{"id":131266,"date":"2024-03-19T06:11:50","date_gmt":"2024-03-19T13:11:50","guid":{"rendered":"https:\/\/www.mcafee.com\/blogs\/?p=131266"},"modified":"2024-06-19T07:17:57","modified_gmt":"2024-06-19T14:17:57","slug":"can-thieves-steal-identities-with-only-a-name-and-address","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/can-thieves-steal-identities-with-only-a-name-and-address\/","title":{"rendered":"Can Thieves Steal Identities With Only a Name and Address?"},"content":{"rendered":"<p><span data-contrast=\"auto\">Can thieves <a href=\"https:\/\/www.mcafee.com\/en-us\/identity-theft.html\">steal identities<\/a> with only a name and address?\u202f<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">In short, the answer is \u201cno.\u201d Which is a good thing, as your name and address are in fact part of the public record. Anyone can get a hold of them. However, because they are public\u202finformation, they are still\u202ftools\u202fthat\u202fidentity thieves\u202fcan use.\u202f\u202f<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">If you think of your identity as a jigsaw puzzle, your name and address are the first two pieces that they can use to build a bigger picture and ultimately put your identity at risk.\u202f\u202f<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">With that, let\u2019s look at some other key pieces of your identity that are associated with your name and address\u2014and what you can do to protect them.\u202f<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">For starters, this information is so general that it is of little value in and of itself to an identity thief. Yet a\u202fdetermined identity thief can do a bit of legwork and\u202ftake a few extra steps\u202fto use them as a springboard for other scams.\u202f<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">For example,\u202fwith your name and address\u202fa thief could:\u202f<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"auto\">Research public databases for further pieces of information about you.\u202f<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">There are volumes of\u202fpublic\u202finformation that are readily available should someone want to add some more pieces to your identity jigsaw puzzle, such as:\u202f<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"2\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">How long you\u2019ve lived in your current home, what you paid for it, and what it\u2019s\u202fvalued at\u202ftoday.\u202f<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"2\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">If you\u2019re a registered voter and if you voted in a recent election. (Not how you voted, though!)\u202f<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"2\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">Also, if you\u2019re a veteran or the owner of a cat or dog (through pet licenses).\u202f<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">In the U.S.,\u202f<\/span><a href=\"https:\/\/ctb.ku.edu\/en\/table-of-contents\/assessment\/assessing-community-needs-and-resources\/public-records-archival-data\/main\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">the availability of such information will vary from state to state\u202fand different levels of government may have different regulations about what information gets filed\u2014in addition to\u202fwhether and how those reports are made public<\/span><\/a><span data-contrast=\"auto\">. Globally,\u202fdifferent nations and regions will collect varying amounts of public information\u202fand have their own regulations in place\u202fas well.\u202fMore broadly, though,\u202fmany of these public databases\u202fare now\u202fonline.\u202fConsequently, accessing them is easier than the days when\u202fgetting a hold of that information\u202frequired an in-person visit to a library or public office.\u202f<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"auto\">Get yet more personal information about you from online data brokers.<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">Cybercriminals can gain additional information about you from other online sources, such as data brokers. And data brokerage is a big business,<\/span> <a href=\"https:\/\/www.maximizemarketresearch.com\/market-report\/global-data-broker-market\/55670\/\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">a global economy estimated at $280 billion U.S. dollars a year<\/span><\/a><span data-contrast=\"none\">. What fuels it? Personal information, representing thousands of <\/span><a href=\"https:\/\/techpolicy.sanford.duke.edu\/wp-content\/uploads\/sites\/4\/2023\/02\/Kim-2023-Data-Brokers-and-the-Sale-of-Americans-Mental-Health-Data.pdf\"><span data-contrast=\"none\">data points on billions of people<\/span><\/a><span data-contrast=\"none\"> scraped <\/span><span data-contrast=\"none\">from public records, social media, smartphone apps, shopper loyalty cards, third-party sources, and sometimes other data broker sites as well.\u00a0<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The above-the-board legal intent of data broker sites is to sell that information to advertisers so that they can create highly targeted campaigns based on people\u2019s behaviors, travels, interests, and even political leanings. Others such as law enforcement officials, journalists, and others who are conducting background checks will use them too.