Monthly Archive


Welcome to our Archives page. On this page you will find a total of 15 of our articles broken down into Months and Years.

Risks of Mobile Applications

There is so much you can do on a mobile phone these days! Many tasks you would do on a computer can now be done while on the go with a Smartphone. However, with all of that accessibility comes a price... read more..


Level of expertise

Earlier today I placed a call to your department and was assisted by a woman named Wilma.  The level of expertise and assistance I received was second to none and made me feel very assured of your com... read more..


Computer Security

I am writing to thank your Identity Theft Resource Center for your help when I needed it because a university had a hacker get into computer security. Both Matt and Rex showed an interest and concern ... read more..


Petitions Not A Risk

Petitions Not A Risk The Identity Theft Resource Center has been made aware of a group operating in California under the name ‘Californians Against Identity Theft’.  The group is claiming that there ... read more..


2011 Data Breaches

2011 ITRC Breach Report Key Findings Hacking(1) attacks were responsible for more than one-quarter (26.1%) of the data breaches recorded in the Identity Theft Resource Center’s 2011 Breach Report... read more..


You people are the greatest!!!

I received all three of my credit reports thanks to you.  I filled out the forms and sent them to the credit bureaus. Thanks for making my life so much easier...  You people are the greatest!!! K.N. ... read more..


Hackers: Duhhh, Winning

Hackers: Duhhh, Winning (San Diego, CA  April 19, 2011):  The Identity Theft Resource Center® has found that hacking accounted for the largest number of breaches in 2011 year-to-date.  Almost 37% of ... read more..


I highly recommend this nonprofit organization

I want to let you know that I had a great experience with the service provided by one of the members of this organization. Her name is Gabriela. Very nice customer service and a lot of help. She guide... read more..


Tornado Season: Don’t be a Secondary Victim

Tornado Season: Don’t be a Secondary Victim (San Diego, CA: April 19, 2011)  According to the "Weather Channel", tornado season in the U.S. lasts from April through July, with May and June being the ... read more..


ID theft awareness

Thanks for all of your help-and all that you do in the field of ID theft awareness. Cat (or "Kat") helped me out last week with matters relating to sensitive info and for her knowledge and help I am m... read more..


Great Help

Thank you so much. You were great help. Have an awesome weekend!! Thanks again. Wish everytime you called to handle something they were as awesome as you. KS 04/01/2011... read more..


Credit Report

I received my credit report and was horrified at what I saw.  I was in the process of preparing information to dispute their records when this morning I received a report from their investigation and ... read more..


information to find the responsible party

After contacting you, with the information I obtained from Wilma, I was able to reach the people that needed this information to find the responsible party. Without Wilma I could not have gotten this ... read more..


Most Helpful Organization

Your organization has been the most helpful, informative and understanding of all the people I have contacted. I certainly do appreciate all your help and I hope your organization realizes it's a grea... read more..



Content plugins run when specific kinds of pages are loaded. They do things ranging from protecting email addresses from harvesters to creating page breaks. Default on: Email Cloaking Help Load M... read more..

Results 1 - 15 of 15


ITRC Sponsors and Supporters 





Go to top


The TMI Weekly

Breaches here, identity theft there and invasions of privacy everywhere... Should you be worried and, if so, how can you protect yourself? Sign up now to receive The TMI Weekly and get the latest hot topics in identity theft, data breaches and privacy and helpful information on how to protect your information.