Main Menu

Search

Try searching for

Identity theft

Social security protection

Credit monitoring

Reputation management

IDShield Blog

Explore our blog for the latest news, advice, and more
across the world of identity theft protection.

What to Do After Being Hacked

If your information has been compromised, find out the next steps you should take to recover your security and protect yourself from future attacks.

What is a Data Breach?

A data breach occurs when data is stolen. Stolen data can be used to commit identity fraud. Here’s everything you need to know.

Recent Data Breaches

There has been a surge in data breaches. The majority of 2022 data breaches are due to cyberattacks. Learn more about data breaches in 2022.

What’s Your Digital Identity?

You’ve likely heard the term “digital identity” before, repeatedly and perhaps in the context of high-level government talks about internet security. Yet you may have had to ask yourself, What is digital identity, exactly? Your digital identity is how you prove you’re...

How to Report Identity Theft to Credit Bureaus

The rule “thou shalt not steal” is ignored by cybercriminals. Unfortunately, identity theft is a booming business - it’s up by over 400% since 2010. The most common form of identity theft is when people use someone’s Social Security numbers and other personal...

How Common is Identity Theft?

Identity theft is when someone steals your Personal Identifiable Information and uses it for criminal activity. It’s one of the fastest growing crimes in the world. Just how common is identity theft in the US? The answer: common indeed.  It’s increased by over 400%...

An Identity Thief Rented Housing Using My Name?

Why would another individual rent living space in your name? There are multiple answers to that question, and none of them bode well for anyone victimized by this scheme. It means a scam artist holds their identity details and intends to maximize that data’s value....

How to Identify Fraudulent Payday Loans

There are so many ways to defraud honest Americans. Unfortunately, quite a few of them are hard to detect before damage occurs. Payday loan fraud—when a scammer taps your identity to borrow cash they won't repay—is a prime example of how scammers work the system to...

Scam Busters Win Again

Scams are multiplying. Losses have surged. Consumers feel attacked from many directions by people who want to snatch their wallets. So, what’s a consumer to do? Some folks are fighting back and succeeding in shutting these con artists. The number one tool in a Scam...

The Latest Twitter Hack Shows that No One is Immune

Twitter hack: Account takeovers that IDShield will warn you about The latest Twitter hack is being called one of the most audacious cybersecurity hacks of all time. If you don’t know what happened, here’s the high level: On or about July 15, 2020, hackers hijacked the...

Think Before You Click and Accept Those Online T&Cs

Data gathering is a fact of life. According to a recent report, 81% of Americans believe the risks they face from companies collecting their information outweigh the benefits and 79% are concerned about how this data is being used. What may be less widely accepted,...

Keep Your Address Safe with IDShield

With IDShield, you can rest assured that your address is safe. IDShield’s Address Change Monitoring feature monitors your address history through the National Change of Address database. We also provide a snapshot of your United States Postal Service address history....

Marriott Data Breach Impacts 5 Million Guests

Marriott International announced a data breach that targeted their franchise. In February, the hotel chain discovered that an unspecified property system at a franchise hotel had been hacked. It appears cybercriminals gained access to the login details of two...

How to Spot an Email Scam

COVID-19 is top of mind for everyone, including cybercriminals, who are concocting schemes to steal your personal data. IDShield shares what to look out for.

Members Coronavirus Update

There is a lot going on in the world right now and we are all remaining vigilant and attentive. We recognize that during times of uncertainty, people need confidence and peace of mind. IDShield is built to protect and empower you. Unfortunately, we are seeing...

4 Simple Tips to Avoid Coronavirus Scams

In the face of the ongoing coronavirus pandemic, there are numerous reports of potential consumer and medical scams you should be aware of in order to take the necessary steps to protect your wallet as well as your personal information. Stay vigilant against...

Stop Thieves from Taking out Loans in Your Name

In addition to the possibility of being responsible for paying back the debt, unauthorized loans taken in you name can negatively impact your credit report – leading to higher payments on future loans and more. IDShield’s Payday Loan Monitoring service provides...

Protect Your Tax Refunds From Identity Theft

Identity Theft This year, the Internal Revenue Service (IRS) will issue around $450 billion in refunds. Targets don't get much more tempting than this and, since identity thieves are all about the money, each February brings strong warnings about income tax-related ID...

Holiday Fraud Goes Beyond Shopping Scams

It’s the time of the year for making lists and checking them twice. While you may have heard about scams targeting holiday shoppers, did you know that identity thieves employ a much larger arsenal of tactics designed to take advantage of holiday distractions in order...

Privacy Protection is Just a Tap Away

Data breaches, hacks and identity theft incidents are on the rise. However, protecting your personal information has never been easier! When you become an IDShield Member, you can download the IDShield mobile app to access all your valuable membership benefits right...

