Your Data Is Protected by Triple Layer DefenseSM

All your information is stored using the highest level of encryption from our Triple Layer DefenseSM system. Our system has been independently verified and is continuously audited to ensure our high standards of security.

This means your information is encrypted in transit, in use and at rest.

Additionally, your stored data is...

  • Encrypted at the system level in the cloud
  • Encrypted within your unique account

Be sure to take advantage of all your account features and keep your information up-to-date in your Online Identity VaultTM.

Close

Menu

1-866-460-0095

Secure

What are Identity Crimes?

Identity crimes impacted 38.3 million people in 2015 – that’s a new victim every second.1 These crimes encompass lost/stolen personally identifiable information (PII), fraud and identity theft.

  • Lost/Stolen PII: the theft or misplacement of information that can be used to identify you as an individual.
  • Fraud: the theft and misuse of a victim’s existing accounts, primarily financial accounts.
  • Identity Theft: the stealing of an individual’s PII to create new accounts under the victim’s name.
  • $38.3 million identity crimes victims in 20151
  • 18 hours to repair identity theft2
  • $16 billion lost to fraud in 20162

How does it happen?

  • Vishing is when a scam artist poses as a legitimate person or company over the phone with the intention of stealing money or personal information. Vishing is typically used to steal credit card numbers or other information used in identity theft schemes.
  • SMSishing occurs when you receive an SMS text message that appears to be from a reputable source, such as your bank, asking for personal details. The message will often send you to a malicious website with the goal of stealing your personal or financial data.
  • Keystroke Logging is software that discreetly tracks the computer keys typed on a keyboard. This software is typically used to obtain user names, passwords and PINs.
  • Man-in-the-Browser is a type of Trojan horse (computer virus) that infects a web browser. It takes advantage of vulnerabilities in your browser to discretely modify web pages, transaction content or insert additional transactions.
  • Dumpster Diving occurs when someone goes through your trash looking for bills, preapproved credit card applications or other mail that contains your personal information. Always shred sensitive material before you dispose of it.
  • Phishing is when an online scammer poses as a legitimate person or company with the intention of stealing money or personal information. Phishing attempts often come via email or pop-up spam message online claiming to be a familiar entity, like your bank, and ask for your personal information. Do not click on, forward or reply to these fake requests.
  • Skimming occurs when someone steals your payment card information through a special device that attaches to payment terminals. Look for signs that a payment terminal has been tampered with and use a chip-embedded payment card when possible.
  • Change of Address (theft) occurs when an identity thief fills out a change of address form and diverts your mail to another address. They often do this to hide an identity theft event or to obtain personal information which they can exploit for personal gain.
  • Lost or Stolen Wallet is a common first step in committing identity theft. Stealing your personal belongings, such as a purse and/or wallet, often exposes your payment cards, checks, driver's license and mail containing personal information. This information can be used to commit identity theft. Contact the police and your certified Resolution Specialist in the event your wallet is lost or stolen.

Additional steps can be taken to prevent this disruptive and costly crime.

Start your protection today!

With our customizable services, you can choose the right protection to fit your budget and risk tolerance. With our award-winning protection, we will strive to restore your identity — giving you and your family peace of mind.

12016 Fraud Report, Javelin Strategy & Research 2 2017 Fraud Report, Javelin Strategy & Research

Timeout Notification


seconds
remaining

For your Privacy and Protection, this online session is about to timeout due to inactivity.

If you are still working, please Click the Continue button below. To log out now, click the log out button. If no choice is made, you will be automatically logged out.