Identity Theft, Are Your Children Safe?

AndrewSmither

I personally have had encounters with Identity Theft; twice online, once when my wallet was lost/stolen.  Ever since then, I have subscribed to an Identity Theft Protection through my Discover Card.  After Playstation Network was hacked, they sent out a formal e-mail to all accounts on the network stating personal information may have been obtained.  They recommended subscribing to a similar service but this one was free for a year on them.  I decided to take them up on their offer as it would add a second layer of protection and give me a chance to see how another company does it.  The company Playstation recommended was All Clear ID, which offers a free and a pro version.

As part of the All Clear ID, I get newsletters in my e-mail inbox on security tips.  The latest  newsletter raised the question of children’s safety from Identity Theft.  Do you think they would be safe since they are children?  Do you think they would be less likely to be targeted?  If so, you are wrong.  Children are 51 times more likely to have their identity stolen than you!  Slightly over 10% of children have had their SSN used by someone without parental permission.  This was alarming for me, and by writing this post I hope to help spread the news of this discovery.  I have learned that Credit Reports were never intended to check for children.  Generally when a company checks your credit, it verifies the social security, name, and current standing in credit; it does not look for birth date conflicts.  A featured real issue in the newsletter explained an All Clear ID client discovered his child had 42 open accounts under his/her name.  These accounts included mortgages, credit cards, auto loans, and the like.  The open accounts started when the child was 3 years old .  Through All Clear ID the parent was able to close all outstanding accounts and only has one left pending.  This was done as a check before the child was going to apply for college and would have greatly hindered the college loan process had it not been taken care of in time.

I would highly recommend anyone to at least take All Clear ID up on their free version.  I would look at it the same way with AV/AS protection on your computer.  A free one is better protection than none at all.  If you are now wondering about your own child, please read over the sources below as I did and take advantage of their free Child ID Scan.  They can also be covered under your Identity Protection with All Clear ID.

Sources :

January 20, 2026
Modern construction and manufacturing sites are no longer just about heavy machinery; they’re digital ecosystems. Tablets, laptops, IoT sensors, and mobile apps are now essential for everything from blueprint access to production monitoring. These tools enable real-time collaboration, safety compliance, and operational efficiency. But when your workforce is spread across remote job sites or large facilities, keeping these systems connected and secure becomes a challenge. Construction Blueprint & Plan Access: Crews use tablets to view updated plans on-site, reducing errors and rework. Safety & Compliance Reporting: Mobile apps allow instant incident reporting and safety checks. Equipment Tracking: IoT sensors monitor heavy machinery usage and maintenance needs. Manufacturing Production Line Monitoring: Tablets and IoT devices track throughput and detect anomalies. Quality Control: Mobile devices capture and share inspection data in real time. Inventory Management: Connected devices streamline material tracking and reduce downtime. These tools keep projects moving, but only if they’re secure, updated, and accessible anywhere. Why Remote Access Is Critical Construction sites and manufacturing plants often operate in remote or rugged environments. Workers need secure, reliable access to company systems, whether they’re in the field, on the shop floor, or traveling between sites. Without proper management, connectivity issues and security gaps can lead to delays, data breaches, and compliance failures. How a Managed IT Services Partner Helps You Win Partnering with a Managed IT Services provider lik e Eberly Systems ensures: Centralized Device Management: Configure, update, and secure all devices remotely using Microsoft Intune. Enterprise-Grade Security: Microsoft Defender protects against threats across IT and OT environments. Identity & Access Control: Microsoft Entra ID enables MFA and conditional access for subcontractors and BYOD scenarios. 24/7 Monitoring & Support: Proactive threat detection and performance monitoring keep operations running smoothly. Scalable Solutions: Whether you have 50 devices or 500, policies and updates roll out automatically. This means your teams can access critical tools and data securely anytime, anywhere, without worrying about downtime or cyber risks. Construction and manufacturing thrive on precision and speed. Technology makes that possible, but only when it’s managed effectively. A trusted Managed IT Services partner doesn’t just keep devices secure, it keeps your business moving, your workforce connected, and your data protected. Ready to empower your teams and safeguard your operations? Contact Eberly Systems today for a free consultation.
By Guest Blogger December 9, 2025
Why Device Management Is Critical
November 4, 2025
Why Cybersecurity Hygiene Matters for SMBs
October 28, 2025
Why Leading with AI Matters for Small and Medium-Sized Businesses
October 10, 2025
Fake CAPTCHA Sites Hijack Clipboard to Install Malware
October 10, 2025
Understanding Business Email Compromise (BEC)
By Kordel Eberly August 17, 2025
Welcome to the Cyber Cold War
fish hook
By Eberly Systems September 20, 2024
We're all in the same boat trying to avoid cybercrime! Here's our top ways to identify a potential phishing attempt.
By Eberly Systems September 10, 2024
Focus on integrating with new team members and new customers