NEWYou tin present perceive to Fox News articles!
Earlier this year, much than 25 cardinal Americans began receiving letters from a institution astir of them had ne'er heard of. The sender was Conduent Business Services, a contractor that processes benefits records and quality resources information for authorities Medicaid programs, leader wellness plans and authorities agencies. Between October 2024 and January 2025, ransomware operators pulled names, Social Security numbers, dates of birth, location addresses, aesculapian diagnosis codes and wellness security assertion numbers retired of Conduent's systems. In February 2026, Texas Attorney General Ken Paxton called it the largest information breach successful U.S. history.
The letters ended the mode astir of these letters end, with an apology, a telephone fig and an connection of 1 twelvemonth of escaped recognition monitoring. Once your information is already out, tin you realistically support your individuality connected your own, oregon has it go thing astir radical are amended disconnected outsourcing?
Sign up for my FREE CyberGuy Report
- Get my champion tech tips, urgent information alerts and exclusive deals delivered consecutive to your inbox.
- For simple, real-world ways to spot scams aboriginal and enactment protected, sojourn CyberGuy.com - trusted by millions who ticker CyberGuy connected TV daily.
FAKE SSA EMAIL ALERT: SPOT THIS SCAM FAST

Massive information breaches proceed to exposure delicate idiosyncratic information, leaving millions astatine hazard of individuality theft. (Daniel de la Hoz/Getty Images)
Plus, you'll get instant entree to my Ultimate Scam Survival Guide escaped erstwhile you join.
What you tin bash for escaped today
Federal instrumentality and tools from the Federal Trade Commission screen much crushed than galore radical realize. None of these outgo anything. When utilized together, they adjacent the astir communal introduction points fraudsters target.
1) Freeze your credit
Start by freezing your recognition astatine each 3 bureaus. A frost blocks caller accounts from being opened successful your name. It has been escaped astatine Equifax, Experian and TransUnion since 2018. You tin assistance it temporarily erstwhile you request to use for credit.
2) Get an IRS Identity Protection PIN
Next, get an Identity Protection PIN from the IRS astatine irs.gov/identity-theft-fraud-scams/get-an-identity-protection-pin. This six-digit codification blocks fraudulent taxation returns filed utilizing your Social Security number. The IRS issues a caller 1 each year.
3) Check your recognition reports regularly
You should besides cheque your recognition reports regularly. Equifax, Experian and TransUnion present connection escaped play entree done AnnualCreditReport.com. Checking erstwhile each fewer months tin assistance you drawback suspicious enactment early.
4) Use IdentityTheft.gov for recovery
It besides helps to bookmark IdentityTheft.gov. The tract creates a personalized betterment plan, generates the affidavit creditors necessitate and provides prefilled quality letters.
5) Opt retired of prescreened recognition offers
Another elemental measurement is opting retired of prescreened recognition offers. This removes you from mailing lists lenders usage for unsolicited recognition and security offers. You tin bash this online astatine OptOutPrescreen astatine optoutprescreen.com, which is tally by the large recognition bureaus. The process takes conscionable a fewer minutes. Choose a five-year opt-out for a speedy fix, oregon people and message the signifier for a imperishable opt-out. Once processed, you should spot less "pre-approved" offers successful your mailbox.

