Identity Theft Blog and Resources

Featured Posts

Card image cap
How to Protect Your Identity in the Workpl...

Businesses and employees are often major targets of identity theft and cybercrime. And there are three reasons why. When...

Read More
Card image cap
Experts Explain the Importance of Ethical ...

This is part one of a two-part cybersecurity series. When you think of a modern-day hacker, you probably think of a hood...

Read More
Card image cap
The Heartbreak of Spousal Identity Theft

It's Valentine's Day and you and your spouse are enjoying a candle lit dinner at your favorite restaurant. Everything f...

Read More

All Posts

  • Generic placeholder image
    How to Protect Your Identity in the Workplace
    Businesses and employees are often major targets of identity theft and cybercrime. And there are three reasons why. When it comes to cybercrime, businesses are easy targets. They typically hold a massive amount of both employ...
  • Generic placeholder image
    The Consequences of Identity Document Forgery
    Guest Post by Stephanie Gordon When we lose a wallet, purse, or bag, our thoughts typically turn to their recovery, not because of whatever money was in it, but because of the identity documents it contains. More often than ...
  • Generic placeholder image
    What Is Your Risk in Small Data Breaches?
    Guest Post from Lexington Law Maybe it started with something small, like one unusual charge on your credit card or just a compromised email address, but you were able to contain it by refuting the charge or closing the acco...
  • Generic placeholder image
    How Much Do You Know about Identity Theft? [Quiz]
    Identity theft is an ever-growing threat that has sparked worry around the world. From individuals to businesses and organizations, identity theft has affected more people than you'd probably imagine. Although you cannot keep...
  • Generic placeholder image
    Experts Explain the Importance of Ethical Hacking (Part 2 of 2)
    This is part two of a two-part cybersecurity series. As mentioned in part one of this two-part series, ethical hacking involves people who are legally hired to hack into data systems in order to expose the system's weak point...
  • Generic placeholder image
    Experts Explain the Importance of Ethical Hacking (Part 1 of 2)
    This is part one of a two-part cybersecurity series. When you think of a modern-day hacker, you probably think of a hooded figure maliciously working on a computer in a dark room. What probably doesn't come to mind is a compl...
  • Generic placeholder image
    How to Prevent Identity Theft, and What to Do If It Happens to You
    Guest Post from Lexington Law In today’s increasingly digital society, identity theft is an issue that plagues millions of Americans. Identity theft happens when someone steals your personal information to reap financ...
  • Generic placeholder image
    What You Should Know about ID Theft after Death
    Imagine your grandmother calling you and saying she thinks your grandfather who passed away two months ago is still alive. She explains that she keeps getting credit card bills in his name and wants to know if he somehow esc...
  • Generic placeholder image
    Possible Orbitz Data Breach May Have Exposed Payment Information of 880,000 Credit Cards
    On March 20, 2018, the well-known travel booking site, Orbitz, announced that there may have been a potential data breach exposing a significant amount of customer credit card/payment information. The company suspects that i...
  • Generic placeholder image
    How Online Dating Can Lead to Identity Theft
    Maybe you recently broke up with someone or you were dumped. You're feeling emotionally vulnerable: After a while, you and your best friend decide that it’s time for you to get back into the dating game. So, you sign u...

Compare the top ranked companies

Find the right company for you.

MyIDCare image#1
LegalShield IDShield image#2
LifeLock image#3
IdentityIQ image#4
Zander ID Protection image#5
Identity Guard image#6View
More