10
Heading presence:
High
Typical uses:
11-33
Current uses:
21
Examples
credit card
Typical: 4-10 (5)
credit card
credit cards, creditcards, credit-card
Importance:
9
/10
Typical uses:
4-10
Current uses:
5
Examples
social security number
Typical: 2-4 (1)
social security number
social security numbers
Importance:
7
/10
Typical uses:
2-4
Current uses:
1
Examples
credit report
Typical: 3-9 (1)
credit report
credit reports, credit reporting, credit report(s
Importance:
7
/10
Typical uses:
3-9
Current uses:
1
Examples
identity thieves
Typical: 2-4 (1)
identity thieves
identity thief
Importance:
7
/10
Typical uses:
2-4
Current uses:
1
Examples
victim of identity theft
Typical: 1-3 (2)
victim of identity theft
victims of identity theft
Importance:
6
/10
Typical uses:
1-3
Current uses:
2
Examples
equifax
Typical: 1-3 (1)
equifax
Importance:
6
/10
Typical uses:
1-3
Current uses:
1
Examples
irs
Typical: 1-2 (3)
irs
Importance:
6
/10
Typical uses:
1-2
Current uses:
3
Examples
tax return
Typical: 1-3 (3)
tax return
tax returns
Importance:
6
/10
Typical uses:
1-3
Current uses:
3
Examples
credit bureaus
Typical: 1-2 (2)
credit bureaus
credit bureau
Importance:
6
/10
Typical uses:
1-2
Current uses:
2
Examples
bank account
Typical: 1-3 (3)
bank account
bank accounts
Importance:
6
/10
Typical uses:
1-3
Current uses:
3
Examples
fraud alert
Typical: 1-2 (1)
fraud alert
fraud alerts, fraudalert
Importance:
6
/10
Typical uses:
1-2
Current uses:
1
Examples
data breach
H
Typical: 2-6 (3)
data breach
data breaches, data-breaches
Importance:
5
/10
Heading presence:
Moderate
Typical uses:
2-6
Current uses:
3
Examples
federal trade commission
Typical: 1-2 (1)
federal trade commission
Importance:
5
/10
Typical uses:
1-2
Current uses:
1
Examples
ftc
Typical: 1-3 (3)
ftc
Importance:
5
/10
Typical uses:
1-3
Current uses:
3
Examples
identitytheft.gov
Typical: 1-2 (1)
identitytheft.gov
Importance:
5
/10
Typical uses:
1-2
Current uses:
1
Examples
experian
Typical: 1-2 (1)
experian
Importance:
5
/10
Typical uses:
1-2
Current uses:
1
Examples
credit card statements
Typical: 1-2 (1)
credit card statements
credit card statement
Importance:
5
/10
Typical uses:
1-2
Current uses:
1
Examples
transunion
Typical: 1-2 (1)
transunion
Importance:
5
/10
Typical uses:
1-2
Current uses:
1
Examples
law enforcement
Typical: 1-3 (2)
law enforcement
law-enforcement
Importance:
5
/10
Typical uses:
1-3
Current uses:
2
Examples
credit score
Typical: 1-3 (3)
credit score
credit scores
Importance:
5
/10
Typical uses:
1-3
Current uses:
3
Examples
scams
Typical: 1-3 (1)
scams
scam
Importance:
5
/10
Typical uses:
1-3
Current uses:
1
Examples
credit card number
Typical: 1-2 (1)
credit card number
credit card numbers, credit-card number
Importance:
4
/10
Typical uses:
1-2
Current uses:
1
Examples
new accounts
Typical: 1-2 (2)
new accounts
new account
Importance:
4
/10
Typical uses:
1-2
Current uses:
2
Examples
sensitive information
Typical: 1-2 (1)
sensitive information
Importance:
4
/10
Typical uses:
1-2
Current uses:
1
Examples
malware
H
Typical: 2-4 (3)
malware
Importance:
4
/10
Heading presence:
Low
Typical uses:
2-4
Current uses:
3
Examples
withdrawals
Typical: 1-2 (3)
withdrawals
withdrawal
Importance:
4
/10
Typical uses:
1-2
Current uses:
3
Examples
phishing
H
Typical: 1-3 (3)
phishing
phish
Importance:
4
/10
Heading presence:
Low
Typical uses:
1-3
Current uses:
3
Examples
account numbers
Typical: 1-2 (1)
account numbers
account number
Importance:
4
/10
Typical uses:
1-2
Current uses:
1
Examples
identity fraud
Typical: 3-9 (5)
identity fraud
Importance:
4
/10
Typical uses:
3-9
Current uses:
5
Examples
medical identity theft
H
Typical: 1-2 (3)
medical identity theft
Importance:
4
/10
Heading presence:
Low
Typical uses:
1-2
Current uses:
3
Examples
recovery plan
Typical: 1-2 (1)
recovery plan
Importance:
4
/10
Typical uses:
1-2
Current uses:
1
Examples
id theft
H
Typical: 1-3 (1)
id theft
idtheft, id.theft
Importance:
4
/10
Heading presence:
Low
Typical uses:
1-3
Current uses:
1
Examples
debit card
Typical: 1-2 (1)
debit card
debit cards, debit-card
Importance:
4
/10
Typical uses:
1-2
Current uses:
1
Examples
debt collectors
Typical: 1-2
debt collectors
debt collector
Importance:
3
/10
Typical uses:
1-2
Current uses:
โ
Examples
child identity theft
Typical: 1-2 (1)
child identity theft
Importance:
3
/10
Typical uses:
1-2
Current uses:
1
Examples
types of identity theft
H
Typical: 2-4 (1)
types of identity theft
type of identity theft
Importance:
3
/10
Heading presence:
Low
Typical uses:
2-4
Current uses:
1
Examples
social media
Typical: 1-3 (1)
social media
Importance:
3
/10
Typical uses:
1-3
Current uses:
1
Examples