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">On the dark side, hackers, scammers, and thieves will buy this information as well, which they can use to commit identity theft and fraud. The thing is, data brokers will sell to anyone. They don\u2019t discriminate.\u00a0<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"auto\">Send you phishing attacks and scams by physical mail.\u202f<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">Phishing attacks aren\u2019t just for email, texts, and direct messages.\u202f<\/span><span data-contrast=\"none\">In fact, thieves are turning to old tricks via old-fashioned physical mail<\/span><span data-contrast=\"auto\">. That includes\u202fsending phony offers or impersonating officials\u202fof government\u202finstitutions, all\u202fdesigned\u202fto\u202ftrick you into giving\u202fup\u202fyour\u202fpersonally identifiable information (PII).\u202f\u202f<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">What might that look like in your mailbox? They can take the form of bogus\u202flottery\u202fprizes that request bank information for routing (non-existent) winnings. Another favorite of scammers is bogus tax notifications that demand immediate payment. In all, many can look quite convincing at first blush, yet there are ready ways you can spot them. In fact,\u202f<\/span><a href=\"https:\/\/www.mcafee.com\/blogs\/internet-security\/how-to-protect-yourself-from-phishing-scams\/\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">many of the tips for avoiding these physical mail phishing attacks are the same for avoiding phishing attacks online<\/span><\/a><span data-contrast=\"auto\">.\u202f\u202f<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"auto\">Redirect your physical mail, essentially committing mail fraud.\u202f<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">Recently, I\u2019ve seen a\u202ffew\u202f<\/span><a href=\"https:\/\/www.whec.com\/top-news\/consumer-alert-the-scammers-are-busy-heres-how-you-avoid-being-a-victim\/\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">news stories like this<\/span><\/a><span data-contrast=\"auto\">\u202fwhere thieves\u202freportedly\u202fabuse the change-of-address system with the U.S. Postal Service. Thieves\u202fwill simply forward your mail to\u202fan address of their choosing, which can\u202fdrop\u202fsensitive information like bank and credit card statements\u202fin their mailbox.\u202fFrom there, they\u202fcould potentially have\u202fnew checks sent to them or\u202fperhaps\u202fan additional credit card\u2014both of which they can use to drain your accounts and run up your bills.\u202f<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The Postal Service\u202fhas\u202fmechanisms in place to prevent this, however. Among these, the Postal Service will send you a physical piece of mail to confirm the forwarding. So, if you ever receive mail from the Postal Service, open it and give it a close look. If you\u202fget such a notice and\u202fdidn\u2019t\u202forder the forwarding, visit your local post office to get things straightened out. Likewise, if it seems like you\u2019re missing bills in the mail, that\u2019s another good reason to follow up with your post office\u202fand the\u202fbusiness\u202fin question to\u202fsee if there have been any changes made\u202fin your mail forwarding.\u202f\u202f<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"auto\">Protecting your good name (and identity too)\u202f<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">So\u202fwhile your name and address are out there\u202ffor practically all\u202fto see, they\u2019re largely of little value to an identity thief on their own. But as mentioned above, they are key puzzle pieces to your overall identity. With\u202fenough of\u202fthose other pieces in hand, that\u2019s where an identity thief can cause trouble.\u202f<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Other\u202fcrucial\u202fpieces of your identity include:\u202f\u202f<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">Your Social Security Number or tax ID number:\u202f<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">Let\u2019s start with the biggest one.\u202fThis is the master key to your identity, as it is one of the most unique identifiers you have.\u202f<\/span><a href=\"https:\/\/www.mcafee.com\/blogs\/consumer-cyber-awareness\/how-to-report-identity-theft-to-social-security\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">As I covered in my earlier blog on Social Security fraud<\/span><\/a><span data-contrast=\"auto\">,\u202fa thief can unlock everything from credit history and credit line to tax refunds and medical care\u202fwith your Social Security or tax ID number. In extreme cases,\u202fthey\u202fcan use it to impersonate\u202fyou\u202ffor employment, healthcare, and even in the event of an arrest.\u202f\u202f<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">You can protect your Social Security Number by keeping it locked in a safe place (rather than in your wallet) and by providing your number only when\u202fabsolutely necessary.\u202f<\/span><a href=\"https:\/\/www.mcafee.com\/blogs\/consumer-cyber-awareness\/how-to-report-identity-theft-to-social-security\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">For more tips on keeping\u202fyour number\u202fsafe, drop by that blog on Social Security fraud I mentioned<\/span><\/a><span data-contrast=\"auto\">.