gaite
Life Events/Financial Planning

Identity Theft and Fraud Recovery

Your information is exposed. Here's what to do first.

Identity theft moves fast and the steps to stop it can feel overwhelming. It disrupts your finances, your sense of security, and your trust in systems you depend on every day. Taking action right now, even one step, is the hardest and most important part. You don't have to figure out the right order on your own.

8 guides
28 actions

Your plan includes

8 guides. 28 concrete actions.

Each guide focuses on one area of this life event. Inside each guide, the AI walks you through specific actions with deliverables, deadlines, and resources.

01

Contain the Damage

Secure the most exposed accounts, cards, email, and phone access first. This guide stops active fraud from spreading before you begin the longer recovery process.

Lock compromised financial accounts and cardsSecure primary email and phone accessTerminate unauthorized sessions and revoke app permissions
02

Map the Exposure

Determine whether this is one compromised account or broader identity theft. The scope of the breach drives every decision that follows.

Identify what information was compromisedDetermine the attack vectorTrace downstream exposure
03

Protect Credit and Recover Accounts

Freeze credit, replace compromised cards, dispute fraudulent charges, and secure core financial accounts in the right order. Sequencing matters here because missteps can reopen exposure.

Place credit freezes at all three bureausDispute fraudulent charges and accountsReplace compromised cards and credentials
04

Document and Report

Build a case log with reports, dates, and confirmation numbers that support every dispute and claim. Fraud recovery is a paper trail problem, and this guide keeps it organized.

File an FTC Identity Theft ReportFile a police reportBuild and maintain a case logSend dispute letters to creditors and bureaus
05

Clean Up Devices, Mail, and Identity Systems

Close the entry points that allowed the breach so the attacker cannot restart the cycle. This covers compromised devices, stolen mail, forwarded addresses, and phishing footholds.

Scan and secure compromised devicesStop mail theft and address fraudReclaim hijacked accounts and profilesHarden authentication across systems
06

Protect Tax, Payroll, and Dependents

Extend recovery beyond banking into tax filing, employment records, government benefits, and the identities of dependents. These systems are often the last to be checked and the hardest to fix after delay.

Request an IRS Identity Protection PINCheck for fraudulent tax filings and wage reportsProtect dependent identitiesNotify payroll and benefits departments
07

Coordinate Supporters and Protect Privacy

Let helpers reduce burden without creating new exposure or taking over the process. This guide covers how to share access safely and preserve the victim's autonomy.

Define what help is needed and from whomShare access safelyProtect the person's autonomy and dignity
08

Monitor and Rebuild Trust

Create a realistic follow-up rhythm for credit checks, alerts, new letters, and periodic account audits. The active phase ends, but the risk does not.

Set up ongoing credit monitoringBuild a periodic review routineRecognize and respond to re-victimization signalsRebuild digital trust gradually

Ready to navigate identity theft and fraud recovery?

Answer a few questions about your situation. Gaite builds a personalized plan with the guides and actions most relevant to you.

Personal plans start at $10/month. Family plans $25/month for up to 5 members. Cancel anytime.