Main Menu

Search

Try searching for

Identity theft

Social security protection

Credit monitoring

Reputation management

IDShield Blog

Explore our blog for the latest news, advice, and more
across the world of identity theft protection.

Avoid These Common Romance Scams

It’s a universal truth that most people want to find love. The problem is, online fraudsters use that desire against unsuspecting, vulnerable people on dating apps and dating sites. Not to burst Cupid’s bubble, but dating and romance scams are blooming like love in...

Why Is It Important To Check Your Credit Report?

Your credit reports are an important record of your credit activity, loans, public records and more. Creditors such as credit card companies and banks submit your credit information to the three major credit bureaus, which compile this info into your credit report. If...

Is Your Computer Hacked? How to Tell & Fix it

Why do hackers attack your computer? If you own a computer, you have probably heard about the threat that hackers pose to your system. Hackers are always seeking to gain access to your computer. Once they get in, they can wreak some serious havoc on your data,...

How to Find Out if Someone Has Hacked Your Email

Identity theft is a general term for a huge, terrible problem that affects millions of people per year. It happens when someone steals your personal information to obtain goods and services. The thieves can harm your finances and your credit, and even nullify...

How to Tell if Your Phone Is Hacked & How to Fix It

Your smart phone is your sanctuary. It’s where you keep photos, memories, accounts, passwords, and lots of other personal information. You probably have it with you at all times! You try to keep it as safe and secure as possible. Is your phone dying faster than usual...

How to Recover Your Hacked Facebook Account

In today's digital age, hacking has become a common issue. Many of us have experienced the frustration and panic that comes with losing control of our social media accounts. But no need to worry—there's always a remedy! In this guide, you’ll learn the steps to regain...

Recognizing Email Scams: Weird Symbols to Look for

Once upon a time, it was a thrill to receive email. We enthusiastically welcomed birthday greetings and meet-up offers from friends, but today, most inboxes receive a deluge of unwanted, suspicious-looking content. Unfortunately, much of it is spam. So, it follows...

Why Older Americans are Top Scam Targets

Scammers who target the elderly seem to be all around us. You’ve likely heard about the grandparent's scam where a caller claims to be an individual's grandchild needing emergency cash. Another classic theme is that the individual has won a prize or giveaway. The...

Job Hunting? Review Your Social Media First

Recruiters, employers, and co-workers are all guilty of checking your social media either to see how you might fit into their organization or out of simple curiosity about who you are; chances are if you have taken the time to look someone up, they have done the same....

How We Review Your Online Reputation

Our powerful automated reputation scan uses cutting-edge technology to pick up on potentially negative or offensive content on your social profiles. Here we provide a breakdown of the things that we look for and flag in your alerts, so you can better understand how...

What to Do if You Get Hacked

If your information has been compromised, find out the next steps you should take to recover your security and protect yourself from future attacks.

Don’t Forget About Those Old Accounts and Profiles

Myspace, Flickr, Hi5, Foursquare, Google Plus…. Remember those? During your time online it’s highly likely that you’ve left a few old accounts and profiles online. These can pose risks to both your reputation and your online security. Here’s how IDShield can help you....

What is a Data Breach?

A data breach occurs when data is stolen. Stolen data can be used to commit identity fraud. Here’s everything you need to know.

Recent Data Breaches

There has been a surge in data breaches. The majority of 2022 data breaches are due to cyberattacks. Learn more about data breaches in 2022.

What’s Your Digital Identity?

You’ve likely heard the term “digital identity” before, repeatedly and perhaps in the context of high-level government talks about internet security. Yet you may have had to ask yourself, What is digital identity, exactly? Your digital identity is how you prove you’re...

How to Report Identity Theft to Credit Bureaus

The rule “thou shalt not steal” is ignored by cybercriminals. Unfortunately, identity theft is a booming business - it’s up by over 400% since 2010. The most common form of identity theft is when people use someone’s Social Security numbers and other personal...

How Common is Identity Theft?

Identity theft is when someone steals your Personal Identifiable Information and uses it for criminal activity. It’s one of the fastest growing crimes in the world. Just how common is identity theft in the US? The answer: common indeed.  It’s increased by over 400%...

