April 26, 2018 By David Bisson 2 min read

More than 1 million children living in the U.S. were victims of identity fraud in 2017, a new study revealed.

According to the “2018 Child Identity Fraud Study,” published by Javelin Strategy & Research and sponsored by Identity Guard, identity theft caused $2.6 billion in total losses and $540 million in out-of-pocket costs for the families of the child victims.

Like Stealing Data From a Baby

For the study, Javelin Strategy & Research surveyed 5,000 adults who lived with a dependent minor at some point in the past six years. Their responses, which Javelin collected between August and September 2017, provided insight into the risks that identity fraud poses to children.

The report found that data breaches are particularly damaging for young victims. Of the children who learned their information was exposed, 39 percent fell victim to identity fraud. That’s considerably higher than the rate for adults at just 19 percent.

That wasn’t the only area where child victims of identity fraud, which affected 16.7 million U.S. consumers in 2017, had different experiences than their adult counterparts. For example, more than half (60 percent) of children personally knew the perpetrators who abused their identity. By comparison, just 7 percent of adult victims knew their offender, according to Javelin’s “2018 Identity Fraud Report.”

The Connection Between Bullying and Identity Fraud

At the same time, Javelin discovered that children who had been bullied online were nine times more likely to fall victim to identity fraud than those who weren’t, with incident rates of 6.67 percent and 0.72 percent, respectively. Al Pascual, senior vice president of research and head of fraud and security at Javelin, said this finding indicates how fraud and bullying arise from the “same underlying vulnerabilities.”

“Children who are unprepared to protect themselves from online risks are likely to encounter individuals who wish to target them emotionally or financially,” he explained.

Many children are too young to take the security of their identities into their own hands. With that said, Javelin advised guardians to take it upon themselves to stem the tide of child identity theft by freezing their children’s credit reports, monitoring accounts for suspicious activity and keeping physical documents behind lock and key.

More from

Airplane cybersecurity: Past, present, future

4 min read - With most aviation processes now digitized, airlines and the aviation industry as a whole must prioritize cybersecurity. If a cyber criminal launches an attack that affects a system involved in aviation — either an airline’s system or a third-party vendor — the entire process, from safety to passenger comfort, may be impacted.To improve security in the aviation industry, the FAA recently proposed new rules to tighten cybersecurity on airplanes. These rules would “protect the equipment, systems and networks of transport…

Protecting your digital assets from non-human identity attacks

4 min read - Untethered data accessibility and workflow automation are now foundational elements of most digital infrastructures. With the right applications and protocols in place, businesses no longer need to feel restricted by their lack of manpower or technical capabilities — machines are now filling those gaps.The use of non-human identities (NHIs) to power business-critical applications — especially those used in cloud computing environments or when facilitating service-to-service connections — has opened the doors for seamless operational efficiency. Unfortunately, these doors aren’t the…

Communication platforms play a major role in data breach risks

4 min read - Every online activity or task brings at least some level of cybersecurity risk, but some have more risk than others. Kiteworks Sensitive Content Communications Report found that this is especially true when it comes to using communication tools.When it comes to cybersecurity, communicating means more than just talking to another person; it includes any activity where you are transferring data from one point online to another. Companies use a wide range of different types of tools to communicate, including email,…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today