An Open Letter to Equifax’s Mr. Rego Barros

An Open Letter to Equifax’s Mr. Rego Barros I’m certain that I am not alone in applauding your recent mea culpa in The Wall Street Journal. You are only two days in and have already publicly taken ownership of the situation and have charted a course forward. You...

Instagram Hack 09.06.17

This Instagram Hack Goes Beyond Celebrity Accounts Instagram has acknowledged it was breached last week. According to reports, as many as six million accounts may have been compromised. Hackers have reportedly created a dark web database of users’ phone numbers and...

Shopping Online Safely

Take steps to shop safely The number of online shoppers in the United States is projected to surpass 200 million in 2015. The ease and convenience of shopping from just about anywhere, avoiding crowds, and not having to find a place to park are just a few things that...

The Internet of Things

Be aware of the potential privacy implications with internet-connected devices The “Internet of Things” or “IoT”—have you heard the buzz around it? Do you know what it is? It is a phrase used to refer to those things that can connect to the internet to send and...

Avoid the 5 Most Common Scams

Common Scams Well disguised scams come at you from all directions – the Internet, mail, even face-to-face contact. Scammers change stories constantly in order to lure victims into their schemes. Understanding the most commonly used tactics will help you avoid becoming...

Scammers Revamp Old Scams to Current Events

Crafty scammers are always looking for ways to get personal information from unsuspecting individuals. They will often develop new scams or revamp old ones using the latest headlines as a platform.  The scam begins with an email that seems to be from a friend. This...

Watch Out for Skimmers

If you use an ATM often or on occasion, it’s wise to pay attention to a few things about the machine you’re using. According to an article from the Better Business Bureau (BBB), ATM skimming is a growing problem. An estimated one in five people have become victims of...

What You Need to Know About Credit Repair Scams

If you have a poor credit rating, the promises made by credit repair companies, to provide clean credit histories and access to fresh lines of credit, may seem like a dream come true. Unfortunately, these offers are too good to be true and may leave you in even worse...

Your Identity? Prove It.

IDShield has seen identity theft victims face a variety of challenges to proving identity and residence address. Learn how to be prepared and what to do.

Co-signing a Loan: Understand the Risks

Co-signing on a loan involves a lot more than just your signature. When you co-sign a loan you put your credit history and personal assets on the line. Though it may be difficult to say no to a friend or family member it is important to make sure you fully understand...

Reroute Robocalls

Robocalls—those automated phone calls delivering a recorded message—are often a nuisance and in certain cases are illegal. Learn how to stop getting them.

Identity Theft Spotlight: Check Fraud

When was the last time you wrote or received a check? While credit card and debit transfers continue to increase, checks remain a common form of payment, especially for larger amounts. According to a 2013 Federal Reserve Payments Study, the number of checks paid in...

The IRS is NOT Calling

Is the IRS calling you or not? These tell-tale signs will let you know if the caller is a legitimate IRS agent or a scammer trying to snatch your cash.

How to Protect Yourself from Holiday Scams

With the holiday season upon us, it isn't just retailers looking to turn a profit. Scammers exploit the spirit of the holidays to help separate victims from their money. Many of these scams are used throughout the year but are given a new twist for the holidays. “We...

Talk To Your Elderly Parents About Internet Safety

The face of the internet is decidedly more wrinkled than many would assume. The Pew Research Center determined 59% of seniors use the internet. Shockingly, a new report by Limelight determined on average, Baby Boomers – who are now in their 50s and 60s – spend more...

Recent Articles

Man replying to a phone text while sitting at a work table

Can You be Hacked by Replying to a Text?

Have you ever lost your smartphone? Feels like you’ve lost your world—which, in a way, you have. Your phone has all your contacts, voice mails, apps, social media, photos, videos, search history—not to mention that you use it to call, face time, email, video and text....

Upset woman who has been hacked looking at her laptop

What to Do After Being Hacked

When it comes to getting hacked and having your personally identifiable information compromised, these days, it’s not a question of “if,” it’s more a question of “when.” Data breaches are happening with more regularity and cyber thieves are becoming even more...


Credit Monitoring

Couple researching credit freezes using a laptop

How to Freeze Your Credit

"Give credit where credit is due—otherwise freeze it.” Ok, that’s not an actual quote, but yes, you should consider freezing your credit in certain situations. A credit freeze can also be called a security freeze, but why would freezing your credit be beneficial? It’s...

Mother with baby on her lap researching credit freezes on a laptop

What is a Credit Report Freeze?

What is a credit freeze, aka a security freeze? It’s a “lock” on your credit reports that blocks third parties from viewing your credit score. It also blocks new lines of credit under your name, ensuring that online criminals cannot open new accounts. In other words,...