\u202f<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">Your passport and driver\u2019s license:\u202f<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">Thieves have\u202ffigured out ways of getting\u202faround the fact that\u202fIDs like\u202fthese include a photo. They may be able to modify or emulate these documents \u201cwell enough\u201d\u202fto pull off certain types of fraud, particularly if the people requesting their bogus documents don\u2019t review them with a critical eye.\u202f<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Protecting yourself\u202fin this case\u202fmeans knowing where these documents are at any time. (With passports, you may want to store those securely like your Social Security or tax ID number.) Also be careful when you share this information, as the identifiers on these documents are highly unique. If you\u2019re uncomfortable with sharing this information, you can ask if other forms of ID might work\u2014or if this information is really needed at all. Also, take a moment to make copies of these documents and store them in a secure place. This can help you provide important info to the proper authorities if they\u2019re lost or stolen.\u202f\u202f<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">Your card and account information:\u202f<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h3>\n<p><a href=\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/data-breach-security-steps\/\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">With data breaches large and small making the news<\/span><\/a><span data-contrast=\"auto\">\u202f(and\u202fmany\u202fmore that do not), keeping a sharp eye on your accounts is a major part of identity theft prevention.\u202fWe talk about\u202fthis topic\u202fquite often, and\u202fit\u2019s worth another mention\u202fbecause\u202fprotecting\u202fthese means\u202fprotecting yourself from\u202fthieves who are after\u202fdirect access to your finances and more.\u202f\u202f<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Secure your digital accounts for banking, credit cards, financials, and shopping by\u202f<\/span><a href=\"https:\/\/www.mcafee.com\/blogs\/consumer\/strong-password-ideas-to-keep-your-information-safe\/?hilite=%27password%27\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">using strong, unique passwords for each of your accounts\u202fthat\u202fyou change every 60 days<\/span><\/a><span data-contrast=\"auto\">.\u202fSound\u202flike a lot of work?\u202f<\/span><a href=\"https:\/\/www.mcafee.com\/en-us\/identity-theft\/protection.html?path=blogs\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">Let a password manager do it for you, which you can find in comprehensive online protection software<\/span><\/a><span data-contrast=\"auto\">. By changing your strong passwords and keeping them unique can help prevent you from becoming a victim if your account information is part of a breach\u2014by the time a crook attempts to use it, you may have changed it and made it out of date.\u202f<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"auto\">Extra steps for extra identity protection\u202f\u202f<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">In addition to protecting the core forms of identity mentioned above, a few other good habits go a long way toward keeping your identity secure.\u202f<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">1. Install and use online protection software<\/span><\/b><span data-contrast=\"auto\">\u202f<\/span><\/h3>\n<p><span data-contrast=\"auto\">By protecting your devices, you protect what\u2019s on them, like your personal information.\u202f<\/span><a href=\"https:\/\/www.mcafee.com\/en-us\/identity-theft\/protection.html?path=blogs\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">Comprehensive online protection software can\u202fprotect your identity in several ways<\/span><\/a><span data-contrast=\"auto\">, like creating and managing the strong, unique passwords we talked about and providing further services that monitor and protect your identity\u2014in addition to digital shredders that can permanently remove sensitive documents (simply deleting them won\u2019t do that alone.)\u202fFurther, it can <\/span><a href=\"https:\/\/www.mcafee.com\/learn\/identity-monitoring\/path=blogs\"><span data-contrast=\"none\">monitor your identity<\/span><\/a><span data-contrast=\"auto\"> and <\/span><a href=\"https:\/\/www.mcafee.com\/learn\/credit-monitoring?path=blogs\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">monitor your credit<\/span><\/a><span data-contrast=\"auto\">, further protecting you from theft and fraud.<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">2. Shred your stuff<\/span><\/b><span data-contrast=\"auto\">\u202f<\/span><\/h3>\n<p><span data-contrast=\"auto\">Identity theft where thieves dig through trash or go \u201cdumpster diving\u201d for literal scraps of personal info in bills and statements, has been an issue for some time. You can prevent it by shredding up any paper medical bills, tax documents, and checks once you\u2019re through with them. Paper shredders are inexpensive, and let\u2019s face it, kind of fun too. Also, if you\u2019re traveling, have a trusted someone collect your mail or have the post office put a temporary hold on your mail. Thieves still poach mail from mailboxes too.