The top methods of identity compromise reported were due to PII being shared in a scam, stolen documents with personal information, and unauthorized access to a computer or mobile device.
The top methods of identity compromise reported were due to PII being shared in a scam, stolen documents with personal information, and unauthorized access to a computer or mobile device. — This cybersecurity statistic was published by Identity Theft Resource Center in June 2025. It covers topics including Identity, Personal information, Scam. The original data appears in 2025 Trends in Identity Report. For the full methodology and detailed findings, refer to the original report.
Share or Copy this stat
Frequently Asked Questions
What does this statistic say?
The top methods of identity compromise reported were due to PII being shared in a scam, stolen documents with personal information, and unauthorized access to a computer or mobile device. This data was published by Identity Theft Resource Center and covers Identity, Personal information, Scam.
Where does this data come from?
This statistic comes from 2025 Trends in Identity Report, published by Identity Theft Resource Center on June 24, 2025. You can view the original report at https://www.idtheftcenter.org/post/2025-trends-in-identity-report-impersonation-scams-rise/.
What cybersecurity topics does this cover?
This statistic relates to Identity, Personal information, Scam. Browse more statistics on Identity or from Identity Theft Resource Center.