Woman seated at a desk navigating a laptop with her fingers.

What is Credit Monitoring and Do I Need it?

Your credit is important—it’s the key indicator of your financial health. Your creditworthiness is the difference between being able to take out a loan to buy your dream home…or not. Credit monitoring services keep a close eye on your credit and track changes in your...


Data Breach

Padlock representing protection against a data breach

What is a Data Breach?

Data breaches used to be a shock, but now that most of us have a vibrant digital presence, they’ve become more of a reality. If your personally identifiable information hasn’t been compromised by a breach yet, there’s a decent chance that it will at some point in the...

Data breach warning in red

Recent Data Breaches

Data breaches, hacks, and digital scams are a huge problem not only for companies and governments but for all of us. Because when your Personal Identifiable Information (PII) is exposed, it leads to identity theft and potentially losing the funds in your bank account....

Businessman and woman touching data protection shield

Can You Keep Your Info From Being Leaked in a Data Breach?

The short answer to this question is: no. But if you ask the right questions, you can certainly lessen the chances that your personal information will be leaked in a company’s data breach. Data breaches have been dominating the news in recent years and unfortunately,...


Fraud Protection

Rows of yellow cellphone sim cards.

How SIM Swap Works: What You Need to Know

Have you heard people talking about SIM, but didn’t know what it was? A SIM card (Subscriber Identity Module) looks like the chip on the front of most credit cards, but slightly bigger. This microdevice enables your phone to connect with your cellular provider and...

Businessman shown holding house keys and a replica of a small house..

A Home’s Buyers Closing Nightmare

Home Buyers: You Need a Closing Fraud Attack Plan It's a stressful situation—buying a new home. The looking, the haggling, and the mere thought of moving can add up to burnout for shoppers. They put down thousands of dollars in earnest money to initiate the sale, then...

A tornado touching down in a rural farm area.

Plan Now for the Next Natural Disaster

Disaster Plan Boosts Identity Protection It's disaster season. Tornadoes, hurricanes, floods, or wildfires could be just around the corner. What would happen to your vital data if a tornado or hurricane tossed your laptop into another state? Maybe a building landed on...


Hacking

Man replying to a phone text while sitting at a work table

Can You be Hacked by Replying to a Text?

Have you ever lost your smartphone? Feels like you’ve lost your world—which, in a way, you have. Your phone has all your contacts, voice mails, apps, social media, photos, videos, search history—not to mention that you use it to call, face time, email, video and text....

Upset woman who has been hacked looking at her laptop

What to Do After Being Hacked

When it comes to getting hacked and having your personally identifiable information compromised, these days, it’s not a question of “if,” it’s more a question of “when.” Data breaches are happening with more regularity and cyber thieves are becoming even more...

young woman discovers she has been hacked

How to Tell if You’re Being Hacked

Have you ever asked yourself: “am I being hacked?” Perhaps not, because skilled hackers do their dirty work in a way that doesn’t tip off their victims. And that’s their point—the longer that a victim is unaware that they’ve been hacked, the more damage that hackers...


Identity Theft

man in handcuffs

What is Criminal Identity Theft?

Criminal identity theft happens when someone who is cited or arrested for a crime uses someone else’s personal information as ID. The result: a criminal record now exists in the name of the person whose ID was hijacked. This can have all sorts of repercussions, and...

Thief stealing a Social Security Card from a wallet

What is Synthetic Identity Theft?

Synthetic identity theft occurs when a fraudster combines real and fake personal information to create a new identity—as opposed to stealing an existing one.  A thief can use a real Social Security number combined with a fake name and date of birth to ‘Frankenstein’...

Couple working at laptop to resolve tax identity theft

What is Tax Identity Theft

As the Fab Four sang, you can’t avoid the tax man. But if you’re careful, you can avoid tax identity theft. What is tax identity theft? It’s when someone steals your identity and fraudulently files taxes or works in your name. Translation: someone else can end up with...


Identity Theft Taxes


Internet Privacy

A man deleting documents on his smartphone.

6 Ways to Remove Your Personal Information from Google

The social media giants of the world are being pressured by people who are getting sick and tired of their personally identifiable information (PII) being shared. They’re losing faith in being able to keep it secure and private. Google is no exception to this as it...


Internet Scams

A frustrated woman sitting on a living room sofa looking at her smartphone.

Can You Confirm This Big Purchase?

Beware Requests to Confirm Big Purchases! The first text—this one's from Amazon—asks you to confirm you bought an iPhone 12 for $1,130. "Just let us know if you did not make the purchase, and we'll cancel it," the text reads. A second message asks for confirmation of...


Internet Security

A woman typing on her mobile phone as she sits in a cafe.

