Main Menu

Search

Try searching for

Identity theft

Social security protection

Credit monitoring

Reputation management

IDShield Blog

Explore our blog for the latest news, advice, and more
across the world of identity theft protection.

A young woman cooking

Recent Articles

What Are the Types of Identity Theft?

What Are the Types of Identity Theft?

Identity theft is a serious business, and business is booming. Nearly 42 million Americans were victims of identity fraud in 2021, up a staggering 79% over 2020.  As every aspect of your life goes digital, your personal information lives on hundreds, if not thousands...

What is PII and What Does PII Include?

What is PII and What Does PII Include?

Personally Identifiable Information (PII) is unique information that can be used to link to an individual’s identity. In some cases, stolen PII can help identity thieves fraudulently access someone else’s identity. PII can include your full name, date of birth, and...


Fraud Protection

How SIM Swap Works: What You Need to Know

How SIM Swap Works: What You Need to Know

Have you heard people talking about SIM, but didn’t know what it was? A SIM card (Subscriber Identity Module) looks like the chip on the front of most credit cards, but slightly bigger. This microdevice enables your phone to connect with your cellular provider and...

A Home’s Buyers Closing Nightmare

A Home’s Buyers Closing Nightmare

Home Buyers: You Need a Closing Fraud Attack Plan It's a stressful situation—buying a new home. The looking, the haggling, and the mere thought of moving can add up to burnout for shoppers. They put down thousands of dollars in earnest money to initiate the sale, then...

Plan Now for the Next Natural Disaster

Plan Now for the Next Natural Disaster

Disaster Plan Boosts Identity Protection It's disaster season. Tornadoes, hurricanes, floods, or wildfires could be just around the corner. What would happen to your vital data if a tornado or hurricane tossed your laptop into another state? Maybe a building landed on...


Data Breach

Graduates Prime Targets For Theft After Breach

Graduates Prime Targets For Theft After Breach

Amidst all the cards, balloons and congratulations, recent high school and college graduates received another present—the breach of credit card data used to order their caps and gowns. Supplier Herff Jones discovered the violation in mid-May as graduates flocked to...

Data Brokers: Who’s Tracking You?

Data Brokers: Who’s Tracking You?

Hackers Know All About You You already know how data breaches occur. Maybe you're fluent in the ways exposed information travels across the internet. Perhaps you even know all about the Dark Web, that uncharted segment of the internet where illegal transactions occur....


Identity Theft Taxes


Internet Privacy

6 Ways to Remove Your Personal Information from Google

6 Ways to Remove Your Personal Information from Google

The social media giants of the world are being pressured by people who are getting sick and tired of their personally identifiable information (PII) being shared. They’re losing faith in being able to keep it secure and private. Google is no exception to this as it...

Big Data Privacy Tug Of War Is On

Big Data Privacy Tug Of War Is On

Is Sharing Internet with Neighbors Risky? An identity crisis has hit the world's information technology industry. Big Tech giants like Apple, Amazon and Comcast have taken sides in the debate about whether data indicators like tracking should become more private or...


Internet Scams

Can You Confirm This Big Purchase?

Can You Confirm This Big Purchase?

Beware Requests to Confirm Big Purchases! The first text—this one's from Amazon—asks you to confirm you bought an iPhone 12 for $1,130. "Just let us know if you did not make the purchase, and we'll cancel it," the text reads. A second message asks for confirmation of...

How They Do It: Spearphishing Scammers at Work

How They Do It: Spearphishing Scammers at Work

5 Warning Signs You're About to Get Hooked How's your firewall? Got those spam filters engaged? An alarming percentage of individuals still fall for spearphishing attacks—either at home or work—even with spam prevention in place. Unfortunately, these numbers are on...


Internet Security

Public Wi-Fi May be Free But it Comes With a Price

Public Wi-Fi May be Free But it Comes With a Price

Practically everyone uses public Wi-Fi. Most coffee shops, restaurants, gyms, planes, airports, and hotels offer it. It’s convenient and free. But the reality is, it comes with a price. Because when you use public Wi-Fi, you’re much more exposed to getting hacked,...

Why You Need Stronger Passwords

Why You Need Stronger Passwords

For every door that opens on the internet, there’s usually a “key” to open that door—in other words, a combination of username and password. And behind each door is a ton of personal information about you. If you use easy-to-hack passwords, reuse them across sites,...


Member Benefits

How to Spot Child Identity Theft and How to Avoid It

How to Spot Child Identity Theft and How to Avoid It

These days, almost everyone is online—including our kids. Translation: children’s private information is more exposed than ever. Why? Because information about them is collected every time they play an online game on their tablet, text with their friends on their...

24/7 Emergency Access for Identity Theft Issues

24/7 Emergency Access for Identity Theft Issues

Identity theft has been a problem for years. Coronavirus has created more new opportunities for ID thieves to steal your info. During the coronavirus pandemic, more people than ever before are using the internet to work, shop, and stay entertained while they remain...


Password Safety

How Secure is Your Password?

How Secure is Your Password?

Are you a QWERTY fan? Maybe sports teams are more your thing—Cowboys42, anyone? If you haven't guessed yet, these are common password choices—ones that should be eternally banned for a variety of reasons. But the main reason to stop these lightweight password...


Taxes

Stolen Tax Refund – 7 Steps to Take Now

Stolen Tax Refund – 7 Steps to Take Now

Spring is here, which means that it’s tax filing season—woohoo! Hopefully, after you go through the necessity of filling out your return, you’ll have a nice refund coming your way, courtesy of Uncle Sam. But wait—can someone steal your tax refund check? Unfortunately,...

5 Ways to Avoid Tax Scams

5 Ways to Avoid Tax Scams

Tax season is stressful enough without having to watch your back for scammers and crooks. LegalShield has tips for you. The following 5 tips will help you avoid common tax season scams.  Beware of Email – The Internal Revenue Service (IRS) and the Canada Revenue...


Speak with an Identity Theft Specialist Today

IDShield Product Overview

Protect Your Identity
with IDShield

Controlling your identity has never been so critical. Rather than waiting for something to go wrong, we need to take an active role in protecting our identity, privacy, and reputation online. IDShield is here to help you understand where the pitfalls lie and how you can protect yourself and your family now and in the future.

IDShield Product Overview

Take Control of your
Privacy with IDShield

We’ve all signed up for something without really thinking about how it affects our privacy. It’s time to take back control of your data and your privacy. IDShield can help make protection personal, giving you tools and services that go beyond reactive alerting. We are the only product that comprehensively equips you with privacy management and guarantees that if your privacy is violated, they’ll help you take back control with an unlimited service guarantee, consultation, and a complete array of tools empowering you to have control over your digital life.