IDShield Blog
Explore our blog for the latest news, advice, and more
across the world of identity theft protection.
Data Breach | June 30, 2021
Graduates Prime Targets For Theft After Breach
Amidst all the cards, balloons and congratulations, recent high school and college graduates received another present—the breach of credit card data used to order their caps and gowns. Supplier Herff Jones discovered the violation in mid-May as graduates flocked to large venues for the first live...
Identity Theft | June 30, 2021
Six Ways to Guard Your Family’s Gamers
With online gaming, you’re often battling two enemies without realizing it. One’s the warrior or beast on your screen; the other is a silent thief operating in the background who tries to hack your files. These second actors aren’t trying to earn a new skin or rack up a high score; they want your entire record, including...
Internet Privacy | June 28, 2021
Big Data Privacy Tug Of War Is On
An identity crisis has hit the world’s information technology industry. Big Tech giants like Apple, Amazon and Comcast have taken sides in the debate about whether data indicators like tracking should become more private or more ubiquitous. In many cases, consumers are asked to share a piece of their internet...
Recent Articles
How Data Brokers Sell Your Identity & Personal Information
Do you know who's selling your data? That can be a difficult question to answer. Credit reporting bureaus are data brokers, but they’re only the tip of the iceberg. Tech companies, credit card companies, marketing agencies and more mine data for their own use, which...
What is PII and What Does PII Include?
Personally Identifiable Information (PII) is unique information that can be used to link to an individual’s identity. In some cases, stolen PII can help identity thieves fraudulently access someone else’s identity. PII can include your full name, date of birth, and...
6 Ways to Remove Your Personal Information from Google
The social media giants of the world are being pressured by people who are getting sick and tired of their personally identifiable information (PII) being shared. They’re losing faith in being able to keep it secure and private. Google is no exception to this as it...
How SIM Swap Works: What You Need to Know
Have you heard people talking about SIM, but didn’t know what it was? A SIM card (Subscriber Identity Module) looks like the chip on the front of most credit cards, but slightly bigger. This microdevice enables your phone to connect with your cellular provider and...
Plan Now for the Next Natural Disaster
Disaster Plan Boosts Identity Protection It's disaster season. Tornadoes, hurricanes, floods, or wildfires could be just around the corner. What would happen to your vital data if a tornado or hurricane tossed your laptop into another state? Maybe a building landed on...
A Home’s Buyers Closing Nightmare
Home Buyers: You Need a Closing Fraud Attack Plan It's a stressful situation—buying a new home. The looking, the haggling, and the mere thought of moving can add up to burnout for shoppers. They put down thousands of dollars in earnest money to initiate the sale, then...
Graduates Prime Targets For Theft After Breach
Amidst all the cards, balloons and congratulations, recent high school and college graduates received another present—the breach of credit card data used to order their caps and gowns. Supplier Herff Jones discovered the violation in mid-May as graduates flocked to...
Data Brokers: Who’s Tracking You?
Hackers Know All About You You already know how data breaches occur. Maybe you're fluent in the ways exposed information travels across the internet. Perhaps you even know all about the Dark Web, that uncharted segment of the...
Did Facebook’s Massive Data Leak Include Your Phone Number?
Half a Billion Facebook User Files Spilled Online Over 500 million Facebook (FB) user files appeared on a popular hacker web forum over the weekend, causing an uproar and making headlines worldwide. News of the download spread at light speed in part because the data...
Protect Your Business Email From Being Compromised (BEC)
W-2 forms and other income tax document thefts caused massive headaches for the government and taxpayers years ago when stolen identity refund fraud (SIRF) was at its peak. The Internal Revenue Service (IRS) lost billions of dollars, and taxpayer refunds were...
How Data Brokers Sell Your Identity & Personal Information
Do you know who's selling your data? That can be a difficult question to answer. Credit reporting bureaus are data brokers, but they’re only the tip of the iceberg. Tech companies, credit card companies, marketing agencies and more mine data for their own use, which...
6 Ways to Remove Your Personal Information from Google
The social media giants of the world are being pressured by people who are getting sick and tired of their personally identifiable information (PII) being shared. They’re losing faith in being able to keep it secure and private. Google is no exception to this as it...
