My Cart  
You haven’t added anything to your cart yet. Once you add an item, you’ll see it here.



Shopping Online Safely

Identity Theft News

Shopping Online Safely

The number of online shoppers in the United States is projected to surpass 200 million in 2015. The ease and convenience of shopping from just about anywhere, avoiding crowds and not having to find a place to park are just a few things that make shopping on a retailer’s website an attractive option.

However, with convenience comes caution. Concerns about payment data security and other personal information makes some consumers shy about conducting their shopping via the internet. The following tips, if practiced, can bring about a sense of security while conducting online transactions:

Take steps to shop safely

1. Be Choosy. Don’t click indiscriminately on a link that you find in an unsolicited email or pop-up advertisement. Choose only well-known websites that have an address that starts with “https” when you get to the point of providing your payment information during the purchase process.

2. Be Precise. When navigating to a particular retailer’s website, make sure you have the exact web address. Some thieves have purchased website names that are very similar to a reputable website with the hopes that shoppers will find the fraudulent website instead. Trying to shop on the fraudulent site could lead to theft of personal information or not getting what you think you are purchasing.

3. Be Skeptical. Did you find some fantastic deal that you haven’t seen anywhere else? Beware! Ads for the season’s “hot” item, especially at a ridiculously good price, could actually be a scheme to get you to click on a link or approve a download that brings with it a virus or other trouble.

4. Be Unique. It is dangerous to use the same password for all of your online accounts. Why? If one of the accounts you access online is breached, the unauthorized intruder might acquire your password. They can then try to use the same password on other sites you use which might include other shopping sites or your checking account or credit card accounts. Use different passwords for each of your online accounts.

5. Be Thorough. Keep a record of all your purchases and the websites where each purchase was made. Save receipts, confirmation email messages, etc. Make note of how you paid for each item and then check the account to make sure only the authorized charge went through.

 A service of the Investigators of Kroll These materials are derived from the research and discovery activities of Kroll Fraud Specialists and Licensed Investigators, and have been gathered from personal, historical, and aggregated experience performing specialized restoration services on behalf of Identity Theft victims. While believed to be accurate, these materials do not constitute legal advice, and are not guaranteed to be correct, complete or up-to-date. No part of this document may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into a language or computer language, in any form by any means, electronic, mechanical, optical, chemical, manual or otherwise, without the express written consent of Kroll. These materials are provided for informational purposes only. MEM-104-2014-12-04


WannaCry Ransomware

May 16, 2017

Over the past 72 hours, a massive ransomware attack occurred affecting businesses, government organizations, and individuals in well over 100 countries. The ransomware – called WannaCry (also called WannaCrypt) – encrypts the victim’s hard drive and demands a ransom, paid in the virtual currency bitcoin, equivalent to approximately US$300. Kroll strongly recommends organizations and individuals take action to reduce your risk and prepare for inevitable future similar attacks.


What is Ransomware?

Ransomware is a type of malware; once executed on a computer system, it seeks to encrypt a wide range of files, denying the user access, and effectively holding the files “hostage” in return for a monetary payment – a ransom. It prevents users from accessing their computers, files, or mobile devices by holding them for ransom. Users are typically expected to pay high ransom amounts to get access back to their data. Many times, the ransomware will falsely claim that the user has committed a crime with their computer, and that they are being fined by the police department or a government agency.


U.S. Government Data Shows Healthcare Breaches Up 320%

May 11, 2017

Check the pulse of your personal healthcare information


When you visit your physician or a healthcare facility, the last thing on your mind is the personal information you are required to share. Where is it going? Who sees your information? What could happen to it? Healthcare providers collect personal data ranging from your name and date of birth, to credit card numbers, medical insurance numbers (which may include your Social Security number), diagnosis information, prescriptions, and medical history.


Providers are required to store this information securely, but data thieves know how valuable your personal information is. Despite healthcare providers’ best efforts, they often fall victim to data breaches. That puts your protected health information (PHI) in the hands of hackers and thieves who may use it themselves or sell it for others to use to execute a variety of schemes and crimes.


IDShield Investigator Insights: Social Media

April 20, 2017

Sharing on Social Media Today Can Impact Your Future

Many of us can’t remember life before social media. How did we make it through the day without our friends telling us how they were feeling or posting pictures of what they had for lunch?


While it seems like social media sites have been around forever, the first, Six Degrees, launched only 20 years ago, making social media a relatively new means of staying in touch. As social animals, our desire to connect with others is great, and social media, along with the proliferation of mobile devices, makes it easy to do. Since we like to think we can trust our friends, it’s easy to let our guard down when we’re commenting on a Facebook post or sharing vacation photos on Instagram.


IDShield Investigator Tips: Social Media

April 20, 2017

When It Comes to Staying Safe on Social Media, Listen to Your Mother

Twenty-one percent of adult internet users have had an email or social media account compromised.1 Applying some old-fashioned words of wisdom to our modern online lives can help prevent it from happening to you. Here are some tips from the Investigators at Kroll:


“An ounce of prevention is worth a pound of cure.”

Danger Lurks Where Technology Intersects Public Safety

April 13, 2017

It’s 3 a.m., and you are awakened by the sounds of sirens blaring outside. All of the cell phones in your house start to chirp, and when you look down, you see an emergency notification with a warning to evacuate immediately. The alert says to head north and that all major roads will be used as one-way streets to enable a rapid evacuation. Twenty miles north of your town the same thing is happening, except in this case, the warning is telling everyone that they should head south.

Simple Steps to Protect Yourself Against Identity Theft

March 17, 2017

Despite the fact that the U.S. Director of National Intelligence ranked cybercrime as the No. 1 national security threat, very few Americans take real steps to protect themselves, their family and their businesses against identity theft.

As the head of a company that helps consumers protect themselves from this issue, I've become increasingly aware of its perils, and how it impacts millions of people each year. I see identity theft as a growing epidemic that warrants immediate action. There are a number of simple steps to take, and some may seem obvious, but many people choose not to address the issue with preventive measures. How often do you back up personal and corporate computers, check your credit report and statements, or update your virus protection software?