Your Online Reputation and Why You Should Care

As we experience massive a shift in how we work, your online persona is more important than ever, but managing it is hard. Your online persona is a collection of social posts, photos, likes, comments, reviews, and follows—that you add to every day. For many years, we...

Scan and Clean Up Your Reddit with IDShield

Whether you’ve been a Reddit user for many years or joined more recently during the hype surrounding the subreddit “r/wallstreetbets,” it’s clear to see how much content is posted on the site every single day. One of the most well-known subreddits is r/IAmA, a format...

Build Your Online Reputation with Our LinkedIn Features

If you’ve done a quick Google search about a person recently, it’s no secret that how we look online matters. From landlords to hiring managers, people are using search engines and social media sites to draw conclusions about others. Being your best self online often...

Top 5 Reasons You Need to do a Social Media Clean Up

Let’s face it, these days, social media is a more important part of our lives than ever. The online footprint we leave on social networks such as Twitter and Facebook can affect our lives in the real world, from work to school, to our personal lives. The way we use...

It’s Easy to Clean Up Your Facebook with IDShield

Can you remember what you did in the summer of 2012? Well, the odds are you probably can’t, but your Facebook probably will know! In this blog post, we explain how easy it is to delete your old Facebook posts and photos with IDShield and our advanced social media...

Scan Your TikTok Social Media with IDShield

Over 130 million people now use TikTok in the U.S., and we’ve all watched and posted millions of hours of TikToks. From epic dance routines to insane optical illusions and funny everyday moments TikTok has been the go-to to post and share funny videos and watch your...

Shocking True Identity Theft Stories & Their Impact

Candida Gutierrez. Stephen Echols. Marcus Calvillo. They aren't household names, but their experiences with identity theft were epic. Their "total" identity theft stories provide lessons we should study and heed. These abuses continued for decades. These three...

How to Identify Fraudulent Payday Loans

There are so many ways to defraud honest Americans. Unfortunately, quite a few of them are hard to detect before damage occurs. Payday loan fraud—when a scammer taps your identity to borrow cash they won't repay—is a prime example of how scammers work the system to...

Scam Busters Win Again

Scams are multiplying. Losses have surged. Consumers feel attacked from many directions by people who want to snatch their wallets. So, what’s a consumer to do? Some folks are fighting back and succeeding in shutting these con artists. The number one tool in a Scam...

Small Business Identity Risks: COVID-19 Loan Scams

Small business owners across the country are facing fraud after receiving aid. As a small business owner who faced the brutal financial hardships during the pandemic, you applied for some government aid to keep your business on its feet. Approved. Great! But then –...

The Facebook Data Breach: Was Your Number Leaked?

Half a billion Facebook user files spilled online Over 500 million Facebook (FB) user files appeared on a popular hacker web forum over the weekend, causing an uproar and making headlines worldwide. News of the download spread at light speed in part because the data...

How Should You Respond to Potential IRS Scams?

It’s that time of year once again. The holidays have come and gone and we’re all settling into a new year. With all of our resolutions aside, one thing is still left to do - our taxes. This season is also the time where IRS-related scams are plentiful.   It’s...

4 Tips to Protect Yourself Against Election Scams

As we near closer to November, our civic responsibility as voters is to inform ourselves and question everything, not only about the issues and candidates but also when it comes to donating, surveying, registering, and voting. Unfortunately, an election year creates...

The Latest Twitter Hack Shows that No One is Immune

Twitter hack: Account takeovers that IDShield will warn you about The latest Twitter hack is being called one of the most audacious cybersecurity hacks of all time. If you don’t know what happened, here’s the high level: On or about July 15, 2020, hackers hijacked the...

Think Before You Click and Accept Those Online T&Cs

Data gathering is a fact of life. According to a recent report, 81% of Americans believe the risks they face from companies collecting their information outweigh the benefits and 79% are concerned about how this data is being used. What may be less widely accepted,...

Keep Your Address Safe with IDShield

With IDShield, you can rest assured that your address is safe. IDShield’s Address Change Monitoring feature monitors your address history through the National Change of Address database. We also provide a snapshot of your United States Postal Service address history....

Marriott Data Breach Impacts 5 Million Guests

Marriott International announced a data breach that targeted their franchise. In February, the hotel chain discovered that an unspecified property system at a franchise hotel had been hacked. It appears cybercriminals gained access to the login details of two...