\u202f<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">3. Go paperless<\/span><\/b><\/h3>\n<p><span data-contrast=\"auto\">Getting statements online cuts the paper out of the equation and thus removes another thing that a thief can physically steal and possibly use against you. Whether\u202fyou use electronic statements through\u202fyour bank, credit card company, medical provider,\u202for\u202finsurance company,\u202fuse\u202fa secure password and a secure connection provided by a VPN. Both will\u202fmake\u202ftheft\u202fof your personal info\u202ffar tougher on identity thieves.\u202f<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">4. Use a VPN<\/span><\/b><\/h3>\n<p><a href=\"https:\/\/www.mcafee.com\/en-us\/vpn.html?path=blogs\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">A VPN is a Virtual Private Network<\/span><\/a><span data-contrast=\"auto\">, a service that protects your data and privacy online. It creates an encrypted tunnel to keep you more anonymous online by masking your IP address, device information, and the data you\u2019re passing along that connection. In this way, it makes it far more difficult for advertisers, data brokers, and bad actors to skim your private information\u2014in addition to shielding your information from crooks and snoops while you\u2019re banking, shopping, or handling any kind of sensitive information online.\u202f<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">5. Monitor your accounts<\/span><\/b><span data-contrast=\"auto\">\u202f<\/span><\/h3>\n<p><span data-contrast=\"auto\">Give your statements a close look each time they come around. While many companies and institutions have fraud detection mechanisms in place, they don\u2019t always catch\u202fevery\u202finstance of fraud. Look out for strange purchases or charges and follow up with your bank or credit card company if you suspect fraud.\u202fEven the smallest charge could be a sign that something shady is afoot.\u202f<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">6. Check your credit report<\/span><\/b><\/h3>\n<p><span data-contrast=\"auto\">This is a powerful tool\u202ffor\u202fspotting\u202fidentity theft. And in many cases, it\u2019s free to do so. In\u202fthe U.S., the Fair Credit Reporting Act (FCRA)\u202f<\/span><a href=\"https:\/\/www.annualcreditreport.com\/index.action\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">requires the major credit agencies to provide you with a free credit check<\/span><\/a><span data-contrast=\"auto\">\u202fat least once every 12 months.\u202f<\/span><a href=\"https:\/\/www.canada.ca\/en\/financial-consumer-agency\/services\/credit-reports-score\/order-credit-report.html\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">Canada provides this service<\/span><\/a><span data-contrast=\"auto\">, and\u202f<\/span><a href=\"https:\/\/moneyaware.co.uk\/2017\/05\/how-to-get-your-credit-report\/\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">the UK\u202fhas options to receive free reports\u202fas well<\/span><\/a><span data-contrast=\"auto\">,\u202falong with several other nations. It\u2019s a great idea to check\u202fyour credit report, even if you don\u2019t suspect a problem.\u202f<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">7. Remove your personal data from data broker sites<\/span><\/b><span data-contrast=\"auto\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">If the thought of your personal info being bought and sold puts you off, there\u2019s something you can do about it. Our <\/span><a href=\"https:\/\/www.mcafee.com\/learn\/personal-data-cleanup?path=blogs\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">Personal Data Cleanup<\/span><\/a><span data-contrast=\"auto\"> service can scan some of the riskiest data broker sites and show you which ones are selling your personal info. It also provides guidance on how you can remove your data from those sites, and with select products, it can even manage the removal for you. \u200b<\/span><\/p>\n<h2><b><span data-contrast=\"auto\">Your name and address are just two pieces of a larger puzzle\u202f<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">While thieves need more than just your name and address to commit\u202fthe overwhelming majority of\u202ffraud,\u202fyour\u202fname and address\u202fare\u202fcenterpieces of the larger jigsaw puzzle that is your overall identity.\u202f\u202f<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">And the interesting thing is your puzzle gets larger and larger as time goes on. With each new account you create and service that you sign into, that\u2019s one more piece added to the puzzle. Thieves love getting their hands on any pieces they can because with enough of them in place, they can try and pull a fast one in your name. By looking after each piece and knowing what your larger jigsaw puzzle looks like, you can help keep identity thieves out of your business and your life.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Can thieves steal identities with only a name and address?\u202f\u00a0 In short, the answer is \u201cno.\u201d Which is a good&#8230;<\/p>\n","protected":false},"author":1408,"featured_media":186673,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[13],"tags":[10849,10846,10852,142],"coauthors":[15741],"class_list":["post-131266","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-privacy-identity-protection","tag-can-identity-be-stolen-with-name-and-address","tag-can-someone-steal-identity-with-name-and-address","tag-how-to-check-if-someone-is-using-my-address","tag-tag-identity-theft"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Can Thieves Steal Identities With Only a Name and Address? | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Can thieves steal identities with only a name and address?