March 8, 2018 By David Bisson 2 min read

The Federal Trade Commission (FTC) received more identity theft reports from millennials in 2017 than they did from senior citizens, a recent report revealed.

According to its “Consumer Sentinel Network Data Book 2017,” the FTC fielded reports of identity theft from 61,114 victims between the ages of 20 and 29 in 2017, while those in their 30s submitted 80,467 reports.

Together, millennials between 20 and 39 filed 141,581 cases in which someone stole their identity. That number dwarfs the combined total of 67,125 reports received from consumers in their 60s, 70s and 80s.

Fraud Types and Average Losses

Criminals victimized millennials with many different types of identity fraud, which affected 16.7 million U.S. consumers in 2017, according to Javelin Strategy & Research’s “2018 Identity Fraud Study.” The FTC report found that more than 30 percent of people in their 20s and close to 40 percent of those in their 30s suffered from instances of credit card fraud. Millennials who contacted the FTC also experienced bank fraud, employment or tax-related fraud, and phone or utilities fraud.

In addition, 40 percent of identity theft victims aged 20-29 said they lost money as a result of those scams, compared to just 18 percent of those in their 70s and older. However, senior citizens who did lose money reported greater sums than younger victims. The average median amount stolen from victims aged 80 or older was $1,092, while millennials lost less than half of that total.

Educating Consumers About Identity Theft

Overall, the FTC logged 2.68 million complaints from consumers in 2017. On one hand, that number represents a decrease from 2.98 million individuals who reported cases of identity theft in the previous year. On the other hand, victims lost more money to fraudsters in 2017 ($905 million) than the year prior ($842 million).

“This underscores the importance of the FTC’s work in educating consumers and cracking down on the scammers who try to take their money,” said Tom Pahl, acting director of the FTC’s Bureau of Consumer Protection, as quoted in a press release.

To protect themselves from identity thieves, consumers should be wary of suspicious emails and other social engineering schemes designed to compromise their sensitive data. If they suspect that someone is mishandling their personal information, consumers should file a complaint with the FTC.

More from

What does resilience in the cyber world look like in 2025 and beyond?

6 min read -  Back in 2021, we ran a series called “A Journey in Organizational Resilience.” These issues of this series remain applicable today and, in many cases, are more important than ever, given the rapid changes of the last few years. But the term "resilience" can be difficult to define, and when we define it, we may limit its scope, missing the big picture.In the age of generative artificial intelligence (gen AI), the prevalence of breach data from infostealers and the near-constant…

Airplane cybersecurity: Past, present, future

4 min read - With most aviation processes now digitized, airlines and the aviation industry as a whole must prioritize cybersecurity. If a cyber criminal launches an attack that affects a system involved in aviation — either an airline’s system or a third-party vendor — the entire process, from safety to passenger comfort, may be impacted.To improve security in the aviation industry, the FAA recently proposed new rules to tighten cybersecurity on airplanes. These rules would “protect the equipment, systems and networks of transport…

Protecting your digital assets from non-human identity attacks

4 min read - Untethered data accessibility and workflow automation are now foundational elements of most digital infrastructures. With the right applications and protocols in place, businesses no longer need to feel restricted by their lack of manpower or technical capabilities — machines are now filling those gaps.The use of non-human identities (NHIs) to power business-critical applications — especially those used in cloud computing environments or when facilitating service-to-service connections — has opened the doors for seamless operational efficiency. Unfortunately, these doors aren’t the…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today