IDShield Blog
Explore our blog for the latest news, advice, and more
across the world of identity theft protection.
Data Breach | June 30, 2021
Graduates Prime Targets For Theft After Breach
Amidst all the cards, balloons and congratulations, recent high school and college graduates received another present—the breach of credit card data used to order their caps and gowns. Supplier Herff Jones discovered the violation in mid-May as graduates flocked to large venues for the first live...
Identity Theft | June 30, 2021
Six Ways to Guard Your Family’s Gamers
With online gaming, you’re often battling two enemies without realizing it. One’s the warrior or beast on your screen; the other is a silent thief operating in the background who tries to hack your files. These second actors aren’t trying to earn a new skin or rack up a high score; they want your entire record, including...
Internet Privacy | June 28, 2021
Big Data Privacy Tug Of War Is On
An identity crisis has hit the world’s information technology industry. Big Tech giants like Apple, Amazon and Comcast have taken sides in the debate about whether data indicators like tracking should become more private or more ubiquitous. In many cases, consumers are asked to share a piece of their internet...
Recent Articles
Back-to-School Scams: Outwit Fraudsters Before They Strike
Scammers love to take advantage of this hectic school season. They can easily slip under the radar and steal personal information. Then, they can use the identity and other private data to make purchases, sign up for services, or sell personal information to other bad...
See Beyond the BNPL Hype: Smart Ways to Safeguard Your Identity and Monitor Your Credit
Imagine: You purchase a television, a sofa, or some other expensive item, and all you have to do is quickly sign up for a Buy Now Pay Later (BNPL) program to pay off the debt in bite-sized installments instead of handing over huge chunks of cash up front. Who wouldn’t...
Protecting Yourself From Identity Theft
By Steve Earls, a seasoned cybersecurity leader who has innovated cybersecurity and risk management strategies at the CIA, Verizon Wireless, and Trane Technologies, is the Chief Information Security Officer overseeing LegalShield’s cybersecurity programs and teams....
Buying Gift Cards for Loved Ones? Avoid These Common Scams
By Steve Earls, a seasoned cybersecurity leader who has innovated cybersecurity and risk management strategies at the CIA, Verizon Wireless, and Trane Technologies, is the Chief Information Security Officer overseeing LegalShield’s cybersecurity programs and teams....
Recognizing Email Scams: Weird Symbols to Look for
Once upon a time, it was a thrill to receive email. We enthusiastically welcomed birthday greetings and meet-up offers from friends, but today, most inboxes receive a deluge of unwanted, suspicious-looking content. Unfortunately, much of it is spam. So, it follows...
Why Older Americans are Top Scam Targets
Scammers who target the elderly seem to be all around us. You’ve likely heard about the grandparent's scam where a caller claims to be an individual's grandchild needing emergency cash. Another classic theme is that the individual has won a prize or giveaway. The...
What is a Data Breach?
Data breaches used to be a shock, but now that most of us have a vibrant digital presence, they’ve become more of a reality. If your personally identifiable information hasn’t been compromised by a breach yet, there’s a decent chance that it will at some point in the...
Recent Data Breaches
Data breaches, hacks, and digital scams are a huge problem not only for companies and governments but for all of us. Because when your Personal Identifiable Information (PII) is exposed, it leads to identity theft and potentially losing the funds in your bank account....
Can You Keep Your Info From Being Leaked in a Data Breach?
The short answer to this question is: no. But if you ask the right questions, you can certainly lessen the chances that your personal information will be leaked in a company’s data breach. Data breaches have been dominating the news in recent years and unfortunately,...
Protect Your Business Email From Being Compromised (BEC)
W-2 forms and other income tax document thefts caused massive headaches for the government and taxpayers years ago when stolen identity refund fraud (SIRF) was at its peak. The Internal Revenue Service (IRS) lost billions of dollars, and taxpayer refunds were...
Online Privacy Has Never Been Easier
We can help protect your personal information by helping you keep your sensitive, private data more secure. Now, we can do that even better! Data brokers collect your valuable personal information when you use the internet, make online purchases, accept website...
Don’t Forget About Those Old Accounts and Profiles
Myspace, Flickr, Hi5, Foursquare, Google Plus…. Remember those? During your time online it’s highly likely that you’ve left a few old accounts and profiles online. These can pose risks to both your reputation and your online security. Here’s how IDShield can help you....