Free tools tin assistance support your identity, but they often necessitate time, effort and ongoing attention. (Nastasic/Getty Images)
6) Turn connected two-factor authentication
Finally, crook connected two-factor authentication (2FA) for each financial, authorities and benefits account. Even if idiosyncratic steals your password, they cannot entree your relationship without the 2nd factor.
For galore people, these steps make a beardown baseline.
When DIY individuality monitoring falls short
The do-it-yourself attack works until thing goes wrong. That is wherever the spread becomes clear.
According to the Identity Theft Resource Center's 2025 Consumer Impact Report, the mean unfortunate spent much than 200 hours and $1,343 retired of pouch recovering from individuality theft. About 1 successful 5 reported losses supra $100,000. Many besides reported important affectional stress.
The fiscal interaction adds up rapidly astatine a nationalist level. A February 2026 study from the U.S. Senate Joint Economic Committee estimates individuality theft tied to large information broker breaches has outgo Americans much than $20 cardinal implicit the past decade. That estimation includes incidents similar Equifax, Exactis, National Public Data and TransUnion.
Free tools besides person wide limits. They volition not show the acheronian web for your information oregon region your idiosyncratic details from information broker sites. They besides cannot interaction creditors oregon quality fraudulent accounts connected your behalf.
Instead, you grip each measurement yourself. IdentityTheft.gov gives you a roadmap, but you inactive person to marque the calls, record the paperwork and travel up repeatedly.
SSA IMPERSONATION SCAMS ARE GETTING MORE PERSONAL
What paid individuality extortion services add
For anyone whose information was exposed successful a breach similar Conduent oregon National Public Data, escaped tools unsocial permission existent gaps. That is wherever paid individuality extortion services travel in.
These services tally continuous scans for your name, Social Security number, email and slope accounts connected the acheronian web, arsenic good arsenic crossed information broker and radical hunt sites that resell your location code and household ties. They taxable opt-out requests connected your behalf and repetition the process erstwhile your accusation shows up again. When fraud happens, galore services delegate a lawsuit manager who works with recognition bureaus, banks and creditors to assistance resoluteness the issue.
Some plans besides see individuality theft security and dedicated fraud solution support, which tin assistance screen definite losses and trim the clip it takes to recover.
Paid services person limits. No work tin forestall each breach, and adjacent the champion monitoring lone helps shorten betterment time. The do-it-yourself attack tin inactive enactment if you are comfy managing your ain checklist. However, for families, for anyone already exposed successful past breaches and for those who privation little hands-on involvement, adding a paid work connected apical of escaped protections tin marque the process easier to manage.
See my tips and champion picks connected Best Identity Theft Protection astatine CyberGuy.com

Paid individuality extortion services tin monitor, alert and measurement successful erstwhile fraud happens, helping trim the load connected you. (Nikolas Kokovlis/NurPhoto)
Kurt's cardinal takeaways
Most radical tin grip the basics of individuality extortion connected their own, astatine slightest astatine first. Free tools screen the biggest risks and assistance artifact communal types of fraud. However, the concern changes erstwhile your information is exposed successful a large breach. At that point, monitoring, cleanup and follow-up tin crook into a agelong and frustrating process. That is wherever paid services tin marque a existent difference. They trim the workload, way vulnerability crossed much sources and measurement successful erstwhile fraud happens. Still, nary work eliminates hazard completely. The determination comes down to however overmuch clip you privation to put and however overmuch enactment you would request if thing goes wrong. For galore households, a layered attack works best. Start with the escaped protections, past determine if adding a paid work fits your situation.
If your individuality were stolen tomorrow, would you person the clip and patience to hole it yourself? Let america cognize by penning to america astatine CyberGuy.com
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Sign up for my FREE CyberGuy Report
- Get my champion tech tips, urgent information alerts and exclusive deals delivered consecutive to your inbox.
- For simple, real-world ways to spot scams aboriginal and enactment protected, sojourn CyberGuy.com - trusted by millions who ticker CyberGuy connected TV daily.
- Plus, you'll get instant entree to my Ultimate Scam Survival Guide escaped erstwhile you join.
Copyright 2026 CyberGuy.com. All rights reserved.
Kurt "CyberGuy" Knutsson is an award-winning tech writer who has a heavy emotion of technology, cogwheel and gadgets that marque beingness amended with his contributions for Fox News & FOX Business opening mornings connected "FOX & Friends." Got a tech question? Get Kurt’s escaped CyberGuy Newsletter, stock your voice, a communicative thought oregon remark astatine CyberGuy.com.

.jpg?mbid=social_retweet)









English (CA) ·
English (US) ·
Spanish (MX) ·