Members Coronavirus Update

There is a lot going on in the world right now and we are all remaining vigilant and attentive. We recognize that during times of uncertainty, people need confidence and peace of mind. IDShield is built to protect and empower you. Unfortunately, we are seeing...

4 Simple Tips to Avoid Coronavirus Scams

In the face of the ongoing coronavirus pandemic, there are numerous reports of potential consumer and medical scams you should be aware of in order to take the necessary steps to protect your wallet as well as your personal information. Stay vigilant against...

Protect Your Tax Refunds From Identity Theft

Identity Theft This year, the Internal Revenue Service (IRS) will issue around $450 billion in refunds. Targets don't get much more tempting than this and, since identity thieves are all about the money, each February brings strong warnings about income tax-related ID...

How to Prevent Loan Fraud: Loan Monitoring

In addition to the possibility of being responsible for paying back the debt, unauthorized loans taken in you name can negatively impact your credit report – leading to higher payments on future loans and more. IDShield’s Payday Loan Monitoring service provides...

Holiday Fraud Goes Beyond Shopping Scams

It’s the time of the year for making lists and checking them twice. While you may have heard about scams targeting holiday shoppers, did you know that identity thieves employ a much larger arsenal of tactics designed to take advantage of holiday distractions in order...

Macy’s Data Breach Exposes Customer Credit Card Info

It’s the time of year when millions of people begin shopping for the holidays. And every year, more and more are turning to the internet for all their gifting needs. Along with the convenience of shopping online, however, comes new dangers as criminals are ready to...

Online Privacy Protection is Just a Tap Away

Data breaches, hacks and identity theft incidents are on the rise. However, protecting your personal information has never been easier! When you become an IDShield Member, you can download the IDShield mobile app to access all your valuable membership benefits right...

An Open Letter to Equifax’s Mr. Rego Barros

Open letter Equifax I’m certain that I am not alone in applauding your recent mea culpa in The Wall Street Journal. You are only two days in and have already publicly taken ownership of the situation and have charted a course forward. You clearly have much work to do...

Instagram Hack 09.06.17

This Instagram Hack Goes Beyond Celebrity Accounts Instagram has acknowledged it was breached last week. According to reports, as many as six million accounts may have been compromised. Hackers have reportedly created a dark web database of users’ phone numbers and...

Online Shopping Safety Tips

Take steps to shop safely The number of online shoppers in the United States is projected to surpass 200 million in 2015. The ease and convenience of shopping from just about anywhere, avoiding crowds, and not having to find a place to park are just a few things that...

The Internet of Things

Be aware of the potential privacy implications with internet-connected devices The “Internet of Things” or “IoT”—have you heard the buzz around it? Do you know what it is? It is a phrase used to refer to those things that can connect to the internet to send and...

Avoid the 5 Most Common Scams

Common Scams Well disguised scams come at you from all directions – the Internet, mail, even face-to-face contact. Scammers change stories constantly in order to lure victims into their schemes. Understanding the most commonly used tactics will help you avoid becoming...

Scammers Revamp Old Scams to Current Events

Crafty scammers are always looking for ways to get personal information from unsuspecting individuals. They will often develop new scams or revamp old ones using the latest headlines as a platform.  The scam begins with an email that seems to be from a friend. This...

Watch Out for Skimmers

If you use an ATM often or on occasion, it’s wise to pay attention to a few things about the machine you’re using. According to an article from the Better Business Bureau (BBB), ATM skimming is a growing problem. An estimated one in five people have become victims of...

What You Need to Know About Credit Repair Scams

If you have a poor credit rating, the promises made by credit repair companies, to provide clean credit histories and access to fresh lines of credit, may seem like a dream come true. Unfortunately, these offers are too good to be true and may leave you in even worse...

Your Identity? Prove It.

IDShield has seen identity theft victims face a variety of challenges to proving identity and residence address. Learn how to be prepared and what to do.

Co-signing a Loan: Understand the Risks

Co-signing on a loan involves a lot more than just your signature. When you co-sign a loan you put your credit history and personal assets on the line. Though it may be difficult to say no to a friend or family member it is important to make sure you fully understand...