\u202f\u00a0 In short, the answer is \u201cno.\u201d Which is a good thing, as your name and address are in fact\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Can Thieves Steal Identities With Only a Name and Address? | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Can thieves steal identities with only a name and address?\u202f\u00a0 In short, the answer is \u201cno.\u201d Which is a good thing, as your name and address are in fact\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/can-thieves-steal-identities-with-only-a-name-and-address\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-19T13:11:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-19T14:17:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/11\/300x203_Blog_121422.png\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"203\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Amy Bunn\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Amy Bunn\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/can-thieves-steal-identities-with-only-a-name-and-address\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/can-thieves-steal-identities-with-only-a-name-and-address\/\"},\"author\":{\"name\":\"Amy Bunn\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/15fadfbc1716a6a3d88e22ed09e95fe3\"},\"headline\":\"Can Thieves Steal Identities With Only a Name and Address?\",\"datePublished\":\"2024-03-19T13:11:50+00:00\",\"dateModified\":\"2024-06-19T14:17:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/can-thieves-steal-identities-with-only-a-name-and-address\/\"},\"wordCount\":2160,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/can-thieves-steal-identities-with-only-a-name-and-address\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/12\/300x200_Blog_031924.png\",\"keywords\":[\"Can identity be stolen with name and address\",\"Can someone steal identity with name and address?\",\"how to check if someone is using my address\",\"identity theft\"],\"articleSection\":[\"Privacy &amp; Identity Protection\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/can-thieves-steal-identities-with-only-a-name-and-address\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/can-thieves-steal-identities-with-only-a-name-and-address\/\",\"name\":\"Can Thieves Steal Identities With Only a Name and Address? | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/can-thieves-steal-identities-with-only-a-name-and-address\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/can-thieves-steal-identities-with-only-a-name-and-address\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/12\/300x200_Blog_031924.png\",\"datePublished\":\"2024-03-19T13:11:50+00:00\",\"dateModified\":\"2024-06-19T14:17:57+00:00\",\"description\":\"Can thieves steal identities with only a name and address?\u202f\u00a0 In short, the answer is \u201cno.\u201d Which is a good thing, as your name and address are in fact\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/can-thieves-steal-identities-with-only-a-name-and-address\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/can-thieves-steal-identities-with-only-a-name-and-address\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/can-thieves-steal-identities-with-only-a-name-and-address\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/12\/300x200_Blog_031924.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/12\/300x200_Blog_031924.png\",\"width\":300,\"height\":200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/can-thieves-steal-identities-with-only-a-name-and-address\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Privacy &amp; Identity Protection\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Can Thieves Steal Identities With Only a Name and Address?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/15fadfbc1716a6a3d88e22ed09e95fe3\",\"name\":\"Amy Bunn\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/b58be83668cf2b1de7fb5b8a222bb835\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/Amy-Bunn-96x96.jpeg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/Amy-Bunn-96x96.jpeg\",\"caption\":\"Amy Bunn\"},\"description\":\"Amy Bunn is head of communications at McAfee and has worked in technology and cybersecurity for over 15 years. During this time, Amy has witnessed the changing technology landscape and the critical role that online protection plays today. Amy believes that families and individuals around the world should be free to enjoy all the benefits and advantages that the internet and technology afford and is passionate about making this a reality by discussing the very latest in cybersecurity tips and advice, which, when combined with robust online protection, can help empower people to live their life online with total confidence.\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/amy-bunn\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Can Thieves Steal Identities With Only a Name and Address? | McAfee Blog","description":"Can thieves steal identities with only a name and address?\u202f\u00a0 In short, the answer is \u201cno.