Big Data Privacy Tug Of War Is On
Is Sharing Internet with Neighbors Risky? An identity crisis has hit the world's information technology industry. Big Tech giants like Apple, Amazon and Comcast have taken sides in the debate about whether data indicators like tracking should become more private or...
Ever Heard of Dark Patterns? Don’t Let These Questionable Tactics Claim Your Cash or Personal Info
Dark patterns. You'll soon hear much more about these techniques that manipulate consumers into decisions they might not ordinarily make. Think you can spot these manipulatives in online ads? It's more complicated than you think. So much so that a group of data and...
Can You Confirm This Big Purchase?
Beware Requests to Confirm Big Purchases! The first text—this one's from Amazon—asks you to confirm you bought an iPhone 12 for $1,130. "Just let us know if you did not make the purchase, and we'll cancel it," the text reads. A second message asks for confirmation of...
How They Do It: Spearphishing Scammers at Work
5 Warning Signs You're About to Get Hooked How's your firewall? Got those spam filters engaged? An alarming percentage of individuals still fall for spearphishing attacks—either at home or work—even with spam prevention in place. Unfortunately, these numbers are on...
Public Wi-Fi May be Free But it Comes With a Price
Practically everyone uses public Wi-Fi. Most coffee shops, restaurants, gyms, planes, airports, and hotels offer it. It’s convenient and free. But the reality is, it comes with a price. Because when you use public Wi-Fi, you’re much more exposed to getting hacked,...
Why You Need Stronger Passwords
For every door that opens on the internet, there’s usually a “key” to open that door—in other words, a combination of username and password. And behind each door is a ton of personal information about you. If you use easy-to-hack passwords, reuse them across sites,...
Small Business Owners: If You’re Not Worried About Cyberattacks, Here’s Why You Should Be
In a lot of ways, being a small business owner is like being a parent. Your business is your baby, and you need to protect it at all costs. With that said, you’ve probably already heard about cybercrime and the importance of maintaining good “online protection.” But...
How to Spot Child Identity Theft and How to Avoid It
These days, almost everyone is online—including our kids. Translation: children’s private information is more exposed than ever. Why? Because information about them is collected every time they play an online game on their tablet, text with their friends on their...
24/7 Emergency Access for Identity Theft Issues
Identity theft has been a problem for years. Coronavirus has created more new opportunities for ID thieves to steal your info. During the coronavirus pandemic, more people than ever before are using the internet to work, shop, and stay entertained while they remain...
New Plan Features to Proactively Protect Your Private Data and Identity
Anti-Cyberbullying Consultation and Assistance IDShield now offers advanced services that provide comprehensive privacy and anti-cyberbullying consultation and assistance. In addition to data monitoring and threat alerts, members will receive one-on-one consultation...
How Secure is Your Password?
Are you a QWERTY fan? Maybe sports teams are more your thing—Cowboys42, anyone? If you haven't guessed yet, these are common password choices—ones that should be eternally banned for a variety of reasons. But the main reason to stop these lightweight password...
Keep Your Username and Password Credentials Protected with IDShield
Are Your Passwords Secure? If you’re guilty of reusing that same password of your dog’s name for every single account, you are not alone. That said, it might be time for an intervention on “password clinging.” Data breaches happen every day, and the sad fact is, they...
Two-Step Authentication: What it is and Why it’s Key in Your Online Security
Your Digital Privacy is More at Risk than Ever If the data breaches we have seen in the past few years have taught us anything, it’s that we should take our digital security seriously. And the number one reason breaches occur? Passwords. These days, the password with...
Speak with an Identity Theft Specialist Today
IDShield Product Overview
Protect Your Identity
with IDShield
Controlling your identity has never been so critical. Rather than waiting for something to go wrong, we need to take an active role in protecting our identity, privacy, and reputation online. IDShield is here to help you understand where the pitfalls lie and how you can protect yourself and your family now and in the future.
IDShield Product Overview
Take Control of your
Privacy with IDShield
We’ve all signed up for something without really thinking about how it affects our privacy. It’s time to take back control of your data and your privacy. IDShield can help make protection personal, giving you tools and services that go beyond reactive alerting. We are the only product that comprehensively equips you with privacy management and guarantees that if your privacy is violated, they’ll help you take back control with an unlimited service guarantee, consultation, and a complete array of tools empowering you to have control over your digital life.