Public Wi-Fi May be Free But it Comes With a Price

Practically everyone uses public Wi-Fi. Most coffee shops, restaurants, gyms, planes, airports, and hotels offer it. It’s convenient and free. But the reality is, it comes with a price. Because when you use public Wi-Fi, you’re much more exposed to getting hacked,...

Screen showing the place to enter a password.

Why You Need Stronger Passwords

For every door that opens on the internet, there’s usually a “key” to open that door—in other words, a combination of username and password. And behind each door is a ton of personal information about you. If you use easy-to-hack passwords, reuse them across sites,...


Member Benefits

Mother, father, boy and girl sit on a sofa while looking at a laptop screen.

How to Spot Child Identity Theft and How to Avoid It

These days, almost everyone is online—including our kids. Translation: children’s private information is more exposed than ever. Why? Because information about them is collected every time they play an online game on their tablet, text with their friends on their...

Smiling business woman talking on a mobile phone while typing on a laptop.

24/7 Emergency Access for Identity Theft Issues

Identity theft has been a problem for years. Coronavirus has created more new opportunities for ID thieves to steal your info. During the coronavirus pandemic, more people than ever before are using the internet to work, shop, and stay entertained while they remain...


Online Identity

Illustration of mobile phone and computer window surrounded by icons representing tips to protect yourself.

Guide for Protecting Your Digital Identity

What is a digital identity? Do I have a digital identity? And what, exactly, does my digital identity tell other people about me? It’s a fact of modern life that nearly everyone has a digital identity. It’s also a fact that your digital identity may not speak...

Illustration of laptop with passwords exposed and data breached

How to Know if Your Identity Has Been Stolen

Talented identity thieves work subtly and quickly enough to get at your personal information before you even notice that anything’s wrong. So, how do you know if your identity has been stolen? We’ll go over how to check to see if you’ve been a victim then discuss ways...

Illustration of credit card, email, and social media icons on hooks symbolizing the potentially dangers of personal information.

How Does Online Identity Theft Happen?

Not everyone will experience online identity theft. But hundreds of thousands of Americans do—it’s one of the fastest growing crimes in America. The fact is, these days, there are scammers looking to steal your online identity, any way they can, 24/7. So how does...


Password Safety

Person typing on a laptop. Text on screen reads: Connect to address 192.160.1.10; user name: *********; password: ***********; Access granted...; exited after 0.006146 seconds ; any key to continue . . .

How Secure is Your Password?

Are you a QWERTY fan? Maybe sports teams are more your thing—Cowboys42, anyone? If you haven't guessed yet, these are common password choices—ones that should be eternally banned for a variety of reasons. But the main reason to stop these lightweight password...


Social Media

Young woman holding and viewing a smartphone while having coffee in the kitchen at home

Abandoned Online Accounts

How many social media accounts do you participate in? How many sites are there where you have an account that you no longer use to socialize with others? Now consider two more questions, “What personal information of yours is stored within that account, even if it’s...

Man working at a desk while holding a mobile phone.

The Latest Twitter Hack Shows that No One is Immune

Twitter hack: Account takeovers that IDShield will warn you about The latest Twitter hack is being called one of the most audacious cybersecurity hacks of all time. If you don’t know what happened, here’s the high level: On or about July 15, 2020, hackers hijacked the...

A man working in a dark room with multiple computer monitors.

The Twitter Hack – The Latest News And How It Happened

How Did A Tech Giant Like Twitter Get Hacked? Twitter was hacked on July 15th 2020. Notable figures like Kanye West, Bill Gates, Elon Musk and Joe Biden had their accounts compromised. The hacker posted from these notable accounts with a similar statement: Send...


Taxes

Woman looking at tax tables on a computer monitor while seated at a desk in an office.

Stolen Tax Refund – 7 Steps to Take Now

Spring is here, which means that it’s tax filing season—woohoo! Hopefully, after you go through the necessity of filling out your return, you’ll have a nice refund coming your way, courtesy of Uncle Sam. But wait—can someone steal your tax refund check? Unfortunately,...


Uncategorized


Speak with an Identity Theft Specialist Today

IDShield Product Overview

Protect Your Identity
with IDShield

Controlling your identity has never been so critical. Rather than waiting for something to go wrong, we need to take an active role in protecting our identity, privacy, and reputation online. IDShield is here to help you understand where the pitfalls lie and how you can protect yourself and your family now and in the future.

IDShield Product Overview

Take Control of your
Privacy with IDShield

We’ve all signed up for something without really thinking about how it affects our privacy. It’s time to take back control of your data and your privacy. IDShield can help make protection personal, giving you tools and services that go beyond reactive alerting. We are the only product that comprehensively equips you with privacy management and guarantees that if your privacy is violated, they’ll help you take back control with an unlimited service guarantee, consultation, and a complete array of tools empowering you to have control over your digital life.