World News

Legal violations hit 25M in what Texas AG Paxton calls largest ever

NEWNow you can listen to Fox News articles!

Earlier this year, more than 25 million Americans started receiving letters from a company most of them had never heard of. The sender was Conduent Business Services, a contractor that processes benefits records and human resources data for state Medicaid programs, employer health plans and federal agencies. Between October 2024 and January 2025, ransomware operators extracted names, Social Security numbers, birthdays, home addresses, medical diagnosis codes and health insurance claim numbers out of Conduent systems. In February 2026, Texas Attorney General Ken Paxton called it the largest data breach in US history.

The letters ended the way most of these letters end, with an apology, a phone number and an offer of one year of free credit monitoring. Once your data is out, can you protect your identity yourself, or is it something many people are better at cashing out?

Sign up for my FREE CyberGuy report

  • Get my best tech tips, emergency security alerts and exclusive deals delivered straight to your inbox.
  • For easy, real-world ways to spot scams early and stay protected, visit CyberGuy.com trusted by the millions who watch CyberGuy on TV every day.

SSA FALSE EMAIL ALERT: SEE THIS INDICATOR FAST

Major data breaches continue to expose sensitive personal information, leaving millions at risk of identity theft. (Photos by Daniel de la Hoz/Getty)

Plus, you'll get instant access to mine Ultimate Scam Survival Guide free when you join.

You can do it for free today

Federal law and tools from the Federal Trade Commission cover more areas than most people realize. None of this costs anything. When used together, they block the most common entry points targeted by fraudsters.

1) Increase your credit

Start by setting up your credit at all three bureaus. A suspension prevents new accounts from being opened in your name. It was free at Equifax, Experian and TransUnion as of 2018. You can temporarily lift it if you need to apply for a loan.

2) Get an IRS Identity Protection PIN

Next, get an identity protection pin from the IRS at irs.gov/identity-theft-fraud-scams/get-an-identity-protection-pin. This six-digit code prevents fraudulent tax returns filed using your Social Security number. The IRS issues a new one every year.

3) Check your credit reports regularly

You should also check your credit reports regularly. Equifax, Experian and TransUnion now offer free weekly access through AnnualCreditReport.com. Checking once every few months can help you catch suspicious activity early.

4) Use IdentityTheft.gov to recover

It also helps with bookmarking IdentityTheft.gov. The site creates a personalized recovery plan, makes the affidavits creditors need and provides pre-filled dispute letters.

5) Opt out of pre-screened credit

Another easy step is to opt out of pre-approved credit. This removes you from mailing lists used by lenders to receive unsolicited loan and insurance offers. You can do this online at OptOutPrescreen at optoutprescreen.comoperated by the major credit bureaus. The process takes just a few minutes. Choose a five-year opt-out for a quick fix, or print and submit the form to choose a permanent opt-out. Once processed, you should see a few “pre-approved” offers in your mailbox.

A woman holding a credit card next to an open laptop.

Free tools can help protect your identity, but they often require time, effort and ongoing attention. (Nastasic/Getty Images)

6) Turn on two-factor authentication

Finally, turn on two-factor authentication (2FA) for every financial, government and benefits account. Even if someone steals your password, they won't be able to access your account without the second factor.

For many people, these steps form a solid foundation.

When DIY ownership monitoring decreases

The do-it-yourself method works until something goes wrong. This is where the gap opens.

According to the Identity Theft Resource Center's 2025 Consumer Impact Report, the average victim spent more than 200 hours and $1,343 out of pocket recovering from identity theft. About one in five reported losses are over $100,000. Many also reported severe emotional distress.

The financial impact is growing rapidly at the national level. A February 2026 report from the US Joint Economic Committee estimates identity theft related to major consumer data breaches has cost Americans more than $20 billion over the past decade. That estimate includes events like Equifax, Exactis, National Public Data and TransUnion.

Free tools also have clear limitations. They will not monitor the dark web for your data or remove your personal information from data broker sites. They also cannot contact creditors or dispute fraudulent accounts on your behalf.

Instead, you manage all the steps yourself. IdentityTheft.gov it gives you a guide, but you still have to make phone calls, file paperwork and follow up over and over again.

SSA'S SELF-CERTIFICATION INDICATORS CONTINUE TO BE ADDITIONAL

What paid identity protection services add up

For anyone whose data has been exposed in a breach like Conduent or National Public Data, free tools alone leave real gaps. This is where paid identity protection services come into play.

These services use continuous scanning of your name, Social Security number, emails and bank accounts on the dark web, as well as on every data vendor and people searching sites that resell your home address and family ties. They send out requests on your behalf and repeat the process when your information appears again. When fraud occurs, many services offer a case manager who works with credit bureaus, banks and creditors to help resolve the issue.

Other plans include identity theft insurance and dedicated fraud resolution support, which can help cover some losses and reduce the time it takes to recover.

Paid services have limitations. No service can prevent all breaches, and even the best monitoring only helps to shorten recovery time. The do-it-yourself approach can still work if you're comfortable managing your own checklist. However, for families, for anyone who has already been exposed to past breaches and those who want to be less involved, adding a paid service on top of free protection can make the process more manageable.

See my tips and top picks for Best Identity Theft Protection on CyberGuy.com

A person typing on a computer keyboard.

Paid identity protection services can monitor, alert and intervene when fraud occurs, helping to reduce the burden on you. (Nikolas Kokovlis/NurPhoto)

Kurt's priority is taking

Most people can handle the basics of identity protection on their own, at least initially. Free tools cover major risks and help prevent common types of fraud. However, the situation changes when your data is exposed in a major breach. Meanwhile, monitoring, cleaning and tracking can turn into a long and frustrating process. This is where paid services can make a real difference. They reduce workload, track exposure from multiple sources and intervene when fraud occurs. However, no service completely eliminates risk. The decision depends on how much time you want to invest and how much support you will need if something goes wrong. For most homes, a layered approach works best. Start with free protection, then decide if adding a paid service is right for your situation.

If you were stolen tomorrow, would you have the time and patience to fix it yourself? Let us know by writing to us at CyberGuy.com

CLICK HERE TO DOWNLOAD THE FOX NEWS PROGRAM

Sign up for my FREE CyberGuy report

  • Get my best tech tips, emergency security alerts and exclusive deals delivered straight to your inbox.
  • For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com trusted by the millions who watch CyberGuy on TV every day.
  • Plus, you'll get instant access to mine Ultimate Scam Survival Guide free when you join.

Copyright 2026 CyberGuy.com. All rights reserved.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button