Talk about 5G is everywhere right now, from the trade war with China to the ban on Huawei. Here's what 5G is and why it matters.Technologyread more
Officials remained firmly committed to a "patient" policy stance at their meeting earlier this month.The Fedread more
A slew of retail earnings the past two weeks makes it clear that while Americans continue to shop, they aren't ringing registers at department stores.Retailread more
A federal judge in New York City on Wednesday said Deutsche Bank and Capitol One can turn over financial documents related to President Donald Trump and his businesses in...Politicsread more
Shares of L Brands, the owner of Victoria's Secret and Bath & Body Works, rose nearly 11% in aftermarket trading Wednesday after the company reported it beat revenue and...Retailread more
Stocks that would benefit from a federal infrastructure spending program fell after President Trump ended a meeting on infrastructure spending with Democratic leaders.Market Insiderread more
Despite the president's claim that "you can't investigate and legislate simultaneously," certain must-pass pieces of legislation, including a debt ceiling hike, will...Politicsread more
CNEX, backed by Microsoft and Dell, filed new allegations in a Texas suit accusing China's Huawei and an executive of trade secrets theft.Technologyread more
Amazon shareholders demanded the company to take action on a number of different issues during its annual shareholder meeting on Wednesday.Technologyread more
Moody's said it's downgrading the outlook for Equifax from stable to negative, citing ongoing fallout from the company's 2018 data breach.Technologyread more
Controversial lawyer Michael Avenatti was indicted on charges of trying to extort athletic shoe giant Nike out of tens of millions of dollars by threatening to go public with...Politicsread more
You can't run and you can't hide. Data breaches are the new normal, and the problem is likely to worsen as hackers get even better at breaking and entering.
"Every company—no matter how good their security team and no matter how strong their security technology—has something valuable these thieves want, and they will get it," said Theresa Payton, CEO of the digital security company Fortalice and former White House chief information officer. "It's not a matter of will they get in. It's what happens to your data once they get in."
It's estimated that nearly 1 billion records have been compromised in the last 10 years.
"That means everyone in this country should assume that their personal information is already compromised," said Robert Sicilano, an identity theft expert at BestIDTheftCompanys.com.
About 16.6 million people became the victims in 2012, according to a report from the U.S.Justice Department. The most common types of misused information: credit card(40 percent) and bank accounts (37 percent) information. The Justice Department estimates the cost of this crime was $24.7 billion in direct and indirect losses.
(Read more: Court halts robocalls aimed at senior citizens)
Most people find out they've been victimized when they are contacted by their financial institution. Fraud experts say we can't rely on someone else to catch the problem, though, and must take steps to protect ourselves.
"The longer ID theft goes on, the more damage is done and the longer it takes the victim to recover from it," said Eva Velasquez, president and CEO of the nonprofit Identity Theft Resource Center.
That's why it's so important to be on the lookout for any warning sign that your personal information has been stolen and is being used.
(Read more: Push is on to get 'kill switch' into smartphones)
"Surveys show nine out of 10 people don't check their financial statements," Siciliano said. "That's irresponsible. You shouldn't be waiting for a retailer to tell you there's been a breach. You should be checking your financial statements more than you check your Facebook page, but people's priorities are skewed."
Here are seven of the key signs that you are a victim of identity theft:
"If you take five minutes to follow up on something that's out of the ordinary, weird or just doesn't make sense, you could save yourself a lot of headaches later on," Velasquez said. The Identity Theft Resource Center has a full list of ID Theft Red Flags.
Go on the offensive
Take steps now to reduce your risk of harm when your personal information gets stolen in a data breach.
(Read more: Identity thieves gear up to steal your tax refund)
That means using secure passwords and having different ones for different accounts. If the password for your online gaming service and bank account are the same, that's a real problem.
In her new book, "Privacy in the Age of Big Data, " Theresa Payton has another recommendation: Have a unique email address that you use only for your financial accounts. Why? Because an email address stolen from a department store or social-media site can be the key to more fraud.
"If you use the same email address for everything and they steal that in a breach, the first thing they do is go to your financial accounts, ask for a password reset, and bingo—they are now able to access your financial life," she said. "People need to take matters into their own hands, and a separate email for financial services is a good place to start."