While identity monitors and the like cannot stop identity theft from happening, they add an extra set of "eyes", making it less likely that thieves will be able to access information and stay connected to it. Things like encryption, single sign on solutions and password keepers make it more difficult to access the accounts of others, so those in fear of their information's safety often choose these methods, but even the monitors increase safety to some degree. By receiving the reports provided by these services, people can take any necessary actions in order to regain control of their information - thus decreasing the likelihood of thieves entering again and misusing the information in some way.
Designed to be user friendly, these services require those using them to enter in information in the beginning and then take over from there. The services monitor information and accounts, not the people, which can give users break when it comes to scanning the far reaches of information that compile their life stories. With this careful observation of the different aspects of people's accounts - transactions, status, additions, balances, applications - it's all carefully inspected, noted, and reported back in an extremely organized and efficient manner, meant to give people a sense of security and satisfaction about their livelihood. With routine updates by the users in order to account for additional changes to accounts or information - getting married, getting a new job, etc. - these methods can be effectively used for long periods of time.
The methods used by thieves are constantly changing, and for this reason, so are the ways that these identity monitors work. In order to detect identity theft, the services have to be up to date, meaning that when new hacking methods, new security breaches and even new Internet sites are created, these programs change and adapt to meet the needs of consumers. If the protection methods did not update or change, they would be extremely ineffective in terms of providing long lasting support, which would be troublesome and stressful for both the developers of the software and those that rely on it. These changes are meant to keep up with (if not ahead of) changes in methods used by thieves, meaning that user information is kept much safer in the long run.
Focusing on even one of these benefits may be enough to convince someone to choose and identity or credit monitoring service to better protect their information, but the usefulness increases when considering that these will all work together upon implementing some form of protection. Though they are quite convincing, these are only some of the benefits of using identity monitors - the true reward will be seeing these programs in action, and putting the results and reports to good use.