Reroute Robocalls

Robocalls—those automated phone calls delivering a recorded message—are often a nuisance and in certain cases are illegal. Learn how to stop getting them.

Identity Theft Spotlight: Check Fraud

When was the last time you wrote or received a check? While credit card and debit transfers continue to increase, checks remain a common form of payment, especially for larger amounts. According to a 2013 Federal Reserve Payments Study, the number of checks paid in...

The IRS is NOT Calling

Is the IRS calling you or not? These tell-tale signs will let you know if the caller is a legitimate IRS agent or a scammer trying to snatch your cash.

How to Protect Yourself from Holiday Scams

With the holiday season upon us, it isn't just retailers looking to turn a profit. Scammers exploit the spirit of the holidays to help separate victims from their money. Many of these scams are used throughout the year but are given a new twist for the holidays. “We...

Talk To Your Elderly Parents About Internet Safety

The face of the internet is decidedly more wrinkled than many would assume. The Pew Research Center determined 59% of seniors use the internet. Shockingly, a new report by Limelight determined on average, Baby Boomers – who are now in their 50s and 60s – spend more...

Recent Articles

cybersecurity wedding success - View from behind of a large wedding party outside in a garden by a fountain while a photo is being taken.

Cybersecurity Tips for Wedding Success

The big day is on the way! You’ve been planning your wedding with love and care, and finally all your hard work is about to pay off. Or perhaps you are a wedding guest, prepared to attend this exciting event. Whether you are a member of the bridal party or a...

Man looking at a woman's photo on his phone via a dating app

Avoid These Common Romance Scams

It’s a universal truth that most people want to find love. The problem is, online fraudsters use that desire against unsuspecting, vulnerable people on dating apps and dating sites. Not to burst Cupid’s bubble, but dating and romance scams are blooming like love in...

An older man sitting on a sofa looking at his credit report. A laptop and Christmas tree is nearby.

Why Is It Important To Check Your Credit Report?

Your credit reports are an important record of your credit activity, loans, public records and more. Creditors such as credit card companies and banks submit your credit information to the three major credit bureaus, which compile this info into your credit report. If...


Credit Monitoring

An older man sitting on a sofa looking at his credit report. A laptop and Christmas tree is nearby.

Why Is It Important To Check Your Credit Report?

Your credit reports are an important record of your credit activity, loans, public records and more. Creditors such as credit card companies and banks submit your credit information to the three major credit bureaus, which compile this info into your credit report. If...

Couple researching credit freezes using a laptop

How to Freeze Your Credit

"Give credit where credit is due—otherwise freeze it.” Ok, that’s not an actual quote, but yes, you should consider freezing your credit in certain situations. A credit freeze can also be called a security freeze, but why would freezing your credit be beneficial? It’s...

Mother with baby on her lap researching credit freezes on a laptop

What is a Credit Report Freeze?

What is a credit freeze, aka a security freeze? It’s a “lock” on your credit reports that blocks third parties from viewing your credit score. It also blocks new lines of credit under your name, ensuring that online criminals cannot open new accounts. In other words,...


Data Breach

Padlock representing protection against a data breach

What is a Data Breach?

Data breaches used to be a shock, but now that most of us have a vibrant digital presence, they’ve become more of a reality. If your personally identifiable information hasn’t been compromised by a breach yet, there’s a decent chance that it will at some point in the...

Data breach warning in red

Recent Data Breaches

Data breaches, hacks, and digital scams are a huge problem not only for companies and governments but for all of us. Because when your Personal Identifiable Information (PII) is exposed, it leads to identity theft and potentially losing the funds in your bank account....

Businessman and woman touching data protection shield

Can You Keep Your Info From Being Leaked in a Data Breach?

The short answer to this question is: no. But if you ask the right questions, you can certainly lessen the chances that your personal information will be leaked in a company’s data breach. Data breaches have been dominating the news in recent years and unfortunately,...


Fraud Protection

Concerned looking woman viewing email spam on her laptop computer

Recognizing Email Scams: Weird Symbols to Look for

Once upon a time, it was a thrill to receive email. We enthusiastically welcomed birthday greetings and meet-up offers from friends, but today, most inboxes receive a deluge of unwanted, suspicious-looking content. Unfortunately, much of it is spam. So, it follows...