\u201d Which is a good thing, as your name and address are in fact","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Can Thieves Steal Identities With Only a Name and Address? | McAfee Blog","og_description":"Can thieves steal identities with only a name and address?\u202f\u00a0 In short, the answer is \u201cno.\u201d Which is a good thing, as your name and address are in fact","og_url":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/can-thieves-steal-identities-with-only-a-name-and-address\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2024-03-19T13:11:50+00:00","article_modified_time":"2024-06-19T14:17:57+00:00","og_image":[{"width":300,"height":203,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/11\/300x203_Blog_121422.png","type":"image\/png"}],"author":"Amy Bunn","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"Amy Bunn","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/can-thieves-steal-identities-with-only-a-name-and-address\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/can-thieves-steal-identities-with-only-a-name-and-address\/"},"author":{"name":"Amy Bunn","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/15fadfbc1716a6a3d88e22ed09e95fe3"},"headline":"Can Thieves Steal Identities With Only a Name and Address?","datePublished":"2024-03-19T13:11:50+00:00","dateModified":"2024-06-19T14:17:57+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/can-thieves-steal-identities-with-only-a-name-and-address\/"},"wordCount":2160,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/can-thieves-steal-identities-with-only-a-name-and-address\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/12\/300x200_Blog_031924.png","keywords":["Can identity be stolen with name and address","Can someone steal identity with name and address?","how to check if someone is using my address","identity theft"],"articleSection":["Privacy &amp; Identity Protection"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/can-thieves-steal-identities-with-only-a-name-and-address\/","url":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/can-thieves-steal-identities-with-only-a-name-and-address\/","name":"Can Thieves Steal Identities With Only a Name and Address? | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/can-thieves-steal-identities-with-only-a-name-and-address\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/can-thieves-steal-identities-with-only-a-name-and-address\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/12\/300x200_Blog_031924.png","datePublished":"2024-03-19T13:11:50+00:00","dateModified":"2024-06-19T14:17:57+00:00","description":"Can thieves steal identities with only a name and address?\u202f\u00a0 In short, the answer is \u201cno.\u201d Which is a good thing, as your name and address are in fact","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/can-thieves-steal-identities-with-only-a-name-and-address\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/can-thieves-steal-identities-with-only-a-name-and-address\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/can-thieves-steal-identities-with-only-a-name-and-address\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/12\/300x200_Blog_031924.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/12\/300x200_Blog_031924.png","width":300,"height":200},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/can-thieves-steal-identities-with-only-a-name-and-address\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Privacy &amp; Identity Protection","item":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/"},{"@type":"ListItem","position":3,"name":"Can Thieves Steal Identities With Only a Name and Address?"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/15fadfbc1716a6a3d88e22ed09e95fe3","name":"Amy Bunn","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/b58be83668cf2b1de7fb5b8a222bb835","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/Amy-Bunn-96x96.jpeg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/Amy-Bunn-96x96.jpeg","caption":"Amy Bunn"},"description":"Amy Bunn is head of communications at McAfee and has worked in technology and cybersecurity for over 15 years. During this time, Amy has witnessed the changing technology landscape and the critical role that online protection plays today. Amy believes that families and individuals around the world should be free to enjoy all the benefits and advantages that the internet and technology afford and is passionate about making this a reality by discussing the very latest in cybersecurity tips and advice, which, when combined with robust online protection, can help empower people to live their life online with total confidence.","url":"https:\/\/www.mcafee.com\/blogs\/author\/amy-bunn\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/131266","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/1408"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=131266"}],"version-history":[{"count":7,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/131266\/revisions"}],"predecessor-version":[{"id":194693,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/131266\/revisions\/194693"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/186673"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=131266"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=131266"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=131266"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=131266"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}