Keep Your Private Information Safe On Dating Apps—The Do’s and Don’ts
Getting to know someone online means sharing your personal details. But you must be careful not to overshare because if you do, it could lead to your identity being stolen or your private data being sold. If you’re asking yourself, “is the Tinder app private?” or “are...
How to Spot and Avoid Travel Scams
Originally published March 3, 2021. Blog post updated for accuracy, comprehensiveness and freshness on June 27, 2024. As travel season peaks, fraudsters ramp up their efforts to deceive unsuspecting travelers. Being informed, proactive, and vigilant are ways to...
Cybersecurity Tips for Wedding Success
The big day is on the way! You’ve been planning your wedding with love and care, and finally all your hard work is about to pay off. Or perhaps you are a wedding guest, prepared to attend this exciting event. Whether you are a member of the bridal party or a...
Avoid These Common Romance Scams
It’s a universal truth that most people want to find love. The problem is, online fraudsters use that desire against unsuspecting, vulnerable people on dating apps and dating sites. Not to burst Cupid’s bubble, but dating and romance scams are blooming like love in...
Cybersecurity Tips for Wedding Success
The big day is on the way! You’ve been planning your wedding with love and care, and finally all your hard work is about to pay off. Or perhaps you are a wedding guest, prepared to attend this exciting event. Whether you are a member of the bridal party or a...
Public Wi-Fi May be Free But it Comes With a Price
Practically everyone uses public Wi-Fi. Most coffee shops, restaurants, gyms, planes, airports, and hotels offer it. It’s convenient and free. But the reality is, it comes with a price. Because when you use public Wi-Fi, you’re much more exposed to getting hacked,...
Why You Need Stronger Passwords
For every door that opens on the internet, there’s usually a “key” to open that door—in other words, a combination of username and password. And behind each door is a ton of personal information about you. If you use easy-to-hack passwords, reuse them across sites,...
Child Identity Theft: How Can Child Identity Theft Occur?
These days, almost everyone is online including our kids. Translation: children’s private information is more exposed than ever. Why? Because information about them is collected every time they play an online game on their tablet, text with their friends on their...
24/7 Emergency Access for Identity Theft Issues
Identity theft has been a problem for years. Coronavirus has created more new opportunities for ID thieves to steal your info. During the coronavirus pandemic, more people than ever before are using the internet to work, shop, and stay entertained while they remain...
New IDShield Identity Theft Services For Digital Privacy & Cyberbullying
Anti-cyberbullying consultation and assistance IDShield now offers advanced services that provide comprehensive privacy and anti-cyberbullying consultation and assistance. In addition to data monitoring and threat alerts, members will receive one-on-one consultation...
How Secure is Your Password? Password Strength Tips
Are you a QWERTY fan? Maybe sports teams are more your thing—Cowboys42, anyone? If you haven't guessed yet, these are common password choices—ones that should be eternally banned for a variety of reasons. But the main reason to stop these lightweight password...
Password Security: How to Make a Good Password
Are your passwords secure? If you’re guilty of reusing that same password of your dog’s name for every single account, you are not alone. That said, it might be time for an intervention on “password clinging.” Data breaches happen every day, and the sad fact is, they...
Two Factor Authentication: What it is and Why it’s Key in Your Online Security
Your digital privacy is more at risk than ever If the data breaches we have seen in the past few years have taught us anything, it’s that we should take our digital security seriously. And the number one reason breaches occur? Passwords. These days, the password with...
Speak with an identity theft specialist today
IDShield Product Overview
Protect Your Identity
with IDShield
Controlling your identity has never been so critical. Rather than waiting for something to go wrong, we need to take an active role in protecting our identity, privacy, and reputation online. IDShield is here to help you understand where the pitfalls lie and how you can protect yourself and your family now and in the future.
IDShield Product Overview
Take Control of your
Privacy with IDShield
We’ve all signed up for something without really thinking about how it affects our privacy. It’s time to take back control of your data and your privacy. IDShield can help make protection personal, giving you tools and services that go beyond reactive alerting. We are the only product that comprehensively equips you with privacy management and guarantees that if your privacy is violated, they’ll help you take back control with an unlimited service guarantee, consultation, and a complete array of tools empowering you to have control over your digital life.