Couple reviewing a document due to concern about fraud

Why Older Americans are Top Scam Targets

Scammers who target the elderly seem to be all around us. You’ve likely heard about the grandparent's scam where a caller claims to be an individual's grandchild needing emergency cash. Another classic theme is that the individual has won a prize or giveaway. The...

Rows of yellow cellphone sim cards.

How SIM Swap Works: What You Need to Know

Have you heard people talking about SIM, but didn’t know what it was? A SIM card (Subscriber Identity Module) looks like the chip on the front of most credit cards, but slightly bigger. This microdevice enables your phone to connect with your cellular provider and...


Hacking

Woman distressed because she is getting a Hacked message on her desktop computer.

Is Your Computer Hacked? How to Tell & Fix it

Why do hackers attack your computer? If you own a computer, you have probably heard about the threat that hackers pose to your system. Hackers are always seeking to gain access to your computer. Once they get in, they can wreak some serious havoc on your data,...

Woman sitting in front of her desktop computer and shocked to realize her email account has been hacked.

How to Find Out if Someone Has Hacked Your Email

Identity theft is a general term for a huge, terrible problem that affects millions of people per year. It happens when someone steals your personal information to obtain goods and services. The thieves can harm your finances and your credit, and even nullify...

Man realizing his mobile phone has been hacked.

How to Tell if Your Phone Is Hacked & How to Fix It

Your smart phone is your sanctuary. It’s where you keep photos, memories, accounts, passwords, and lots of other personal information. You probably have it with you at all times! You try to keep it as safe and secure as possible. Is your phone dying faster than usual...


Identity Theft

man in handcuffs

What is Criminal Identity Theft?

Criminal identity theft happens when someone who is cited or arrested for a crime uses someone else’s personal information as ID. The result: a criminal record now exists in the name of the person whose ID was hijacked. This can have all sorts of repercussions, and...

Thief stealing a Social Security Card from a wallet

What is Synthetic Identity Theft?

Synthetic identity theft occurs when a fraudster combines real and fake personal information to create a new identity—as opposed to stealing an existing one.  A thief can use a real Social Security number combined with a fake name and date of birth to ‘Frankenstein’...


Identity Theft Taxes


Internet Privacy

Illustration of numberous olda and new social media icons such as myspace, Google Plus, LinkedIn, etc.

Don’t Forget About Those Old Accounts and Profiles

Myspace, Flickr, Hi5, Foursquare, Google Plus…. Remember those? During your time online it’s highly likely that you’ve left a few old accounts and profiles online. These can pose risks to both your reputation and your online security. Here’s how IDShield can help you....


Internet Scams

cybersecurity wedding success - View from behind of a large wedding party outside in a garden by a fountain while a photo is being taken.

Cybersecurity Tips for Wedding Success

The big day is on the way! You’ve been planning your wedding with love and care, and finally all your hard work is about to pay off. Or perhaps you are a wedding guest, prepared to attend this exciting event. Whether you are a member of the bridal party or a...

Man looking at a woman's photo on his phone via a dating app

Avoid These Common Romance Scams

It’s a universal truth that most people want to find love. The problem is, online fraudsters use that desire against unsuspecting, vulnerable people on dating apps and dating sites. Not to burst Cupid’s bubble, but dating and romance scams are blooming like love in...


Internet Security

cybersecurity wedding success - View from behind of a large wedding party outside in a garden by a fountain while a photo is being taken.

Cybersecurity Tips for Wedding Success

The big day is on the way! You’ve been planning your wedding with love and care, and finally all your hard work is about to pay off. Or perhaps you are a wedding guest, prepared to attend this exciting event. Whether you are a member of the bridal party or a...

A woman typing on her mobile phone as she sits in a cafe.

Public Wi-Fi May be Free But it Comes With a Price

Practically everyone uses public Wi-Fi. Most coffee shops, restaurants, gyms, planes, airports, and hotels offer it. It’s convenient and free. But the reality is, it comes with a price. Because when you use public Wi-Fi, you’re much more exposed to getting hacked,...

Screen showing the place to enter a password.

Why You Need Stronger Passwords

For every door that opens on the internet, there’s usually a “key” to open that door—in other words, a combination of username and password. And behind each door is a ton of personal information about you. If you use easy-to-hack passwords, reuse them across sites,...


