DC Identity Theft: Strategies To Protect Your Data

By Pam George | Last updated on January 29, 2026 Featuring practical insights from contributing attorneys Chris Griner, Marc S. Martin and Kurt Wimmer

While the cyber hack of Sony Pictures Entertainment uncovered confidential emails that titillated Hollywood, it also exposed more than 47,000 Social Security numbers of past and present employees, and company financials.

Even as corporations and financial institutions are coming up with new data safeguards against ID theft, hackers are devising ways to infiltrate them. For legal advice on safeguarding your data, consult with an experienced consumer law attorney.

Consumers Create Data Trails Every Day

“Think about the information imprint that the average consumer creates today versus 10 years ago,” says Kurt Wimmer. “Each time you make an online purchase, send a text message, click an online advertisement or download a new app on your smartphone, this creates a new thread of data.”

Most of this electronic information is stored by businesses. “To hackers, these are prized commodities,” says Marc S. Martin, partner at Perkins Coie. “As the size of the data pie increases, so too will hackers’ attempts to breach it.”

Protect Your Consumer Rights

If a business has scammed you, find a top consumer law attorney in the Super Lawyers directory to stand up for you and your legal rights.

Find a lawyer today

When the Breach Hits

If you suspect your information has been compromised, or you may be a victim of identity theft, Stroock & Stroock & Lavan’s Chris Griner says:

  • Collect copies of statements that indicate fraud and document the date on which you discovered a problem
  • Alert your financial services provider immediately
  • Notify any entities that make direct deposits into your account of the suspected breach

Personal diligence remains important. The only secure computer may be the one that is never used.

Chris Griner

Notify The Main Credit Reporting Agencies

Also notify the three main credit reporting agencies (CRAs) — Equifax, Experian, TransUnion — to place a fraud alert on your account, notes Martin.

“It will make it harder for bad actors to open unauthorized credit accounts,” he says. “It also provides you free access to your credit report, which will help you determine if any unauthorized credit accounts have been opened in your name.”

As the size of the data pie increases, so too will hackers’ attempts to breach it.

Marc S. Martin

Resolving the Issue With the Financial Institution

If only one credit card has been compromised, and the breach was discovered early, you can generally resolve the issue with the financial institution, Griner says. He recommends that identity theft victims file an Identity Theft Victim’s Complaint and Affidavit with the Federal Trade Commission (FTC).

Identity thieves often test consumers with charges of less than a dollar to see if the consumer is watching.

— Kurt Wimmer

Steps To Protect Yourself From a Cyber Attack

  • Remove all personal and financial information, such as account numbers, from mobile devices before discarding, Martin says.
  • Instead of the usual password, such as a child’s name followed by numbers, use a series of words with numbers and special characters, says Griner. Change passphrases about every 90 days, and stress the importance of securing personal data to family members.
  • Pay attention to correspondence from major retailers or banks. According to Griner, 47 states have laws requiring private or government entities to notify customers if personal information has been compromised. He suggests you verify the authenticity of any correspondence — it could be a scam.
  • Regularly review credit card and bank statements for unexpected charges, even small ones. “Identity thieves often test consumers with charges of less than a dollar to see if the consumer is watching,” says Wimmer. If the charge goes unnoticed, they “pull the trigger” on larger purchases.

Identity-theft protection services and a consumer law attorney are options, too. However, “Personal diligence remains important,” Griner says. “The only secure computer may be the one that is never used.”

Was this helpful?

What do I do next?

Enter your location below to get connected with a qualified attorney today.
0 suggestions available Use up and down arrow keys to navigate. Touch device users, explore by touch or with swipe gestures.

At Super Lawyers, we know legal issues can be stressful and confusing. We are committed to providing you with reliable legal information in a way that is easy to understand. Our legal resources pages are created by experienced attorney writers and writers that specialize in legal content in consultation with the top attorneys that make our Super Lawyers lists. We strive to present information in a neutral and unbiased way, so that you can make informed decisions based on your legal circumstances.

0 suggestions available Use up and down arrow keys to navigate. Touch device users, explore by touch or with swipe gestures.

Find top lawyers with confidence

The Super Lawyers patented selection process is peer influenced and research driven, selecting the top 5% of attorneys to the Super Lawyers lists each year. We know lawyers and make it easy to connect with them.

Find a lawyer near you