The top methods of identity compromise reported were due to PII being shared in a scam, stolen documents with personal information, and unauthorized access to a computer or mobile device.
June 24, 2025
Get the latest cybersecurity stats delivered to your inbox every week
Browse more stats from Identity Theft Resource Center or explore Identity
Join 1,000+ security professionals getting weekly insights