Member Benefits

Smiling business woman talking on a mobile phone while typing on a laptop.

24/7 Emergency Access for Identity Theft Issues

Identity theft has been a problem for years. Coronavirus has created more new opportunities for ID thieves to steal your info. During the coronavirus pandemic, more people than ever before are using the internet to work, shop, and stay entertained while they remain...


Online Identity

Illustration of mobile phone and computer window surrounded by icons representing tips to protect yourself.

Guide for Protecting Your Digital Identity

What is a digital identity? Do I have a digital identity? And what, exactly, does my digital identity tell other people about me? It’s a fact of modern life that nearly everyone has a digital identity. It’s also a fact that your digital identity may not speak...

Illustration of laptop with passwords exposed and data breached

How to Know if Your Identity Has Been Stolen

Talented identity thieves work subtly and quickly enough to get at your personal information before you even notice that anything’s wrong. So, how do you know if your identity has been stolen? We’ll go over how to check to see if you’ve been a victim then discuss ways...

Illustration of credit card, email, and social media icons on hooks symbolizing the potentially dangers of personal information.

How Does Online Identity Theft Happen?

Not everyone will experience online identity theft. But hundreds of thousands of Americans do—it’s one of the fastest growing crimes in America. The fact is, these days, there are scammers looking to steal your online identity, any way they can, 24/7. So how does...


Password Safety

Person typing on a laptop. Text on screen reads: Connect to address 192.160.1.10; user name: *********; password: ***********; Access granted...; exited after 0.006146 seconds ; any key to continue . . .

How Secure is Your Password? Password Strength Tips

Are you a QWERTY fan? Maybe sports teams are more your thing—Cowboys42, anyone? If you haven't guessed yet, these are common password choices—ones that should be eternally banned for a variety of reasons. But the main reason to stop these lightweight password...

A man viewing a laptop login screen

Password Security: How to Make a Good Password

Are your passwords secure? If you’re guilty of reusing that same password of your dog’s name for every single account, you are not alone. That said, it might be time for an intervention on “password clinging.” Data breaches happen every day, and the sad fact is, they...


Social Media

Mixed race young female looking worried and stress while reading bad news on her mobile phone.

How to Recover Your Hacked Facebook Account

In today's digital age, hacking has become a common issue. Many of us have experienced the frustration and panic that comes with losing control of our social media accounts. But no need to worry—there's always a remedy! In this guide, you’ll learn the steps to regain...

Illustration of a company employee reviewing the online profiles of potential employees.

Job Hunting? Review Your Social Media First

Recruiters, employers, and co-workers are all guilty of checking your social media either to see how you might fit into their organization or out of simple curiosity about who you are; chances are if you have taken the time to look someone up, they have done the same....

Shocked man looking at his old social media posts.

Don’t Let Your Social Media Posts from Years Ago Define You

There’s no denying that social media has shifted the way we express ourselves. From discussing current events to wearing that favorite outfit, to making new friends—what was once reserved for social get-togethers has now moved online. It’s sometimes hard to remember a...


Taxes

Woman looking at tax tables on a computer monitor while seated at a desk in an office.

Stolen Tax Refund – 7 Steps to Take Now

Spring is here, which means that it’s tax filing season—woohoo! Hopefully, after you go through the necessity of filling out your return, you’ll have a nice refund coming your way, courtesy of Uncle Sam. But wait—can someone steal your tax refund check? Unfortunately,...


Uncategorized


Speak with an identity theft specialist today

IDShield product overview

Protect your identity
with IDShield

Controlling your identity has never been so critical. Rather than waiting for something to go wrong, we need to take an active role in protecting our identity, privacy, and reputation online. IDShield is here to help you understand where the pitfalls lie and how you can protect yourself and your family now and in the future.

IDShield product overview

Take control of your
privacy with IDShield

We’ve all signed up for something without really thinking about how it affects our privacy. It’s time to take back control of your data and your privacy. IDShield can help make protection personal, giving you tools and services that go beyond reactive alerting. We are the only product that comprehensively equips you with privacy management and guarantees that if your privacy is violated, they’ll help you take back control with an unlimited service guarantee, consultation, and a complete array of tools empowering you to have control over your digital life.