Main Menu

Search

Try searching for

Identity theft

Social security protection

Credit monitoring

Reputation management

IDShield Blog

Explore our blog for the latest news, advice, and more
across the world of identity theft protection.

Recent Articles

What is Synthetic Identity Theft?

What is Synthetic Identity Theft?

Synthetic identity theft occurs when a fraudster combines real and fake personal information to create a new identity—as opposed to stealing an existing one.  A thief can use a real Social Security number combined with a fake name and date of birth to ‘Frankenstein’...

How to Know if Your Identity Has Been Stolen

How to Know if Your Identity Has Been Stolen

Talented identity thieves work subtly and quickly enough to get at your personal information before you even notice that anything’s wrong. So, how do you know if your identity has been stolen? We’ll go over how to check to see if you’ve been a victim then discuss ways...

How Does Online Identity Theft Happen?

How Does Online Identity Theft Happen?

Not everyone will experience online identity theft. But hundreds of thousands of Americans do—it’s one of the fastest growing crimes in America. The fact is, these days, there are scammers looking to steal your online identity, any way they can, 24/7. So how does...


Fraud Protection

How SIM Swap Works: What You Need to Know

How SIM Swap Works: What You Need to Know

Have you heard people talking about SIM, but didn’t know what it was? A SIM card (Subscriber Identity Module) looks like the chip on the front of most credit cards, but slightly bigger. This microdevice enables your phone to connect with your cellular provider and...

Plan Now for the Next Natural Disaster

Plan Now for the Next Natural Disaster

Disaster Plan Boosts Identity Protection It's disaster season. Tornadoes, hurricanes, floods, or wildfires could be just around the corner. What would happen to your vital data if a tornado or hurricane tossed your laptop into another state? Maybe a building landed on...

A Home’s Buyers Closing Nightmare

A Home’s Buyers Closing Nightmare

Home Buyers: You Need a Closing Fraud Attack Plan It's a stressful situation—buying a new home. The looking, the haggling, and the mere thought of moving can add up to burnout for shoppers. They put down thousands of dollars in earnest money to initiate the sale, then...


Data Breach

Graduates Prime Targets For Theft After Breach

Graduates Prime Targets For Theft After Breach

Amidst all the cards, balloons and congratulations, recent high school and college graduates received another present—the breach of credit card data used to order their caps and gowns. Supplier Herff Jones discovered the violation in mid-May as graduates flocked to...

Data Brokers: Who’s Tracking You?

Data Brokers: Who’s Tracking You?

Hackers Know All About You You already know how data breaches occur. Maybe you're fluent in the ways exposed information travels across the internet. Perhaps you even know all about the Dark Web, that uncharted segment of the internet where illegal transactions occur....


Identity Theft Taxes


Internet Privacy

6 Ways to Remove Your Personal Information from Google

6 Ways to Remove Your Personal Information from Google

The social media giants of the world are being pressured by people who are getting sick and tired of their personally identifiable information (PII) being shared. They’re losing faith in being able to keep it secure and private. Google is no exception to this as it...


Internet Scams

Can You Confirm This Big Purchase?

Can You Confirm This Big Purchase?

Beware Requests to Confirm Big Purchases! The first text—this one's from Amazon—asks you to confirm you bought an iPhone 12 for $1,130. "Just let us know if you did not make the purchase, and we'll cancel it," the text reads. A second message asks for confirmation of...

How They Do It: Spearphishing Scammers at Work

How They Do It: Spearphishing Scammers at Work

5 Warning Signs You're About to Get Hooked How's your firewall? Got those spam filters engaged? An alarming percentage of individuals still fall for spearphishing attacks—either at home or work—even with spam prevention in place. Unfortunately, these numbers are on...


Internet Security

Public Wi-Fi May be Free But it Comes With a Price

Public Wi-Fi May be Free But it Comes With a Price

Practically everyone uses public Wi-Fi. Most coffee shops, restaurants, gyms, planes, airports, and hotels offer it. It’s convenient and free. But the reality is, it comes with a price. Because when you use public Wi-Fi, you’re much more exposed to getting hacked,...

Why You Need Stronger Passwords

Why You Need Stronger Passwords

For every door that opens on the internet, there’s usually a “key” to open that door—in other words, a combination of username and password. And behind each door is a ton of personal information about you. If you use easy-to-hack passwords, reuse them across sites,...


Member Benefits

How to Spot Child Identity Theft and How to Avoid It

How to Spot Child Identity Theft and How to Avoid It

These days, almost everyone is online—including our kids. Translation: children’s private information is more exposed than ever. Why? Because information about them is collected every time they play an online game on their tablet, text with their friends on their...

24/7 Emergency Access for Identity Theft Issues

24/7 Emergency Access for Identity Theft Issues

Identity theft has been a problem for years. Coronavirus has created more new opportunities for ID thieves to steal your info. During the coronavirus pandemic, more people than ever before are using the internet to work, shop, and stay entertained while they remain...


Password Safety

How Secure is Your Password?

How Secure is Your Password?

Are you a QWERTY fan? Maybe sports teams are more your thing—Cowboys42, anyone? If you haven't guessed yet, these are common password choices—ones that should be eternally banned for a variety of reasons. But the main reason to stop these lightweight password...


Taxes

Stolen Tax Refund – 7 Steps to Take Now

Stolen Tax Refund – 7 Steps to Take Now

Spring is here, which means that it’s tax filing season—woohoo! Hopefully, after you go through the necessity of filling out your return, you’ll have a nice refund coming your way, courtesy of Uncle Sam. But wait—can someone steal your tax refund check? Unfortunately,...


Speak with an Identity Theft Specialist Today

IDShield Product Overview

Protect Your Identity
with IDShield

Controlling your identity has never been so critical. Rather than waiting for something to go wrong, we need to take an active role in protecting our identity, privacy, and reputation online. IDShield is here to help you understand where the pitfalls lie and how you can protect yourself and your family now and in the future.

IDShield Product Overview

Take Control of your
Privacy with IDShield

We’ve all signed up for something without really thinking about how it affects our privacy. It’s time to take back control of your data and your privacy. IDShield can help make protection personal, giving you tools and services that go beyond reactive alerting. We are the only product that comprehensively equips you with privacy management and guarantees that if your privacy is violated, they’ll help you take back control with an unlimited service guarantee, consultation, and a complete array of tools empowering you to have control over your digital life.